Write a 150-word response about which resource(s) you found to be most useful in

Write a 150-word response about which resource(s) you found to be most useful in

Write a 150-word response about which resource(s) you found to be most useful in terms of not only researching the different types of networks that exist, but which might be best for a given scenario. What criteria are you using, or thinking of using, to determine which type of network is most appropriate for your particular project?

Now that we have examined what makes a piece of communication “technical writing

Now that we have examined what makes a piece of communication “technical writing

Now that we have examined what makes a piece of communication “technical writing” as well as how one approaches professional writing situations with their reader(s) in mind, you will write a brief paper that analyzes the traits that characterizes a document of your choosing as a piece of technical writing and how elements within the document informs you of who comprises the document’s intended audience(s). Length Requirement: One to two pages Source Requirement: Your selected technical document Documentation Style: APA Prompt For your Document Analysis, first identify a technical document that you come across at work or in your daily life. For example, you might choose to a report, a manual, a sign, a label on a piece of equipment or a product, a website, etc. (I chose a Dyson V10 Vacuum Manual.) Once you have identified the technical document you wish to analyze, write a one- to two-page paper that: Introduces and explains the technical document. Make sure to include the actual piece of documentation in this description; for instance, if you are writing about a sign, include a picture of the sign. If your document is on the Internet, include a link to the website where the document is located. Your description of your technical document should be no more than one paragraph. After introducing your selected technical document, identify and describe at least three characteristics of the document that make it a technical document. Then, for each characteristic you identify, use the reading assignment and lecture material from Module 1 to analyze how each characteristic classifies your selected document as an example of technical writing. (I have attached the material from Module 1.) Once you have analyzed what elements of your selected document make it an example of technical writing, describe the document’s intended audience(s) and describe at least three elements of the document that support your claim of the group(s) who make up the document’s intended audience. Then, for each characteristic you identify, use the reading assignment and lecture material from Module 2 to analyze how each characteristic supports your claim of the intended audience’s identity. ** Please ensure that you are appropriately citing your sources in order to make it clear where you are (a) engaging with the lecture material and/or the assigned reading for Modules 1 and 2 and (b) maintaining academic integrity.

To prepare: Choose one of the four small businesses from the “Project Overview”

To prepare: Choose one of the four small businesses from the “Project Overview”

To prepare: Choose one of the four small businesses from the “Project Overview” document, which is located in this week’s Learning Resources. Imagine that the owner of the business has asked you to design a network for the business. Part A: Needs Analysis Conduct a needs analysis for the business you selected by determining the following: Identify the specific needs the network must meet. Explain why each need exists and how it specifically supports the business. Include the number and types of devices that will be connected. Be sure to include mobile devices. Identify the different types of users and their access needs (be sure to consider customers or other users as well as employees). Describe any application, file, printer, and other sharing needs. Discuss required bandwidths. Discuss budget considerations. Part B: Design Requirements Having conducted a needs analysis to assess the network access needs of the business with which you are working, the next step is to translate that understanding of the various users and what is needed into a specific list of design requirements. This will serve as a checklist for your design. For each item in your list of design requirements, you will explain why that specific requirement is necessary. Possible examples might include: Password-protected guest wireless access: The business wants to allow customers to access the internet but does not want general open access. This customer access should not give access to other network resources or computers and should not allow customers to access one another’s computers when logged on. Shared data storage with version control: Employees often collaborate on documents and other materials. Common, shared access is needed for these materials. Employees should know when someone else is working on the materials or when changes have been made to support collaboration without inadvertently losing work. Internet access: All computers on the company network need to be able to access the internet through a shared modem. To complete Part B: List at least 10specific design requirements for the network. For each item in your list of design requirements, explain why that specific requirement is necessary based on your network needs analysis for the business you have chosen. Combine Part A(needs analysis) and Part B (design requirements) into one document and submit as your Project Part 1. Your document should be 4–6 pages long (not including the list of works cited), but it is the quality of the work that is important, not the number of pages. Cite and reference all sources using APA 7 format and style guidelines and submit in a single document.

Please complete this assignment in APA Style and 1-3 pages. Also included 1-2 re

Please complete this assignment in APA Style and 1-3 pages. Also included 1-2 re

Please complete this assignment in APA Style and 1-3 pages. Also included 1-2 references in the section at the end. Use the instructions below and also attached as a word document. Instructions Project 3-5-Use the vi editor. : In this hands-on project, you create and edit text files using the vi editor. (For this activity, please use the PDF attached. ONLY complete Project 3-5) ———— Discovery Exercise 4-10: Configure permissions. : What permissions argument to the chmod command would you use to impose the following permissions? 1.on a directory such that: the owner would have read, write, and execute; the group would have read and execute; and others would have read 2.on a file such that: the owner would have read and write; the group would have no permissions; and others would have write 3.on a file such that: the owner would have write; the group would have read, write, and execute; and others would have read and write

