OE W 7 D

 

Watch the following video, and Provide a critique. Also, think of other possible scenarios where mobile technology can be used to address humanitarian efforts.

https://youtu.be/L9_c1j9VRwE 

300 words needed

Cloud Technologies Power Point

Using the project guidelines and the attached summary for this project, you will develop a detailed comparative analysis of cloud vendors and their services. A comparative analysis provides an item-by-item comparison of two or more alternatives, processes, products, or systems. In this case, you will compare the pros/cons of the cloud service providers in terms of security, ease of use, service models, services/tools they provide, pricing, technical support, cloud service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

Presentation Guidelines

Your presentation should be comprised of the following:

· One to two slides on the company profile.

· One to two slides on what the company is struggling with.

· One to two slides on current infrastructure.

· Three to six slides on the top three cloud services providers. Include their service models (i.e., SaaS, PaaS, IaaS), services/tools/solutions (i.e., compute, storage, database, developer tools, analytics tools, networking and content delivery, customer engagement), pricing, accessibility, technical support for companies, global infrastructure.

· One to two slides on a recommended cloud service provider based on the comparative analysis and the cloud vendor’s abilities to meet the service needs of the company.

· One slide on the conclusion.

  

How   Will My Work Be Evaluated?

As a professional, you will likely make   presentations to customers, client audiences, and management. By summarizing   your results and recommendations in an effective presentation, you are   demonstrating how you use your technical knowledge to convey your ideas to   others in a professional setting. Your ability to express recommendations to   decision makers with the right mix of technical detail in an accepted format   is an important workplace and career skill.

The following evaluation criteria aligned   to the competencies will be used to grade your assignment:

· 1.1.1: Articulate the main idea and   purpose of a communication.

· 1.1.2: Support the main idea and purpose   of a communication.

· 2.1.1: Identify the issue or problem   under consideration.

· 2.2.2: Evaluate sources of information on   a topic for relevance and credibility.

· 2.3.1: State conclusions or solutions   clearly and precisely.

· 10.1.1: Identify the problem to be   solved.

· 10.1.2: Gather project requirements to   meet stakeholder needs.

· 10.1.3: Define the specifications of   required technologies.

· 13.1.1: Create documentation appropriate   to the stakeholder.

· 13.2.1: Evaluate vendor recommendations   in the context of organization requirements.

Discussion

Topic: Assume that you have been tasked by your employer to develop an incident response plan. Create a list of stakeholders for the IR planning committee. For each type of stakeholder, provide the reasons for inclusion and the unique aspects or vision that you believe each of these stakeholders will bring to the committee.

8-1 Discussion: Freedom of Speech Online

 After reading about the idea of freedom of online speech, discuss the following: Should internet content be censored? Explain using examples. Should an internet provider be liable for the content that appears online? Why or why not? Use recent, relevant examples from the news to support your position. 

700 words: Leadership

  1. Discuss Howell and Mendez’s three perspectives on followership.  Note how these behaviors influence work productivity.
  2. What is the big five personality model?
  3. What is the Myers-Briggs test?  How is it similar to the Big five model?  How is it different than the Big five model?

Assignment and Discussion

 

Week 10 – Discussion

Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database. Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not?

Writing Assignment – Wk 10

Some common biometric techniques include:

  1. Fingerprint recognition
  2. Signature dynamics
  3. Iris scanning
  4. Retina scanning
  5. Voice prints
  6. Face recognition

Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs. 

Week-10 Discussion

 In no less than 250 words, describe a hacking tool that is used to gain access to a network.  Explain how the tool is used, how it works and how a netwoprk administrator can prevent this tool from access the network 

 

Week 10 Assignment

  • 10.1 What are three broad mechanisms that malware can use to propagate?
  • 10.2 What are four broad categories of payloads that malware may carry?
  • 10.3 What are typical phases of operation of a virus or worm?
  • 10.4 What mechanisms can a virus use to conceal itself?
  • 10.5 What is the difference between machine-executable and macro viruses?
  • 10.6 What means can a worm use to access remote systems to propagate?
  • 10.7 What is a “drive-by-download” and how does it differ from a worm?
  • 10.8 What is a “logic bomb”?
  • 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
  • 10.10 List some of the different levels in a system that a rootkit may use.
  • 10.11 Describe some malware countermeasure elements.
  • 10.12 List three places malware mitigation mechanisms may be located.
  • 10.13 Briefly describe the four generations of antivirus software.
  • 10.14 How does behavior-blocking software work?
  • 10.15 What is a distributed denial-of-service system?

Room reservation site

Hello, this needs to be a very basic webpage. This is project for a school assignment and doesn’t need to be flashy or extra. Think the simpler the better. As long as it works and hits all the points listed below ill be fine. Requirements:

  • Allow users to login to the site
  • Create a database to hold login info for website, reservation info, & conference room info
  • Allow users to register to the site
  • Users should be able to reserve rooms for a specified date and time range
  • Validate user input
  • Display error messages when appropriate.
  • List conference room reservations sorted in date and start time order
  • Allow two display options: 
    • All-display all conference room reservation schedules; past and future
    • Future-display conference room reservations that are scheduled in the future only

This site is to be hand coded ONLY do not use and site builders, any plugins/widgets, I only need it to be very basic. This is not a professional site it is a school project. I have provided a link of what is considered too far and not what im asking for. 

http://mdimond.info/2550/conference/login.php

* Do not allow reservations outside of business hours or during the weekends