Category: Technology

  • Title: Priorities in Developing an Awareness Program and the Importance of Project and Risk Management in InfoSec

    1.When developing an awareness program, what priorities should you keep in mind?
    (Provide reference)
    2. Define “project management.” Why is project management of particular interest in the field of InfoSec? (Provide reference)
    3. In risk management strategies, why must periodic reviews be a part of the process?(Provide reference)
    4.What value would an automated asset inventory system have for the risk identification process?(Provide reference)

  • Title: The Patient Experience of Ultrasound: A Report on Interviews with Three Individuals

    RESEARCH PROJECT CRITERIA  
    Interview at least 3 people who have had an ultrasound before and ask them about their
    experience. Be sure to encourage them to elaborate on both the good and bad! Write a report
    on your findings to share with the class. Reports must be a minimum of 3 pages long,
    typewritten, double-spaced, using 12 font.
    Be sure to include the following information in your report:
      Age of the person when he/she received the ultrasound
     Related medical history (signs and symptoms, lab values, previous testing, etc)
     Description of the experience – both positives and negatives.  Get a lot of details!
      What were the patient’s impressions of the Sonographer who completed the exam?

  • Running PHP Files in XAMPP and Understanding HTML5 Tags Title: “Mastering XAMPP: A Guide to Running PHP Files and Understanding HTML5 Tags” Running PHP Files in XAMPP: 1. Install XAMPP:

    Explain how to run a PHP file in XAMPP.
    Explain the main use of the following HTML5 tags: head, title, meta, link, script, div, nav, h1, ul, ui.

  • Title: The Revolutionary Impact of the Smartphone: How a Device has Transformed the World through Information Systems and Technology

    This is the Final paper of an Information System Management and Technology course.
    Title: An Information System that has changed the World
    In this paper, we will have to identify an information systems or a technology that has changed the way individuals or organizations do something.  This could be a web application, mobile app, or device.  Examples include online bill payment provided by banks (a web application), text messaging or WhatsApp (mobile apps), or a smart phone, iPad, or Kindle (device).  
    The paper should consist of the following sections:
    Introduction
    In this section provide an introduction to the information system or the technology you would like to present.  Why is it important to consider such a technology – this is the justification.
    The System or Technology
    What is the information system or the technology?
    Who designed or invented it?
    When was this introduced?  – History?
    Functionality
    How does it work?
    What are the technology components of the system?
    Hardware and Software
    Benefits and Costs
    What are the benefits of this system?
    What are the costs?  – Initial Investment, and ongoing costs
    Competition?
    Conclusion
    What does the future hold?
    References
    References should be in the APA format.
    Other 
    As this is the Final paper, write the paper with professional knowledge and ideas.
    6 pages double-spaced, not including figures and references. 
    Do not use too many references. One reference is enough for the one paragraph.
    Do not use AI programs, and do not plagiarize.

  • Basic Wireshark Lab Assignment “Exploring Network Commands, Timestamps, and Event Identification: A Comprehensive Analysis” Basic Wireshark and Nmap Lab Assessment “Network Scanning and Intrusive Techniques: A Comprehensive Analysis Using Nmap” “NMAP and Zenmap Lab: Network Enumeration and Identification” Part 1: Screenshots: 1. Windows 10 IP address: [insert screenshot of Windows 10 IP address] 2. Kali IP address: [insert screenshot of

