APA FORMAT WITH REFERENCE AND CITATIONS Assignment 1: Describe the company you

APA FORMAT WITH REFERENCE AND CITATIONS
Assignment 1: Describe the company you

APA FORMAT WITH REFERENCE AND CITATIONS
Assignment 1: Describe the company you are going to write about in the attached 1-page form below.   Keep it to just one page.
Download this MS-Word document. Edit it. Select your options. Add the expected brief text. Upload it back here by the deadline.
Assignment 1 Form.docx
You will be describing the client you have decided to write about.  This client wants you to tell them how to set up a data analytics (DA) function. 

  You’ve recently taken a position as the Chief Security Officer (CSO) for a co

 
You’ve recently taken a position as the Chief Security Officer (CSO) for a co

 
You’ve recently taken a position as the Chief Security Officer (CSO) for a company that has been experiencing an increasing number of successful malware attacks. Educating and training your workforce on malware is one of the ways you intend to address the ongoing issues.
Outline the major elements you would include in your program and briefly discuss why each element would be important in training employees on the dangers of malware.
Be sure to cover the major types of malware, emphasizing those you believe are most dangerous, and actions employees should take when confronted with a situation that they might be confronted malware or an attempt to lure them to do something that would result in malware being installed on their system.

Please use the attached template to fill in.   For this activity, you will esta

Please use the attached template to fill in.
 
For this activity, you will esta

Please use the attached template to fill in.
 
For this activity, you will establish the fictional company, executives, and team members that you will refer to.
Respond to each of the following:
What is the name of this e-commerce company? (Do not choose a real company.) What is the fictional name of the CEO, and what is the fictional name of the CIO? (You can use a friend or family member if you want, or some celebrity or fictional character.)
In 1-2 paragraphs, describe what kind of business your fictional company is in. Do they sell a product? A service? A new government (non-political, please) agency? A nonprofit or charity, perhaps? The one stipulation is that they must conduct business online, and they must be growing.
Finally, choose one of the following roles on the team (cybersecurity).
Now that you have identified your area of expertise based on the concentration you have studied, you will need to identify the members of your team. You will take the place of one of the members, so put your name (John Smith) where it belongs; the other roles can have fictional names assigned to them.

Cybersecurity Specialist:
Networking Specialist:
Data Management Specialist:
IT Project Manager (Assistant to the Project Manager):
Software Development Team Lead:

  Why do you think it is so important to document a digital crime scene? In a

 
Why do you think it is so important to document a digital crime scene? In a

 
Why do you think it is so important to document a digital crime scene? In a few sentences, describe the steps you would take and why you think you should take them, to ensure you have all of the needed evidence recorded. Are there any Internet resources that you could recommend that would help in this process? 
What happens if we do not document everything or do a poor job of documentation?

  Read the article “POV: Artificial Intelligence Is Changing Writing at the Univ

 
Read the article “POV: Artificial Intelligence Is Changing Writing at the Univ

 
Read the article “POV: Artificial Intelligence Is Changing Writing at the University: Let’s Embrace It.” and then decide how you want to respond to it. Choose one of the following ways.
Skeptic, challenging the author
Reflector, thinking about how the reading applies to you and others
Validator, supporting the author
Extender, applying the author’s principles to future situations
Descriptions of these roles are found below. Once you’ve decided, label your role in your initial post  (Skeptic, Reflector, Validator, or Extender). 
Skeptic – Challenge some items in the reading. Be specific about what you disagree with and provide substantive evidence (logic, examples, or even research). Here’s a way to start your post: “I disagree with many points in the editorial because…”
Reflector – Think about the concepts set forth in the reading as they relate to your own experiences or those of others. Be specific about your observations, explaining how you have reached your conclusions. Here’s a way to start your post: “Reading this article makes me think of a class I took a month ago…”
Validator – Support some items in the reading. Be specific about which points you agree with, explaining why you do. Provide evidence. Here’s a way to start your post: “I agree with many of the author’s points, such as…”
Extender – Show how the concepts might be applied in future situations. You may focus on both positive and negative ramifications. Be specific as you extend the conversation. Here’s a way to start your post: “This editorial made me wonder how the concepts might be applied to…”

  Item 2 of the Portfolio: Annotated Bibliography (due in week 4)    This week,

 
Item 2 of the Portfolio: Annotated Bibliography (due in week 4)   
This week,

 
Item 2 of the Portfolio: Annotated Bibliography (due in week 4)   
This week, you will submit an annotated bibliography for two (2) of your sources for the final project paper. Both sources should be scholarly (peer-reviewed) and from the APUS Library. Read the instructions for upcoming assignments so you will have a good idea of sources you might need.   
Each source (listed in alphabetical order) should have a complete Works Cited or References entry for the citation style you are using, as well as an annotation, which should be a paragraph or two summarizing and evaluating the article.  Information about the author’s credentials and publisher’s credibility may be included. Value of the sources to the final project paper should be part of the annotation. (Summaries/evaluations under one hundred words each will be considered under-developed.)  
Write in third person only. It’s a good idea to include a signal phrase, direct quote or paraphrase, and a parenthetical citation within each summary.  
To format your Works Cited or References entries, you may use the library cite button discussed in the week four Lessons. Include the article’s web link (the https address—not just the doi) at the end of your Works Cited entry. Just copy and paste it from your web browser, if it is not already included. Examples are shown in the attached Template (which you will download) and Sample (which is attached to show you an example of what a good submission looks like).   
Submit your assignment as a Word document attached to the assignment link so it can be automatically processed through Turnitin. Use the template provided. You can save the template with a title like this: Your Name_Annotated Bib.   

