Discussion

COURSE:  InfoTech in a Global Economy 

Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence.  Why or why not? 

 please cite properly in APA 

 At least one scholarly source should be used in the initial discussion thread. 

Project 1: Job Interview Presentation

This week, you will submit your answers to the interview questions.

If you didn’t download the Job Interview Presentation Template from Week 3, do so now and follow the instructions to record your work.

The questions are based on fundamental networking concepts that are likely to be asked at an entry-level networking job interview. The following topics are covered:

LAN topologies
OSI model and layers
networking devices
common protocols
IP ranges
class of network and default subnet mask
autonomous system
You will also need to include either an audio file along with your presentation or record a screen-capture video of the presentation. These presentation resources can help you prepare and record your presentation. Your presentation should be done as if you were in an actual interview. The presentation should be about five to 10 minutes.

How Will My Work Be Evaluated?

As you progress in your networking career, you will interview for positions and may even find yourself making presentations to customers, client audiences, and management. Effective interviewing includes a systematic, purposeful conversation. Your goal is to demonstrate your knowledge, skills, and/or experience; and ability to do the job successfully. You can achieve this by explicitly and confidently answering the questions posed.

The interview questions selected are likely to be asked during an interview for an entry-level networking position. Successfully answering these questions conveys a foundational networking knowledge that will help you land the position! Use the provided PowerPoint template to document your answer, then record yourself answering each question. Submit to the Assignment folder when complete.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

1.1.2: Support the main idea and purpose of a communication.
1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
2.3.1: State conclusions or solutions clearly and precisely.
10.1.1: Identify the problem to be solved.
10.1.3: Define the specifications of required technologies.
13.1.1: Create documentation appropriate to the stakeholder

SE491 week 3 assignment

import java.util.*;

 public class Payroll

{

 public static void main(String args[])

 {

 String lastName;

 double hours, netPay, grossPay;

 double STD_PAYRATE = 15.50;

 double WITHHOLDING_RATE = 0.20;

 System.out.println(“Enter employee last name: “);

 Scanner input = new Scanner (System.in);

 lastName = input.nextLine();

 System.out.println(“Enter hours worked for  ” + lastName +” >> “);

 hours = input.nextDouble();

 grossPay = hours * STD_PAYRATE;

 netPay = grossPay – (grossPay * WITHHOLDING_RATE);

 System.out.println(“Net pay for ” + lastName + ” who worked for ” + 

 hours + ” hours is $” + String.format(“%.2f”,netPay));

 }

}

Research paper week 5 develop a computer and internet security policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 **** Include at least 3 scholarly references in addition to the course textbook.  

Your paper should meet the following requirements:

• Be approximately four to six pages in length, Use Calibri, 11 pt not including the required cover page and reference page. Try dividing your paper into section with section headers.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion. 

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Favorite topic “Cloud Computing Risks”

The key to this paper is to demonstrate your understanding of the topics, not to re-word the text or reference material. Paper must be 100% original and not plagiarized.

QUESTION: Please summarize your favorite topic “Cloud Computing Risks” discussed in class explaining why.

GUIDELINES:

Running Size of your deliverable should include the 2 Pages of content for this phase, a title page, the references page

Make sure you are using at least (2) academic APA references.

This submission should be created following APA 6th edition guidelines.

The paper is to follow the APA style guide, Sixth Edition 

INT 1010 assignment 7

  Please complete the steps below and upload your Excel workbook assignment under Chapter 7 Assignment Submit Here.

  1. Open a blank Excel workbook
  2. Create the following headers in row 1
    1. Class Date
    2. Topic of the week
    3. Assignment
    4. Due Date
    5. Possible Points
    6. Points Earned
    7. Grade
  3. Format Class Date column with MM/DD/YY format
  4. Format Due Date column with MM/DD/YY format
  5. Format Possible Points column as a Number with 0 Decimal Places
  6. Format Points Earned column as a Number with 0 Decimal Places
  7. Format Grade as a Percentage with two decimals
  8. The calculation for the grade column is Points Earned divided by Possible Points.  Complete for each topic. (use formulas)
  9. Enter a Row for assignment per the detailed schedule
  10. Enter all the Points Earned in the Points Earned Column (use formulas)
  11. Calculate the Grade for each Points Earned in the Grade Column (use formulas)
  12.  Add the sum of the column labeld Possible Points (use formulas)
  13. Add the sum of the column labeld Points Earned (use formulas)
  14. The Grade Column is the calculation for the sum of all Points Earned divided by the sum Possible Points (use formulas)
  15. Save the file as Excel_Database_StudentFirstandLastName and submit.

The Role of Blockchain in Information Governance

 While blockchain is successful with cryptocurrencies, it is also beneficial for information governance in businesses. After reading this article  (https://www.everteam.com/en/role-of-blockchain-in-information-governance/), discuss at least two ways you foresee blockchain transforming information governance in businesses. Be sure to utilize sources and provide at least one detailed example of your findings. 

Gap in Literature

Healthcare cyber-attacks and their mitigation techniques in Industry 4.0 is the topic selected. Advanced threats and attacks have developed by cyber criminals unaware of healthcare professionals. I want to address the latest threats and mitigation strategies that help healthcare organizations and patients secure their information. Cybercriminals believe the healthcare industry is a soft target. Cybercriminals routinely target healthcare organizations. Healthcare industry vulnerabilities can be linked to various issues, including a lack of security awareness among care personnel, reliance on old unpatched systems that are no longer supported, a broad attack surface, and a lack of staffing resources. 
Qualitative and quantitative research methods address the problem by conducting interviews and an online survey with healthcare professionals. Factor Analysis Information Risk (FAIR) and Technology acceptance models (TAM) are utilized for this study. 
Humayun, M. (2021). Industry 4.0 and cyber security issues and challenges. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10), 2957-2971.
Research questions
What are the most common types of social attacks against humans encountered by healthcare organizations?
What policies and governance adopted by healthcare organizations have resulted in enhanced resilience?
How does an organization perform a cybersecurity risk assessment to identify the role of humans in the loop for enhancing cybersecurity?
What is the role of the training program in enhancing healthcare professionals’ awareness of cyber threats, and how can we measure the impact of training and awareness activities adopted within an organization?
What have cyber defense strategies been proposed by national and international organizations to strengthen cyber resilience?
Findings: The research aims to synthesize the recent literature on human behavior-related security weaknesses that compromise the cyber defense strategy used by healthcare organizations.
====================================================
Professor Response:
Hi Student
Interesting topic but remember that your research question must fill a scholarly gap in the literature. Also, take care to proof read your APA Style works. Typo’s and grammar mistakes in this one as this is aproposal should be in the future tense. Glad to have you in the class,
Good progress on an interesting topic area and good progress on finding scholarly literature, but what is the scholarly gap in the literature. Identifying that gap will help narrow your look at an IT topic in healthcare. Remember too that proper APA Style is essential as you refine your scholarly writing skills needed in this scholarly writing effort. Example, your third paragraph first sentence “…attacks trick…” and use nouns rather than pronouns, ex. “it” HINT, again, the Purdue OWL is a great source of citation and grammar requirements for APA style seventh edition.