Assignment 350 words 5 references – Search Engine Optimization

Instructions – Include the below details:

1. Abstract –  

One paragraph describing the research to be conducted

2. Introduction –  

Include 1 paragraph as the introduction

3. Problem statement

Include 1 paragraph describing the problem you plan to research

4. Relevance and significance 

Include 1 paragraph describing the research goal

5. Research questions

Add no more than 2 research questions as they relate to the research

focus

Week 5

 

Week 5 Assignment:

In order to complete assignment #5 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #5). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of one (1) full page in length with a minimum of two (2) outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

                               Question below

Describe the steps involved in modifying the default password policy in Oracle?

Resource: PowerPoint Basics

 

Resource: PowerPoint Basics

Navigate to the PowerPoint BasicsTutorials using this link https://edu.gcfglobal.org/en/powerpoint/ (Links to an external site.)(Links to an external site.)You will use the material covered in these tutorials to submit assignments later in this unit and you will be quizzed on the material at the end of the unit.

  1. Getting Started with PowerPoint
  2. Creating and Opening Presentations
  3. Saving Presentations
  4. (not required to review)
  5. Slide Basics – **Important to review for Assignment**
  6. Text Basics – Review the tutorial.
  7. Applying Themes- **Important to review for Assignment**
  8. Applying Transitions – **Important to review for Assignment**
  9. Managing Slides- Review the tutorial.
  10. Using Find & Replace- Review the tutorial.
  11. Printing – Review the tutorial.
  12. Presenting Your Slide Show-Review the tutorial.
  13. Lists – Review the tutorial.
  14. Indents and Line Spacing – Review the tutorial.
  15. Inserting Pictures – **Important to review for Assignment**
  16. Formatting Pictures – **Important to review for Assignment**
  17. Shapes – Review the tutorial.
  18. Aligning, Ordering, and Grouping Objects – Review the tutorial.
  19. Animating Text and Objects – **Important to review for Assignment**
  20. Inserting Videos Review the tutorial.
  21. Inserting Audio- **Important to review for Assignment**
  22. Tables – Review the tutorial.
  23. Charts Review the tutorial.
  24. SmartArt Graphics – Review the tutorial.
  25. (not required to review)
  26. (not required to review)
  27. (not required to review)
  28. Modifying Themes – **Important to review for Assignment**
  29. Slide Master View – **Important to review for Assignment**
  30. Hyperlinks – **Important to review for Assignment**
  31. Action Buttons – Review the tutorial.
  32. Rehearsing and Recording Your Presentation -Review the tutorial.
  33. Sharing Your Presentation Online – Review the tutorial.

Understanding the Work of the IT Governance Board

 

In this final week of your internship, your rotation assignment takes you back to the Chief of Staff’s Office where you started out seven weeks ago.

Among other things, the Chief of Staff’s organization is responsible for organizing meetings and providing support to the various internal governance boards and executive committees that comprise the internal governance infrastructure. Last week, you had a brief introduction to the work of one of these boards — the IT Governance board — when you helped the Chief Financial Officer and CFO staff put together a briefing to inform the board’s members about a technology problem. 

The work of the company’s governance boards and committees is extremely important since these groups plan, design, negotiate, implement and provide oversight for the processes, policies, procedures, and other mechanisms used to guide,  monitor, control, and assess the operations of the company. Each board is comprised of executives who each represent their functional areas or a group of internal stakeholders. Usually, there is a chair position that rotates among the members. If you would like to learn more about corporate governance in general, Deloitte’s report Developing an effective governance operating model: A guide for financial services boards and management teams provides a brief but comprehensive overview (see https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Financial-Services/dttl-fsi-US-FSI-Developinganeffectivegovernance-031913.pdf). You may also find this article What is a management system?, from the International Standards Organization, helpful as it explains what a management system is and why standards are needed to define repeatable steps that organizations can use to ensure the effectiveness and efficiency of their management activities.

