Technology
[Get Solution] Phones in School
The Assignment should take the form of a persuasive academic essay, in which you will provide reliable evidence from at least four sources to support the argument for change that you are advocating. You will also need to address counter-arguments or misconceptions about your topic within the essay, as the ability to do so is a key component of a strong argument. Your persuasive essay will need to meet the following criteria: APA 6th Edition format for the document, including an appropriately formatted title page and References page A thesis statement at the end of the introduction Well-developed paragraphs that include evidence from sources to support your argument for a specific change in your community Four reliable sources should be cited within the text of the Assignment; at least one of the cited sources should be either a book/ebook or a periodical article. 3 sources will be for the change and 1 will be a rival source All cited sources need to have full citations on a References page (except for any interviews you conduct, which only require in-text citations) Standard English and a formal tone throughout the writing Only the third person point of view should be used
[Get Solution] Cloud Compromise
SCENARIO: One of your organizations internal departments frequently uses outside cloud storage to store large amounts of data, some of which may be considered sensitive. You have recently learned that the cloud storage provider that is being used has been publicly compromised and large amounts of data have been exposed. All user passwords and data stored in the cloud providers infrastructure may have been compromised. What is your response? Discussion questions Does your organization have current polices that consider 3rd party cloud storage? Should your organization still be held accountable for the data breach? What actions and procedures would be different if this was a data breach on your own local area network? What should management do? What, if anything, do you tell your constituents? o How/when would you notify them?
[Get Solution] Patch Management
The Quick Fix SCENARIO: Joe, your network administrator, is overworked and underpaid. His bags are packed and ready for a family vacation to Disney World when he is tasked with deploying a critical patch. In order to make his flight, Joe quickly builds an installation file for the patch and deploys it before leaving for his trip. Next, Sue, the on-call service desk technician, begins receiving calls that nobody can log in. It turns out that no testing was done for the recently-installed critical patch. What is your response? Discussion questions What is Sues response in this scenario? o Does your on-call technician have the expertise to handle this incident? If not, are there defined escalation processes? Does your organization have a formal change control policy? o Are your employees trained on proper change control? o Does your organization have disciplinary procedures in place for when an employee fails to follow established policies? Does your organization have the ability to roll back patches in the event of unanticipated negative impacts?
[Get Solution] Financial Break-in
SCENARIO: A routine financial audit reveals that several people receiving paychecks are not, and have never been, on payroll. A system review indicates they were added to the payroll approximately one month prior, at the same time, via a computer in the financial department. What is your response? INJECT: You confirm the computer in the payroll department was used to make the additions. Approximately two weeks prior to the addition of the new personnel, there was a physical break-in to the finance department in which several laptops without sensitive data were taken. OPTIONAL INJECT: Further review indicates that all employees are paying a new “fee” of $20 each paycheck and that money is being siphoned to an off-shore bank account. Having this additional information, how do you proceed? Discussion questions What actions could you take after the initial break in? Do you have the capability to audit your physical security system? Who would/should be notified? Would you able to assess the damages associated from the break in? Would you be able to find out what credentials may have been stored on the laptop? How would you notify your employees of the incident? How do you contain the incident? o Optional Inject question: How do you compensate the employees?
[Get Solution] The Flood Zone
SCENARIO: Your organization is located within a flood zone. Winter weather combined with warming temperatures has caused flooding throughout the area. Local authorities have declared a state of emergency. In the midst of managing the flooding, a ransomware attack occurs on your facility, making computer systems inoperable. What is your response? Discussion questions Do you have a COOP (Continuity of Operations Plan) or DRP (Disaster Recovery Plan)? o If so, do you carry out an annual simulation to ensure the COOP or DRP is sufficient and running smoothly? Do you have an Incident Response Plan (IRP) that specifically details ransomware steps? o What steps will you take if restoring from backup is not an option? o Does your IRP only take into account the financial implications of a cybersecurity incident, or does it consider the severity of the situation as well? o Do you have a plan in place for how to acquire bitcoin? o Have you considered that a targeted ransomware attack may require more bitcoin than is easily accessible on the market? Do you have a backup for completing Emergency Operations Center (EOC) processes without a computer system? o Can you route emergency communications/processes through a neighboring entity? Who do you need to notify, and how will you do so? o Consider that increased phone traffic may be congesting the lines.
[Get Solution] Interface Design
There is one paper assignment throughout this course. Students will be required to submit responses to the prompt using citations, APA formatting, and high-level arguments to receive a good score. Please double-space your paper and use Times New Roman 12-point font. Make sure to proofread your paper before submitting. APA format. Please utilize appropriate citations and references for sources. A minimum of two (2) academic sources is required. What are the different types of human trafficking? Which of these are women more susceptible and why? Describe the statistics on this crime and the current trends surrounding it. What are some ways that we can prevent this crime from occurring (proactive)? What are some of the effects human trafficking has on the victim and what are some of the measures we should take to assist victims after they have been freed (reactive)? NO PLAGIARISM. THIS WILL BE RAN BY TURNITIN WEBSITE AND WILL CATCH IT.
