Categories
Internet Technology (IT)

In this section summarize the findings of the literature sources presented in the literature review section.

Using the following information, create a research project that follows APA format. A research project has 4 basic sections:
1. The Introduction (Statement of the Problem)
1. Whatever you chose as the title on the title page, that title repeats here as the header NOT Introduction or Statement of the problem
2. The opening paragraphs introduce the reader to what is going to be researched and background information about the problem
3. This section concludes with a purpose paragraph
1. In the last paragraph of the introduction you will state “The purpose of this project was…..” You will also present the specific research question for the paper. If you are missing this your grade will suffer.
2. Literature Review (This is the heart of the paper)
1. Here resource, after resource, after resource is presented to answer the research question(s). Fact based! You are merely presenting the facts of each source represented. You are not presenting opinion.
2. Organize the sources presented as they relate to answering the research question(s).
3. Discussion of the Findings
1. In this section summarize the findings of the literature sources presented in the Literature Review section.
4. Recommendations and Conclusion
1. Wrap up your project. You are able to provide your opinion, based on the sources that were referenced in the SOP and Lit Review sections as it relates to the question(s) being researched.
2. Recommendations and the conclusion are based upon the findings of the research conducted.
3. Make sure to specifically tell the reader how the project answered the research question(s) in the introduction
Assignment:
Take what you have learned in this course to identify a research project topic related to cybercrime. Develop a project that addresses one of the following topics:
Topic 1: Nation-State cybercrime.
Topic 2: Digital terrorism.
Topic 3: Cybercrime in the United States.
To accomplish the assignment for this project you will need to research academic papers and scholarly based resources that delve into the topic of your choosing. From this research you will focus on something unique. A topic will surface as you conduct your research. You will develop one (1) or two (2) questions to answer.
Do not write a book report on the topic you choose. Develop and argue a focused point. We are not discussing, showing, or presenting anything. Your project is arguing a point that you have develop from your research.
Information to Include in the Introduction / Statement of the Problem Section:
* What is the historical development of your topic? Did it start with technology or morph from other traditional crimes.?
* How does it work?
* How are Law Enforcement or Government agencies addressing the problem?
* Your recommendations for future research in your topics area?
Research Question Pointers
* There is a significant amount of information on the topics in the Utica Library.
* Choose a topic from one of the three provided.
* You will develop research question(s) that provides information on a specific point.
* Do not write a book report on the topic you choose. This is an academic research project.
* Read through the articles in the Utica Library and Google Scholar, then develop concise research question(s).
* You were provided idea options in the first research project, I want to see you developing your own ability to generate acceptable research questions related to the assigned topic.
* Google provides numerous reference options, but many of them are not scholarly or academic reviewed resources.
* This is intended to be practice in preparation for completing your Capstone Project. You are going to have to develop your own project subject and develop the research questions for your project.
Once you have determined the question argue your point. At a minimum, there should be twenty (20) scholarly or academic citations to support the paper’s argument.
Assignment Requirements
* APA 7th Edition compliant
* Length – see below
* Must include a Title Page and References page(s)
* Use the following file naming format to save the file:
* Your Last Name_CYB673_Research3
* Projects must be 20% or less than in similarity through VeriCite.
* 80% of the citations must be from academic resources and journals.
* Fifteen (15) pages minimum
* Page count does NOT include the Title, Abstract, TOC, or References pages
* This does not include:
* Popular media (papers, magazines, radio, TV, Wikipedia, and basic Internet sites such as blogs.)
* Court cases (these are opinions – judges interpret the application of the law for the given case). Caveat – if your project is based upon a specific court decision or a specific court decision has a bearing on the basis of your project, you can reference that court decision.
* Specific company research such as a report from a technology company.
Points to remember:
* Your project is not written to your professor. Write to the imaginary reader who knows nothing about the topic. This will force you not to take short cuts in assuming your reader knows your topic.
* Be detailed without using fluff.
* Doing research is like conducting an investigation, be sure to be thorough in your digging.

Categories
Internet Technology (IT)

2.1.1: identify the issue or problem under consideration.

As a cloud professional tasked with developing a proof of concept for the company’s cloud adoption, you will prepare a proof of concept report to be submitted to the company owner. By developing a well-structured report of your results and recommendations to management, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express recommendations to decision-makers with the right mix of technical detail in an accepted format is an important workplace and career skill.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
1.1.3: Present ideas in a clear, logical order appropriate to the task.
1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.
2.1.1: Identify the issue or problem under consideration.
2.1.2: Describe the context surrounding the issue or problem.
2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.
2.3.4: Address alternative viewpoints, perspectives, and methods.
11.1.3: Install the software.
11.2.1: Configure technology according to stakeholder specifications and requirements.
13.1.1: Create documentation appropriate to the stakeholder.

Categories
Internet Technology (IT)

The sales and marketing department at your company consists of two salespeople, a graphic designer, a copywriter, and a layout person.

Scenario 5-3: Changing Print Drivers
You have a new Canon printer. Unfortunately, it did not come with any drivers. So, you visit the Canon website and download the driver. You then print the document, but the printed page contains what looks like programming code. When other users try to print, their documents do not print. Describe your recommended solution.
Scenario 5-4: Using Cloud Services
The sales and marketing department at your company consists of two salespeople, a graphic designer, a copywriter, and a layout person.
Tonya and Aaron are the salespeople. Tonya is responsible for the western United States and Aaron covers the eastern United States. They tend to use the same files for all sales presentations, client follow-ups, and so on. When one modifies a template, it’s important that the other gets the updated file as soon as possible.
The marketing employees share several Word documents and PowerPoint presentations, in addition to a large folder of graphical images. It’s important for them to have shared access to a Marketing folder that contains the shared files.
What should you do to help the sales and marketing employees work more efficiently?
3-4pages in length (excluding cover page, and reference list)
Follow the APA 7th edition format, Use the APA 7 template

Categories
Internet Technology (IT)

Requirement:

In class, we have watched two videos regarding hardware side channel attacks, i.e., fault injection attack, and power analysis attack.

