1.When developing an awareness program, what priorities should you keep in mind?
(Provide reference)
2. Define “project management.” Why is project management of particular interest in the field of InfoSec? (Provide reference)
3. In risk management strategies, why must periodic reviews be a part of the process?(Provide reference)
4.What value would an automated asset inventory system have for the risk identification process?(Provide reference)
Category: Technology
-
Title: Priorities in Developing an Awareness Program and the Importance of Project and Risk Management in InfoSec
-
Title: The Patient Experience of Ultrasound: A Report on Interviews with Three Individuals
RESEARCH PROJECT CRITERIA
Interview at least 3 people who have had an ultrasound before and ask them about their
experience. Be sure to encourage them to elaborate on both the good and bad! Write a report
on your findings to share with the class. Reports must be a minimum of 3 pages long,
typewritten, double-spaced, using 12 font.
Be sure to include the following information in your report:
Age of the person when he/she received the ultrasound
Related medical history (signs and symptoms, lab values, previous testing, etc)
Description of the experience – both positives and negatives. Get a lot of details!
What were the patient’s impressions of the Sonographer who completed the exam? -
Running PHP Files in XAMPP and Understanding HTML5 Tags Title: “Mastering XAMPP: A Guide to Running PHP Files and Understanding HTML5 Tags” Running PHP Files in XAMPP: 1. Install XAMPP:
Explain how to run a PHP file in XAMPP.
Explain the main use of the following HTML5 tags: head, title, meta, link, script, div, nav, h1, ul, ui. -
Title: The Revolutionary Impact of the Smartphone: How a Device has Transformed the World through Information Systems and Technology
This is the Final paper of an Information System Management and Technology course.
Title: An Information System that has changed the World
In this paper, we will have to identify an information systems or a technology that has changed the way individuals or organizations do something. This could be a web application, mobile app, or device. Examples include online bill payment provided by banks (a web application), text messaging or WhatsApp (mobile apps), or a smart phone, iPad, or Kindle (device).
The paper should consist of the following sections:
Introduction
In this section provide an introduction to the information system or the technology you would like to present. Why is it important to consider such a technology – this is the justification.
The System or Technology
What is the information system or the technology?
Who designed or invented it?
When was this introduced? – History?
Functionality
How does it work?
What are the technology components of the system?
Hardware and Software
Benefits and Costs
What are the benefits of this system?
What are the costs? – Initial Investment, and ongoing costs
Competition?
Conclusion
What does the future hold?
References
References should be in the APA format.
Other
As this is the Final paper, write the paper with professional knowledge and ideas.
6 pages double-spaced, not including figures and references.
Do not use too many references. One reference is enough for the one paragraph.
Do not use AI programs, and do not plagiarize. -
Basic Wireshark Lab Assignment “Exploring Network Commands, Timestamps, and Event Identification: A Comprehensive Analysis” Basic Wireshark and Nmap Lab Assessment “Network Scanning and Intrusive Techniques: A Comprehensive Analysis Using Nmap” “NMAP and Zenmap Lab: Network Enumeration and Identification” Part 1: Screenshots: 1. Windows 10 IP address: [insert screenshot of Windows 10 IP address] 2. Kali IP address: [insert screenshot of
1st task:
This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
Basic Wireshark Lab – Rubric
Rubric Criteria:
Criteria Desсrіption
Part 1: Screenshots
5. Target
12 points
Includes all of the screenshots of Wireshark tasks, including: Kali Linux VM starts a Wireshark packet capture and shows all network traffic, identification of the IP addresses for the Kali Linux and Windows 10 VMs from within Wireshark, adds an ICMP filter and pings the Windows 10 VM, adds an IP Address filter with the Windows 10 VM IP Address and runs an NMAP Service Scan against the Windows 10 VM IP Address, researches and applies two additional filters that demonstrate their effect on the capture, saves the captured packets to a file using their last name as the file name, and closes the capture session and then loads the capture file that was saved.