The IT Governance board operates under authority delegated by the corporate governance board. This board’s charter gives it responsibility for governance, risk management, and compliance management (GRC) for corporate IT processes, policies, and technologies. Members of the board each serve for a three year term. Of the 24 members, 8 have just begun their terms.

The IT Governance board focuses upon ensuring that the company achieves maximum value for each dollar spent on information technology capabilities. The board’s members must exercise due diligence to ensure that the company complies with laws and regulations that apply to the use of Information Technology (including privacy and security requirements). The board is also charged with ensuring that the company complies with voluntary standards such as PCI-DSS since these have an impact on the company’s business operations (non compliance could result in the company not being permitted to receive payments via credit cards).

The next meeting of the IT Governance board will include a set of orientation briefings for the new members. Your assignment, as a support staffer, is to help prepare for this orientation meeting by developing a short (5-minute) briefing on one of the following IT management / IT security management frameworks, standards, and models.

  1. COBIT
  2. ITIL
  3. ISO 27001 (ISMS Program Management)
  4. NIST Cybersecurity Framework
  5. NIST Security and Privacy Controls (NIST SP 800-53)
  6. NIST Risk Management Framework (NIST SP 800-37)

See the weekly readings for information about your selected topic. Then, find additional sources on your own. (Each of these standards and frameworks is discussed in freely available materials on the Internet or in articles available through the university’s only library. There is no reason for you to pay for copies of any materials for this assignment.)

After you have researched your chosen framework, standard, or model, develop a written script for your briefing which you will deliver verbatim (as written). You should also prepare a one page handout for the board members to follow as you present your speech.

WK7 20210617

NOTE: **** post answers in separate documents for each Question

      **** Please follow the instructions to the point and pick relavant topics according to the subject

      **** Follow APA7 format

Subject: Introduction to Data mining 

Question 1: Write a 300+ word essay (APA format & latest scholarly journal article references 2016 on words)

There are many different approaches in Data Mining. Explain and provide an example of the “Statistical Procedure Based Approach” in Data Mining?

Question 2: Assignment 3+ pages (APA format & 2 latest scholarly journal article references 2016 on words)

ANSWER EACH QUESTION WITH 300+ WORDS WITH PROPER REFERENCES IF NEEDED

Classification: Alternative Techniques Assignment

1) Define and provide an example of Rule Coverage and Accuracy.

2) What are the Characteristics of Rule-Based Classifier?

3) What do the steps to building a rule set consist in a Direct Method: RIPPER?

4) Describe what is used to separate data in Support Vector Machines.

5) List and describe the two classifiers of Ensemble Methods.

Subject: Database security

Question 3: Write a 500+ word essay (APA format & latest scholarly journal article references 2016 on words)

Write an essay of at least 500 words:

how a blockchain implementation would improve data security in a military, education, or other context. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences.

Include 3 quotes with quotation marks and cited in-line and in a list of references. 

Include an interesting meaninful title.

Include at least one quote from each of 3 different articles.

Subject: Building secure web applications

Question 4: Write a 300+ word essay (APA format & latest scholarly journal article references 2016 on words)

What is the Dark Web? How is it accessed? How is it used by criminals? How can it be used in a positive way? 

How can be used by law enforcement and intelligence services? How can be used by private individuals?

To write java program of prime numbers

you will generate a NON THREADED, SEQUENTIAL program.  This sequential program will take some input (you can grab this input from the user, or from a command line argument) that it will store in an integer.  (Therefore, there needs to be checks in place to make sure that the number being given can be stored adequately in an integer.  You do not need to use BigInteger or long for this, regular integersis fine.  This is more about design than about function).

Now that you have this number, you want to compute all the prime numbers that exist between 2 and that number (inclusive).

If a number is not prime, you will store that number and a List of its factors in a Map

If a number is prime you will store it in a List.  So, at the conclusion, we have a Map of non primes that contain factors of numbers and a list of primes.

