Using The Big Questions in Science, select two questions that, if they could be resolved, might change our perception of how our world functions. Write a well-documented, 500- to 1000-word APA-compliant paper that addresses the following:
Identify the short-term key changes to society that would result from the resolution of each question.
Explain your opinion of the long-term impacts on society if each question were resolved. [MO 2.4
tell me what too questions you will pick
Category: Technology
We have read a number of examples of contact between civilizations that changed
We have read a number of examples of contact between civilizations that changed the course of history. In some cases, the impact of technology was accompanied by economic and medical impacts.
Using the readings from Guns, Germs, and Steel and The Big Questions in Science, the Sky News video, and the National Public Radio audio podcast as background, write a well-documented, 500- to 1000-word APA-compliant paper that addresses the following:
Examine at least two examples of cultural contact between civilizations in which the exchange created significant cultural and/or societal changes.
Based on these past events, identify both cautions and possible guidelines for similar situations that are occurring in the present or might occur in the future. [MO 2.2, MO 2.4]
Examples may come from your readings or more contemporary accounts in news or other media. Please reference all sources.
Student Name: Date: Part 1: Physical and Environmental Protection Policy Locate
Student Name:
Date:
Part 1: Physical and Environmental Protection Policy
Locate and read the Physical and Environmental Protection Policy in the NIST Cybersecurity Framework Policy Template Guide. Research online for a real-world implementation example of the policy and compare it with the NIST policy template side by side.
Answer the following questions clearly and systemically in this Word document. Make sure to include a References section toward the end of the document.
1. The Physical and Environmental Protection Policy is implemented for which NIST function and sub-categories? [5 points]
Answer:
2. Which organization is the implementation example you identified for? Which industry sector (e.g., education, government, etc.) is the organization in? [5 points]
Answer:
3. What is the purpose of the example policy? Which party (parties) does the policy apply to? Who is/are responsible for implementing this policy? [5 points]
Answer:
4. As compared to the NIST policy template, how is the example policy customized to fit the needs of the organization? Describe three occurrences of customization in detail. [15 points]
Answer:
Part 2: Secure System Development Life Cycle Standard
Locate and read the Secure System Development Life Cycle Standard in the NIST Cybersecurity Framework Policy Template Guide. Research online for a real-world implementation example of the standard/policy and compare it with the NIST policy template side by side.
Answer the following questions clearly and systemically in this Word document. Make sure to include a References section toward the end of the document.
1. The Secure System Development Life Cycle Standard is implemented for which NIST functions and sub-categories? [5 points]
Answer:
2. Which organization is the implementation example you identified for? Which industry sector (e.g., education, government, etc.) is the organization in? [5 points]
Answer:
3. What is the purpose of the example standard/policy? Which party (parties) does the standard/policy apply to? Who is/are responsible for implementing this policy? [5 points]
Answer:
4. As compared to the NIST policy template, how is the example standard/policy customized to fit the needs of the organization? Describe two occurrences of the customization in detail. [10 points]
Answer:
5. If specified in the example standard/policy, how frequent is the policy reviewed for potential modifications? If not specified in the example standard/policy, what are your recommendations? [5 points]
Answer:
References
1.
2.
3.
This week, you will conduct an equity-impact assessment of the technology you ha
This week, you will conduct an equity-impact assessment of the technology you have selected for your Course Project. The goal of this assignment is to provide a framework for removing barriers that disadvantaged people may experience in accessing and utilizing new technologies, as well as analyzing technologies through the lens of equity.
A good synonym for equity is fairness. In an ideal world, everyone would enjoy the same opportunities for success, and outcomes would be purely a result of merit. Unfortunately, factors such as resource inequality and discrimination make it much more difficult, or even impossible, for some people to access the same benefits from emerging technologies that others might take for granted.
As you thought about the strengths, weaknesses, opportunities, and threats related to your technology, your primary focus may have been on how this technology affects you or other people who are similar to you in various ways. In this assignment, your goal will be to consider how this technology impacts other groups, for better or for worse.
Please include each of the following elements in a response of two to three pages (600–900 words).
Begin with a two- to three-sentence goal statement for your technology. What is the intended impact?
Identify and explain groups that may be impacted by the technology. This can include, but is not limited to, low-income populations, communities of color, linguistic minorities, LGBTQA+ communities, and immigrant or refugee populations.
Identify and explain regions that may be impacted by the technology. This can include, but is not limited to, urban communities, rural communities, coastal communities, industrial communities, and ethnic enclave.
