Analyze techniques to effectively compose a major IT document after watching t

 
Analyze techniques to effectively compose a major IT document after watching t

 
Analyze techniques to effectively compose a major IT document after watching the videos or by conducting research by addressing the questions below:
Video: How to format a book in MS Word (Part III: Front matter, back matter and section breaks): https://www.youtube.com/watch?v=R-5kJl5rN6E
Video – Front Matter, Body & End Matter in Technical Documents: https://study.com/academy/lesson/front-matter-body-end-matter-in-technical-documents.html(This is not a mandatory video you must watch; however, there is a special offer for 7 days usage–Try it first for 7 days. Special Offer!)
Explain the purpose of front matter in a technical document and provide examples.
Explain the items found in the body of a technical document.
Explain the purpose of back (end) matter in a technical document and provide examples.

> Describe the various sources of systems and software components. > Describe ho

> Describe the various sources of systems and software components.
> Describe ho

> Describe the various sources of systems and software components.
> Describe how to plan purchases and acquisitions, as well as the steps in the procurement process.
> Explain how to conduct procurement, including its inputs, processes, and outputs.
> What is a statement of work? Why is it so important to procurement?
Need 4 pages in APA format with peer-reviewed citations. No need for introduction or conclusion.

   In order to complete assignment #6 you will need to answer the below question

  
In order to complete assignment #6 you will need to answer the below question

  
In order to complete assignment #6 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #6). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.
Chapter 10Immunomedics was alerted that there was some negative buzz about the company in a chat room. The poster used a pseudonym, and therefore the company was unable to identify the poster for lawsuit purposes. The only information the company could ascertain was the poster’s ISP. So the company decided to subpoena the ISP for identity information of the poster in order to file suite against the poster. How should the courts handle these cases, where the company’s complaints may, or may not rise to the level of an actionable legal claim?Chapter 11Please read Question #5 on page 362 and then answer the following questions.Should Craigslist be subject to liability for FHA violations? Why or why not? Cite appropriate legal principles when explaining your answer. 
 Question 5 pg 362
Users of the popular Internet website Craigslist are able to post advertisements for housing that permit statements regarding the preference, limitation, or discrimination of others based on race, religion, sex, or family status. The Fair Housing Act (FHA), however, prohibits making, printing, or publishing a notice, statement, or advertisement for sale or rental of dwellings indicating preference, limitation, or discrimination based on protected classes. As such, Chicago Lawyers Committee for Civil Rights Under Law, Inc. brought suit against Craigslist alleging a violation of the FHA. In defense, Craigslist claimed that it was immune from liability based on Section 230(c)(1) of the CDA, which protects interactive computer services from liability for unlawful third-party content. Should Craigslist be subject to liability for FHA violations? Why or why not? Cite to appropriate legal principles when explaining your answer. 48

   You are a security professional for a large, private health care organization

  
You are a security professional for a large, private health care organization

  
You are a security professional for a large, private health care organization. Users have access to file and application servers, as well as data storage facilities that contain customer health information and personally identifiable information (PII). Your organization needs to create user access policies and provide them to its employees.
Sean, your manager, asks you to write a report detailing relevant user access policies. He needs you to research a generic template and use that as a starting point from which to move forward.
For this assignment:
1. Research existing policy templates and examples from organizations of a similar type.
2. Write a report detailing at least three relevant user access policies based on your research.
· Create a table for the policies.
· Include a short summary explaining why you chose the policies.
· Include an introduction and conclusion.
· Provide citations for your sources.

