Study question and assignment

Information Systems for Business and Beyond Questions

  • Chapter 11 – study questions 1-10, Exercise 1, 3 & 4

Information Technology and Organizational Learning Assignment:

  • Chapter 9 – Review the section on Establishing a Security Culture.  Review the methods to reduce the chances of a cyber threat noted in the textbook.  Research other peer-reviewed source and note additional methods to reduce cyber-attacks within an organization.

communication 1

Write a fully developed paper in which you:

  1. Select one of the working groups in the IETF or IEEE and briefly summarize what this group is working on.
  2. Justify the need of the IEEE 802 standard used in networking.
  3. Evaluate the three standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology.
  4. Take a position on the need for a federal regulating body of standards such as NIST. Include supporting evidence to justify your opinion.
  5. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Justify a position on the need for a federal regulating body of standards informed by research of the three standard organizations.

Discussion

How is the implementation of network security similar and different between on-perm and cloud environments? Give some examples.

How is the management of network security similar and different between on-perm and cloud environments? Give some examples.

Corporate IT Security Audit Compliance

Que:1 

Discuss this statement: “Connecting to a WAN offers many advantages and pitfalls” (Lan-to-WAN connection). Exactly how does connecting to a WAN offer pitfalls and to whom?

Que: 2

Discuss the risks associated with allowing remote users to access the Organization’s network using untrusted WANs. Are their security measures you could put into place to lessen the risk or is this something you would completely stay away from allowing into the Organization? 

DISCUSSION

 

Topic of Discussion

We studied the network criteria: performance, Reliability, and security. In the very early days of the network technologies, in your opinion, which of the three criteria was more considered, and how the other criteria started to get considered as well?

Submission Instructions

  • Post your responses, examples, ideas, and discussions. on this topic on the blackboard.

Assignment

This task relates to a sequence of assessments that will be repeated across Chapters 6, 7, 8, 9 and 10. Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.

For this task, take a close look at the colour choices:

  1. Start by identifying all the applications of colour deployed, listing them under the headers of 1) data legibility, 2) editorial salience, and 3) functional harmony.
  2. How suitable are the choices and deployment of these colours? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential applications of colour, what would you do differently or additionally?

Assignment Link: http://book.visualisingdata.com/chapter/chapter-9

Assignment Requirements: At least 500 words in length

References: At least two peer-reviewed, scholarly journal references.

Cloud Computing – Practical Connection – 5 hours

Practical Connection Paper

Develop a paper describing how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share how you could leverage the knowledge gained working as an IT consultant working for an organization of your choice.

Requirements:  Provide a 500-word (2 or more pages double spaced not counting the title and reference pages) paper.  The paper should include a title page, body pages, and reference page.  An abstract and introduction is not required for this assignment.  Correct use of APA guidelines for sources and citations is required. If supporting evidence from outside resources is used those must be properly cited.

No Wikipedia references 

online discussion

 

Where does data analysis begin?

The collection of data is not the onset of data analysis projects. A data analysis project begins with a purpose, problem, and research questions.

Find one scholarly research paper with an excellent example of:

  • Problem statement
  • Research questions

The example shall relate to a practical, real-world work environment in the information technology field. After finding the research, discuss the following:

  • What makes this example excellent in the topics that initiate a data analysis project?
  • What relates this example to a practical, real-world work environment in the information technology field?
  • Do the research questions meet the criteria defined in the lecture in week one?
  • What is the generalizability of this research?

Do not restate what the authors of the research have already stated. Your post shall be in your own words. Reference the research example using APA 7, as well as any other references used in your post. The hanging indent required in research papers is not appropriate on the discussion board.

When replying to your peers, do you agree with their answers to the topics? The peer response posts should identify whether you agree and why or why not. Reference your peer’s research example in your peer response.

Keep in mind, a citation must be made for every reference. When citing, ensure that the statement requires a citation.