Order # 12027

Title: Software and Storage

Paper type Other (Not listed)

Paper format APA

Course level Undergraduate

Subject Area IT Management

# pages 1   ( or 300 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

Instructions

You have been recently promoted to IT manager and have been asked to analyze the current software and storage. Then you will need to present to the CIO the various software available as described below. You will also need to present to the CIO information about the progression of storage devices, new developments in storage devices, and how productivity is related to storage devices, along with how storage devices impact users.

Part 1

Read the following brief descriptions of software. Write 1–2 pages identifying the software by name, a detailed definition, and description.

Copyrighted software that is distributed at no cost for a trial period. After the trial period, the user is billed automatically.

Software provided for use, modification, and redistribution. There are no restrictions from the copyright holder. It is usually downloaded at no cost. The draw is that users can share improvements and personalize the software to meet their needs.

This software is an application that enables designers to create high-quality professional publications with text and graphics. Business users might use it for annual reports, marketing, and newsletters. Personal users might produce flyers, calendars, and business papers.

This technology uses radio signals to transmit with a tag in or attached to an object, animal, or even person. They are often used in retail, inventory, tickets, or to access monitored environments.

This code stores information in a vertical and horizontal direction. It stores information that requires a reader for interpretation that interacts with a Web site.

Part 2

Using research from the resources, the Capella Library, or the Internet, write 1–2 pages in which you describe the chronological progression of storage devices. Include:

Instances that spurred new development.

The effect on productivity and storage practices.

The impact on users in a professional environment.

Additional Requirements

Written communication: Written communication is free of errors that detract from the overall message. Use spell check in Word to confirm spelling and grammar.

Format: Follow current APA formatting guidelines.

Font and font size: Use Times New Roman, 12 point.

Length of paper: 1–2 pages per part, double-spaced.

scope of a cloud computing audit

 

Describe in 500 words discuss the scope of a cloud computing audit for your business.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Assignment

1. Using a Microsoft Word document, please list in order of your preference the five top areas in which you think computer-based laws should be passed or strengthened by legislatures, and a brief description of  why you chose this law and its ranking

2. The minimum word count shall be not less than 250 words.

Computer Science Jenkins

Hello,

I do have a small project of mine for automation. In general, I do have automation Framework and have Jenkins installed in Linux and I do have two nodes Win7 and Win10. Selenium Grid and Hub installed and running successfully.

I do have knowledge and skillset of using the automation project with Java,Maven,Selenium and Cucumber. I need someone’s help in configuring Jenkins for Maven project and connecting two node machines to it to run my small project of automation via GitLab trigger setup as well.

There is no requirement document, and I am looking for someone who can deliver quality of work and I can work things around in Tutor’s comfort zone. I am in EST, but I am looking for reasonable price. If tutor is from India and have some knowledge in especially Jenkins, Maven, Java, Selenium, Selenium Grid. Please don’t hesitate to contact me.

I am new in this platform. Looking for help 🙂

Access control discussion 14

Discuss the major components of information assurance.

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly cite the references.

How many databases are you in? Discussion board

 There are numerous databases that contain personal, but public, information about individuals. 

Today much of this data is available online.

How do you feel about your personal information being contained in databases that other individuals can access or that might be breached via the Internet?

Do you mind that anyone with an Internet connection might be able to find out how much you paid for your house, if you are married, where you live, and other personal information?

Answer with complete sentences for full credit.

OR_Assignment_3

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

   A minimum of five peer-reviewed journal articles.

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

Discussion 1 response – Cyber Law

 Question : Read Chapter 1 of the Goldman Textbook and describe in a minimum of 500 words what the Internet is and how it has changed the world. 

I am adding my classmate’s response for the above question. You will have to write response for each post in 250 words. No references needed.  

Discussion 1: (RajeshKumar Kodali) 

The internet definitely changed somewhere between 1989 and 1995.

 The main source was privatization. After a progression of meetings, adjustments and startups, in 1993 the National Science Foundation declared plans to privatize all administrative resources associated with Internet work, helping those who were successful in mid-1995. Why? In short, NSF wanted to attract private customers and, in that sense, share the expensive picture of the Internet with them. NSF was simply pursuing its main goal of supporting US research: it was confident that a huge usage size would cut costs. (Indeed, it certainly had an unexpected result.) (Bruce, 1999).

Privatization had another unexpected result. It allowed application designers to think about building commercial applications for a previously unknown set of customers (e.g., any business or family outside scouting universities) and uses (e.g., e-commerce). This has opened up a completely different range of possible applications for the Internet and expanded its capabilities.

