Practical Connection Essay_ CLoud Computing

  

Executive Program Practical Connection Assignment

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

 Requirements:

1. Provide a 500 word (or 2 pages double spaced) minimum reflection.

2. Use proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Question to ponder… should references be used in a personal reflection paper?

3. Share a personal connection that identifies specific knowledge and theories from this course. 

4. Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

5. You should NOT provide an overview of the assignments assigned in the course. The assignment is to reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.  

6. Personal Connection paper should have a maximum of 20% similarity score. 

Please refer to the following APA format file and follow everything mentioned. Especially Table of contents, Conclusion.

Week 3 Writing Assignment

 Define and describe NAS. Assume you must implement a shared file system within the cloud. What company would you select? Why? What costs should your client expect to pay for cloud-based data on a gigabyte (GB) basis? 

Information Systems Architecture

 

Discuss how an information system’s architecture planning contributes to overall enterprise risk in the organizations. Research the following elements for a specific organization of your choosing: 

  • Platforms 
  • Networks 
  • Applications 
  • Databases 
  • Operating Systems 

How can risks can be eliminated? Note: You may choose to continue researching your chosen organization in this week’s individual assignment. 

Business Intellegence

Discussion: What are the common business problems addressed by Big Data analytics?  In the era of Big Data, are we about to witness the end of data warehousing? Why? 

 Questions: 1. What is Big Data? Why is it important? Where does Big Data come from? 

2. What do you think the future of Big Data will be? Will it lose its popularity to something else? If so, what will it be? 

3. What is Big Data analytics? How does it differ from regular analytics? 

4. What are the critical success factors for Big Data analytics? 

5. What are the big challenges that one should be mindful of when considering the implementation of Big Data analytics? 

Exercise:  At teradatauniversitynetwork.com, go to the Sports Analytics page. Find applications of Big Data in sports. Summarize your findings 

Discussion: Computer Crimes

 After reading about the surge of internet computer crimes, discuss the following: How have computer crimes driven changes in information technology security? How does the Fourth Amendment apply to computer crimes? 

MIS 504 Introduction to Information Systems

  

Is it safe to log onto a wireless network at an airport, library, or other public location? It depends on how vigilant you are. Even the wireless network in your home is vulnerable because radio frequency bands are easy to scan. Both Bluetooth and Wi-Fi networks are susceptible to hacking by eavesdroppers. You are expected to prepare a research project (e.g. 400/500 words) about malicious programs (e.g. Shamoon), and the damage being caused to public and private sectors in Saudi Arabia, if any. 

Purpose: The assignment is to promote awareness of various security threats, and to develop a better understanding of how enterprises/business firms improve their security environment via the establishment of a framework for security and control. 

Assignment Guideline:

1. Use Time New Roman.

2. Use Font Size 12.

3. Use 1.15 Line Spacing. 

AUtomated Code Review: WebGoat source code using the VCG SAST tool and verify the findings within the code.

 
For this assignment, My task is to scan the WebGoat source code using the VCG SAST tool and verify the findings within the code. In particular, you will be be using VisualCodeGrepper, which is an open-source SAST tool running on Windows. It supports multiple programming languages(C++, C#, VB, PHP, Java, and PL/SQL).. Prepare a simple report based on OWASP Findings Report Guide, and submit the report in a PDF format   There should be a section summarizing all the findings by:

  1. Risk level
  2. OWASP Top 10 Threats

To install VCG and run your scans, follow these instructions:

  1. Download WebGoat 8.0 from GitHub in a zip format.
  2. Extract the zip file into a directory.
  3. Download VCG from the project page.
  4. Install VCG on a Windows machine. Consider the system requirements on the project page.

Twitter Data Analysis

 

 

NF 160 Introduction to Data Science

Twitter Data Analysis

Due Date: Nov 5, 2020

Points: 22

Objective:

Examine students’ ability to create Twitter applications in order to download tweets by using the R platform for data science projects.

Tasks:

Students will create a Twitter application for scraping tweets by using the R platform. They will use this application to download a total of 200 tweets by searching with their chosen hashtag and from a user profile. The first 100 tweets will be collected by using a student-chosen hashtag/keyword and the rest 100 tweets will be collected from a student-chosen Twitter user profile.

Deliverables:

Two files:

  • One word processing/PDF file explaining the steps of Twitter application creation
  • The RStudio file that contains codes for Twitter data collection 

Submission:

Upload both of these files in Canvas Assignment section.

Points and Rubrics:

Word Processing/PDF file:

  • The word processing/PDF file explaining the steps of Twitter application creation will get a maximum of 5 points
  • Inclusion of comprehensive application creation steps will get a maximum of 5 points
  • Inclusion of minimal application creation steps will get a maximum of 3 points
  • No explanation of Twitter application creation will get 0 point

RStudio File:

  • The RStudio file will get a maximum of 6 points
  • 150-199 tweets comprising of a hashtag and user profile will get 5 points
  • 50-149 tweets comprising of a hashtag and use profile will get 3 points
  • Less than 50 tweets comprising of a hashtag and user profile will get 2 points
  • No tweet will get 0 points

CRM PowerPoint

IT and business managers see inefficiencies in everyday processes, as these inefficiencies are often related to current systems in place. As such, IT and business managers need to identify these issues to senior management and offer solutions.

In this interactive assignment, you will analyze the role of CRM systems in business and assess the issues that make a CRM system necessary for successful customer relationship management. Assume the role of an IT Manager working for an organization where there is no CRM in place. You may use a business scenario of your choice (this may be a real world scenario with which you are familiar or one you create). For your initial post, you will create PowerPoint presentation and screencast video of your PowerPoint. This presentation will be created for your CIO and should provide all pertinent information.

Your PowerPoint presentation must include a minimum of four inefficient processes you have identified related to recent customer interactions. Consider the CRM research you conducted and present to your CIO the CRM that best meets your needs. Include a rationale as to how it will alleviate the identified inefficiencies, providing a minimum of four reasons why the CRM and the vendor chosen would be the solution for your organization. Support your statements with evidence from your required and researched sources.