    1st task:
    This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
    Basic Wireshark Lab – Rubric
    Rubric Criteria:
    Criteria Desсrіption
    Part 1: Screenshots
    5. Target
    12 points
    Includes all of the screenshots of Wireshark tasks, including: Kali Linux VM starts a Wireshark packet capture and shows all network traffic, identification of the IP addresses for the Kali Linux and Windows 10 VMs from within Wireshark, adds an ICMP filter and pings the Windows 10 VM, adds an IP Address filter with the Windows 10 VM IP Address and runs an NMAP Service Scan against the Windows 10 VM IP Address, researches and applies two additional filters that demonstrate their effect on the capture, saves the captured packets to a file using their last name as the file name, and closes the capture session and then loads the capture file that was saved.
    4. Acceptable
    10.44 points
    Includes most of the screenshots of Wireshark tasks, including: Kali Linux VM starts a Wireshark packet capture and shows all network traffic, the identification of the IP addresses for the Kali Linux and Windows 10 VMs from within Wireshark, adds an ICMP filter and pings the Windows 10 VM, adds an IP Address filter with the Windows 10 VM IP Address and runs an NMAP Service Scan against the Windows 10 VM IP Address, researches and applies two additional filters that demonstrate their effect on the capture, saves the captured packets to a file using their last name as the file name, and closes the capture session and then loads the capture file that was saved.
    3. Approaching
    9.48 points
    Includes some of the screenshots of Wireshark tasks, including: Kali Linux VM starts a Wireshark packet capture and shows all network traffic, the identification of the IP addresses for the Kali Linux and Windows 10 VMs from within Wireshark, adds an ICMP filter and pings the Windows 10 VM, adds an IP Address filter with the Windows 10 VM IP Address and runs an NMAP Service Scan against the Windows 10 VM IP Address, researches and applies two additional filters that demonstrate their effect on the capture, saves the captured packets to a file using their last name as the file name, and closes the capture session and then loads the capture file that was saved.
    2. Insufficient
    8.88 points
    Includes a few of the screenshots of Wireshark tasks, including: Kali Linux VM starts a Wireshark packet capture and shows all network traffic, the identification of the IP addresses for the Kali Linux and Windows 10 VMs from within Wireshark, adds an ICMP filter and pings the Windows 10 VM, adds an IP Address filter with the Windows 10 VM IP Address and runs an NMAP Service Scan against the Windows 10 VM IP Address, researches and applies two additional filters that demonstrate their effect on the capture, saves the captured packets to a file using their last name as the file name, and closes the capture session and then loads the capture file that was saved.
    1. Unsatisfactory
    0 points
    Does not include the screenshots of Wireshark tasks, including: Kali Linux VM starts a Wireshark packet capture and shows all network traffic, the identification of the IP addresses for the Kali Linux and Windows 10 VMs from within Wireshark, adds an ICMP filter and pings the Windows 10 VM, adds an IP Address filter with the Windows 10 VM IP Address and runs an NMAP Service Scan against the Windows 10 VM IP Address, researches and applies two additional filters that demonstrate their effect on the capture, saves the captured packets to a file using their last name as the file name, and/or closes the capture session and then loads the capture file that was saved.
    Criteria Desсrіption
    Part 2: Kali IP Address, Windows IP Address, and Commands
    5. Target
    4 points
    Specifically includes the Kali IP address, the Windows IP address, and the command used to change directory/folder, move a file, remove a file, and create a new directory/folder; comprehensively identifies and explains the commands.
    4. Acceptable
    3.48 points
    N/A
    3. Approaching
    3.16 points
    Partially includes the Kali IP address, the Windows IP address, and the command used to change directory/folder, move a file, remove a file, and create a new directory/folder; broadly identifies and explains the commands.
    2. Insufficient
    2.96 points
    N/A
    1. Unsatisfactory
    0 points
    Does not include the Kali IP address, the Windows IP address, and the commands used to change directory/folder, move a file, remove a file, and creates a new directory/folder; does not identify and/or explain the commands.
    Criteria Desсrіption
    Part 2: Importance of a Timestamp and Other Logging Tools
    5. Target
    4 points
    Includes a thorough explanation of why a timestamp is important on Wireshark, as well as other logging tools.
    4. Acceptable
    3.48 points
    Includes a clear explanation of why a timestamp is important on Wireshark, as well as other logging tools.
    3. Approaching
    3.16 points
    Includes a surface-level explanation of why a timestamp is important on Wireshark, as well as other logging tools.
    2. Insufficient
    2.96 points
    Includes a vague and/or incomplete explanation of why a timestamp is important on Wireshark, as well as other logging tools.
    1. Unsatisfactory
    0 points
    Does not include an explanation of why a timestamp is important on Wireshark, as well as other logging tools.
    Criteria Desсrіption
    Part 2: List of Well-Known Ports and Associated Protocols
    5. Target
    4 points
    Includes an in-depth list of well-known ports and associated protocols.
    4. Acceptable
    3.48 points
    Includes an appropriate list of well-known ports and associated protocols.
    3. Approaching
    3.16 points
    Includes a minimal list of well-known ports and associated protocols.
    2. Insufficient
    2.96 points
    Includes an incomplete list of well-known ports and associated protocols.
    1. Unsatisfactory
    0 points
    Does not include a list of well-known ports and/or associated protocols.
    Criteria Desсrіption
    Part 2: Explanation of the Differences Between a Port and a Protocol
    5. Target
    4 points
    The explanation of the differences between a port and a protocol is accurate and comprehensive.
    4. Acceptable
    3.48 points
    The explanation of the differences between a port and a protocol is accurate.
    3. Approaching
    3.16 points
    The explanation of the differences between a port and a protocol is brief.
    2. Insufficient
    2.96 points
    The explanation of the differences between a port and a protocol is inaccurate.
    1. Unsatisfactory
    0 points
    Does not include an explanation of the differences between a port and a protocol.
    Criteria Desсrіption
    Part 2: Identifying Events
    5. Target
    4 points
    Expertly describes how Wireshark can be used to identify events that indicate an attack is in progress or has happened.
    4. Acceptable
    3.48 points
    Succinctly describes how Wireshark can be used to identify events that indicate an attack is in progress or has happened.
    3. Approaching
    3.16 points
    Generally describes how Wireshark can be used to identify events that indicate an attack is in progress or has happened.
    2. Insufficient
    2.96 points
    Poorly describes how Wireshark can be used to identify events that indicate an attack is in progress or has happened.
    1. Unsatisfactory
    0 points
    Does not describe how Wireshark can be used to identify events that indicate an attack is in progress or has happened.
    Mechanics of Writing
    4 points
    Criteria Desсrіption
    Includes spelling, capitalization, punctuation, grammar, language use, sentence structure, etc.
    5. Target
    4 points
    No mechanical errors are present. Skilled control of language choice and sentence structure are used throughout.
    4. Acceptable
    3.48 points
    Few mechanical errors are present. Suitable language choice and sentence structure are used.
    3. Approaching
    3.16 points
    Occasional mechanical errors are present. Language choice is generally appropriate. Varied sentence structure is attempted.
    2. Insufficient
    2.96 points
    Frequent and repetitive mechanical errors are present. Inconsistencies in language choice or sentence structure are recurrent.
    1. Unsatisfactory
    0 points
    Errors in grammar or syntax are pervasive and impede meaning. Incorrect language choice or sentence structure errors are found throughout.
    Format/Documentation
    4 points
    Criteria Desсrіption
    Uses appropriate style, such as APA, MLA, etc., for college, subject, and level; documents sources using citations, footnotes, references, bibliography, etc., appropriate to assignment and discipline.
    5. Target
    4 points
    No errors in formatting or documentation are present. Selectivity in the use of direct quotations and synthesis of sources is demonstrated.
    4. Acceptable
    3.48 points
    Appropriate format and documentation are used with only minor errors.
    3. Approaching
    3.16 points
    Appropriate format and documentation are used, although there are some obvious errors.
    2. Insufficient
    2.96 points
    Appropriate format is attempted, but some elements are missing. Frequent errors in documentation of sources are evident.
    1. Unsatisfactory
    0 points
    Appropriate format is not used. No documentation of sources is provided.
    Assignment one.
    Basic Wireshark Lab
    Assessment Desсrіption
    By gaining an understanding of the basic protocol analyzer (Wireshark), students will be able to set up and read basic digital traffic, including:
    · Gaining a foundational understanding of logging
    · Identifying the source and destination IPs
    · Translating IP addresses into websites
    · Identifying ports and protocols
    · Creating a timeline of events
    View ″2-3 Wireshark Lab,″ from the video playlist located in Class Resources. In this lab, you will explore some basic Wireshark and Linux commands. (https://www.youtube.com/watch?v=jVG7Yoghphc&list=PLfSk-dHOm3SC32JVL_set6NumaLO221Zn&index=8)
    Part 1:
    Complete the following Wireshark tasks and capture screenshots of each task result:
    · On the Kali Linux VM, start a Wireshark packet capture and show all network traffic.
    · Identify the IP addresses for the Kali Linux and Windows 10 VMs from within Wireshark.
    · Add an ICMP filter and ping the Windows 10 VM.
    · Add an IP Address filter with the Windows 10 VM IP Address and run an Nmap service scan against the Windows 10 VM IP Address.
    · Research and apply two additional filters to demonstrate their effect on the capture.
    · Save the captured packets to a file using your last name as the file name.
    · Close the capture session and then load the capture file that you saved.
    Part 2:
    Write a 250- to 500-word summary addressing the following:
    · Your Kali IP address.
    · The Windows IP Address.
    · For both Windows and Linux, identify and explain the following commands:
    – Command used to change directory/folder
    – Command that moves a file
    – Command that removes a file
    – Command that creates a new directory/folder
    · An explanation for why a timestamp is important on Wireshark, as well as other logging tools.
    · A list of 10 well-known ports and associated protocols.
    · A brief explanation of the difference between a port and a protocol.
    · Describe how Wireshark can be used to identify events that indicate an attack is in progress or has happened.
    Place all screenshots in a Microsoft Word document and submit it to the assignment dropbox. When submitting screenshots as part of your assignment, you must always include a full image of your desktop window, including the date and time in the lower right-hand corner of the Windows desktop or the upper-right corner of the macOS desktop.
    While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines.
    2nd task:
    Nmap and Zenmap Lab – Rubric
    Rubric Criteria
    This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
    Criteria Desсrіption
    Part 1: Screenshots
    5. Target
    20 points
    Includes all of the screenshots of the Windows 10 IP address, student′s Kali IP address, Netdiscover, nmap -sn (Ping) scan, nmap -sV (Services) scan, nmap -A (Intrusive) scan, Zenmap network topology, and two additional nmap scans not covered in the video.
    4. Acceptable
    17.4 points
    Includes most of the screenshots of the Windows 10 IP address, student′s Kali IP address, Netdiscover, nmap -sn (Ping) scan, nmap -sV (Services) scan, nmap -A (Intrusive) scan, Zenmap network topology, and two additional nmap scans not covered in the video.
    3. Approaching
    15.8 points
    Includes some of the screenshots of the Windows 10 IP address, student′s Kali IP address, Netdiscover, nmap -sn (Ping) scan, nmap -sV (Services) scan, nmap -A (Intrusive) scan, Zenmap network topology, and two additional nmap scans not covered in the video.
    2. Insufficient
    14.8 points
    Includes a few of the screenshots of the Windows 10 IP address, student′s Kali IP address, Netdiscover, nmap -sn (Ping) scan, nmap -sV (Services) scan, nmap -A (Intrusive) scan, Zenmap network topology, and two additional nmap scans not covered in the video.
    1. Unsatisfactory
    0 points
    The screenshots of the Windows 10 IP address, student′s Kali IP address, Netdiscover, nmap -sn (Ping) scan, nmap -sV (Services) scan, nmap -A (Intrusive) scan, Zenmap network topology, and two additional nmap scans not covered in the video are not included.
    Criteria Desсrіption
    Part 2: Operating System
    5. Target
    4 points
    Clearly identifies what operating system is running on the Windows 10 system.
    4. Acceptable
    3.48 points
    N/A
    3. Approaching
    3.16 points
    Identifies what operating system is running on the Windows 10 system in an unclear and/or in concise manner.
    2. Insufficient
    2.96 points
    N/A
    1. Unsatisfactory
    0 points
    Does not identify what operating system is running on the Windows 10 system.
    Criteria Desсrіption
    Part 2: Intrusive Scan
    5. Target
    4 points
    Comprehensively describes what is meant by an intrusive scan.
    4. Acceptable
    3.48 points
    Clearly describes what is meant by an intrusive scan.
    3. Approaching
    3.16 points
    Broadly describes what is meant by an intrusive scan.
    2. Insufficient
    2.96 points
    Incomprehensively describes what is meant by an intrusive scan.
    1. Unsatisfactory
    0 points
    Does not include a desсrіption of what is meant by an intrusive scan.
    Criteria Desсrіption
    Part 2: Nmap Summary
    5. Target
    4 points
    Summary of what the two additional Nmap scans do is compelling, with screenshots.
    4. Acceptable
    3.48 points
    Summary of what the two additional Nmap scans do is desсrіptive, with screenshots.
    3. Approaching
    3.16 points
    Summary of what the two additional Nmap scans do is basic, but screenshots are included.
    2. Insufficient
    2.96 points
    Summary of what the two additional Nmap scans do is lacking details, but screenshots are included.
    1. Unsatisfactory
    0 points
    Summary of what the two additional Nmap scans do is not included.
    Criteria Desсrіption
    Includes spelling, capitalization, punctuation, grammar, language use, sentence structure, etc.
    5. Target
    4 points
    No mechanical errors are present. Skilled control of language choice and sentence structure are used throughout.
    4. Acceptable
    3.48 points
    Few mechanical errors are present. Suitable language choice and sentence structure are used.
    3. Approaching
    3.16 points
    Occasional mechanical errors are present. Language choice is generally appropriate. Varied sentence structure is attempted.
    2. Insufficient
    2.96 points
    Frequent and repetitive mechanical errors are present. Inconsistencies in language choice or sentence structure are recurrent.
    1. Unsatisfactory
    0 points
    Errors in grammar or syntax are pervasive and impede meaning. Incorrect language choice or sentence structure errors are found throughout.
    Criteria Desсrіption
    Uses appropriate style, such as APA, MLA, etc., for college, subject, and level; documents sources using citations, footnotes, references, bibliography, etc., appropriate to assignment and discipline.
    5. Target
    4 points
    No errors in formatting or documentation are present. Selectivity in the use of direct quotations and synthesis of sources is demonstrated.
    4. Acceptable
    3.48 points
    Appropriate format and documentation are used with only minor errors.
    3. Approaching
    3.16 points
    Appropriate format and documentation are used, although there are some obvious errors.
    2. Insufficient
    2.96 points
    Appropriate format is attempted, but some elements are missing. Frequent errors in documentation of sources are evident.
    1. Unsatisfactory
    0 points
    Appropriate format is not used. No documentation of sources is provided.
    Nmap and Zenmap Lab
    Assessment Desсrіption
    Using NMAP and Zenmap set the foundation for enumeration and network identification.
    View ″2-2 NMAP and Zenmap Lab″ and ″Warriors of the Net,″ from the playlist located in Class Resources. (https://www.youtube.com/watch?v=js2vtJBGH0o&list=PLfSk-dHOm3SC32JVL_set6NumaLO221Zn&index=7)
    Part 1:
    In this lab, you will use NMAP and Zenmap setup, basic scanning, and network topology. Provide screenshots of your Windows 10 IP address, your Kali IP address, Netdiscover, nmap -sn (Ping) scan, nmap -sV (Services) scan, nmap -A (Intrusive) scan, Zenmap network topology, and two additional nmap scans not covered in the video.
    Part 2:
    Write a 250- to 500-word summary addressing the following:
    · Identify what operating system is running on your Windows 10 system.
    · Describe what is meant by an intrusive scan.
    · Summarize what your two additional NMAP scans do and provide screenshots.
    Place all screenshots in a Microsoft Word document and submit it to the assignment dropbox. When submitting screenshots as part of your assignment, you must always include a full image of your desktop window, including the date and time in the lower right-hand corner of the Windows desktop or the upper-right corner of the macOS desktop.
    While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines.

  • “Creating a Resume for an Information Technology Systems Analyst Position” “Software Configuration and Database Management: Enhancing Productivity and Quality Work”

    I need help writing my resume. I had one but my computer crashed and it’s gone now, and I was just offered a job with a deadline to submit a resume by close of business today, so I need a new one ASAP. I’m going to need to use the chat feature to go over the specifics, but the job is in information technology (systems analyst). Here is information from the job posting; I do not meet all of them, but I do meet most of them and I am an internal applicant.
    Prepares and maintains technical documentation including flow charts, use cases, functional specifications, data models, user guides, and reporting to assist with the ongoing operation and maintenance of technology solutions. 
    Perform system configuration for existing application systems supporting Credit Union business processes, including but not limited to, lending applications and origination systems, core financial system, and host user interface system.
    Develops an understanding of internal and/or external customer business requirements.
    Uses SDLC processes and associated tools, analyzes current system targeted for replacement/enhancement to determine business and technical functions to be included in design.
    Collaborates with other IT areas in the research and design of tactical and strategic system solutions for business process and/or efficiency opportunities.
    Prepares detailed system requirements and assists in functional design solutions for new products/functionality and enhancements to existing products/functionality.
    Provides 3rd tier problem resolution assistance for system deficiencies or errors and coordinates the prompt diagnosis and resolution of application system issues that have an impact on the production environment and document management of the Credit Union business departments. 
    Coordinates with the application vendor/development team to resolve problems and trouble tickets. Maintains application performance and integrity during ongoing development, modification, and support processes.   
    Coordinate with business stakeholders, vendors, and consultants to design and develop solutions and the successful testing, documentation and support of those solutions. Investigates packaged solutions to systems and programs for resolution of problems and enhancement opportunities. 
    Collaborates with the business analysts and technology teams in the design, development, testing and implementation of new applications, existing application upgrades and new application releases and participates in large group projects under the direction of an assigned Project Manager as appropriate. 
    Works with business analysts in supporting end-user requests and assists in change management controls of the production environment.  Closely works with the Database Administrator building SQL scripts, maintaining application databases, and recovery processes and activities for the application of data.
    Performs other duties as assigned.
    JOB QUALIFICATIONS
    EDUCATION
    Position requires a Bachelor’s Degree in Computer Science or other Information Systems related degree in a technical field or a minimum of 5+ years’ experience in system requirements and process/application design.
    EXPERIENCE
    5+ years of progressive work experience designing moderate to complex business processes, process mapping, and working on large-scale process improvement initiatives.
    2+ years of experience facilitating JAD sessions or other technical requirement gathering processes.
    2+ years of experience working with SQL and/or application configuration.
    Financial services industry experience preferred.
    SKILLS & ABILITIES
    Demonstrated ability to write technical documentation.
    Demonstrated ability to lead small technical projects.
    Experience with facilitation JAD sessions or other requirements gathering processes.
    Exposure to a formal project management methodology, quality assurance program, and SDLC, or applicable Agile methodology.
    Capable of performing application administration of system files, parameter settings, software configuration tables, and database edits.
    Familiar with MS Office software (Word, Excel, Access, PowerPoint, Outlook, and Visio) and current Microsoft operating systems at a level that enables productivity and quality work.
    Ability to read, analyze, interpret, and apply common systems development requirements and design criteria.
    The candidate should possess strong interpersonal, organization, problem solving, conflict resolution, and negotiation skills.
    Ability to quickly grasp concepts, analyze data, and provide feedback to project teams.
    Understanding of web development methodologies, application design, navigation, and information architecture. 
    Proficient with query tools such as SQL.
    Some understanding of structured Quality Assurance testing, program development, and ongoing process support for a systems environment.
    Ability to multi-task and manage unstructured tasks within specific guidelines and time constraints.
    Should be able to create screen mockups to visualize requirements to SMEs and modify requirements accordingly.
    Highly motivated and organized.

