- This is a required assignment, worth 45 points, and must be submitted by the due date.
Review the Grading Rubric before completing this assignment.
Research a scholarly paper on the impact of “Emerging Technologies on SAD” and reflect on only one of the following topics:- “Impact”: How do recent or emerging technologies impact SAD?
- “Cloud”: Is the SAD process different when dealing with Cloud Systems?
- “Analytics-centric”: Is the SAD process different when dealing with Analytics-centric organizations?
- “DM-Warehouses”: Is the SAD process different when advanced Data Management and Warehouses are involved?
- NOTE:
You must copy and paste the topic (“Impact” or “Cloud” or “Analytics-centric” or “DM-Warehouses”) at the start of your paper to provide a context for your answer
This paper must be between 250-300 words on what caught your eye and reflect on what you read.
Do not add extraneous text that does not address the question – do not add an introduction or conclusion.
Do not copy and paste text from the referenced resource.
You must provide at least one APA reference for your resource and corresponding in-text citations..
You must provide the referenced resource URL/DOI in the APA reference.
Do not use the Textbook as a referenced resource.
Week 2 Creating a scope statement
Wk 2 Team – Apply: Creating a Scoping Document [due Day 7]
Assignment Content
- A Work Breakdown Structure (WBS) is based on a project’s scope statement. This statement lists all the work that goes into creating the products of the project. It includes the charter, requirements document, processes, and is managed by the project manager. In this week’s Team assignment, your team will review the scenario and develop a project scope statement based on the provided information. You may use the template provided or develop your own.
Read the Global Treps Scenario and complete the assignment below.
Develop a first version of a project scope statement for the project. Use the Scope Statement template and the example in Chapter 5 as guides. Be as specific as possible in describing product characteristics and requirements, as well as all of the project’s deliverables. Include the following:
- Global Treps website
- 4 Shark-Tank-like events
- A business plan
- Outsourced items(laptops, donation acceptance, video creation, etc.) as part of the project scope
- Submit your project scope statement.
Related Diversification
Related Diversification. Related Diversification is the most popular distinction between the different types of diversification and is made with regard to how close the field of diversification is to the field of the existing business activities. Related Diversification occurs when a company adds to or expands its existing line of production or markets. For this assignment, consider your own company or one that you know well. Assume your company opted to pursue a strategy of related diversification and respond to the following questions.
- What industries or product categories could it diversify into that would allow it to achieve economies of scale?
- Identify at least two or three such industries or product categories?
- Describe the specific kinds of cost savings that might accrue from entry into each?
Assignment
- Assignment Directions: Discuss Role Play, Threat Emulation, and Operational Impact
In a word document, discuss the assigned topic consisely in approximately ten sentences.
General requirements and instructions to complete your assignment- Use the IEEE format to cite any material you take directly from a source or paraphrase.
- Type your responses in a Microsoft Word document.
- Upload and submit your paper to the assignment drop box by Sunday at 11:00 p.m.
- A rubric will be used to assess your responses.
Assignment
Review the required reading material and summarize one of the scholarly articles listed on the selected websites. In 2-3 paragraphs, and using your own words, explain why ethical hacking is necessary in today’s complex business environment.
Required Reading material
The Benefits of Learning Ethical Hacking (Posted in Penetration Testing on August 29, 2018)
https://resources.infosecinstitute.com/the-benefits-of-learning-ethical-hacking/
When Ethical Hacking Can’t Compete
Research report 3
Need a 500-word research report for the attached PPT with reference and the term used to search for the topic.
Note: The word should be in its own words and it should look like a summary.
No plagiarism
APA format
Policy, Legal, Ethics, & Cmplc week
Week Four Discussion
Week Four DiscussionDiscuss in 500 words your opinion whether Edward Snowden is a hero or a criminal. You might consider the First Amendment and/or the public’s right to know as well as national security concerns. Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. Write in essay format not in bulleted, numbered or other list format. Do not use attachments as a submission. Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’. You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.
Topic
- Locate a dissertation on any topic by searching the ProQuest library database. Read the literature review section. Provide a one-paragraph summary of the literature review.
MIPS Programming
MIPS Programming: Write a program that reads up to 15 temperatures into a static array, and then prints out the average temperatures to 5 decimal places using only integer commands. It will stop taking input when a -761 is entered. Valid temperatures are from -200 to 1000 degrees exclusive of the end points. It will then output the total, the count and the average to 4 decimal places using Integer Commands. It will do all the work in subprograms/functions and use to appropriate registers to pass information. There will be at least 3 subprograms. The first subprogram will receive the base address of the array and the maximum number of elements as arguments into the subprogram. It will return the number of valid elements read. The second subprogram will receive the base address of the array and the number of the valid elements as arguments into the subprogram. It will return the total of the valid elements in the array. The third subprogram will receive the total and count as arguments into the subprogram. It will output the total, count and the average to 5 decimal places or a message that there was no valid input. It will return nothing. Sample: Run 1 Enter a temp (>-200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and < +1000 degress fahrenheit) or -761 to exit: -761 The total is: -1 The count is: 2 The average temperature is: -0.50000
Project 1: Virtualization Assignment
For this assignment, the Caduceus CTO, Eliza, has asked you to create a working proof of concept.
Step 1: Set Up and Log Into Your AWS Academy Account
CMIT 495 requires you to complete hands-on assignments in a virtual environment. We will be using Amazon Web Services (AWS) as our virtual environment. Amazon offers a free account for those that register. UMGC will automatically add you to an AWS Academy Learner Lab. However, you still need to set up and log into your AWS Academy account to get started.
Review the following AWS Academy (Student Guide) to set up and log into your AWS Academy Account, then access and use your Learner Lab. Be sure to read the guide carefully before proceeding:
Note: The AWS Academy Learner Lab (Student Guide) provides students with instructions for using AWS Academy Learner Labs. The Learner Lab offers a lab environment suitable for student projects over a period designated by the department.
Step 2: Download the Week 1 Project Template
Download the template you will use to submit your project. (Virtualization Assignment 1 Template)
Step 3: Install and Configure an AWS EC2 Instance (Virtual Machine)
Using the newly created AWS free account, install and configure an Ubuntu Server virtual machine (VM) using the most recent version of the 64-bit operating system.
You will need to provide a detailed overview of the steps required to install the Ubuntu server operating system on the virtual machine, including screenshots of each step in the process in the Week 1 Assignment Template.
Review the following documentation detailing an overview and step-by-step procedure on how to install and configure an AWS EC2 instance.
- Getting Started with Amazon EC2
- Create an EC2 instance and install a web server
- Get started with Amazon EC2 Linux instances
Step 4: Complete the Week 1 Project and Upload to the Assignment Folder
Answer the questions and embed the appropriate screenshots of your Ubuntu server installation. When providing a detailed overview of the steps required to install the Ubuntu server operating system on the virtual machine, make sure to include screenshots of each step in the process. Further details and instructions are included within the Week 1 Assignment Template.