Tasks assignment

 

There are TWO tasks that you would need to do( they are separate): 

Task 1 (Minimum 300 words): 

There are three levels of management hierarchy: strategic, managerial and operational.

1. Review at least 4 academically reviewed articles on each management hierarchy. 

2. Summarize all 4 articles in your own words.

3. Discuss how the three levels of management hierarchy: strategic, management, and operational relates to the mission of a business.

4. As an IT professional, how would you use information technology to improve the efficiency of the three levels of management hierarchy?

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index.

Information Assurance.

I have two assignments, need 1000 – 1200 words for each assignment, at least three references in “APA” format for each assignment. Summary and conclusion should be must in the paper. 

Topics:

Topic 1: Information Assurance – Securing Information Systems (Access Controls)

Topic 2: Information Assurance – Auditing, Testing, and Monitoring

Attached power point presentations for the above specified topics for reference. 

Note: Don’t copy paste matter from the PPT’s.

Week 2 Discussion Due TONIGHT

 For  this discussion, you will need to address all the tasks below and be  sure to participate fully by responding to your classmates as well.  Citations should be used to support your analysis and references should  be included in APA format. Before you begin, be sure to review the Discussion Question Guidelines!  

Now that you have been introduced to some advanced features in  Microsoft Word, you will teach the class an advanced skill in it. In  this discussion, select at least one advanced feature of Microsoft Word  and, using your own words (no copying and pasting) and examples, teach  your classmates this skill. Check the posts on the discussion board to  choose something no one else has shared yet!

In your discussions with your classmates, see if you can follow their directions or offer any help to problems they had.

You can also offer any help with challenges your classmates have shared.

By Thursday, December 10, 2020, make your initial  post to the Discussion Area. After you post your initial submission, be  sure to respond to at least two of your classmates, and to the professor  when appropriate, by Monday, December 14,2020, on at least two different days of the week.  /content/enforced/71846-17093625/Week_Two_Discussion_Question1.pptx  

Cloud Computing and Digital Forensics

1.) Your Research Project “Vulnerability and Risk Assessment” is due this week. It must consist of:

a. 5 source annotated bibliography

b. slide presentation with 12 or more slides

c. Summary or Abstract containing at least 750 words.

Use the  Research Databases available from the Danforth Library  as your first choice for reference.

2.) Discuss in 500 words or more best practices for incident response in the cloud. Refer to at least one incidence response framework.

Use at least three sources. Use the   Research Databases available from the Danforth Library    as your first choice. 

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  

Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. 

Cite your sources using APA format. Use the quotes in your paragaphs.  

Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format.

Data Mining : Answer the following questions. Please ensure to use correct APA7 references and citations with any content brought into the assignment.

Answer the following questions. Please ensure to use correct APA7 references and citations with any content brought into the assignment.  

  1. For sparse data, discuss why considering only the presence of non-zero values might give a more accurate view of the objects than considering the actual magnitudes of values. When would such an approach not be desirable?
  2. Describe the change in the time complexity of K-means as the number of clusters to be found increases.
  3. Discuss the advantages and disadvantages of treating clustering as an optimization problem. Among other factors, consider efficiency, non-determinism, and whether an optimization-based approach captures all types of clusterings that are of interest.
  4. What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means?
  5. Explain the difference between likelihood and probability.
  6. Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of connection (interconnectedness) of clusters.

Essay Questions

 

  • Review the strategic integration section.  Note what strategic integration is and how it ties to the implementation of technology within an organization.
  • Review the information technology roles and responsibilities section.  Note how IT is divided based on operations and why this is important to understand within an organization.

computer ethics

  

Assignment 2 

In a typical 1000-word essay, discuss what is unique about IT and Computers as far as ethical issues? 

How should people approach ethical issues that IT, Information Networks and Computer Technology present? 

Do not select passages from any resources! You must express your opinion from your reading of the course materials and online resources.

Students have to include proper citations. The essay’s quality of writing is part of the assessment. Therefore, grammatical, typographical or syntactical errors will affect the grade. No late submission. It WON’T be accepted.

Security Architecture and Design

Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least four references. In-text citations as required. (1200 words)

Question: 

If you were to explain to a family/friend about Information technology, what would you say is its importance in today’s world, and what are future trends in Information Technology (IT)?

Remember to stay at an introductory level because your family/friend knows nothing about technology. Going deeper would confuse them and will cause them to lose interest in your explanation.

Your paper must include all the following and each section must include at least two practical examples:

a) Introduction (75-150 words)

b) Importance of IT in today’s world (350-500 words).

c) Future trends in IT (Where do you see IT in the next ten (10) years?) (450-600 words)

d) Based on your responses from above (c above), why should your family/friend be interested in IT? (Benefits of believing in IT, now and future) (275-350 words)

e) Summary (75-200 words)

f) References (at least four)

Note: add more headings and subheadings as possible.