4. Acceptable
10.44 points
Includes most of the screenshots of Wireshark tasks, including: Kali Linux VM starts a Wireshark packet capture and shows all network traffic, the identification of the IP addresses for the Kali Linux and Windows 10 VMs from within Wireshark, adds an ICMP filter and pings the Windows 10 VM, adds an IP Address filter with the Windows 10 VM IP Address and runs an NMAP Service Scan against the Windows 10 VM IP Address, researches and applies two additional filters that demonstrate their effect on the capture, saves the captured packets to a file using their last name as the file name, and closes the capture session and then loads the capture file that was saved.
3. Approaching
9.48 points
Includes some of the screenshots of Wireshark tasks, including: Kali Linux VM starts a Wireshark packet capture and shows all network traffic, the identification of the IP addresses for the Kali Linux and Windows 10 VMs from within Wireshark, adds an ICMP filter and pings the Windows 10 VM, adds an IP Address filter with the Windows 10 VM IP Address and runs an NMAP Service Scan against the Windows 10 VM IP Address, researches and applies two additional filters that demonstrate their effect on the capture, saves the captured packets to a file using their last name as the file name, and closes the capture session and then loads the capture file that was saved.
2. Insufficient
8.88 points
Includes a few of the screenshots of Wireshark tasks, including: Kali Linux VM starts a Wireshark packet capture and shows all network traffic, the identification of the IP addresses for the Kali Linux and Windows 10 VMs from within Wireshark, adds an ICMP filter and pings the Windows 10 VM, adds an IP Address filter with the Windows 10 VM IP Address and runs an NMAP Service Scan against the Windows 10 VM IP Address, researches and applies two additional filters that demonstrate their effect on the capture, saves the captured packets to a file using their last name as the file name, and closes the capture session and then loads the capture file that was saved.
1. Unsatisfactory
0 points
Does not include the screenshots of Wireshark tasks, including: Kali Linux VM starts a Wireshark packet capture and shows all network traffic, the identification of the IP addresses for the Kali Linux and Windows 10 VMs from within Wireshark, adds an ICMP filter and pings the Windows 10 VM, adds an IP Address filter with the Windows 10 VM IP Address and runs an NMAP Service Scan against the Windows 10 VM IP Address, researches and applies two additional filters that demonstrate their effect on the capture, saves the captured packets to a file using their last name as the file name, and/or closes the capture session and then loads the capture file that was saved.
Criteria Desсrіption
Part 2: Kali IP Address, Windows IP Address, and Commands
5. Target
4 points
Specifically includes the Kali IP address, the Windows IP address, and the command used to change directory/folder, move a file, remove a file, and create a new directory/folder; comprehensively identifies and explains the commands.
4. Acceptable
3.48 points
N/A
3. Approaching
3.16 points
Partially includes the Kali IP address, the Windows IP address, and the command used to change directory/folder, move a file, remove a file, and create a new directory/folder; broadly identifies and explains the commands.
2. Insufficient
2.96 points
N/A
1. Unsatisfactory
0 points
Does not include the Kali IP address, the Windows IP address, and the commands used to change directory/folder, move a file, remove a file, and creates a new directory/folder; does not identify and/or explain the commands.
Criteria Desсrіption
Part 2: Importance of a Timestamp and Other Logging Tools
5. Target
4 points
Includes a thorough explanation of why a timestamp is important on Wireshark, as well as other logging tools.
4. Acceptable
3.48 points
Includes a clear explanation of why a timestamp is important on Wireshark, as well as other logging tools.
3. Approaching
3.16 points
Includes a surface-level explanation of why a timestamp is important on Wireshark, as well as other logging tools.
2. Insufficient
2.96 points
Includes a vague and/or incomplete explanation of why a timestamp is important on Wireshark, as well as other logging tools.
1. Unsatisfactory
0 points
Does not include an explanation of why a timestamp is important on Wireshark, as well as other logging tools.
Criteria Desсrіption
Part 2: List of Well-Known Ports and Associated Protocols
5. Target
4 points
Includes an in-depth list of well-known ports and associated protocols.
4. Acceptable
3.48 points
Includes an appropriate list of well-known ports and associated protocols.
3. Approaching
3.16 points
Includes a minimal list of well-known ports and associated protocols.
