Final white paper project – ticketing system

 – Add images and tables that were included in previous submissions. Your current document points to figures and tables that are no longer included in your capstone project. 

  – There are still some discrepancies between the information presented in the Technology Solution and Requirements section (pages 13 – 19) and the Design section (pages 19 – 24) and the implementation section (24 – 31). For instance, the following technologies components listed in the Technology Solutions and Requirements section are not included in the design and implementation sections: Azure cloud-based service, Recoverit, Cisco Integrated Service Virtual Router (ISR), -WD My Book Duo 4TB, and SecuGen biometric scanner. 

 – Your test result doesn’t show specific examples and images (there are references to images, but the document doesn’t include these images) that support the needs that you selected such as database, network infrastructure, access control, and so on.  The test result section for each need is briefly summarized in three or four lines. You must provide specific information that demonstrate a proper test result or a failure if that is the case.  – The Assignment requires that you include the Conclusion section.  

portfolio project

 

Your final project paper is broken down into 4 parts, worth a total of 125 points towards your final grade. This milestone is worth 25 points.

For this piece of that assignment, you will write the introduction to your final portfolio project (1-2 pages), comprehensively describing the industry you are choosing to use in the paper and preliminary challenges with information governance that you have identified. Be sure to utilize 2-3 sources from the UC Library.

Review the instructions in the Final Paper document first (attached here). Each milestone is a separate writing assignment, leading up to the Final Paper.

Expectations are that it will be a scholarly work, using largely peer-reviewed resources, formatted to APA 7 style. Grammar, spelling, and punctuation are significantly weighted. Any instance of plagiarism will result in a 0 on the activity (first offence) or failing the course (2nd offence).

short answer

 

Please respond to the following:

  • There’s no real prominent certification in the programming industry that says to an employer that you have programming skills. What are some tips you have for your classmates on how you plan to showcase what you have learned as a programmer? How do you plan to document your education and experience to look valuable to a potential employer?

5 details that should be included in your cloud SLA.

 

Discuss in 500 words or more the top 5 details that should be included in your cloud SLA.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Three Dimensions of Risk Management

 

Choose an organization from the education, financial, or healthcare sector to study throughout this course. Each week you explore different aspects within the IT division of the organization including:

  • 3 dimensions of risk management
  • Potential risks during a server database migration
  • Risk assessment and continuity plan
  • Request for proposal for new web servers
  • Monte Carlo method

You have been asked by the CIO of the organization you chose to create Microsoft®PowerPoint® presentation, along with an accompanying summary guide handout, for the managers of the IT, Accounting/Finance, and Engineering departments to inform them of the three dimensions of risk management.

The three dimensions of risk management shape the organizational framework of project risk management and determine the degree of freedom used to classify various realizations of uncertainties, resulting in a formalized systematic analysis of physical systems.

Research information about the organization you chose to complete this week’s assignment.

Part A:

Create a 4- to 6-slide, (does not include title or reference pages) media-rich Microsoft® PowerPoint® presentation (with Speaker Notes) which describes each of the three dimensions, its definition, values, and importance to your company. Identify the potential security risks to an organization in each of the following outsourcing situations:

  • The implementation of an external service provider for data/security protection
  • The use of contractual service providers for processing information systems applications such as a payroll, human resources, or sales order taking
  • The use of an offshore company to support your desktop computers
  • The use of an third-party governance to provide network support

Note: Media-rich presentations should include multimedia such as graphics, charts, pictures, photos, drawings, video clips, or audio.

Part B:

Create a 1-page ( (does not include title or reference pages) Microsoft® Word Summary Guide on this presentation. Include the following:

  • Risk considerations during the development and implementation of information systems
  • The importance of Information systems risk management
  • A summary of the organizational risk management framework
  • The risk register of the highest risk of information security to the organization

Include APA-formatted citations when necessary.

Assignment

Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

Youtube link:  https://www.youtube.com/watch?v=ehRCA8eYJzk 

PLE week2 P2

Hello,

i need this paper by 1/21 afternoon.

Strictly No plagiarism please use your own words.

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. What kind of speech was the First Amendment written to protect?

2. Does the First Amendment apply only to spoken words?

3. What does it mean that laws regulating speech must be content neutral?

4. Why are common carriers prohibited from controlling the content of the material they carry? 

5. How does the Supreme Court determine whether material is obscene?

6. Why have attempts to censor the Internet failed in the US?

7. Why not just ban spam? 

8. Why did Facebook ban Alex Jones and Louis Farrakan?

9. Should websites that show how to 3d print guns be banned? 

10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean? 

Link: https://hackablepodcast.com/episodes/pwned

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism