Cloud Computing Discussion 7

Discuss in 500 words, why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc. 

Use at least three sources. Do not use Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) these quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Standalone quotes will not count toward the 3 required quotes.

cloud computing

select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header. 

• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success. 

Requirements: 

The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements.

authentication

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication.

Python Coding

 

Instructions:

Create a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. You may use Microsoft Word® for your pseudocode and Microsoft PowerPoint® for your flowchart.

1. Problem:

Create a flowchart and pseudo code to do the following:-

You are going to modify week 4 assignment (2 problems) to use input() function (no hard coded values) to prompt the user to enter the values.

Make sure the prompt message is meaningful, do not say “Enter value”, say something like this “Enter hours worked” after you get all the inputs, display the results and prompt the user if wants more calculation (y/n). If no then print a message like “Thank you for …….”

The flowchart must include a loop and if-then

Data Breach

In 80 words or more answer the following. Consider the risk of availability of backups. Suppose your company has 100 users and each user has there own personal allotted amount of data under their user account that they can store on the network shared drive. This data can be accessed as long as they are using a computer on the network or are VPN’d in. No other user can access another users data. Suppose there is a breach or security issue that exposes all user data to be exposed and stolen. Which IT team monitors this data and how would they react to this breach?

3 pages—Assignment 01–will be submitted to Turnitin

This assignment will be submitted to Turnitin®. Please see  Rubrics attached. 

Instructions

It is a responsibility of the global firm to ascertain the level of importance of various aspects of culture. Companies’ operations need to recognize and adjust to the cultural environment. In this week’s Lesson, you will find eight elements of culture. For this assignment, there are four elements of culture that are most important when marketing products and services internationally: language, religion, manners and customs, and aesthetics. Indicate why each is important and provide examples in your response.

Write a paper of 3 pages, typewritten in double-spaced APA format (Times New Roman, 12 pt. styles), page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations and online submission variances.

In your response, make certain that you include at least two outside references from search engines or scholarly sources from the APUS Online Library.

Your paper will be automatically submitted to Turnitin in the assignment dropbox. Originality reports will be returned to the faculty and student. Multiple submissions are allowed. For full credit, make sure that your Similarity Index does not exceed 20%.

In the Assignment dropbox, please attach your paper as a file, do not copy & paste. I will grade and return your file.

Please see  Rubrics attached. 

discrete structure

  

Discrete structures are the foundation for formulation of problems and algorithms. In the following paper, you will experience the use of discrete math for a thinning algorithm and its necessary and sufficient conditions for characterizing points. 

Paper “A parallel thinning algorithm for medial surfaces” G. Bertrand, Pattern Recognition Letters, 16 (1995) 979-986. This paper is attached. 

The overall idea of the algorithm is highlighted in blue, although the question to be answered is related to Proposition 2 (highlighted in yellow). Simple point is an important concept used for the algorithm. You are expected to answer the following question regarding a simple point mentioned in Proposition 2. 

Question 1. What is the definition of that is mentioned in Proposition 2? Briefly explain the meaning of it. Define each symbol used in your definition. 

Question 2. What is the definition of ? Briefly explain the meaning of it. 

Question 3. Proposition 2 say that x is n-simple if and only if   and . Give at least one example of x and X such that x is 6-simple. Briefly explain. 

Discussion

Engaging recent (Past 5 years) scholarly research, outline and discuss the top 5 factors driving Information Security Governance today.

Reverse Engineering, Vlnerabilties

This is an Android app. Please review and identify if there are any vulnerabilities in this mobile Android app.

For each vulnerability, please take a screenshot or evidence and explain why you think it is a vulnerability.

Password to extract the file: infected