2. Insufficient
2.96 points
Includes an incomplete list of well-known ports and associated protocols.
1. Unsatisfactory
0 points
Does not include a list of well-known ports and/or associated protocols.
Criteria Desсrіption
Part 2: Explanation of the Differences Between a Port and a Protocol
5. Target
4 points
The explanation of the differences between a port and a protocol is accurate and comprehensive.
4. Acceptable
3.48 points
The explanation of the differences between a port and a protocol is accurate.
3. Approaching
3.16 points
The explanation of the differences between a port and a protocol is brief.
2. Insufficient
2.96 points
The explanation of the differences between a port and a protocol is inaccurate.
1. Unsatisfactory
0 points
Does not include an explanation of the differences between a port and a protocol.
Criteria Desсrіption
Part 2: Identifying Events
5. Target
4 points
Expertly describes how Wireshark can be used to identify events that indicate an attack is in progress or has happened.
4. Acceptable
3.48 points
Succinctly describes how Wireshark can be used to identify events that indicate an attack is in progress or has happened.
3. Approaching
3.16 points
Generally describes how Wireshark can be used to identify events that indicate an attack is in progress or has happened.
2. Insufficient
2.96 points
Poorly describes how Wireshark can be used to identify events that indicate an attack is in progress or has happened.
1. Unsatisfactory
0 points
Does not describe how Wireshark can be used to identify events that indicate an attack is in progress or has happened.
Mechanics of Writing
4 points
Criteria Desсrіption
Includes spelling, capitalization, punctuation, grammar, language use, sentence structure, etc.
5. Target
4 points
No mechanical errors are present. Skilled control of language choice and sentence structure are used throughout.
4. Acceptable
3.48 points
Few mechanical errors are present. Suitable language choice and sentence structure are used.
3. Approaching
3.16 points
Occasional mechanical errors are present. Language choice is generally appropriate. Varied sentence structure is attempted.
2. Insufficient
2.96 points
Frequent and repetitive mechanical errors are present. Inconsistencies in language choice or sentence structure are recurrent.
1. Unsatisfactory
0 points
Errors in grammar or syntax are pervasive and impede meaning. Incorrect language choice or sentence structure errors are found throughout.
Format/Documentation
4 points
Criteria Desсrіption
Uses appropriate style, such as APA, MLA, etc., for college, subject, and level; documents sources using citations, footnotes, references, bibliography, etc., appropriate to assignment and discipline.
5. Target
4 points
No errors in formatting or documentation are present. Selectivity in the use of direct quotations and synthesis of sources is demonstrated.
4. Acceptable
3.48 points
Appropriate format and documentation are used with only minor errors.
3. Approaching
3.16 points
Appropriate format and documentation are used, although there are some obvious errors.
2. Insufficient
2.96 points
Appropriate format is attempted, but some elements are missing. Frequent errors in documentation of sources are evident.
1. Unsatisfactory
0 points
Appropriate format is not used. No documentation of sources is provided.
Assignment one.
Basic Wireshark Lab
Assessment Desсrіption
By gaining an understanding of the basic protocol analyzer (Wireshark), students will be able to set up and read basic digital traffic, including:
· Gaining a foundational understanding of logging
· Identifying the source and destination IPs
· Translating IP addresses into websites
· Identifying ports and protocols
· Creating a timeline of events
View ″2-3 Wireshark Lab,″ from the video playlist located in Class Resources. In this lab, you will explore some basic Wireshark and Linux commands. (https://www.youtube.com/watch?v=jVG7Yoghphc&list=PLfSk-dHOm3SC32JVL_set6NumaLO221Zn&index=8)
Part 1:
Complete the following Wireshark tasks and capture screenshots of each task result:
· On the Kali Linux VM, start a Wireshark packet capture and show all network traffic.
· Identify the IP addresses for the Kali Linux and Windows 10 VMs from within Wireshark.
· Add an ICMP filter and ping the Windows 10 VM.
· Add an IP Address filter with the Windows 10 VM IP Address and run an Nmap service scan against the Windows 10 VM IP Address.