Summary: Produce an ER Model for the following scenario (presented in Step 1 bel

Summary:
Produce an ER Model for the following scenario (presented in Step 1 bel

Summary:
Produce an ER Model for the following scenario (presented in Step 1 below) and business need, for the Pythagoras Math Academy.
ER Model for the scenario presented. 
You have the option to use MS Visio (if you have the software) to produce your ER Model.  
Alternatively, if you do not have MS Visio, you can use the ERD PLUS (Open source ER Modeling Software) and produce your ER Model. 
Required Software:
MS Visio by Microsoft OR
ERD PLUS, Open Source Offering. This offering is cloud-based, and you do not need to download any clients. You will need to create an account (username and password), link to this offering follows: https://erdplus.com 
Lab Steps:
Step 1: Read and understand the Scenario and Business needs presented below. Define and document the ENTITIES, and RELATIONSHIPS, required to address the business needs. The nouns in the scenario below will give the ENTITIES that you will need. Finally, the verbs will describe the RELATIONSHIPS.Scenario and Business Need The Pythagoras Math Academy is in need to develop a database to keep track and control of his students, teachers, and classes offered. Teachers are able to teach multiple courses. But they are required to be certified on the course they are teaching. For example, only a group of teachers are certified to teach Algebra, and other Geometry. Students can take multiple courses. Courses are taught by teachers with the proper certification and have multiple certs as needed.  Courses are taught in one of the classrooms at one of the School’s several sites.Each classroom is optimized to serve the needs for a course (for example some courses might require computer labs and whiteboards). The school needs to keep track of the math courses delivered in each of the sites.
Step 2: For this project, you are required to use MS Visio or ERD PLUS to produce the deliverables.If you are using MS Visio follow the steps below:
project overview/ expectations.
Open MS Visio
Click on the Software Database Template in the main window
Select the Database Model Diagram Template to open a new file.
Save the File and ensure to have in your file name PROJECT2_LastName_FistInitial.
If you are using ERD PLUS.
From the ERP PLUS main interface, select DOCUMENTS –> NEW DIAGRAM (NAME YOUR DIAGRAM) –>ER DIAGRAM –> CREATE
Step 3: Define and Database ENTITIES
Add an entity for each Table you identified in the Scenario and Business Need.
You will use the MS Visio tool, or the ERD PLUS open source offering to complete this step.
Step 4: ADD the required ENTITY ATTRIBUTES  
Add the required Attributes for each Entity that you feel would help to define each Entity as needed.
Select one of the attributes to be PRIMARY KEY (PK)
Step 5: Define RELATIONSHIPS
Use the Crow’s Feet Notation.
Drag and drop (draw) relationships between the entities you defined.
Connect the ends to the two entities for each relation.
Defined the Primary Key for the parent entity.
Step 6: Define CARDINALITY RELATIONSHIPSet the cardinality for each of your relationships defined in Step 5.  For MS Visio: select a relationship line in the drawing area that is connecting two entities. In the Database Properties window, select the miscellaneous category. Select the cardinality for the selected relationship.
Step 7: Upload your Work 
Save the File and ensure to have in your file name PROJECT2_LastName_FistInitial. 
Rubric:
1. ER Model (MS Visio OR ERD PLUS)
2. Entities: Minimum of three entities are represented
3. Attributes: Minimum of two attributes for each Entity. Most would require more than two attributes, and I am only requiring two per entity.
4. Relationships: Minimum three relationships are presented.
5. Cardinality is defined and specific for each relationship with Crow’s foot notation.

  PC-3.2: Interact with others in a professional manner using appropriate commun

 
PC-3.2: Interact with others in a professional manner using appropriate commun

 
PC-3.2: Interact with others in a professional manner using appropriate communication and presentation skills.
Purpose
The ability to make presentations is important for any professional. This assignment reinforces your ability to develop a presentation for upper management. 
Assignment Instructions
Based on the knowledge you have achieved thus far in this class, compose a minimum 10-slide research presentation using the current APA version with title and reference slides using Microsoft PowerPoint. Prepare the slides for a 15-minute professional presentation on the topic of cybersecurity policies contains a policy recommendation of some type. Your presentation will be to upper management in an enterprise firm with over 2,000 employees and six locations throughout the world. Your presentation needs to include a title slide and follow APA formatting guidelines. 
Note: Be sure to use the notes portion within the slides to include additional content.
Then, compose a 1-page paper explaining how you will utilize interpersonal skills, including communications skills, problem solving, decision making, listening skills negotiation, and assertiveness to obtain management buy-in for your policy recommendation. 
Assignment Requirements
Include a title slide.
10 slides in length, not counting the title and reference slides
Includes a highly developed viewpoint and purpose and exceptional content
Paper and slides demonstrate superior organization and are well ordered, logical, and unified.
Free of grammar and spelling errors
No evidence of plagiarism
At least three outside references on the topic of cybersecurity policies
One-page paper using the most current APA formatting
Your work should demonstrate a comprehensive understanding and expert-level usage of interpersonal skills to embody professional demeanor using all of the following skills: communication skills, problem solving, decision making, listening skills, negotiation, and assertiveness. Make sure to show how you would apply all of the skills in a professional situation.
For assistance with APA requirements, please go to Academic Writer. You will find the link in the Academic Tools section of the course.
Directions for Submitting Your Assignment
Compose your assignment using Microsoft PowerPoint and Word and save them as IT484_YourName_Unit_9_ Assignment 2 and submit them separately to the Assignment 2 Dropbox for Unit 9.
see unit 9-2 rubric