  • User Satisfaction Evaluation of the Zoom Interface Understanding the Difference between 32-bit and 64-bit Operating Systems Understanding the Difference between 32-bit and 64-bit Operating Systems: An Overview by Waqas ITMaster

    Write a 1- to 2-page paper that addresses the following:
    Briefly describe the purpose of the application or website you selected (e.g., Calendar, Word, Zoom, etc.).
    Copy and paste one or two screenshots that demonstrate the basic appearance of the application interface.
    Evaluate the interface with regard to at least five categories of user satisfaction with the interface. Categories may include functionality, ease of learning the interface, organization of information, sequence of screens, error messages, availability of help, designed for all levels of users, or any other categories of user satisfaction you think are important.
    Include a brief justification that succinctly clarifies why you evaluated each category as you did.
    Remember that, for your written assignments, you must write in a scholarly voice, use paraphrasing to convey your ideas, and put quotation marks around content that is copied word-for-word from a source. You must also provide in-text citations and a reference list for all of the sources you use.
    References
    Required Readings
    Bourgeois, D., Mortati, J., Wang, S., & Smith, J. (2019). Information systems for business and beyond (2019). https://opentextbook.site/exports/ISBB-2019.pdf
    Part I: What Is an Information System?
    Chapter 3: Software (pp. 54–61)
    Bourgeois, D., Mortati, J., Wang, S., & Smith, J. (2019). SoftwareLinks to an external site. [PowerPoint presentation]. https://www.cpp.edu/~raguthrie/CIS310/index.htm 
    Computer Hope. (2023, September 12). WindowsLinks to an external site.. https://www.computerhope.com/jargon/w/windows.htm
    GeeksforGeeks. (2023, November 23). What is Linux operating systemLinks to an external site.. https://www.geeksforgeeks.org/introduction-to-linux-operating-system/
    Goad, M., & Steele, C. (2023, March). Mobile operating systemLinks to an external site.. TechTarget. https://www.techtarget.com/searchmobilecomputing/definition/mobile-operating-system#:~:text=A%20mobile%20operating%20system%20(OS,components%20and%20its%20software%20functions
    Mixon, E. (2024, January). Android OSLinks to an external site.. TechTarget. https://www.techtarget.com/searchmobilecomputing/definition/Android-OS
    Posey, B. (2023, September). Apple iOSLinks to an external site.. TechTarget. https://www.techtarget.com/searchmobilecomputing/definition/iOS#:~:text=Apple%20iOS%20stands%20for%20iPhone,as%20pinching%2C%20tapping%20and%20swiping
    Tutorials Point. (n.d.). Operating system – OverviewLinks to an external site.. https://www.tutorialspoint.com/operating_system/os_overview.htm
    U.S. Bureau of Labor Statistics. (2020b, April 10). Occupational outlook handbook: Computer programmersLinks to an external site.. https://www.bls.gov/ooh/computer-and-information-technology/computer-programmers.htm
    U.S. Bureau of Labor Statistics. (2019, September 4). Occupational outlook handbook: Software developersLinks to an external site.. https://www.bls.gov/ooh/computer-and-information-technology/software-developers.htm
    U.S. Bureau of Labor Statistics. (2020h, April 10). Occupational outlook handbook: Web developersLinks to an external site.. https://www.bls.gov/ooh/computer-and-information-technology/web-developers.htm
    Required Media
    CareerFoundry. (2021, March 11). UX design vs UI design – What’s the difference?Links to an external site. (2024) [Video]. YouTube. https://www.youtube.com/watch?v=5CxXhyhT6Fc
    Data is Beautiful. (2022, December 14). NEW! Most popular operating systems 1999 – 2022Links to an external site. [Video]. YouTube. https://www.youtube.com/watch?v=o14-gCNRwR8
    Hotjar. (2023, May 26). The future of AI and UX design: What it means for youLinks to an external site. [Video]. YouTube. https://www.youtube.com/watch?v=dxfKQvp7DWM
    LearnFree. (2020, September 1). Computer basics: Understanding operating systemsLinks to an external site. [Video]. YouTube. https://www.youtube.com/watch?v=fkGCLIQx1MI
    Showalter, J. (2022, November 2). The future of UI/UX designLinks to an external site. [Video]. YouTube. https://www.youtube.com/watch?v=SRWLLJ6h5l4
    Waqas ITMaster. (2022, January 29). 32-bit vs 64-bit explainedLinks to an external site. [Video]. YouTube. https://www.youtube.com/watch?v=DpoXSDq_NoI