· Research and apply two additional filters to demonstrate their effect on the capture.
· Save the captured packets to a file using your last name as the file name.
· Close the capture session and then load the capture file that you saved.
Part 2:
Write a 250- to 500-word summary addressing the following:
· Your Kali IP address.
· The Windows IP Address.
· For both Windows and Linux, identify and explain the following commands:
– Command used to change directory/folder
– Command that moves a file
– Command that removes a file
– Command that creates a new directory/folder
· An explanation for why a timestamp is important on Wireshark, as well as other logging tools.
· A list of 10 well-known ports and associated protocols.
· A brief explanation of the difference between a port and a protocol.
· Describe how Wireshark can be used to identify events that indicate an attack is in progress or has happened.
Place all screenshots in a Microsoft Word document and submit it to the assignment dropbox. When submitting screenshots as part of your assignment, you must always include a full image of your desktop window, including the date and time in the lower right-hand corner of the Windows desktop or the upper-right corner of the macOS desktop.
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines.
2nd task:
Nmap and Zenmap Lab – Rubric
Rubric Criteria
This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
Criteria Desсrіption
Part 1: Screenshots
5. Target
20 points
Includes all of the screenshots of the Windows 10 IP address, student′s Kali IP address, Netdiscover, nmap -sn (Ping) scan, nmap -sV (Services) scan, nmap -A (Intrusive) scan, Zenmap network topology, and two additional nmap scans not covered in the video.
4. Acceptable
17.4 points
Includes most of the screenshots of the Windows 10 IP address, student′s Kali IP address, Netdiscover, nmap -sn (Ping) scan, nmap -sV (Services) scan, nmap -A (Intrusive) scan, Zenmap network topology, and two additional nmap scans not covered in the video.
3. Approaching
15.8 points
Includes some of the screenshots of the Windows 10 IP address, student′s Kali IP address, Netdiscover, nmap -sn (Ping) scan, nmap -sV (Services) scan, nmap -A (Intrusive) scan, Zenmap network topology, and two additional nmap scans not covered in the video.
2. Insufficient
14.8 points
Includes a few of the screenshots of the Windows 10 IP address, student′s Kali IP address, Netdiscover, nmap -sn (Ping) scan, nmap -sV (Services) scan, nmap -A (Intrusive) scan, Zenmap network topology, and two additional nmap scans not covered in the video.
1. Unsatisfactory
0 points
The screenshots of the Windows 10 IP address, student′s Kali IP address, Netdiscover, nmap -sn (Ping) scan, nmap -sV (Services) scan, nmap -A (Intrusive) scan, Zenmap network topology, and two additional nmap scans not covered in the video are not included.
Criteria Desсrіption
Part 2: Operating System
5. Target
4 points
Clearly identifies what operating system is running on the Windows 10 system.
4. Acceptable
3.48 points
N/A
3. Approaching
3.16 points
Identifies what operating system is running on the Windows 10 system in an unclear and/or in concise manner.
2. Insufficient
2.96 points
N/A
1. Unsatisfactory
0 points
Does not identify what operating system is running on the Windows 10 system.
Criteria Desсrіption
Part 2: Intrusive Scan
5. Target
4 points
Comprehensively describes what is meant by an intrusive scan.
4. Acceptable
3.48 points
Clearly describes what is meant by an intrusive scan.
3. Approaching
3.16 points
Broadly describes what is meant by an intrusive scan.
2. Insufficient
2.96 points
Incomprehensively describes what is meant by an intrusive scan.
1. Unsatisfactory
0 points
Does not include a desсrіption of what is meant by an intrusive scan.
Criteria Desсrіption
Part 2: Nmap Summary
5. Target
4 points
Summary of what the two additional Nmap scans do is compelling, with screenshots.
4. Acceptable
3.48 points
Summary of what the two additional Nmap scans do is desсrіptive, with screenshots.
3. Approaching
3.16 points
Summary of what the two additional Nmap scans do is basic, but screenshots are included.
2. Insufficient
2.96 points
Summary of what the two additional Nmap scans do is lacking details, but screenshots are included.