I have an excel workbook with a few sheets. Our main focus are sheets “Step 2” a

I have an excel workbook with a few sheets. Our main focus are sheets “Step 2” a

I have an excel workbook with a few sheets. Our main focus are sheets “Step 2” and “Step 3”. If you notice, the workbook is a Macro enabled workbook. The goal is to achieve the same results of the macro using a formula, instead of the macro and getting rid of the macro all together. 
Please review my video (attached) for instructions. 

For information systems developers, there are many options for building a mobile

For information systems developers, there are many options for building a mobile

For information systems developers, there are many options for building a mobile app. As part of the analysis and design process for your project with Healthy Harvest, you need to determine how to approach the build by creating a use case diagram and a prototype. This diagram should list system requirements and use proper design principles. 
Create a use case diagram to show the system requirements, including all main features and workflow for the mobile app. 
Create a prototype using the method of your choice to show the overall proposed look of the app. 
Write a 1-page summary that explains both your use case diagram and prototype. Include all system requirements, features, and design elements for the mobile app.
Format references according to APA guidelines. 

  Read the following information about a typical dental practice: Community De

 
Read the following information about a typical dental practice:
Community De

 
Read the following information about a typical dental practice:
Community Dental has two offices in the same city — the North office and the South office. These offices offer the same dental services to patients. Patients can make appointments to either office at their convenience to see the dentist of their choice. Both offices are similarly equipped.
The professional staff includes the dentists, hygienists, dental mechanics, and administrative staff (receptionist, billing clerk, and office manager).
Each Community Dental office has a waiting area served by a receptionist who uses a computer to check in patients, schedule one of the examination rooms, and answer the phone. The waiting room has a door opening to the outside. A second door admits patients into the rest of the facility. Background music plays inside the waiting area. There is also a large aquarium on display.
Each examination area is partitioned off from the adjacent ones. Each has a computer and LCD screen used to pull up patient information and record new dental data such as x-ray interpretations, examination and test results, and procedures done for the patient. A low-level sound masking system is installed in this area.
After their treatment, the patient visits the billing clerk’s desk, which of course has a computer and a printer. Here patients pay (cash co-pay, credit card, or check), insurance information is verified, and an appointment is made. This clerk also mails out postcard appointment reminders and answers the phone.
The Community Dental dentists share a private office that has a computer and a printer. Here they can review patient data, access the Internet, and exchange email with their patients, colleagues, and acquaintances.
A database server containing patient data sits in a closet, next to a small tape library used for backup. Next to it sits a VPN server, firewall/router, and cable modem connected to the Internet. The VPN server accepts incoming connections from the dentist’s home computers. It also provides a permanent VPN connection between the North and South Offices. In this way, all patient data is available at all times at either office.
Most patient data is stored electronically on the database server, but some data such as x-rays and third-party labs results are still filed in physical form. Community Dental also depends on third party service providers to build crowns, braces, false teeth, soft dental protectors, and such. Information is exchanged with service providers using telephone, fax, letter, and email.
The network infrastructure’s management and maintenance are outsourced.
Community Dental also maintains an informative website to advertise its practice. The site is remotely hosted.
Answer the following questions incorporated into an  format. Make any sensible assumptions necessary in order to continue your analysis (stating them as needed for clarity). You are welcome to use the discussion board to share your assumptions with others in the class:
What is all the electronic and non-electronic private health information (ePHI) that is stored, processed, and transmitted at Community Dental’s two offices?
Assess the practice’s organization. Where are organizational processes most likely to be HIPAA compliant? What changes should be made to move the practice closer to compliance in its business operations?
Assess the practice’s physical and technical safeguards. Where are they most likely HIPAA compliant? What changes should be made to move the practice closer to compliance?
Community Dental exchanges data with external service providers and uses a third party to manage its IT infrastructure. What administrative and organizational safeguards should the practice expect these providers to adhere to?
 
Submit your in the usual double-spaced APA-styled report. Content should be a minimum of four double-spaced pages, APA style followed (title page, abstract, table of contents, and references section) to meet expectations.
Answers contain sufficient information to adequately answer the questions
No spelling errors
No grammar errors