 The next reason was the innovation of the World Wide Web. Tim Berners-Lee decided to offer his product in shareware destinations in 1991. He founded the World Wide Web Consortium in 1994. The program had just begun to spread widely in university and soon spread everywhere. This made web applications the essential use of the internet framework and eradicated email as the primary function of the internet (Bruce, 1999).

Surprisingly, the size of the Internet began to change dramatically after 1995. From then on, it developed rapidly, surprising three billion customers the last time anyone checked. The number of pages of commercial websites has reached huge and incomprehensible figures (Bruce, 1999)

Now consider 2005-2015,Many additional applications were developed in the Internet / Web header. Perhaps the most unusual changes have occurred in the last decade with the increase in real time to watch videos and games. This detects stresses on the Internet that were not initially intended for, for example, the continuous (and without interference!) Movement of a lot of information to end customers. It also inspires massive internet usage and makes many customers willing to spend more money on faster collaborations (Glaser et al., 2002).

This also convinces numerous providers to provide customers with what they need and has prompted numerous organizations to find better approaches to utilize the additional throughput. Additionally, it inspired the fabric of the cloud, fundamentally to bring storage closer to customers, which also reconfigured the Internet in ways not initially proposed by planners. (Hi anyway, it improves the experience, so no one is complaining.)

There is another wonderful change in the Internet: the expansion of numerous devices. There was no single Internet solution for remote neighbourhoods, such as Wi-Fi. There were no plans for advanced tablets or mobile phones. There were no plans for NEST indoor dimmers, cameras from your garden, or Netflix on the porch by the pool. However, we can do each of these things on the basis that the conventions of the Internet have been expanded, reformed, modified, shaped, changed, modernized, undone, and imaginatively reconfigured for a wide variety of purposes (Glaser et al., 2002).

Someone else can focus on the many advancements to the Web over the past twenty years. This has also changed the number of customers using the internet.

————————————————————————————–

Discussion 2:(Dheeraj Kumar)

Internet is globally connecting networking systems that facilitate worldwide communications and will accessing to the data resource through huge collection of government, academic, business, public and private network. It is been governed by the agencies like as Internet Assigned Numbers Authority that will establish the universal protocols. Term World Wide Web and internet will be often be used in interchangeably but they will not be same thing internet will refer to global communication systems, includes infrastructure and hardware while web is services that is communicated over internet (Zaryn.D, 2020).

Internet is originated with US government that began in building computer networks in 1960 referred as ARPANET. In the year 1985, US nation’s science foundation commissioned development of university networks backbone referred as NSFNET. System is been replaced by the new network operated commercial internet service provider in the year 1995 Internet is brought to public on the large scale around this time  As the global network responsible for large amounts of the data transfer and the process facilitation . Intent is been evolving constantly. Rapid developments of internet have created an unstable, significant change to everyday lives of ours. Impact intent have on the society is that felt almost on everything we do from that of ordering a pizza to latest news. To have affected the way we are communicating, the way we are learning in regards to the events and our brain functions. At this point racing in catching up with the developing the web technologies, create social evolutions that have impacted the way we will celebrates significant life events. Internet have affected ways we form and maintain the relationship with the family, acquaintance and friends. Now that we could interact with other and keep other update on lives of our be much easily that that of the past, notion of the intimate relationship have changed. For example the social media allow the people in constantly updating the networks in regards to the lives. Using the text posts, videos, photos we will present ourselves to people around us allow us in staying in touch every moment with the people who will care in regards to the people we do not. Cause acquaintance from past few years political learning where we will go to and graduate from the school .This could create new sense of an intimacy that will not exist sin past as people feels that they know all there is in knowing in regards to people in the lives This will in turn have been decrease actually significance of personal life events like as high school reunion and family. Beginning of 21st century have seem more is in the social media and some interactive, crow base communication platform. Revolution have upended ways we will think in regards to the personal life events because of fact that with internet we will have the access in more variety of the options and ideas and now that everyone have say. Where as it is hard to say that internet is sole reason  of this developments there is no denying that this have made significant impact on the way it is used in our day to day lives (Drew.H, 2020).

Executive Program Practical Connection Assignment on Information Governance

Executive Program Practical Connection Assignment on Information Governance 

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own careers. Assignment: Provide a reflection of at least 500 words (or 2 pages double-spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories, and knowledge could be applied to an employment opportunity in your field of study. 

Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection.Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. Do not use prior assignments in the completion of this activity. This is specific to the concepts presented in ITS833 and how you will use them or do use them in your professional lives.