Articlee writing

please discuss the case involving the United States of America versus Ross Ulbrecht.

Words: 500 words APA format

7 questions

  

1) Read this Time article and view the video(https://time.com/5168202/russia-troll-internet-research-agency/) explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  

Use at least three sources. Use the Research Databases available from the Danforth Library(https://libguides.nec.edu/az.php), not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

2) Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Describe Digital Literacy (how to know what is real on the web). 

2. None of these people exist. What does this mean to you?

3. Why is Wikipedia more reliable than a paper encyclopedia?

4. How useful are crowd sources answers?

5. What are some drawbacks to crowd sourced answers?

6. Do people generally utilize the diversity of sources on the Internet effectively?

7. How reliant are we and how reliant should we be on getting our news from social media?

8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?

9. If models are simplifications or reality, why do we rely on them?

10. Why was this model, used by Amazon for hiring, wrong?

11. Why did Skynet declare war on the human race?

3) The purpose of this assignment is to pick a topic for your research project. The topic should be of graduate level not a survey. Investigate an important question. 

Your Research Project will be a presentation on some aspect of the surveillance state.  Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey. Make use of academic references such as you can find in the Danforth LIbrary research databases 

Use at least five sources.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Short excerpt on the Surveillance State :

https://learn-us-east-1-prod-fleet01-xythos.s3.amazonaws.com/5b75a0e7334a9/1237028?response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Zuboff.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20201104T030000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAZH6WM4PL5SJBSTP6%2F20201104%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=0db0e33d87614262defdca855ff1b3498572ba11c6697ca535dd48f0500209d3

4) Discuss in 500 words your opinion on what lessons should be learned from the 737 Max 8 crashes. 

Use at least three sources. Use the Research Databases available from the Danforth Library(https://libguides.nec.edu/az.php), not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

5) Your Research Project on the surveillance state consists of two parts:

1 a Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.

Do not double space.

You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. 

There should be no lists – bulleted, numbered or otherwise. 

Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs.

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use academically appropriate resources which you can find in the Danforth Library Research Databases.( https://www.nec.edu/students-faculty-staff/library-danforth/research-help/databases-help/)

6) Do a bit of research on penetration testing techniques. Investigate and document the following

· Five network penetration testing techniques

· Advantages and disadvantages of each

· One notable social engineering test

· Possible negative implications of penetration tesing

Please write between 300 words

7) Prepare a final project on a web application security topic. The primary deliverables for the project will be a paper and and also a presentation “Topic : White Hat Hacking”, Include a short paragraph describing your project and how you intend to research it. 

· Week 11. Submit final project.

· Week 12. Submit a brief abstract describing your final project.

Week 13. Submit final project materials.

o 500-700 word, double spaced, written in APA format, showing sources and a bibliography

Paper

 List possible training requirements for an SaaS solution integration, a PaaS application migration, and an IaaS application migration.

List and describe budget considerations one should evaluate before moving an application to the cloud.

Final Project

Overview:

In the meeting with your executives, your CEO announced that you would need to

prepare a PowerPoint presentation of your department achievements for the last quarter

and present it in front of the hospital’s board of trustees who will be visiting your hospital

by the end of the month.

Instructions:

Based on that information, your IT Director asked you to prepare a 12-15-page

PowerPoint presentation which will take a fifteen-minute time slot where you discuss the

following:

• As you have opted for Windows-based computers, what are the significant

differences between a Mac and a Windows-based computer?

• What are the main differences between the leading operating systems: Windows,

Mac OS, and Linux?

• What are the measures that you are taking to keep computers safe and to avoid

health hazards from computer use?

• Is the hospital safe and immune from online annoyances such as spam and

adware? How can you further secure your system from malware?

• The advantages of your recent implementation of VoIP?

• Describe the improvements you have implemented in the hospital’s customer

relationship management (CRM) and how are you managing your relationship

with your vendors.

• Discuss whether the adoption of a medical expert system could be beneficial to

the doctors at your Hospital.

• Describe how social media can be effectively used as part of the hospital’s web

strategies and improve its position in the market?

Requirements:

• This assignment is a PowerPoint presentation consisting of 12-15 slides, using

APA formatting and citations.

• Include four references.

• Record voice narration and include closed captioning or script saved to the notes

in PowerPoint.

o For instructions to add narration to a slideshow: https://support.office.com/enus/article/record-a-slide-show-with-narration-and-slide-timings-0b9502c6-5f6c-40aeb1e7-e47d8741161c#OfficeVersion=Office_365

Theory vs practise

  1. How are the seminal contributions in your field led to the key practices in your IT field?
  2. What have been the most beneficial accomplishments of the practices?
  3. Are there any bad results? (Bad means the results were not helpful and may be embarrassing, but no tangible harm was done to the business or organization.)
  4. Any bad results? (bad means that harm did come to the business or organization.) Why or why not?

minimum 2 references and 450 words

discussion 11/28

 Discuss the preparation within your own organization in regards to your Emergency Operations Center.  What are the pros and cons of your current preparations? 

300 words

100 words overview.

Enterprise risk management/ research paper

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Describe the technologies, hardware, and software used within the information technology field using visio to create a diagram that identifies the networking equipment needed to enable the workflow between these employees.

 

Directions

The manager at James Otis Tax Associates has asked you to submit a report describing the technology hardware and software needed to build a computer network for the new office. The manager has asked you to describe the computer system for each new employee, including an explanation of the purpose for each selected technology component, and to identify specific software programs that the employees would need. He has also asked you to describe the security measures needed to support the systems. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for each component.

The manager has provided the following employee descriptions:

  • Certified Public Accountant (CPA): The CPA is a senior position at a tax preparation company. The CPA will be not only handling sensitive customer data from personal tax returns but also preparing tax returns for corporate clients. The CPA is also responsible for the personal tax returns filled out by the tax and data-entry specialist employees.
  • Tax Specialist: The tax specialist has the dual role of entering data and verifying that tax returns are correct. This position involves customer interaction in gathering data for minimizing taxes owed or maximizing tax refunds.
  • Data-Entry Specialist: This position requires data entry for personal tax returns for customers who walk in the door. Although the data-entry specialist works with sensitive customer data, they do not have access to the tax returns once the returns are submitted to the tax specialist for review.

For each employee, you must:

  • Describe all hardware components, including peripherals, needed to create the systems
  • Identify specific software programs (more than one) that would be beneficial to each identified employee. Programs could include:
    • Operating systems
    • Applications such as:
      • Office automation products
      • Security products
  • Describe security measures needed to support this system. Security measures could focus on:
    • Access
    • Administration and user passwords
    • Firewalls

Along with each description, explain the purpose of each technology component in each system. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for components.

Finally, choose a network topology that could be used to connect all of the new employees identified by the manager. Create a Visio diagram to identify the networking equipment needed to enable the workflow between the employees.