Answer these questions:
1. What would you need to do to establish a viable and sustainable security program?
2. How would you present the need for security to the employees of an organization?
3. How would you develop, purchase, or implement a security solution for an enterprise
Writing Requirements
APA format, 3–4 pages in length (excluding cover page, abstract, and reference list)
Be sure to include a minimum of 3-4 outside resources.
Use the APA template located in the Course Information folder to complete the assignment.
Category: Computer Science homework help
Discussion Details: The Conceptual Framework of the College of Education (COE) d
Discussion Details:
The Conceptual Framework of the College of Education (COE) describes the candidate as The Educator as Decision-Maker. This concept embodies the College’s constructivist approach to teaching and learning. Students’ prior knowledge, skills, and attitudes, including dispositions, interconnect with the knowledge, skills, attitudes and expectations they encounter as ASU. As a result of this fusion, students develop and acquire new knowledge, skills, and attitudes that manifest themselves in the students’ informed decision-making capabilities.
· Provide a reflective statement (written or video) discussing how your thought processes, academic development, and professional disposition as a change agent, lifelong learner, and reflective practitioner have been impacted by the learning content provided during this course.
· Discuss at least 3 specific content-related topics between modules 1 – 5 and address how each of those topics provided learning gains that clarified previous misconceptions, changed perspectives with new moments of discovery, and enhanced opportunities for life application to your personal or professional skill set. If necessary, pose questions to the instructor regarding concepts that may still be unclear from modules 1 – 6.
Three Topics
-How assistive technology adaptations can be used to promote independence in daily living
-Examine the features of an effective AT assessment to ensure that the individual and device combine to provide and effective person-technology match
-Examine the components of an augmentative and alternative communication system and how they combine to provide individuals with severe speech problems opportunities to communicate on a daily basis across environments
*need discussion by tomorrow morning if possible. assignment due on sunday*
Assignment Details
ChatGTP Assignment
Using ChapGPT, create an assignment related to any topic you learned about this semester.
Include:
Assignment Objective
Assignment Overviews
Assignment Guidelines:
Grading Rubric
If you aren’t familiar with ChapGPT, use this link: https://www.zdnet.com/article/what-is-chatgpt-and-why-does-it-matter-heres-everything-you-need-to-know/
Topic: Assistive Technology
APA FORMAT, 350 words and proper references and NO PLAGIARISM. 1) Why do some su
APA FORMAT, 350 words and proper references and NO PLAGIARISM.
1) Why do some supervisors fail to delegate effectively? If this situation were a common problem in an organization, what could be done to increase supervisors’ skills in delegating effectively?
2) What are the five components of the basic communication process model? Define each. Identify some of the important forms of electronic communication discussed in the text.
Scenario The Director of the Information Technology received notice from the B
Scenario
The Director of the Information Technology received notice from the Board of Directors that they are interested in a new Data Center. The Board has decided on dedicating a section of the West wing of the building for the data center. They are requesting a high-level design depicting a Data Center floor plan that will include a basic hardware rack layout as well as physical access and security controls.
The Director of Information Technology selected you to create a Visio design showing the floorplan layout of the new data center which include a 42u hardware rack layout and physical access and security controls.
The Board members request a summary explaining the Data Center design, with an evaluation of Green initiatives that will be used in the Data Center.
Instructions
Create a Visio design showing the floorplan layout of the new data center which include a 42u hardware rack layout and physical access and security controls. Provide a summary to explain your design and an evaluation of Green Initiatives.
Create a Data Center floor plan design with space to host 3 offices, rack space, heating and cooling space and show physical access and security controls.
Using best practices for installing hardware racks, design one full 42u rack layout that include the following:
At least five 2u servers
At least one 4u storage unit
At least one network switch
At least one PDU
At least one UPS
Attached is the instruction and the memo template as well as the PDF file for th
Attached is the instruction and the memo template as well as the PDF file for the presentation section. please let me know if you need more information
Risk management project Project Part: Risk Mitigation Plan Senior management at
Risk management project
Project Part: Risk Mitigation Plan
Senior management at Health Network allocated funds to support a risk mitigation plan. They have requested that the risk manager and team create a plan in response to the deliverables produced within earlier phases of the project. The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop a draft of this new plan.
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation style: Your school’s preferred style guide
Estimated length: 4–6 pages
Instructions Format Complete the assignment in a Word document and then uplo
Instructions
Format
Complete the assignment in a Word document and then upload the assignment for grading.
Make sure to include a title page (with your name and date) and a reference page (with your sources).
Double-space paper, 1-inch margins, 12-point font.
When submitting the paper, it will automatically be processed through Turnitin for review.
Use examples from the readings, lecture notes, and outside research to support your answers.
Use high-quality sources (no Wikis, blogs, or anonymously authored articles).
Follow APA guidelines for citing and referencing source material. Answer the below questions (250 words for each question):
This assignment is due by 2355 EST on Sunday.
Instructions: Provide an analysis of the three scenarios below.
1. (250 words + 1 high quality source)
Chapter 6 noted that Friendster has obtained several social networking patents that it could potentially assert against other social networking sites such as Facebook and MySpace. Suppose you are corporate counsel at one of these companies and you expect that you may eventually be sued by Friendster. Choose one of the following options and defend it. Note: You must use the literature to support your decision – DO NOT simply state your opinion. For example, you may see prior cases and use that as a model for your decision
Enforce blocking patent
Pursue licensing agreement
Work around the patent
2. (250 words + 1 high quality source)
Chapter 7 – The CEO of a small but promising start-up company needs an experienced engineer to head up a key aspect of the business and has selected Sam as a leading candidate. If hired, Sam would not only be exposed to the proprietary technology that already provides a significant advantage in the market but would be tasked with developing additional proprietary information and software. Sam is currently an employee of XYZ Corp., a competitor of the start-up. What potential problems might the CEO want to consider? What steps could the CEO take to address these problems?
3. (250 words – source not required)
Read about the Gramm Leach Bliley Act (GLBA) here: https://www.ftc.gov/tips-advice/business-center/guidance/how-comply-privacy-consumer-financial-information-rule-gramm and discuss the impact of GLBA on financial institutions. Specifically, address how GLBA helps protect your privacy.
Module 4 – Lab: Processing Array of Objects In this lab, you will create a
Module 4 – Lab: Processing Array of Objects
In this lab, you will create a GUI application using an array of objects. View the lab instructions and video provided below to help guide you through your efforts.
Module 4 – Project: Use ArrayList, Tabs, and JList Controls In this part of
Module 4 – Project: Use ArrayList, Tabs, and JList Controls
In this part of the project, you will use ArrayList, Tabs, and JList Controls. Read the CIS355A Module 4 Project GuideLinks to an external site. and view the project video below for instructions and details to help guide you through your efforts.
Risk Mitigation Plan Senior management at Health Network allocated funds to supp
Risk Mitigation Plan
Senior management at Health Network allocated funds to support a risk mitigation plan. They have requested that the risk manager and team create a plan in response to the deliverables produced within earlier phases of the project.The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop a draft of this new plan.