1. Unsatisfactory
0 points
Summary of what the two additional Nmap scans do is not included.
Criteria Desсrіption
Includes spelling, capitalization, punctuation, grammar, language use, sentence structure, etc.
5. Target
4 points
No mechanical errors are present. Skilled control of language choice and sentence structure are used throughout.
4. Acceptable
3.48 points
Few mechanical errors are present. Suitable language choice and sentence structure are used.
3. Approaching
3.16 points
Occasional mechanical errors are present. Language choice is generally appropriate. Varied sentence structure is attempted.
2. Insufficient
2.96 points
Frequent and repetitive mechanical errors are present. Inconsistencies in language choice or sentence structure are recurrent.
1. Unsatisfactory
0 points
Errors in grammar or syntax are pervasive and impede meaning. Incorrect language choice or sentence structure errors are found throughout.
Criteria Desсrіption
Uses appropriate style, such as APA, MLA, etc., for college, subject, and level; documents sources using citations, footnotes, references, bibliography, etc., appropriate to assignment and discipline.
5. Target
4 points
No errors in formatting or documentation are present. Selectivity in the use of direct quotations and synthesis of sources is demonstrated.
4. Acceptable
3.48 points
Appropriate format and documentation are used with only minor errors.
3. Approaching
3.16 points
Appropriate format and documentation are used, although there are some obvious errors.
2. Insufficient
2.96 points
Appropriate format is attempted, but some elements are missing. Frequent errors in documentation of sources are evident.
1. Unsatisfactory
0 points
Appropriate format is not used. No documentation of sources is provided.
Nmap and Zenmap Lab
Assessment Desсrіption
Using NMAP and Zenmap set the foundation for enumeration and network identification.
View ″2-2 NMAP and Zenmap Lab″ and ″Warriors of the Net,″ from the playlist located in Class Resources. (https://www.youtube.com/watch?v=js2vtJBGH0o&list=PLfSk-dHOm3SC32JVL_set6NumaLO221Zn&index=7)
Part 1:
In this lab, you will use NMAP and Zenmap setup, basic scanning, and network topology. Provide screenshots of your Windows 10 IP address, your Kali IP address, Netdiscover, nmap -sn (Ping) scan, nmap -sV (Services) scan, nmap -A (Intrusive) scan, Zenmap network topology, and two additional nmap scans not covered in the video.
Part 2:
Write a 250- to 500-word summary addressing the following:
· Identify what operating system is running on your Windows 10 system.
· Describe what is meant by an intrusive scan.
· Summarize what your two additional NMAP scans do and provide screenshots.
Place all screenshots in a Microsoft Word document and submit it to the assignment dropbox. When submitting screenshots as part of your assignment, you must always include a full image of your desktop window, including the date and time in the lower right-hand corner of the Windows desktop or the upper-right corner of the macOS desktop.
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines. -
“Creating a Resume for an Information Technology Systems Analyst Position” “Software Configuration and Database Management: Enhancing Productivity and Quality Work”
I need help writing my resume. I had one but my computer crashed and it’s gone now, and I was just offered a job with a deadline to submit a resume by close of business today, so I need a new one ASAP. I’m going to need to use the chat feature to go over the specifics, but the job is in information technology (systems analyst). Here is information from the job posting; I do not meet all of them, but I do meet most of them and I am an internal applicant.
Prepares and maintains technical documentation including flow charts, use cases, functional specifications, data models, user guides, and reporting to assist with the ongoing operation and maintenance of technology solutions.
Perform system configuration for existing application systems supporting Credit Union business processes, including but not limited to, lending applications and origination systems, core financial system, and host user interface system.
Develops an understanding of internal and/or external customer business requirements.
Uses SDLC processes and associated tools, analyzes current system targeted for replacement/enhancement to determine business and technical functions to be included in design.
Collaborates with other IT areas in the research and design of tactical and strategic system solutions for business process and/or efficiency opportunities.
Prepares detailed system requirements and assists in functional design solutions for new products/functionality and enhancements to existing products/functionality.