Chapter 12 1. HHS and the FTC recently launched an investigation into a major ph

Chapter 12
1. HHS and the FTC recently launched an investigation into a major ph

Chapter 12
1. HHS and the FTC recently launched an investigation into a major pharmacy chain for its information disposal practices. The regulators claimed that the pharmacy chain failed to protect customers’ sensitive financial and medical information by disposing prescriiptions and labeled pill bottles in dumpsters that were accessible by the public. Based on the HIPAA (Health Insurance Portability and Accountability Act of 1996), what consequences should a company face for failing to properly dispose of customer information? For HIPAA act, you may check the website.
Chapter 13
2. Trust is an important part of the continued growth and development of the Internet. This is particularly the case with respect to social networking. Media reports of disturbing stories and case law alike have shown some of the consequences that can arise when individuals create false social networking profiles. In a case in California, and individual established a fake MySpace profile of his former church pastor. On the profile, he posted content that suggested that the pastor used drugs and was homosexual. Can criminal charges be brought against the party that created the fake profile?
3. Read the Family Educational Rights and Privacy Act of 1974 (FERPA) at ED, discuss who has access to your educational record at APUS. Furthermore, what is the roles and responsibilities for APUS instructors and students to comply with FERPA

Read attached case study and answer the following questions: 1. The trial court

Read attached case study and answer the following questions:
1. The trial court

Read attached case study and answer the following questions:
1. The trial court found that Stengart did not have a legitimate expectation of privacy when sending personal emails through the company’s laptop. The appellate court and the Supreme Court disagreed. Discuss the reasoning that the higher courts had in reversing the trial court.
2. What effect would this decision have on a company when thinking about forming company policy regarding personal communication?
3. What kind of tools/techniques are available for Internet surfing process to comply with COPPA?

This week, you will submit the second project, the Desktop Migration Proposal. U

This week, you will submit the second project, the Desktop Migration Proposal. U

This week, you will submit the second project, the Desktop Migration Proposal. Using the requirements analysis your manager provided and the Internet research you conducted, submit your recommendation to the assignment folder. As you are writing your recommendation, ensure your analysis and recommendations align with your manager’s priorities and concerns.
You should carefully document any assumptions made (e.g., how you analyzed the requirement for upgrading monitors, peripherals devices, etc.).
Refer to the HFA Desktop Migration: Corporate PC Refresh Documentation for the company’s needs (requirements). Your justification should clearly indicate how you bridge the gap between the existing desktop specifications and the new machines you recommend.
How Will My Work Be Evaluated?
For this assignment, you are asked by your manager to research the replacement of 50 aging desktop machines with new laptops. Review the business needs from your manager carefully so that you fully appreciate the requirements you must address in selecting the new laptops.
For example, what is significant about the need for “multiple external monitors”? Ask yourself what it takes to connect a laptop to external monitors. What ports are included on your recommended laptop? What kind of cables are required? Can those ports/cables be used with the external monitors? Does the laptop have sufficient graphics capabilities to drive external displays and if so, how many and at what resolution? Follow this same process for all the business needs.
By documenting your choices and the overall recommendation in an effective background report, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
1.1.3: Present ideas in a clear, logical order appropriate to the task.
1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.
1.4.3: Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas.
2.1.2: Describe the context surrounding the issue or problem.
2.3.3: Explain inferences and deductions that follow logically from the evidence provided.
10.1.3: Define the specifications of required technologies.
13.1.1: Create documentation appropriate to the stakeholder.
13.2.1: Evaluate vendor recommendations in the context of organization requirements.
This project is a three- to four-page business-oriented proposal should contain the following:
at least one high-quality graphic
one or more tables to present information
at least one online configurator
your purchase recommendations, specifications, and justification for your choice
one to two IEEE references
If you didn’t download it last week, download the Desktop Migration Proposal Resources now and follow the instructions in the document.
Delete the instructional text from the template before you submit.
In your proposal:
Include warranty, support, antivirus, and accessories.
Add the recommended build to a cart or quotation.
Enter “first name last name cmit 202 xxx” where xxxx is the section number (example: 6380) into the coupons form area. Do not click on apply coupon and do not submit the cart!
Print the pages to PDF (ensure the headers/footers are on) and upload the image to the assignment folder along with your report.
Ensure you have included a cost estimate.
For Reference
Configurator Example from Dell
Configurator Example from HP
Configurator Example from Lenovo

The scope of work is the key element to any project and important to learn. It s

The scope of work is the key element to any project and important to learn. It s

The scope of work is the key element to any project and important to learn. It should be filed as supplementary documentation for purposes of evaluating execution and directional purposes of meeting milestones of a multiphase comprehensive project plan within the vulnerability assessment. The scope of work will be the first section of the final vulnerability assessment report.
Combine the overview from the previous step with a list of security needs into a one-page SoW report. Submit the report for feedback.
Be sure to include an overview of the critical mission assets and use the following criteria as APA 7 level 2 headings:
-descriiption of the scope
-product acceptance criteria
-project deliverables
-project exclusions
-project constraints
-project assumptions
If direct quotes are used they will need proper formatting, such as the inclusion of a page or paragraph number in the in-text citation.