Hw 16

profilerajaajay9999

  

Question 1

Write an essay of at least 500 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context. 

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title  Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in  quotation marks and cite in-line (as all work copied from another should  be handled). The quotes should be full sentences (no more, less) and  should be incorporated in your discussion (they do not replace your  discussion) to illustrate or emphasize your ideas. 

Need 1.5 pages APA format paper. No plagiarism.

Question 2

Internship Reflection 

Write a short, 300 word paper, reflecting on your internship and how it related to your executive masters program at New England College.  As you prepare your paper, you might consider answering some of these questions:

  • How did this internship help prepare you for future      endeavors, both academically and in the workplace?
  • What was the best and worst parts of your      overall experience?
  • What surprised you about this internship?
  • What, if any, were any disapointments?

Need 1 page APA format paper. Courses related are Computer Security and Database Security

Question 3

Write an essay on ethical culture of 1.5pages. Introduction, Summary and Conclusion

Need 1.5 pages APA format paper. No plagiarism.

Question 4

Read Raiding Customer Assets at MF Global and complete the questions at the end of the case study.

https://www.scu.edu/ethics/focus-areas/business-ethics/resources/raiding-customer-assets-at-mf-global/

Need 1.5 pages APA format paper. No plagiarism.

Question 5

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header. 

• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success. 

This paper should not be a cursory overview. This is a technical class and should be a review of the technical solution. It should detail what was moved to the cloud, what cloud services were and are being consumed, and what the results were. 

Warning: If you choose Netflix, be certain to include precisely how cloud services are being used to facilitate their business. There are numerous resources that detail this, but it is vital that you understand exactly what cloud mechanisms are used to facilitate their business.  

Need 4 pages APA format paper. No plagarism.

Question 6

The final project paper is a formal written paper covering concepts from the course - Security Architecture & Design

Need two Separate answers of 2 pages APA format paper. Total 4 pages.

    • a month ago
    • 50
    Answer(1)

    Purchase the answer to view it

    • attachment
      Hw16-Question2.edited.docx
    • attachment
      Question3.docx
    • attachment
      Hw16-Question1.docx
    • attachment
      qn.3.pdf
    • attachment
      Qn11.pdf
    • attachment
      Qn21.pdf
    • attachment
      Question4.docx
    • attachment
      Question51.docx
    • attachment
      Qn51.pdf
    • attachment
      Question61.docx
    • attachment
      Securityarchitectureanddesign1.docx
    • attachment
      IIIIIIIIIIIIIIIIIIIIIIIII6.pdf
    • attachment
      IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII6.pdf
    • attachment
      Qn.41.pdf
    • attachment
      Qn51.pdf
    • attachment
      Qn11.pdf
    • attachment
      Hw16-Question11.docx
    • attachment
      Hw16-Qn1.pdf
    Bids(73)