Provides 3rd tier problem resolution assistance for system deficiencies or errors and coordinates the prompt diagnosis and resolution of application system issues that have an impact on the production environment and document management of the Credit Union business departments.
Coordinates with the application vendor/development team to resolve problems and trouble tickets. Maintains application performance and integrity during ongoing development, modification, and support processes.
Coordinate with business stakeholders, vendors, and consultants to design and develop solutions and the successful testing, documentation and support of those solutions. Investigates packaged solutions to systems and programs for resolution of problems and enhancement opportunities.
Collaborates with the business analysts and technology teams in the design, development, testing and implementation of new applications, existing application upgrades and new application releases and participates in large group projects under the direction of an assigned Project Manager as appropriate.
Works with business analysts in supporting end-user requests and assists in change management controls of the production environment. Closely works with the Database Administrator building SQL scripts, maintaining application databases, and recovery processes and activities for the application of data.
Performs other duties as assigned.
JOB QUALIFICATIONS
EDUCATION
Position requires a Bachelor’s Degree in Computer Science or other Information Systems related degree in a technical field or a minimum of 5+ years’ experience in system requirements and process/application design.
EXPERIENCE
5+ years of progressive work experience designing moderate to complex business processes, process mapping, and working on large-scale process improvement initiatives.
2+ years of experience facilitating JAD sessions or other technical requirement gathering processes.
2+ years of experience working with SQL and/or application configuration.
Financial services industry experience preferred.
SKILLS & ABILITIES
Demonstrated ability to write technical documentation.
Demonstrated ability to lead small technical projects.
Experience with facilitation JAD sessions or other requirements gathering processes.
Exposure to a formal project management methodology, quality assurance program, and SDLC, or applicable Agile methodology.
Capable of performing application administration of system files, parameter settings, software configuration tables, and database edits.
Familiar with MS Office software (Word, Excel, Access, PowerPoint, Outlook, and Visio) and current Microsoft operating systems at a level that enables productivity and quality work.
Ability to read, analyze, interpret, and apply common systems development requirements and design criteria.
The candidate should possess strong interpersonal, organization, problem solving, conflict resolution, and negotiation skills.
Ability to quickly grasp concepts, analyze data, and provide feedback to project teams.
Understanding of web development methodologies, application design, navigation, and information architecture.
Proficient with query tools such as SQL.
Some understanding of structured Quality Assurance testing, program development, and ongoing process support for a systems environment.
Ability to multi-task and manage unstructured tasks within specific guidelines and time constraints.
Should be able to create screen mockups to visualize requirements to SMEs and modify requirements accordingly.
Highly motivated and organized. -
User Satisfaction Evaluation of the Zoom Interface Understanding the Difference between 32-bit and 64-bit Operating Systems Understanding the Difference between 32-bit and 64-bit Operating Systems: An Overview by Waqas ITMaster
Write a 1- to 2-page paper that addresses the following:
Briefly describe the purpose of the application or website you selected (e.g., Calendar, Word, Zoom, etc.).
Copy and paste one or two screenshots that demonstrate the basic appearance of the application interface.
Evaluate the interface with regard to at least five categories of user satisfaction with the interface. Categories may include functionality, ease of learning the interface, organization of information, sequence of screens, error messages, availability of help, designed for all levels of users, or any other categories of user satisfaction you think are important.
Include a brief justification that succinctly clarifies why you evaluated each category as you did.
Remember that, for your written assignments, you must write in a scholarly voice, use paraphrasing to convey your ideas, and put quotation marks around content that is copied word-for-word from a source. You must also provide in-text citations and a reference list for all of the sources you use.
References
Required Readings
Bourgeois, D., Mortati, J., Wang, S., & Smith, J. (2019). Information systems for business and beyond (2019). https://opentextbook.site/exports/ISBB-2019.pdf
Part I: What Is an Information System?