Analyze potential positive and negative impact(s) or unintended consequences for three identified populations. Your chosen populations should include at least one group (see #2) and at least one region (see #3). As part of your analysis, include the following for each of the three populations you select.
Identify the population.
Describe the potential positive and negative impacts and consequences.
Propose actions to mitigate negative impacts or enhance positive impacts.
A successful assignment will
be two to three pages in length (600–900 words);
be composed using Microsoft Word and using 12-point Times New Roman;
include a minimum of three sources; and
be formatted and have sources cited using the seventh edition of APA.
No more hand holding! This is your opportunity to think like a hacker and employ
No more hand holding! This is your opportunity to think like a hacker and employ maximum utilization of available resources to adapt and overcome!
Using the VM for the Buggy Web App, Select any of the available vulnerabilities (Except SQL Injection since we already did that one) and exploit the vulnerability.
Submit a paper describing the following:
what vulnerability you chose
why this vulnerability is dangerous, i.e.
what can be exploited
How you exploited the vulnerability
What results did you observe.
Guidelines
Be sure to adhere to the Good Name Policy in the Student Handbook, write in a concise manner.
Adhere to APA writing style standards (View APA resources under Getting Started – How to Tutorials and Resources).
It should be 3-5 pages in length.
TUse screenshots to show your progression and your final outcome
Provide an analysis of how easy/difficult the vulnerability was to exploit and how dangerous you believe this exploit could be in the field.
All resources are available to you. Use the internet to its fullest extent.
Cover page and works cited are not included in the page count.
Grading: Please see Grading Criteria and Rubric in the Syllabus.
Information Technology The employees at your company have very low compliance
Information Technology
The employees at your company have very low compliance with adapting to new technology
and software. Research ways to increase compliance and why it is important. Propose a course
of action to that will improve your company’s adaptation to new technology.
Your company has recently been hacked and you need to update security protocols. Perform
research regarding the importance of updating protocols. Suggest a course of action based on
your research.
In a Word document, using the same format as previous assignments, describe DICO
In a Word document, using the same format as previous assignments, describe DICOM, HL7, and PACS. In complete sentences, define each and explain their uses. Describe how each is different from the other.
This assignment will require multiple sources (at least 3). Only use reputable sources, no Wikipedia or blog pages. This assignment should resemble a short essay (several paragraphs), however you do not need to use in-text citations or include a cover page or abstract. Use professional language, proper spelling, grammar, and punctuation.
Include a References page to cite all sources of information. Sources should be cited in APA format.
You may use the Purdue OWL resource to help you with your APA citations. Our CBC library is a great resource for reputable information and the library staff are very helpful especially in APA format.
This week, you will write a review of literature based on the technology you are
This week, you will write a review of literature based on the technology you are investigating for your Course Project. A review of literature may be defined as an analysis of published information in a particular subject area. It has some similarities to an annotated bibliography, which you have completed in a previous class, but differs in important respects. An annotated bibliography focuses on annotations, or summaries, of sources. In contrast, a review of literature analyzes the sources, draws connections among them, and notes changes in thinking over time. A review of literature will focus on the following questions.
What are the key points of agreement among the sources?
What are the key points of disagreement among the sources?
Do any of the sources appear to be outliers? In other words, are there any sources that bring up issues, or make assertions, that the other sources do not discuss?
Which sources appear to be the most powerful or influential? Are there sources that all of the other sources deem highly authoritative?
Are there any sources whose assertions seem dubious, illogical, or unsupported by the facts?
How has thinking changed about your topic over time? Are there beliefs that have fallen out of favor?
Successful assignments will do the following.
Analyze at least five sources from reputable publications that can be found in the DeVry Library
Demonstrate points of similarities and differences, note patterns, and evaluate source quality
Be approximately 750–1,000 words in length
Be formatted per current APA standards, including a separate title page and references page
Final paper instructions are attached Word document. Also included is week 1-4 p
Final paper instructions are attached Word document. Also included is week 1-4 presentation and reading material for reference. Please let me know if I have missed any reading material.
Please see the Dissertation Under Chapter 4. Please keep everything in the same
Please see the Dissertation Under Chapter 4. Please keep everything in the same format.
The goal is to read teh Default Report (These are survey questions that were sent out).
Read the dissertation and what the goal was trying to achieve.
Using the results of the Survey questions, Write Chapter 4 to prove your dissertaion Research Questions.
Including Tables and figures on the results is Acceptable.
I have included an example dissertation (the finacial …)