Are there different methods you would have chosen based on what you read?

Qualitative Journal Article review
You will review qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 2% will not be accepted.) 
Please use APA formatting and include the following information:
Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
Study Findings and Results:  What were the major findings from the study? Were there any limitations?
Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
References   

Place this order or similar order and get exceptional paper written by our team of experts at an affordable price

Please refer back to the first couple of assignments and announcements for reaction expectations, this is a separate section of your report that is just as important as the summary.

 This assignment includes two closely related (and reasonably short) papers, a landmark paper from Peter Denning describing working set theory and a paper from Carr and Hennessy on virtual memory management. Note that Hennessy is the other co-author of our Computer Architecture text. As usual, provide a summary and your reaction for each paper. Please refer back to the first couple of assignments and announcements for reaction expectations, this is a separate section of your report that is just as important as the summary.
Peter Denning, “The Working Set Model for Program Behavior”, Communications of the ACM, 1968.
Richard Carr and John Hennessy, “WSClock — A Simple and Effective Algorithm for Virtual Memory Management”, Proceedings of the Symposium on Operating Systems Principles, 1981.

Place this order or similar order and get exceptional paper written by our team of experts at an affordable price

Assignment instructions & cyber insurance policy review worksheet (this document)

Assignment Overview: For this assignment all students will be using the same materials linked here. The type of organization you have been working with will not have a major bearing on your analysis or responses. The goal of this assignment is to apply the policy review analysis strategies and techniques we have been discussing during lectures. Analyzing cyber insurance policies and understanding how coverage applies to claims takes direct experience and practice reviewing many different types of policies. This assignment is designed to give you some practice examining a full cyber insurance policy in the context of a simulated real-world example.
Assignment Structure
Documentation – Each student will be provided the following documents to complete the assignment:

Assignment Instructions & Cyber Insurance Policy Review Worksheet (this document)
Sample Cyber Insurance Declarations Page – “UBTech CySure Declarations Page”
Sample Travelers Cyber Insurance Policy – “Travelers Cyber Risk Policy Form Sample”

Grading – This assignment will be graded on a 100 point scale with 50 points per section. 

The first 10 questions have a right or wrong answer and all answers can be found in the Sample Cyber Insurance Declarations Page. This section is worth a total of 50 points. 
The second set of 6 questions are a bit more challenging and are based on your interpretation of policy language Insuring Agreements, Definitions and Exclusions. These questions will be graded based on level of effort, accuracy and thought put into your responses. This section is worth a total of 50 points.

Place this order or similar order and get exceptional paper written by our team of experts at an affordable price

Are there different methods you would have chosen based on what you read? 

 Quantitative Journal – Article Review – 3-4 pages
You will review quantitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 2% will not be accepted.) 
Please use APA formatting and include the following information:
Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
Study Findings and Results:  What were the major findings from the study? Were there any limitations?
Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
References  

Place this order or similar order and get exceptional paper written by our team of experts at an affordable price

Research the internet and other media  sources for vendors who develop registrar and school management database  systems.

  
Week 4 Assignment – University Database 
  
Week 4 Assignment – University Database
Overview
A prestigious university has recently  implemented a consolidation strategy that will require it to centralize  their student records. In order to move forward, the local university  will need to develop a data model that will retain student records and  perform various data extract transform and load (ETL) processes. Imagine  that you have been hired as a database consultant to assist in the  development of a data design strategy for the student records. You met with various university subject  matter experts and have determined the following after performing  various business analysis processes: 
Faculty groups are divided by core competencies that the  university offers. For example, there are groups such as the art  faculty, computer technology faculty, language faculty, and science  faculty. Each faculty member has an assigned dean and is designated to  teach at one particular campus and school. They are able to teach as  many courses as required.
Courses are categorized by course code and title. Certain courses  have prerequisites and the university has asked for this to be cataloged  as well.
There are various schools within each campus. For example, the Los  Angeles campus holds the following schools: School of Science, School  of Law, and School of Computer Technology. Additionally, each school  offers different professional study programs, such as Forensic Computer  Science, Marine Biology, Business Management, and Civil Engineering, to  name a few.
The study path for students requires that they be enrolled in a  specific professional study program. The professional study program  requires the students to complete a specific set of core courses. The  university also requires that an online grade book be available. The  online grade book should show grades awarded to students for specific  courses and the term they completed the course.
The university identifies each student by their name, date of birth, social, and professional study program.
Instructions
Using these findings, write a 3–4 page paper in which you: 
Analyze the university’s requirements and provide a proposal to  organize all the required data elements. The proposal should include the  following:     

Provide an entity relationship model (ERM) that will describe the data structure that will store all data elements. Note: The graphically depicted solution is not included in the required page length.
Describe any assumptions or limitations for each relationship.  For example, professors are able to teach more than one course, or  students can only be enrolled in one program.

Create the primary key and foreign keys using a UML class diagram for each table.
Suggest at least four types of business intelligence reports that  could help the university in course management, student enrollment, or  historical tracking. Support your answer by providing specific business  functions that these reports could be used for to assist executives of  the university.
Consider outsourcing the functions above as an alternative for  development of the database. Research the Internet and other media  sources for vendors who develop registrar and school management database  systems.     

Suggest three vendors that developed and are employing efficient  registrar and school management database systems and support your  reasons to choose from one of these three vendors.
Compare and contrast the key aspects that each system offers.  Examples of system aspects include but are not limited to cloud based,  pricing model, open source, et cetera.

Go to the Strayer Library to locate at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
The cover page and the reference page are not included in the  required assignment page length. Include charts or diagrams created in  any chart or drawing tool with which you are familiar. The completed  diagrams or charts must be imported into the Word document before the  paper is submitted.
This course requires the use of Strayer  Writing Standards. For assistance and information, please refer to the  Strayer Writing Standards link in the left-hand menu of your course.  Check with your professor for any additional instructions. The specific course learning outcome associated with this assignment is: 
Propose a database design.

Place this order or similar order and get exceptional paper written by our team of experts at an affordable price

Would deploy a similar type of technology in your field or practice or how have the findings informed your selection? 

I am working this discussion post but I need other perspective to supplement my thoughts. 
This is a discussion assignment:The Question: Are digital Technologies tools safe and Effacious?
Use the following articles to
For this discussion board select two of the articles/readings from this module from The Good, Bad, and Potentially Harmful.  Critically analyze each article as outlined below and provide expanded commentary on the following elements:1. Study Design/Flaws2. Applicability to Your Field of Study/Practice3. Would deploy a similar type of technology in your field or practice or how have the findings informed your selection? 4. Review the page on safety is also attached.• Do you have confidence in the safety of these types of services (digital health tools writ large)? 
All the articles are attached to use for the discussion. This is a graduate level assignment.

Place this order or similar order and get exceptional paper written by our team of experts at an affordable price

Which types of illustrations don’t you find?

Examine an illustration (ex. pictures, graphs, charts) used in a journal or magazine in your major field of study.  Which types of illustrations do you usually find?  Which types of illustrations don’t you find?

Place this order or similar order and get exceptional paper written by our team of experts at an affordable price

Do you think that iso 27001 standard would work well in the organization that you currently or previously have worked for?

 The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.For your week 3 research paper, please address the following in a properly formatted research paper:
Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
Are there other frameworks mentioned has been discussed in the article that might be more effective?
Has any other research you uncover suggest there are better frameworks to use for addressing risks?
Your paper should meet the following requirements:
Be approximately four to six pages in length, not including the required cover page and reference page.
Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The school Library is a great place to find resources.
Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Place this order or similar order and get exceptional paper written by our team of experts at an affordable price

3 common security risks with ratings: low, medium or high

 A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:
User authentication and credentials with third-party applications
3 common security risks with ratings: low, medium or high
Justification of your threat model (why it was chosen over the other two: compare and contrast)
You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them. 

Place this order or similar order and get exceptional paper written by our team of experts at an affordable price

What is the value of doing this assignment?

 
Week 3 Assignment: Listen and Respond
Due: Week 3
Points: 100
Skill(s) Being Assessed: Communication (active listening, oral communication)
Criteria for Success: In this assignment, you will:
Create a 1–2 minute audio response (using your own original voice) with clear and consistent sound quality throughout.
As a supervisor, address all aspects of the problem identified by your co-worker clearly, cohesively, and concisely.
Tailor the content, tone, and language of your response to the audience.
Summarize the speaker’s message, incorporating all of the speaker’s main points clearly.
Convey openness and approachability.
Appropriately use informal and formal language.
What to submit/deliverables: Informal voicemail to a colleague (use Kaltura or mobile device to record voicemail).
What is the value of doing this assignment? This assignment gives you an opportunity to practice active listening and oral communication in a workplace setting, all of which continues to hone your communication skill. You will demonstrate the use of appropriate tone and language, and practice conveying openness and approachability in your response to a co-worker. Whether at work or at home, it is critical to tailor approachability and language depending on the audience and purpose.
Communication is a universal skill and one you will continue to refine as you progress throughout your professional and academic careers. This assignment asks you to use what you’ve learned in the first three weeks of the course about active listening, audience analysis, and responding in the workplace. Worried about where to start? The good news is that you’ve already established your foundation with these practices by reading through Chapters 1, 3, and 6 in The Art of Public Speaking. This assignment will use what you learned in those chapters to help you record and compose your response.
Your goal for this assignment is to: Practice your communication skill. You will do this by applying active listening and oral communication strategies to appropriately reply to a voicemail message from your co-worker.
What you need to complete this assignment: To complete this assignment, you will need the following resources:
Assignment Overview Video.
Voicemail from your co-worker.
Kaltura or mobile device.
Chapter 3 in the textbook.
Scenario: Your organization recently shifted to remote work. Since that time, you have heard complaints from a few co-workers concerning the lack of collaboration tools and difficulty effectively collaborating in a remote environment. Your co-worker recently left you a voicemail expressing extreme frustration with the lack of collaboration tools and has asked if there is something that can be done to help the organization select and implement a collaboration tool.
To address the problem of lack of collaboration software, as a team leader you will reply to your co-worker to acknowledge their concerns and let them know you are planning to establish a task force to research effective collaboration tools and suggest replacement technology.
This job aid will help with this assignment submission [PDF].
Steps to complete: In Week 3, complete and submit your assignment in BlackBoard using the following steps:
STEP 1: Listen to the voicemail from your co-worker
STEP 2: Record a 1–2 minute audio message (using your original voice) to your coworker in which you:
Acknowledge your co-worker’s concerns by summarizing their message and asking any clarifying questions.
Outline your plans to help resolve the issue by establishing a task force to research effective collaboration tools.
Reiterate your understanding and empathy for your coworker’s concerns and that you will be available for further discussion as needed.
STEP 3: Submit your audio file to Blackboard in Week 3.
NOTE: You can also use your mobile device and upload your recording to Blackboard. However, recording through Kaltura using these instructions [PDF] and walkthrough video is the recommended option.
Watch the Week 3 Assignment Overview video below to help you with this assignment:

Place this order or similar order and get exceptional paper written by our team of experts at an affordable price