[Get Solution] Researching Content
Requirements: This is your final exam, the final exam requires researching content that will be applicable to a group or specific individual questions. Answer responses must be substantive and comprehensive addressing the questions, providing the relevant research while keeping the ethical theory or concept within context. If you use information from others, you must cite information where you list the information from others, place references in the references section. The length of this paper should be not more than 6 pages of content (the body of your paper) in length. As a guide for minimum content, papers should be a minimum of 2 pages of content (content is the body of your paper (the body excludes the title page, abstract and references pages). Use the included boxes to input your answers, or if you prefer to write out your paper in paragraph format, that is fine, but you must include all of the questions and respond accordingly. Step 1. Article(s)/Facts A. Research one or more articles that includes a technological or ethical topic. Students will list five or more relevant facts using complete sentences from the article(s). Write in the in-text citations for each fact where you list the information from your others/resources. Facts 1. 2. 3. 4. 5. 6. 7. 8. Reference(s): B. Summarize the ethical values from above, what ethical/values are in question from the above facts? List more than three different facts than those from above- below: Facts Summary 1. 2. 3. 4. C. Who are affected/who may be affected? How are they affected by the dilemma/or could be affected? Step 3 Social Contract Theory- Negative and Positive Rights Major Ethical dilemma question: D. Research a new article or resource that has elements of social contract theory. Discuss: what is social contract theory and why your article has a relationship with social contract theory. Interpretation of above analysis: 1. Does the ethical question results validate negative rights being identified? Yes or No? How? 2. Does the ethical question results validate positive rights being identified? Yes or No? How? 3. Develop a social contract theory question that incorporates the article/resources and discuss why your question is relative. Example (how do warranties protect consumer rights)? Final outcome of analysis: Is the social contract theory applicable to your ethical question? How? Why?
[Get Solution] Entity-Relationship Diagrams
Look at the attachment for more details on the assignment. In the word document, you need to be very detailed if it’s going to be more than three pages or less, please let me know. Entity-relationship diagrams (ERDs) can be found in many styles. In this assignment, you will be building upon a provided ERD. Even within the style of the diagram provided, there are different options for representing relationships. You may choose any style to use, but you must be consistent within your diagram. If you would like to view different styles of diagrams, you can look at this variety of examples. Download this ERD, and save it to your computer in a folder where you save your assignments for this course. You will expand the provided diagram to include additional entities and relationships. As you will see, the diagram contains a general set of entities that might be used for employees of any type of organization. As you plan the expansion of your diagram, it is important to identify the type of organization or a specific organization that you are now designing the database for. You will add entities that relate to the existing ones in the diagram. Remember, each entity becomes a table when you build your database in your database management system. The provided diagram called Start_U3.drawio includes four entities, as follows: Department Product/Service Employee Customer You must decide what organization your diagram is for and then determine what two new entities must be added to your diagram to fit the needs of your organization.
[Get Solution] Interview Questions
WRITTEN INTERVIEW QUESTIONS Ph.D. candidates should provide authentic personal statements to each of the five following questions/prompts reflecting on their own personal interests. In the event that any outside resources are used, resources should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question/prompt. It is best to respond to each prompt/question individually for clarity of the reviewer. Documents should be submitted in Microsoft Word format. 1. Provide a brief introduction focusing on your education, career, and decision to apply to University of the Cumberlands. 2. In relation to your doctoral program application, what area of recent research in the field would you want to study, and why? 3. How does your current vocation relate to your application to the doctoral program? 4. How will your experiences and personal skills help you to be successful in your program? 5. What long-term goals do you have for applying your learning from your doctoral program?
[Get Solution] Technological Advancement
For this writing assignment, you will be required to do some outside research on a technological advancement and explain the positions of those who support the technology and those who oppose the technology. After researching, you will be required to do the following: 1. Briefly describe the technology. 2. Describe why people support the technology and why people oppose the technology. 3. Defend your own position. For example, if you were to choose GMOs, you would explain the benefits of using GMOs, the negative consequences of using GMOs, and decide which position is stronger and why. Papers are required to be at least 2 pages in length. You are allowed to exceed two pages, but try to keep it within 3 pages. You are allowed to use whatever style you prefer (e.g. Chicago, MLA, APA, etc.) as long as you remain consistent throughout your paper. Make sure to cite your sources. You do not need to include in-text citations when referencing the book or the codes of ethics above, but make sure to be explicit about which code(s) you are using and use quotation marks if using direct quotes. Do not include a separate title page. You should have no information on the top of your first page besides your name next to the page number and a unique title. You should not have a date, my name, the class information, etc. at the top of the page. Papers are graded on both content and grammar with more points dedicated to content.
Use Promo Code: FIRST15