  • Title: “The Importance of the COSO Framework in Internal Controls: Components, Objectives, and Integration in Company Compliance”

    COSO Framework
    The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. Please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 
    Your paper should meet the following requirements: 
    – Be approximately four to six pages in length, not including the required cover page and reference page. 
    – Follow APA7 guidelines. 
    – Your paper should include an introduction, a body with fully developed content, and a conclusion.
    – Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
    -Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
    Please read this carefully:
    – cite atleast 3 scholarly references (peer reviewed)
    – cite course text book (attached papers, try to use any one of them)
    – Follow APA 7 guidelines
    – Paper should include a fully developed Introduction, body and a conclusion.
    Attached is the rubric.

  • Completing Lab 14.1 and Uploading lab14.txt Completing Lab 14.1 and Uploading lab14.txt

    2. Complete lab 14.1 at the end of chapter. Be sure to add a new virtual hard drive to your virtual machine before attempting this exercise. Partitioning an exist virtual hard drive will destroy your virtual machine.
    3. Enter the following command:
    history 1˃lab14.txt
    $ Upload lab14.txt

  • “Examining Amazon’s Impact on the Global Retail Industry: A Literature Review” Title: The Prevalence of Academic Dishonesty in the Digital Age: Exploring the Impact of Technology on Cheating in Higher Education

