Note: For this week only, you are only required to post your original reply to the discussion question for a total of 20 points. No response is required. Indicate at least one source or reference in your original post. You can use your textbook or current research articles. Please see the rubric for information on how I will assess your discussion post.
QUESTION: Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service. (300words )
A2D
Please go through the attachment for assignment details
Apply: Signature Assignment: Internet Systems Technologies Comparison
Assignment Content
- Imagine this scenario: Pine Valley Furniture wants to use Internet systems to provide value to its customers and staff. There are many software technologies available to Internet systems development teams, including SOAP, HTML, JSON, XML, CSS, ASP.NET, Objective-C, PHP, Java™, Python, Ruby, AJAX, Swift™, AngularJS, Bootstrap, jQuery, and R.
Choose 1 of the following formats for this assignment:
- Comparison table (3–4 pages)
- Tabbed spreadsheet with a supporting narrative
- Address the following items in your assignment:
- Compare at least 3 Internet systems developments software technologies for use at Pine Valley Furniture.
- Analyze how the selected Internet systems developments software technologies support Pine Valley Furniture’s core business processes.
- Justify why an Internet systems developer might choose a specific type of technology instead of another type of technology for Pine Valley Furniture.
- Explain how these technologies can bring value to Pine Valley Furniture.
- Incorporate additional research to support your comparison.
- Cite references to support your assignment.
Format your citations according to APA guidelines.
Submit your assignment.
20210112
Data Base Security:
1) Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection?
2) Write an essay of at least 500 words discussing discussing IAM in a federated cloud application.
3) Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use.
4) Write an essay of at least 500 words discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary? What problems do they solve? How do they benefit companies?
5) Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.
6) Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework.
7) Write an essay of at least 500 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context.
8) Learning About Cookies as Spyware. Research what kind of information cookies store. You might find the following websites helpful:
www.allaboutcookies.org/
www.howstuffworks.com/cookie1.htm
Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.
assignment-9
Use the web or other resources to research at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved.
CIS
Your client is interested in how you will structure the website. Before you begin to write the HTML for your pages, it’s a good practice to create a storyboard that outlines your ideas for colors, font sizes, placement of images, hyperlinks, and sections on each page. Your storyboard and file structure should outline your homepage, inside pages, navigational scheme, and where you plan to add your form. This is a high-level design that you will be adjusting and changing throughout the quarter. You do not need to write this in HTML! In fact, it will save you time if you develop your storyboard in Word, PowerPoint, or Visio first, so you can make adjustments based on feedback.
Here are some online resources to help you think through the process:
- Why Website Storyboarding Is Important.
- How to Use PowerPoint to Create a Website Storyboard.
- Example Storyboard [PDF].
Part Two
Based on your storyboard, you will begin to create your file structure for your site. It is never a good practice to keep all your files in the same folder.
For example, if you are developing a site that sells clothing for men, women, and children, you might have one folder for all the pages that house men’s clothing, another for women’s clothing, and so on.
You can create this portion in Word, indicating where each of your HTML pages will be located, as shown in Section 2.4: Links in Your Text.
Requirements
new tech bus leaders
Many enterprise organizations believe that cloud computing is essential to their business operations. There are some; however, that argue it is not cost efficient and operationally appropriate. Provide a use case where cloud computing is not appropriate and explain why you feel this is an appropriate decision for the enterprise.
Practical Connection Assignment
course name: Cryptography (ISOL-535-B05)
This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.
Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
· Provide a 500 word (or 2 pages double spaced) minimum reflection.
· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
· Share a personal connection that identifies specific knowledge and theories from this course.
· Demonstrate a connection to your current work environment.
· You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Assignment
For this assignment, you are to construct a visual story of yourself, through information.
You have a lot of leeway with this assignment, but I want you to come up with an interesting and informative way to tell someone something about yourself, or to somehow track a particular characteristic or event. What is important, what is not? How does it relate to other things? If you can describe yourself in a paragraph, how would you describe yourself in a visual? Can you pick out a little piece of your experience of life and use graphical structure to tell this story, and even learn from it?
Think of this as building something like a resumé (meaning: “summary”) or curriculum vitae (“story of life”), but constructed through graphical structures rather than words, and topically about something broader than your skills and job history. This visual should investigate and show something about yourself that is interesting, unique, and perhaps quirky.
You can, and likely will, choose to concentrate on a particular area or subset of yourself rather than trying to incorporate everything, but you should try to make a coherent point, statement, or story with this visual. Incorporate as much or as little as you want.
This visual can be based on real data, if you have it, or it can be based on pseudo-data — approximations and an organizational sense, even if there is not true “data” to back it up. The point is rather to come up with a way to visually arrange, organize, and communicate.
You can choose to organize your graphic through some mechanism of time, space, flow, connection, overlap, impact, interest, happiness, …
Week 3 Office Talk – Access Discussion
Topic Questions
As per our textbook, Access, a relational database application, is the most widely used PC-based database management system (DBMS) software for both personal and business users. Like other database systems, the structure of the database file is of the utmost importance. For this exercise, you must demonstrate your understanding of the Access database system by describing how you would begin to create a database file with one of its tables (No templates). Your example may be a personal or business database. In addition, what are the advantages of managing database information in Access versus using an Excel spreadsheet?
Thread Directions
Students are required to participate in these weekly online classroom discussion threads. Students should post at least 1 post on 3 separate days in the active week’s discussion thread. Please make sure to read all topic questions, thread directions, and assignment rubric criteria to ensure that responses are accurate and complete. Points may be deducted, at the discretion of the instructor, for not adhering to any of the following guidelines. Discussion posts will be graded according to the assignment rubric provided below.
How to Post:
1. First Post – Respond to the discussion topic questions listed above. Click on the Reply link listed below to make your response. Minimum word count=100 words