1 page essay answer

 

  1. (a) Describe and give examples of the 2 most significant computer security threats that are impacting the world at the present time.  (b) What steps are being taken to minimize or thwart these threats?  (c) Will the efforts proposed to protect individuals, companies and the governments from these threats still protect the rights of citizens?  (d) Do you think that the steps taken or to be taken are ethical and will not cause a backlash in society?  Please elaborate (beyond a yes or no answer)

2.  (a) Describe at least 3 of the most significant ethical/social issues for individuals and at least 3 of the most significant ethical/social issues for businesses/organizations in the field of Computer Science.  (b) Which, if any, of these issues overlap both individuals and businesses/organizations?  (c) For each issue that you identified that is causing a major ethical/social problem for society, suggest a solution for this problem.  Be as concise as possible in your answer and do not address the issue of security threats in this questionPlease elaborate (beyond a yes or no answer)

3.  The field of computer science has changed during your lifetime and will continue to change in the future.  When the Computer Science department at this University was created in 1974 students were using keypunch cards to run programs on the main frame.  There was no PC, no cell phone, no phone aps, no internet, no Facebook, no Twitter, no Google, no Microsoft, etc.  The field of computer science has changed dramatically from then till now.  Over your entire life the changes could be as dramatic as it has been since the CS Department was created.  (a) How important is it to you to keep up to date with the coming changes in hardware, software and ethical issues?  (b) What specific steps will you in engage in to make sure that you are up to date as a computer professional?  Please elaborate (beyond a yes or no answer)

10 pages

  Circuit City was an American consumer electronics company founded by Samuel Wurtzel in 1949. By 1990s, Circuit City became the second largest consumer electronics store in the United States with annual sales of $12 billion. On March 8 2009, Circuit City shutdown all its stores. On January 8th at the 2018 Consumer Electronics Show in Las Vegas, Circuit City CEO announced a comeback and relaunch of Circuit City into “a dynamic, a social-focused ecommerce site” and a new business strategy for its retail stores 12 . In this case study, assume that Circuit City hired you as the new chief information officer (CIO) to help relaunch the company into a global e-commerce multinational company. Create a PowerPoint presentation containing the IT strategic plan that will address Circuit City ecommerce initiatives. The following information should be covered in the documentation. 

´1. History of Circuit City

´2. What were the issues and challenges that caused the collapse of Circuit City in 2009?

´3. What are the issues and challenges with Circuit City 2018 latest e-commerce initiative?

´4. Discuss the major competitors in global e-commerce.

´5. How would IT deliver value to the business?

´6. Proposed the IT infrastructure required to support global e-commerce

´7. Proposed the IT budget for the e-commerce initiative

´8. Discuss the IT based risks associated with global e-commerce

´9. Discuss how IT can leverage innovative technologies such as social media, big data and business intelligence to provide value to the business

´10. Discuss the future or emerging technologies that would be leveraged to give Circuit City a competitive advantage.

Final paper

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Blockchain” (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?  How does big data affect a global economy.

Prompt 3 “Government and Policies” (1-2 pages):  Discuss the role government plays in a global economy.  Also, look at what policies are currently in place and then discussion what policies should be put in place..

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately six to eight pages long, including both a title page and a references page (for a total of eight to ten pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet these requirements: 

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Practical Connection

This project requires you to write at 3-5 page APA formatted research paper.  The focus is on an organization that you choose which has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper will be submitted during the last week of the course.    

Discussion 1

Resistance to change is a normal everyday aspect in the workplace.  Note what happens to the organizational climate when this resistance occurs and any tactics to reduce negative connotations when dealing with change.

Note: The first post should be made by Wednesday 11:59 p.m., EST. 

Need it in APA Format 

NO Plagiarism 

1 Page, Remember the APA cover page and the references 

linux

1. For this discussion topic, you will need to research methods of dealing with add in hardware devices and how they work with virtualization.  Add in hardware would be items outside of the standard server configuration and might include things like USB license keys, barcode scanners, specialty video cards etc.  As part of the discussion you will want to identify the type of hardware you found and some recommended solutions for making it work with a virtual server. 

2. For this assignment, you need to investigate what options the hypervisor you recommended in your type 1 hypervisor compare assignment have to provide highly available services.  How do these items tie into what you read about in the chapter and which ones would you recommend implementing?  While you investigate the process of making your virtual machines highly available, what else did you run across that could have an impact on the availability of your machines and services that is outside of the control of your hypervisor?  Write up a summary of the features of the hypervisor you choose, a brief section on the non-hypervisor factors and your recommendations for which features are most important to implement to ensure the best availability of your virtual machines. (which i used Oracle Virtualbox)

final Paper

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You  may use either for your investigation. However, be aware of legal  issues surrounding your data gathering. If you are using any system you  do not personally control and have authority to investigate/discover,  please get written permission from the owner/operator of the system or  refrain from your forensics analysis of that systems and use a personal  system. For a network, you can use your own personal home network. For a  smartphone, consider using an image from the Internet or a personal  device. There could be issues related to using a live, active, personal  device (example: corruption of the device). If using a personal device,  consider using an old, outdated phone, if available.

 You  will review various forensics tools used with your selected system.  Select a tool and use that tool to gather forensics data for analysis.  You are simulating the process of gathering this data, so you do not  need to investigate a compromised device or system. The project  deliverables are as follows:

 Week  7 – Prepare an investigative report of the forensics data capture  conducted using the tool selected for this purpose. The paper should  provide the following information: 

  • Executive  Summary of your investigation, including a description of the device or  systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The  paper should be in a form that would be used for reporting to a court  or a law enforcement agency. Be sure to provide graphics evidence of  your forensics investigation effort (Screenshots, reports, etc.).  References should be in APA format.

Build a C program that has two functions: one for encryption and one for decryption.

 Procedure

 Implement one program that has two functions: one for encryption and one for decryption. 

Encryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.) 

Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file. 

EH Week15 DB

 

Hello,

i need this paper by 12/16 afternoon.

Strictly No plagiarism please use your own words.

300 words

Do you feel the benefits of cloud computing are worth the threats and vulnerabilities? Have we arrived at a point where we can trust external agencies to secure  our most precious data? Please explain your answer.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism