Computer Science
Educational Technologies
Instructions Write a 5- to 7-page APA formatted research paper on any of the following topics. Research any associated tools, new developments, and benefits/disadvantages in relation to the topic. Including your introduction and conclusion, make sure to answer the following questions in your paper: Describe your interest in the topic you’ve chosen and why it interests you. What type of positive or negative impact has your technology topic had on society over the past 5 years? What opportunities have now become available because of the advent of your technology topic? What industries are benefiting from the existence of your technology topic? Make sure to cite examples. What improvements do you think could still be made in this area? What are 23 different tools that can be used in relation to your technology topic? Topics to choose from can include any of the following (or related sub-topics): Web Applications Social Media Cloud Computing Web Ethics Collaboration Technology Green Technology Mobile Computing Artificial Intelligence Virtual Reality Open Source Educational Technologies Make sure you put your research into your own words unless direct quotations are appropriate. Cite your sources using APA formatting. You have a tutorial on this in the Campus Common. Here is an example for a reference of a Web site address: Contributor, I. (Last edited date). Title of resource. Retrieved from http://Web address There are plenty of resources you can use to make sure you properly format your paper in a professional manner. You can use the Microsoft Office Word 2010 skills that you learned from this week’s textbook reading to format your paper. Click here for some useful information about APA and formatting research papers. Check out the documents that came with your text that you downloaded in Week 1. The South University Online Library has information about APA Standards. (Check the links at the bottom of the library home page.) Submission Details: Submit your paper to the Submissions Area by the due date assigned as a 5- to 7-page MS Word document named ITS1101_W5_Project_LastName_FirstInitial.docx.
Future Of Cyber Warfare
Discuss the future of cyber warfare. Include the following as part of your discussion: a. How future wars will be fought. b. How ethical is cyber warfare? c. How the United States is preparing defensively to counter cyber-attacks? d. What is next? 1. Document Format. a. MS Word document b. One-inch (1″) margins c. Times New Roman font d. Twelve (12) pitch e. Not including your title page, this assignment should be 4-6 pages. f. You must use 5 scholarly sources in supporting this assignment. 2. Citation Format: The Chicago Manual of Style. As stated in the Academic Integrity Briefings, information taken directly from another source must be placed in quotations and cited following the Chicago format contained in the week one “lessons” folder. You must cite all other information from your sources, even if you do not quote directly. DIRECT QUOTING SHOULD BE KEPT TO A MINIMUM.
Digital Footprints
Describe two digital footprints you have left within the last week. Analyze each one for potential risk on a scale of 1-10, 1 being low risk and 10 being high risk. Write about a situation in which you or someone you know was a victim of a privacy, safety, or security breach online. Describe the situation and how it was eventually resolved. Put your name into at least two different search engines (Google, Bing, Dogpile, Yahoo, Ask.com, and DuckDuckGo are some popular ones) and review your own digital trail. Pretend you are a potential employer. What observations could you make about your own online presence? Note: If you have a common name, you may need to add additional search terms or experiment with different search terms, such as the city in which you live (e.g., Dan Smith Clinton, Iowa). Now that you have explored your own digital trail, identify at least three steps you can take to enhance your privacy, safety, and security on the web.
Disaster Recovery Plan
Module 3 AssessmentPart 1A-B: Outcomes addressed in this activity: Module Outcomes: Understand the key role documentation plays in network management. Utilize Microsoft Visio to create network documentation. Define the importance of a disaster recovery plan. Course Outcomes: IT273M3-3: Analyze policies, best practice, appropriate documentation, and diagrams to manage the network. GEL-1.02: Demonstrate college-level communication through the composition of original materials in Standard English. Assessment Details Part A Using Visio, create a Local Area Network (LAN) consisting of 12 computers, a switch, three printers, and a WAN router. The switch and router should be in a telecom closet to itself and the computers and printer should be in an office room. Connect all the devices to the switch. Connect the router to the connection on the side of the building going to the Internet. Part B Based on the knowledge you have achieved thus far in this class, compose a brief synopsis compiling what you have learned about todays networks. Describe how you would create a better network at your home or office utilizing the knowledge youve gained with this class. An example of this knowledge would be the cabling selected, as well as the IP address scheme utilized. Parameters/Expectations: At least 4 paragraphs in length not counting the title page, include a title page, double space, font size 10 or 12 Includes a highly developed viewpoint, purpose and exceptional content Demonstrates superior organization, is well ordered, logical and unified Free of grammar and spelling errors 5. No evidence of plagiarism
Peripheral Equipment
Must be at least 200 words each. No references or citations are necessary. 1. Reflect on what you think the Internet of Things (IoT) means. How has it affected the way you live? 2. Describe your home or office computer setup to include all peripheral equipment, networks, and the Internet or intranet. Be sure to describe all input, output, and storage devices.
Instructional Audio Design
Write a research paper using APA 7 writing style and formatting in 1,300 – 1,500 words (not including the title page, abstract, conclusion, and references). . Retrieve and read the article, Four Design Principles to Consider for Every Instructional Audio Design Effort, by Curtis W. Carter (2012), from the Full Sail library online research databases and download the APA Resource attached to this activity. Describe and evaluate the benefits and drawbacks of instructional audio based on the Carter (2012) article and at least one additional peer reviewed primary source reference that corroborates or refutes Carter’s (2012) claims. Examine and evaluate how Carters (2012) concepts discusses in his paper can be applied to the planning, script-writing, selection of music, and the production of audio for a) podcasts, b) instructional videos, and c) interactive media. Corroborate and refute Carter’s claims and positions by reading and evaluating the findings from a minimum of 4-peer reviewed I included the required article to be read and I found two other articles that you can use. google scholar is the only other research database that can be used.
Job Search Engines
Evaluating Job Search Engines and Information Assurance and Security Positions – (Information Security Analyst) Search the Internet for a job-search engine. You can use the Capella Career Center or this unit’s studies to help you get started. Evaluate the advantages and disadvantages of your selected site, and provide your insights into the potential effectiveness and ease of use of the site. Additionally, provide, at a minimum, three different IAS-related positions that you would be interested in. What are the skills required? Do you possess them at this time? What steps could you take to obtain those specific skills?
Cybersecurity Management
How would you gain insight from the 4 main ways you can manage cyber risk and train employees to avoid cyber breaches?
Biometric Authentication
Describe cybersecurity roles and responsibilities to protect security for the corporate business mission (for example, the Insider threat, Access Controls, Biometric Authentication) and explain why business also may have a cybersecurity responsibility to protect national security through business resilience and Continuity of Operations Planning Describe what is meant by the term “Cascade Failures” as it may apply to cyberattacks against critical infrastructures. Do you agree or disagree that businesses should protect national security by expanding their cybersecurity budget to prevent or reduce the effects of possible Cascade Failures that may affect their business and other downstream businesses that may depend on them? Justify your answer.
Cybersecurity Training
Describe Cybersecurity Training programs at your own organization (frequency, use of automation, certification after finishing, etc). How is cybersecurity training at your organization designed to successfully overcome resistance to changing users’ poor cybersecurity habits? Should cybersecurity training be designed to correspond to different categories for individual roles and responsibilities in an organization? Explain your answer.
Use Promo Code: FIRST15