You will time the runtime of your application so that we know how long it will take to build these two structures.  To time your application, simply generate a starting time as soon as you retrieve the number you want to use as the base of your iteration and then stop the timer when you are finished generating your structures.  Report back what the difference is. You can use System.currentTimeMillis(); to do this.

Network layers

In the event of an unknown zero-day attack, an intrusion detection system (IDS) might not be able to detect the attack and therefore fail to alert the administrator. Any failure to detect an attack is called a false negative. When alarms are not going off, it’s common to assume that no malicious events are taking place. If that’s a false assumption, real attacks are occurring and security staff is unaware.

False positives may create a false sense of security for the opposite reason—too many alarms from benign occurrences. An administrator might react quickly to the first few alarms. However, after receiving additional false positives, a busy administrator might put off investigating the alarms or ignore them.

Answer the following question(s):

Assume you are a network administrator responsible for security. In your opinion, which is worse—false positives or false negatives? Why?

MKT 455 week 9

Week 9 Discussion — Managing A New Company

Chapter Twelve “Organizing and Planning for Effective Implementation”

Strategic fit is the issue of organizational fit; the fit between a business’s competitive and marketing strategies which would involve the organizational structures, policies, processes, and plans.

Within a given business unit — when it is a part of a larger corporation — what organizational structures and coordination mechanisms are most appropriate? To answer this question, managers must look at following three factors: (1) level of technical competence of the various functional departments within the business, (2) how resources are allocated across those functions, and (3) how to coordinate and resolve conflicts among the departments.

 This class expects you to contribute three times:

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Your contribution one — answer one question only out of three questions below —

Question #1

Suppose you have been offered the job of developing and managing a new medical products unit for a major electronics manufacturer. The purpose of the new SBU will be to adapt technology from other parts of the company for medical applications (diagnostic equipment such as CAT scanners, surgical lasers, etc.) and to identify and build markets for the new products the unit develops. The new unit’s performance over the next several years will be judged primarily on its success at developing a variety of new products and its rate of growth in sales volume and market share. Before accepting the job, what assurances would you seek from the company’s CEO concerning the administrative relationships to be established between the new SBU and corporate headquarters? Why?

Question #2

Now that you have accepted the job described in question 1, you have been given a $50 million operating budget for the first year. Your first task is to staff the new unit and to allocate your bud- get across its various functional departments. Although you obviously want to hire good people for every position, which departments require the most competent and experienced personnel, and which departments should receive relatively large shares of the available budget? Why?

Question #3

As general manager, what type of organizational design would you select for the new SBU de- scribed in question 1? Justify your choice in terms of its ability to help the SBU implement its strategy and accomplish its primary objectives. What potential disadvantages—if any—might be associated with your chosen organizational structure?

.

You do not need to answer all three (3) questions above:

Question #1 needs student X1 and X2 to answer it (Question 1 must be listed first)

Question #2 needs student X3 and X4 to answer it (Question 2 must be listed first)

Question #3 needs student X5 and X6 to answer it (Question 3 must be listed first)

You will earn maximum 2 points from your completed contribution one, if —

  • your answer does not repeat to a same question that has already been answered by 2 classmates both did his/her work before you get here.
  • if you do not totally agree with these 2 classmates’ contribution one, or you think there are some aspects missed out by these 2 classmates, you could explain why you disagree or why some other aspects should be included in your contribution two.  
  • your answer is relevant to the question you selected to address.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Your contribution two — comment on two (yes two, not one) of your classmates’ postings about his/her contribution one.

You will earn maximum 2 points from your completed two comments, if —

  • your each comment starts with a classmate’s name – making it clear that his/her contribution one that you would like to critique on or discuss with.
  • your each comment has minimum 50 words.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Please

study chapters 12 thoroughly before you write up your response either for contribution one or contribution two.

review chapter 12 PowerPoint slides thoroughly (you can find them in “Files” at Canvas).

→ Unicheck before posting your contribution one and contribution two.

Reflection paper of Application security

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

· You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.