There are 5 slides – You can do a minute per slide – Please write a scriipt for

There are 5 slides – You can do a minute per slide – Please write a scriipt for me that I can use to do a presentation on the attached slide.
You have recently been hired to work in the information technology field. Your new manager has
you to write a blog post describing a technological product, practice, or process that at least one group of employees will soon implement. Your manager has approved the blog post from Task 1, and now you will create a multimedia presentation that discusses the content in the blog post.
Note: You must submit a Panopto URL for this task.
Requirements
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).
A. Create a multimedia presentation using presentation software (e.g., PowerPoint). The presentation should cover the main points from your blog article in Task 1 and include the following components:
1. a minimum of five slides, including a title slide
2. a minimum of two visual elements (e.g., photos, charts, graphs with sources cited)
B. Create a narrated multimedia presentation recording based on the Task 1 blog post. Submit your narrated presentation as a Panopto VIEWER link. To generate this link, use Panopto or another recording software to create a video file that can be uploaded to Panopto. The recording should not be a demonstration of the technological product, but a review of the same material required in the blog post. Ensure the recording meets the following criteria:
1. is 5–7 minutes long
2. uses the slides to enhance the presentation from part A
3. demonstrates effective delivery skills (e.g., speaks clearly, audibly, and at an appropriate pace)
Note:
• The video must feature your voice presenting the multimedia presentation. When recording, disable the webcam.
• You may use Panopto to record the multimedia presentation, or you may use another software of your choice and upload the resulting video file to the D339 Panopto Dropbox. Once the video file is uploaded to Panopto, copy the “view” link for the video to the submission area for Task 2.
• For instructions on how to access and use WGU’s Panopto, refer to the “Panopto FAQs” link in the Web Links section located below the rubric.
• For the direct link and directions to login to WGU’s Panopto, refer to the “Panopto Access” link in the Web Links section located below the rubric.
• For instructions on how to submit your Panopto video, refer to the “How to Submit a Panopto Video Link for Evaluation” link in the Web Links section located below the rubric.
Note: File Restrictions
File names may contain only letters, numbers, spaces, and these symbols: ! – _ . * ‘ ( )
File size limit: 200 MB
File types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z
C. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
D. Demonstrate professional communication in the content and presentation of your submission.

There are THREE TASK – EACH TASK IS A DIFFERENT SEPERATE ASSIGNMENT FROM THE OTH

There are THREE TASK – EACH TASK IS A DIFFERENT SEPERATE ASSIGNMENT FROM THE OTHER – USE ATTACHED DOCUMENTS FOR GUIDANCE WITH THE TASK.
TASK 1 – In this task, you will choose one case study from the attached “Case Studies” document. You will analyze the case study using the concepts covered in Section 1 of the course (the Iceberg Tool and the Behavior Over Time graph). You will apply the principles and foundational theory of systems thinking to the chosen case study by using the Iceberg Tool to identify the case’s key events, patterns, and underlying structure. Next, you will use the attached “Case Study 1 Graphs” or “Case Study 2 Graphs” for the case study you chose, and you will select the Behavior Over Time graph that best represents the patterns you identified. Finally, you will write an analysis that discusses what the Iceberg Tool and Behavior Over Time graph reveal about the problem in the case study as well as the interconnections among the key events, patterns, and underlying structure of the system.
Note: You must use one of the given case studies and both the Iceberg Tool and the Behavior Over Time graph.
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).

A.  Analyze one of the given case studies from the attached “Case Studies” document by doing the following:
1. Using the Iceberg Tool, write a summary of the analysis identifying key events, patterns, and the underlying structure that causes the identified events and patterns to occur.
2. Choose the Behavior Over Time graph that best represents the patterns you identified using the attached “Case Study 1 Graphs” or “Case Study 2 Graphs” for the case study you chose.
a. Discuss why the chosen Behavior Over Time graph best represents the patterns present in the chosen case study.
3. Write an analysis that discusses what the Iceberg Tool and Behavior Over Time graph reveal about the problem in the case study as well as the interconnections between the key events, patterns, and underlying structure of the system.

B. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

C. Demonstrate professional communication in the content and presentation of your submission.
TASK 2- In this task, you will choose one case study from the attached “Case Studies” document. You will analyze the case study using the tool from Section 2 (systems archetypes tool) to draw conclusions about a system’s relationships, connections, properties, and subsystems. Choose one of the systems archetypes to help you understand the problems in the case study. You will submit a completed systems archetypes tool and a completed analysis that includes the problems in the case as understood through relationships, connections, properties, and subsystems. It will be important to address any changes that occur throughout the case, as shown by the selection of a particular systems archetype.
Note: You must use a systems archetypes tool.
Requirements
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).

A. Analyze one of the case studies from the attached “Case Studies” document by doing the following:
1. Analyze one of the given case studies using one of the systems archetypes tools.
2. Submit a completed systems archetype tool.
3. Summarize the problems in the case study as understood through its relationships, properties, and subsystems as a result of the changes that occur.

B. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

C. Demonstrate professional communication in the content and presentation of your submission.
TASK 3 – Introduction
In this task, you will choose one of the given complex case studies from the attached “Case Studies” document. You will analyze the case study using the attached “Four Steps Tool.” You will submit the completed “Four Steps Tool,” which includes an analysis of the problems in the case study and your proposed best solution. Your analysis will include the solution’s strengths and challenges; its superiority over other rejected alternatives; and its anticipated impact on the overall system.
Requirements
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).