Chapter 3: Software (pp. 54–61)
Bourgeois, D., Mortati, J., Wang, S., & Smith, J. (2019). SoftwareLinks to an external site. [PowerPoint presentation]. https://www.cpp.edu/~raguthrie/CIS310/index.htm
Computer Hope. (2023, September 12). WindowsLinks to an external site.. https://www.computerhope.com/jargon/w/windows.htm
GeeksforGeeks. (2023, November 23). What is Linux operating systemLinks to an external site.. https://www.geeksforgeeks.org/introduction-to-linux-operating-system/
Goad, M., & Steele, C. (2023, March). Mobile operating systemLinks to an external site.. TechTarget. https://www.techtarget.com/searchmobilecomputing/definition/mobile-operating-system#:~:text=A%20mobile%20operating%20system%20(OS,components%20and%20its%20software%20functions
Mixon, E. (2024, January). Android OSLinks to an external site.. TechTarget. https://www.techtarget.com/searchmobilecomputing/definition/Android-OS
Posey, B. (2023, September). Apple iOSLinks to an external site.. TechTarget. https://www.techtarget.com/searchmobilecomputing/definition/iOS#:~:text=Apple%20iOS%20stands%20for%20iPhone,as%20pinching%2C%20tapping%20and%20swiping
Tutorials Point. (n.d.). Operating system – OverviewLinks to an external site.. https://www.tutorialspoint.com/operating_system/os_overview.htm
U.S. Bureau of Labor Statistics. (2020b, April 10). Occupational outlook handbook: Computer programmersLinks to an external site.. https://www.bls.gov/ooh/computer-and-information-technology/computer-programmers.htm
U.S. Bureau of Labor Statistics. (2019, September 4). Occupational outlook handbook: Software developersLinks to an external site.. https://www.bls.gov/ooh/computer-and-information-technology/software-developers.htm
U.S. Bureau of Labor Statistics. (2020h, April 10). Occupational outlook handbook: Web developersLinks to an external site.. https://www.bls.gov/ooh/computer-and-information-technology/web-developers.htm
Required Media
CareerFoundry. (2021, March 11). UX design vs UI design – What’s the difference?Links to an external site. (2024) [Video]. YouTube. https://www.youtube.com/watch?v=5CxXhyhT6Fc
Data is Beautiful. (2022, December 14). NEW! Most popular operating systems 1999 – 2022Links to an external site. [Video]. YouTube. https://www.youtube.com/watch?v=o14-gCNRwR8
Hotjar. (2023, May 26). The future of AI and UX design: What it means for youLinks to an external site. [Video]. YouTube. https://www.youtube.com/watch?v=dxfKQvp7DWM
LearnFree. (2020, September 1). Computer basics: Understanding operating systemsLinks to an external site. [Video]. YouTube. https://www.youtube.com/watch?v=fkGCLIQx1MI
Showalter, J. (2022, November 2). The future of UI/UX designLinks to an external site. [Video]. YouTube. https://www.youtube.com/watch?v=SRWLLJ6h5l4
Waqas ITMaster. (2022, January 29). 32-bit vs 64-bit explainedLinks to an external site. [Video]. YouTube. https://www.youtube.com/watch?v=DpoXSDq_NoI -
Title: “The Importance of the COSO Framework in Internal Controls: Components, Objectives, and Integration in Company Compliance”
COSO Framework
The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. Please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.
Your paper should meet the following requirements:
– Be approximately four to six pages in length, not including the required cover page and reference page.
– Follow APA7 guidelines.
– Your paper should include an introduction, a body with fully developed content, and a conclusion.
– Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
-Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Please read this carefully:
– cite atleast 3 scholarly references (peer reviewed)
– cite course text book (attached papers, try to use any one of them)
– Follow APA 7 guidelines
– Paper should include a fully developed Introduction, body and a conclusion.
Attached is the rubric. -
Completing Lab 14.1 and Uploading lab14.txt Completing Lab 14.1 and Uploading lab14.txt
2. Complete lab 14.1 at the end of chapter. Be sure to add a new virtual hard drive to your virtual machine before attempting this exercise. Partitioning an exist virtual hard drive will destroy your virtual machine.
