Week 2 Technology Discussion

  Please provide constructive responses to these two discussion posts (3-4 sentences minimum)

1. One  of the advance features I have learned using Microsoft word is the  insert feature. Being able to place all sorts of symbols, pictures,  graphs to a word document helps make it stand out more. For example, if I  were to write a document that talks about graphs and data, I can insert  a chart to properly displays the numbers I want to present over just  regular text. To do so, you must click on the Insert ribbon right next  to Home, under the Illustrations tab, you will see the Chart option.  Another window will open showing you the many different types of charts  and graphs that you can use to present your data. After selecting the  chart you want to use, the image will be inserted into the document  along with another window that reads Chart in Microsoft Windows. It is a  spreadsheet that you can use to enter the data you would like your  chart to display.

2.  An advanced feature that I learned in Microsoft Word was to insert a  picture. This may not be advanced to others but was a feature I had to  play with to insert correctly. To perform this task you would open  Microsoft word and open a blank document. Once the document is opened  use the tab on top that states insert, once you tap insert you have  options to use picture on device or online pictures. I chose online  pictures which provides more options. To use the online search you can  type whatever your looking for in search engine. Once you select the  picture you want to use on your document click picture and below will  provide option to insert. After tapping insert picture will drop onto  document. The picture on document will then need to be positioned by  clicking on picture and dropping on document where desired. Once picture  is positioned use arrow keys to adjust size of picture as desired. I  find this a great feature and think an added illustration always  enhances a document of any kind. 

   

cryptographic attack

Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.

Identify one cryptographic attack and how you can protect against it. 

The paper requires 

  • Explain, define, or analyze the topic in detail
  • Please cite properly in APA 7
  • Use scholarly references
  • Minimum of 2 pages

White paper Project Assignment on ICO

 Textbook: Tapscott, D., &Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin.   

 For this assignment, you’ll create a lightweight white paper for a fictitious Initial Coin Offering (ICO). You will use your imagination to create a brand new, hopefully unique, ICO, and develop a lightweight white paper that presents your ICO to prospective investors. A full white paper takes considerable time and effort to create. For this assignment, you’ll only be asked to provide the most essential elements. 

The goal is for you to be creative in your application of blockchain technology, and the explain your ideas.

 Assignment: 

Then, explore new and existing blockchain projects in “Healthcare” domain that interests you. You can start with an Internet search for “blockchain use cases” and “current blockchain projects.” Identify a few that you find interesting and learn about each one. Then, think of a new idea how you could apply blockchain in a new and useful way. 

Once you have your idea, create your white paper. Your paper should be in 6 pages APA format, and have the following sections:

1) Title – a headline that will catch your reader’s imagination

2) Abstract – Summary of what your whitepaper contains

3) Introduction – Introduce readers to the problem you will solve, the motivation to solve it, and how you’ll present your solution.

4) Problem/Market consideration – Explain the current situation (expand the problem from the introduction).

5) Literature Review

6) Solution – Describe your solution.

7) Summary – Close the sale.

8) References(Minimum 8 References ) 

Case Project 13-7: Lake Point Security Consulting

 

“Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in their final year of the security degree program at the local college.

Predish Real Estate and Auction (PREA) buys and sells high-end residential and commercial real estate across a multistate region. One of the tools that PREA offers is a sophisticated online website that allows potential buyers to take virtual tours of properties. However, PREA’s site was recently compromised by attackers who defaced the site with malicious messages, causing several customers to threaten to withdraw their listings. PREA’s senior management has demanded a top-to-bottom review of their security by an independent third party. LPCS has been hired to perform the review, and they have contracted with you to work on this project.

  1. The first task is to perform a vulnerability assessment of PREA. Create a PowerPoint presentation for the president and his staff about the steps in a vulnerability assessment. List in detail the actions under each step and what PREA should expect in the assessment. Your presentation should contain at least 10 slides” (Ciampa, 605).

Carefully read the case project statement and step number 1 to ensure you cover all of the requested topics. Refer to the information given in the Module 4 assignment that was similar to this for reminders about how to create good presentations. Remember to use the speaker’s notes (this is especially important as I will not see you give this presentation. I need to know what you will say if you were in front of an audience), few bulleted items on the screen, and applicable graphics (charts, graphs, clipart) to make the presentation interesting. You should have an introduction slide, a conclusion slide, and a slide for the list of your sources, along with any content slides needed to get your point across. Information technology specialists always need to be prepared to talk about technology to those who are not versed in the subject. This assignment gives you practice in doing just that.

hw11

  

· How will you apply the skills acquired from Analyzing and Visualizing data to your job?

· How will Analyzing and Visualizing data assist you in your professional or/and academic development?

· If the skills acquired in Analyzing and Visualizing data will not directly apply to your job environment, in what other ways are you hoping to apply them to your personal or academic portfolio?

Research Paper – Distribution As A Determinant Of Business Success

Please submit a 5-research paper (plus cover page and reference page) related to the topic you researched a couple of weeks ago for the annotated bibliography. 
Your research paper should be in APA format. 
Your research paper should include: 
The paper should include the following:
Title page in APA formatIntroduction with thesis statement (one paragraph)Background Section (at least two paragraphs)Literature Review (at least three paragraphs)Personal Reflection (at least one paragraph)Conclusion (one paragraph)References in APA format (at least six sources)
USE THE OUTLINE AND ANOTATED BIBLIOGRAPHY FOR TOPIC AND CONTEXT REFERENCE, I’LL SUBMIT THE RESEARCH PAPER WITH THESE TWO FILLES ATTACHED SO EVERYTHING NEEDS TO FLOW TOGETHER