  difficult to learn how to do story problems because there are so many differen

 
difficult to learn how to do story problems because there are so many
differen

 
difficult to learn how to do story problems because there are so many
different types. If you want to do well on this week’s test, FOLLOW THESE
INSTRUCTIONS!
Step 1: Read the file entitled “Read This First”
Step 2: Open the file “Systems of Equations with Answers”.
Step 3: Go through ALL the story problems provided and try to solve them. Pretend it’s a Practice Test. Check your answers with the key provided.
Step 4: Pick ONE of the problems that you got right (that has not already been solved by a classmate) and demonstrate its solution for the rest of us.
Step 5: Study how your classmates solved the problems that you missed. Remember that these may be on the test!
Note: Problems are selected on a first-come basis. If a classmate has already chosen a problem you had wanted to answer, please select a different problem. Our goal is to answer and discuss as many different problems as possible.
To demonstrate your problem, select Start a New Conversation and make the subject of your post BOTH the problem number and topic (#10 Jarod and the Bunnies).
Begin your post with a statement of the problem so that we can understand what you are doing.
The answers are at the end of the file, so don’t just give an answer—we can already see what the answers are. Don’t post an explanation unless your answer matches the correct one!
Your goal should be to explain this problem so well that a classmate who “just doesn’t get it” will be able to understand it completely!
This is a moderated discussion. Your posting will not be visible to the rest of the class until I approve it. Occasionally, more than one person will tackle a problem before they can see the work of others. In that case, credit will be given to all posters. Once the solution to a problem has become visible, that problem is off limits and you will need to choose a different problem in order
to get credit.
I will indicate in the grading feedback if corrections need to be made. If you haven’t received credit, first double-check my comments. If everything looks OK, then email me asking me to check on it. You must make the necessary corrections and have your work posted in order to receive credit.
For this particular Discussion, no responses are required – your initial post is worth the full points. Should you choose to respond to a classmate, a request for clarification on the procedure used, a suggestion for an alternate method of solving the problem or a general comment about the technique would all be appropriate. I’m sure that a “thank you” for an exceptionally clear explanation would also be welcome!
Please pay attention to spelling and grammar. These skills are most important in about 80% of college courses that require written papers. Good writing skills will also reflect more positively on your status as a college student and graduate. 
Please sign ALL your discussion posts with the name that you like to be called – it makes it so much easier for the rest of us to address you by your preferred name when we respond.
Other Files: Read This First
Systems of Equations Problems with Answers
Using the Equation Editor 

  Discuss tools and techniques to remove Malware from infected machines; using

 
Discuss tools and techniques to remove Malware from infected machines; using

 
Discuss tools and techniques to remove Malware from infected machines; using a popular product to make your point.
Discuss the vulnerabilities that computer memory and computer process have that malware can take advantage of and exploit.
List any observations, tips or questions about this lab that would prove helpful to fellow students prior to midnight on Wednesday and comment on other student posts with value added comments (not simply agreeing) by midnight Sunday for full credit consideration.

  Describe the different display types available.  Describe how to adjust displa

 
Describe the different display types available.  Describe how to adjust displa

 
Describe the different display types available.  Describe how to adjust display settings and comment on the various video standards, resolutions, and concepts.
You need to describe how to build custom configurations.  In particular describe the differences between a standard thick client, virtualization workstation and thin clients.
Instructions: Responses should include direct questions.

You have been promoted as the manager of the e-commerce site for the company you

You have been promoted as the manager of the e-commerce site for the company you

You have been promoted as the manager of the e-commerce site for the company you working for. You are concerned about a recent SQL attack that happened. Your team reacted to the situation by notifying you immediately. You and your team were successful in containing and correcting the issues that allowed the website and database to be compromised by an SQL injection attack.
Knowing that many of the issues can be created by human error, you have decided to evaluate the processes your team uses when they code. As their leader, it is your responsibility to be current on all the best secure coding practices. Your job is to create guidelines for best coding practices, which you will present to your team.
Follow the instructions below
Provide at least three reasons why it is less expensive to build secure software than to correct security issues after a breach.
Outline the objectives and purpose of your company’s “best secure coding practices” and explain how it will influence your division.
Evaluate which method of the secure software development lifecycle will best serve your team, and explain how you plan on implementing your thoughts into your existing processes.
Identify three resources that can be used as “reference material” and act as a beginner’s guide for new employees. Outline the importance of each resource and how each resource can assist new coders. 
Outline all the major aspects of the best practice coding guideline, including objectives, purpose, resources, and methodology