3. Enter the following command:
history 1˃lab14.txt
$ Upload lab14.txt -
“Examining Amazon’s Impact on the Global Retail Industry: A Literature Review” Title: The Prevalence of Academic Dishonesty in the Digital Age: Exploring the Impact of Technology on Cheating in Higher Education
I tried this before and the teacher got a 31%. The teachers feedback is below. I would like my topic to be the same and still about Amazon (see attachment) –
==========================================================
What i originally wrote (attached) – was my paper that failed. I want the same topic.
the template (attached) – is from the assignment and should also help.
Note that whoever i choose to do this – you will also be hired to do the reaseach paper
============================================================
CLASS IS — ITMG498 I001
For your draft, include all of the following
Submit 8-10 double-spaced page literature review based on
your topic.
Submit your Final Paper in a Word file for grading.
Provided at least 10 references to support selected topic in
the reference area.
You need all of the following for your draft.
Title Page
Table of contents – Use Word to generate a table of contents
Abstract
Introduction
The background of the topic
Statement of the Problem
Statement of the Purpose
Research Questions
Significance of the Study
References
Turnitin™
This assignment
will be submitted to Turnitin™.
Instructions
Rough Draft Paper:
Submit 8-10
double-spaced page literature review based on your topic.
Submit your
Final Paper in a Word file for grading.
Provided at
least 10 references to support selected topic in the
reference area.
Specific
Instructions for the Term Paper:
1. Customize the title page for your
own paper. This includes editing the “Running Head” in the page header, the
title of your paper, and your name. If you don’t know how to edit a header in
Word, Google for instructions on how to edit a header in the version of Word
you are using and follow the instructions.
2. Add a table of content with
an outline of all your major points and subpoints.
3. Write a 150-250 word abstract for
your term paper (on p. 2 of the Paper Template). The abstract should be a
brief summary of your paper.
4. Add an Introduction
Introduction goes after the
Abstract. Be sure the students include all of the following using level 2
heading:
The background of the topic
Statement of the Problem
Statement of the Purpose
Research Questions
Significance of the Study
5. For each major section of the
paper, you need to customize the sub-headings. You may add additional
sub-headings, as needed, but each section must have a minimum of three
sub-headings, except for the Recommended Improvement section, which must have
a minimum of five sub-headings. Be sure to be descriptive in your
sub-heading names, so that I know what content you intend to cover in each
sub-heading.
6. Add your references.
NOTE: This assignment
has the classroom TII (TurnItIn) feature turned on. This means that once your
assignment has been submitted to this area, it will automatically be
submitted to Turnitin.com database to generate an Originality Report with an
Originality Index. It takes anywhere from a minute to 24 hours (or longer)
for this report to be generated and returned to the classroom assignment
area. Check often to see if the report has been generated.
The acceptable criteria for the
Originality Index (matching percent) in this course is a maximum of 15%,
which means 15% of the submitted paper has been matched with sources in the
database and hence is not original to the student’s work not including your
references. Turnitin is used in this class to assess the originality
of your work–you must have less than 15% Similarity/matching. Paraphrase
instead of using direct quotes to reduce your matching percent to 15% or
less.
Submission
Instructions:
Written communication is an
essential tool for any professional. As with any skill, writing well is the
result of practice followed by feedback and the use of relevant and
appropriate sources. Therefore, the quality of writing is graded as part of
this assignment. It is easy for students to plagiarize – cut and paste right
into a text document. It has been note, “Many college papers are
published on the web and students can even become members of e-groups which,
for a small fee, promise to deliver ‘A+’ papers on every topic. Ways to cheat
are abundant on the Web.”
Additional
Sources:
The APUS Library video
Research Methods Information
The Research Proposal
APA Game (This
will only function correctly on a mobile device or a modern web browser)
What is
a Scholarly Article—see the link: https://myclassroom.apus.edu/shared/commonfolder/science-and-technology-common/ITCC/ITCC500/APA%20Resources/What%20is%20a%20Scholarly%20Article.pdf
Purdue Online Writing Lab
Writing Commons: https://writingcommons.org/
APA and MLA Citation Game Home
Page
What i originally wrote (attached) – was my paper that failed. I want the same topic.
the template (attached) – is from the assignment and should also help.
Note that whoever i choose to do this – you will also be hired to do the reaseach paper.