    I tried this before and the teacher got a 31%. The teachers feedback is below. I would like my topic to be the same and still about Amazon (see attachment) – 
    ==========================================================
    What i originally wrote (attached) – was my paper that failed. I want the same topic. 
    the template (attached) – is from the assignment and should also help. 
    Note that whoever i choose to do this – you will also be hired to do the reaseach paper
    ============================================================
    CLASS IS —  ITMG498 I001
    For your draft, include all of the following
    Submit 8-10 double-spaced page literature review based on
    your topic.
    Submit your Final Paper in a Word file for grading. 
    Provided at least 10 references to support selected topic in
    the reference area.
    You need all of the following for your draft.
    Title Page
    Table of contents – Use Word to generate a table of contents
    Abstract
    Introduction
    The background of the topic
    Statement of the Problem
    Statement of the Purpose
    Research Questions
    Significance of the Study
    References
    Turnitin™
    This assignment
    will be submitted to Turnitin™.
    Instructions
    Rough Draft Paper:
    Submit 8-10
    double-spaced page literature review based on your topic.
    Submit your
    Final Paper in a Word file for grading.  
    Provided at
    least 10 references to support selected topic in the
    reference area.
    Specific
    Instructions for the Term Paper:
    1. Customize the title page for your
    own paper. This includes editing the “Running Head” in the page header, the
    title of your paper, and your name. If you don’t know how to edit a header in
    Word, Google for instructions on how to edit a header in the version of Word
    you are using and follow the instructions.
    2.  Add a table of content with
    an outline of all your major points and subpoints.
    3. Write a 150-250 word abstract for
    your term paper (on p. 2 of the Paper Template). The abstract should be a
    brief summary of your paper.
    4. Add an Introduction
    Introduction goes after the
    Abstract. Be sure the students include all of the following using level 2
    heading:
    The background of the topic
    Statement of the Problem
    Statement of the Purpose
    Research Questions
    Significance of the Study
    5. For each major section of the
    paper, you need to customize the sub-headings.  You may add additional
    sub-headings, as needed, but each section must have a minimum of three
    sub-headings, except for the Recommended Improvement section, which must have
    a minimum of five sub-headings.  Be sure to be descriptive in your
    sub-heading names, so that I know what content you intend to cover in each
    sub-heading.
    6. Add your references.
    NOTE: This assignment
    has the classroom TII (TurnItIn) feature turned on. This means that once your
    assignment has been submitted to this area, it will automatically be
    submitted to Turnitin.com database to generate an Originality Report with an
    Originality Index. It takes anywhere from a minute to 24 hours (or longer)
    for this report to be generated and returned to the classroom assignment
    area. Check often to see if the report has been generated.
    The acceptable criteria for the
    Originality Index (matching percent) in this course is a maximum of 15%,
    which means 15% of the submitted paper has been matched with sources in the
    database and hence is not original to the student’s work not including your
    references. Turnitin is used in this class to assess the originality
    of your work–you must have less than 15% Similarity/matching. Paraphrase
    instead of using direct quotes to reduce your matching percent to 15% or
    less.
    Submission
    Instructions:
    Written communication is an
    essential tool for any professional. As with any skill, writing well is the
    result of practice followed by feedback and the use of relevant and
    appropriate sources. Therefore, the quality of writing is graded as part of
    this assignment. It is easy for students to plagiarize – cut and paste right
    into a text document. It has been note, “Many college papers are
    published on the web and students can even become members of e-groups which,
    for a small fee, promise to deliver ‘A+’ papers on every topic. Ways to cheat
    are abundant on the Web.”
    Additional
    Sources:
    The APUS Library video
    Research Methods Information
    The Research Proposal
    APA Game (This
    will only function correctly on a mobile device or a modern web browser)
    What is
    a Scholarly Article—see the link: https://myclassroom.apus.edu/shared/commonfolder/science-and-technology-common/ITCC/ITCC500/APA%20Resources/What%20is%20a%20Scholarly%20Article.pdf
    Purdue Online Writing Lab
    Writing Commons: https://writingcommons.org/
    APA and MLA Citation Game Home
    Page
    What i originally wrote (attached) – was my paper that failed. I want the same topic. 
    the template (attached) – is from the assignment and should also help. 
    Note that whoever i choose to do this – you will also be hired to do the reaseach paper.