However, these two attacks are not limited to the approaches demonstrated in the video. Furthermore, there are a ton of other side channel attacks target various hardware.
For this assignment, you will find one hardware-related side channel attack, research and get a better understanding, and then summarize it using your own words. This attack you find can be fault injection or power analysis but with a different approach, or completely different attacks. Let me know if you can’t decide if the attack you find fits the requirement.
Requirement:
1. Your submission should be at least one page and at most two pages. You can include pictures, tables, etc. , to facilitate your illustration, but those pictures and tables are not counted towards the page limit, neither the references. Short answers will result in reduced grade.
2. You must use at least two references, one must be in writing, such as research papers or technical blogs write-ups. Another can be in writing or video. Clearly list the reference at the end.
3. The submission must be written in MS Word (if you use Mac, you can use office 365 online, Mason has group license for all students), using font “Calibri” and size 11. Single-space. 1 inch margin vertical and horizontal. The document must then be converted into PDF and submitted to Blackboard. Submission does not conform to this requirement is subject to 20% deduction minimum.
4. Your answer should be self-contained, which means it should tell the story that includes at least: what is this attack, what is the target of the attack, how this attack works and why does it work, and what are the countermeasures that can be used to address it. Your answer should reflect about 3-4 hours of work with reasonable workload, and you will be graded based on the obvious effort you have put in finding and explaining the attack, as well as your quality of writing.

Categories
Internet Technology (IT)

Which type of sort compares list items in pairs, swapping any two adjacent values that are out of order?

Which type of sort compares list items in pairs, swapping any two adjacent values that are out of order?

Categories
Internet Technology (IT)

Choose a delivery format for your comparison:

Assignment Content
Create a matrix comparing five features of presentation software.
Using these five features, compare two presentation programs.
Include a brief reflection on how the programs meet or fail to meet your expectations.
Choose a delivery format for your comparison:
Matrix created in a Microsoft® Office® program (Use this)
Venn Diagram
Tips on how to create a Venn Diagram can be found at the Microsoft® Office® Support website.
1-page summary
Submit your assignment.

Categories
Internet Technology (IT)

1-page summary

Assignment Content
Create a matrix comparing five features of presentation software.
Using these five features, compare two presentation programs.
Include a brief reflection on how the programs meet or fail to meet your expectations.
Choose a delivery format for your comparison:
Matrix created in a Microsoft® Office® program (Use this)
Venn Diagram
Tips on how to create a Venn Diagram can be found at the Microsoft® Office® Support website.
1-page summary
Submit your assignment.

Categories
Internet Technology (IT)

The marketing employees share several word documents and powerpoint presentations, in addition to a large folder of graphical images.

Scenario 5-3: Changing Print Drivers
You have a new Canon printer. Unfortunately, it did not come with any drivers. So, you visit the Canon website and download the driver. You then print the document, but the printed page contains what looks like programming code. When other users try to print, their documents do not print. Describe your recommended solution.
Scenario 5-4: Using Cloud Services
The sales and marketing department at your company consists of two salespeople, a graphic designer, a copywriter, and a layout person.
Tonya and Aaron are the salespeople. Tonya is responsible for the western United States and Aaron covers the eastern United States. They tend to use the same files for all sales presentations, client follow-ups, and so on. When one modifies a template, it’s important that the other gets the updated file as soon as possible.
The marketing employees share several Word documents and PowerPoint presentations, in addition to a large folder of graphical images. It’s important for them to have shared access to a Marketing folder that contains the shared files.
What should you do to help the sales and marketing employees work more efficiently?
3-4pages in length (excluding cover page, and reference list)
Follow the APA 7th edition format, Use the APA 7 template

Categories
Internet Technology (IT)

He asks you to present your productivity suite recommendation at next week’s team meeting.

Assignment Content
The vice president of sales for your company has asked you for more information on cloud-based office productivity suites. He tells you the sales team is often remote and needs to be able to stay connected to the office. They need to be able to view price sheets, prepare memos and sales agreements, make presentations to clients, have access to their email and schedule, and attend meetings remotely. He asks you to present your productivity suite recommendation at next week’s team meeting.
Create a 6- to 10-slide presentation about a cloud-based office productivity suite, identifying how each of the above needs can be met and the collaborative benefits provided by the suite.
Your presentation must include:
A title slide (not included in the slide count)
Appropriate and relative graphics or images
Detailed speaker notes or recorded audio narration
Instructions on how to add audio to Microsoft® PowerPoint® presentations can be found on the Microsoft® Office® Support site.
A reference slide citing all resources used in the presentation and speaking notes (not included in the slide count)

Categories
Internet Technology (IT)

The information system (is) with the backing from it is a total package with an encoder as part of the system.

There has been much discussion in your organization regarding the purchase of an EHR. Two factions are squaring off in the discussions: those that favor best of fit, and those that favor best of breed. The information system (IS) with the backing from IT is a total package with an encoder as part of the system. You have worked with that encoder before and found it to be subpar. Explain why you support the best of breed IS.