A. Analyze one of the given case studies from the attached “Case Studies” document  by doing the following: 
1. Evaluate the case study using the attached “Four Steps Tool.” 
2. Submit the completed “Four Steps Tool,” which includes the following:
a. your proposed best solution and the solution’s strengths and challenges
b. the solution’s superiority over other, rejected alternatives
c. the solution’s anticipated impact on the overall system

B. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

C. Demonstrate professional communication in the content and presentation of your submission. 

I have to write a research paper with a statistical analysis of the data include

I have to write a research paper with a statistical analysis of the data included in the paper about Energy Optimization and Autonomy in IoT-Based Smart Parking Sensors. I already found 2 sources that you may use for the paper. I also uploaded the notes of my professor about the statistical analysis.

Create a visual analysis using draw.io or your choice of visual analysis to disp

Create a visual analysis using draw.io or your choice of visual analysis to display relationships in a visual (Microsoft Excel, whatever). JPG is attached of visual analysis example. Ensure the analysis has a legend and make it similar to the attached example. Utilize information from the below AND excel data sheet to make the Visual analysis chart.
Relatives
Vivian Jenna Wilson – Daughter
Justine Musk – Ex Wife
Tau Techno Mechanicus Musk – Son
Business Associates 
Larry Ellison – Cofounder and CTO of Oracle
Kimbal Musk – Elon Musk’s brother, a board member of Tesla
James Murdoch – Media executive and former Tesla boardmember.
Max Hodak – Cofounder and former President of Neuralink.
Larry Page and Sergey Brin – Cofounders of Google.
Companies
Tesla Inc. – Automotive and Energy
Space X – Aerospace and Defense
Neuralink – Neurotechnology
The Boring Company

1. Use NORD VPN or other IP obfuscation. 2. Using the following government publi

1. Use NORD VPN or other IP obfuscation.
2. Using the following government public records search sites, search for:
•Elon Reeves Musk or any of the following:
companies:
•Tesla.com
•boringcompany.com
•spacex.com
•muskfoundation.org
people:
•Elon Musk
•relatives (think ex-wives, friends, etc.)
•officers in his companies
•investors
•business associates
3.Tools:
•www.blackbookonline.info
motor vehicles
business filings
court cases
property filings
assets
publicly traded disclosures
motor vehicle carriers
open corporates
companies
officers
•aviation registration
•voter records
•campaign finance
open secrets
4. Roll up EVERYTHING you find, add it to your spreadsheet to keep track of info on Elon, and submit it as a PDF AND updated attached excel.
5. Create a visual analysis using draw.io or your choice of visual analysis to display relationships in a visual (Microsoft Excel, whatever). JPG is attached of visual analysis example.
6. When submitting your visual analysis, provide a three paragraph summary of what you believe is the most impactful piece of new information from the searches and WHY. Avoid making it about anything political.
The attached excel is actually a little sparse. Be careful with new articles, they aren’t at all reliable. there’s no standard for fact checking anymore.
They’re great for leads, but we want to find info ourselves that confirms or denies what’s in people magazine or whatever.
Try focusing on his businesses…lots of bulk data to be had there. Bulk up the attached excel with the above information and organize it.

Current Role Senior Technician Technical Support @ Dell Technologies Looking fo

Current Role Senior Technician Technical Support @ Dell Technologies
Looking for a entry level job in Cybersecurity – Please try and tailor it to this role
If you need any information, please let me know
I have included my current resume + My degree and my Security+ certification
Please let me know if you will be using a diffrent resume format and show me the structure prior

Overview Security analysts play an important role working alongside the computer

Overview
Security analysts play an important role working alongside the computer incident response team (CIRT). The analyst will be the individual who either fixes the issues or allocates resources to fix the issues identified by the CIRT. Using resources to facilitate the work becomes essential to sustain the health of an organization. Applying the Center for Internet Security (CIS) critical controls to company infrastructure is normal practice for an analyst. The controls are meant to guide the organization toward compliance. They are not meant to be used in isolation. Comparing an organization’s technical concerns to the CIS critical controls provides a means of developing solutions to remediate issues. Once the issues are identified and remediated, the next step is to determine how to properly report those issues to different stakeholders.
Prompt
After reviewing Breach Analysis Simulation Scenario Two, address the critical elements below:
Reporting: Select an audience for reporting (sales team, senior management, or other stakeholders).
Explain how you report technical concerns to non-technical people in your selected audience. Keep in mind that most managerial roles are non-technical in nature; managers need information presented to them in a format they can easily understand and use.
Subcontrols: Refer to the CIS Controls worksheet used in Breach Analysis Simulation Scenario Two and recommend two additional subcontrols that could be modified by policy, implementation, automation, or reporting to enhance security for the organization.
Subcontrol One: Describe the modification of the subcontrol and justify your recommendation.
Subcontrol Two: Describe the modification of the subcontrol and justify your recommendation.
Two-Factor Authentication: A proposed solution for the breach issue is to use RSA key fobs as a means of two-factor authentication.
Discuss the merits of using RSA encryption and the implementation of two-factor authentication.
Discuss how different forms of encryption may be used in VPN software.
What to Submit
Your submission should be 1 to 2 pages in length. Use double spacing, 12-point Times New Roman font, and one-inch margins. All sources must be cited using APA format. Use a file name that includes the course code, the assignment title, and your name—for example,