IT Project assessment

please follow the below 

  • includes filling your information on the cover page.
  • You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
  • The work should be your own, copying from students or other resources will result in ZERO marks.
  • Identical copy from students or other resources will result in ZERO marks for all involved students
  • Use Times New Roman font for all your answers.

Adopt a pet

  They are three assignments and they are all related to each other. The topic I want it to be about is “Adopt a pet” web application. The application is about being able to adopt a pet using a web application. The requirements of the assignments are attached below. and each assignment I have in a folder and with it will be documents you reference from according to the requirement to the question itself. And also there is a folder called templates and this folder has templates that you can use for the assignments.  

The project management course asks us to choose a type of project whatever it is and plan for it. The Adopt a pet web application, you don’t have to do the actual web application or code for it. You just have to plan for it using the files I sent you as if you will build the web app. 

How can cryptography be incorporated into a company's system,

 

For the purposes of this course, you will assume the role of the Tier 1 Cybersecurity expert. As you work through the assignments and discussions, please keep in mind that you have the responsibility to guard against cyber attacks. In doing so, a big part of your job is to be proactive about protecting against attacks. You work on a team of network professionals. Your direct report is the CIO who also answers to the Board of Directors. There are times when you will be asked to write reports, make security recommendations, and make presentations to the Board of Directors. If you do well in your responsibilities now, there may be a job advancement with significantly more pay in the near future if you can move up to a Tier 2 expert.

Unit 1 Discussion Assignment

Answer the following questions:

  • How can cryptography be incorporated into a company’s system, focusing on improved security and ease-of-use,  during the initial stages?
  • Why do you believe the plan you described for the first question will meet the initial requirements of improved security and ease-of-use? Use specific descriptions to support your reasoning.

IT345 8B

 

Find a recent article that relates to a software that has malfunctioned and caused either serious injury, death, or loss of revenue. Summarize the article and discuss whether you believe this will impact the adoption of this type of technology.

Post your reply  at midnight. Your response should be at least 250 words and appropriately cite your resources.

Article Analysis

 

Key Terms:

  • Multiparty Negotiation
  • Haggling in Negotiation
  • Counter-offering in Negotiation
  • Adversarial Bargaining

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format. 

Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required.

Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.

For this assignment, you are required to research the benefits as well as the challenges associated with Big Data Analytics for Manufacturing Internet of Things.

 

The  recent advances in information and communication technology (ICT) has  promoted the evolution of conventional computer-aided manufacturing  industry to smart data-driven manufacturing. Data analytics in massive  manufacturing data can extract huge business values while it can also  result in research challenges due to the heterogeneous data types,  enormous volume and real-time velocity of manufacturing data.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at  least two scholarly journal articles to support your positions, claims,  and observations. 
  • Be clearly and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.

Assignment

 Consider the data flow “octopus,” as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves?