Category: IT


  • Data Analysis

    Go to county health rankings website and explore the health outcomes and health factors data for the county where you reside. ( MY ZIP CODE 33177) Analyze the available data, compare county data to state and national benchmarks, identify potential reasons for disparity or similarities between two health outcomes. Part 2: Health Care Initiative You…

  • This week we are looking at the ethical use of big data. Look at 3 privacy statements for any companies you choose in a similar industry (retail, banking, automotive, etc) and discuss the similarities and difference between the 3 statements ( post copies of the statements as a Word document for others to see). How…

  • Review the video on CPAs helping to fight cyberattacks and using the library or other authoritative sources, discuss why and how you think CPAs can assist clients with cybersecurity. Provide specific related examples in your discussion. Be sure to mention which of the items in the video you think CPAs can assist with the most.…

  • This week we are looking more specifically at how big data is used in accounting. Using the library or other authoritative sources, select one accounting related agency like the IRS, SEC, FASB, ACFE, etc. and research and discuss how the agency you selected is using big data and data analytics in practice. Be sure to…

  • ICT3051 Enterprise Networking Week-10 Laboratory Practicum 1 SDN Controller Configuration and Network Monitoring Task In this lab, you will have the opportunity to configure an SDN controller and monitor network traffic using OpenDaylight (ODL) controller and Wireshark. The workshop will consist of two parts: controller configuration and network monitoring. Objectives Understand the role and function…

  • In the Session Long Project in Trident University classes, you apply the practical side of the module topic using your experience as a user, manager, or technology professional. This enables personal application where you can demonstrate knowledge of the course material. Continuing your work as an Information Assurance Consultant, review tools to perform a quarterly…

  • You worked as YODAE’s lead solution architect for a few years. Now, you have taken on a different role as the company’s first information security officer (ISO). Both your role and the number of cloud services and products YODAE offers have changed to meet increased market demands. YODAE now offers IoT devices for K–12 teachers,…

  • Assignment Overview Information Assurance audit plans involve planning and a structured approach. The Information Assurance audit plan will identify the most meaningful areas, events, and activities within an organization, critical to firm performance, to be audited. Case Assignment For this Case Assignment, read the articles listed as required in the Background page about the auditing…

  • 1. From the NIPP of 2013, what is meant by “Partnership Structure?” Give an example. 2. Choose one of the 16 Critical Infrastructure Sectors and comment on its Sector Specific Plan. What other sectors is it closely linked to? Why? How? 1. Chemical 2. Commercial Facilities 3. Communications 4. Critical Manufacturing 5. Dams 6. Defense…

  • Research a scholarly paper on “System Implementation and Maintenance” and reflect on only one (1) of the following topics: · “Issues”: What is the common issue during System Implementation? · “Types”: What types of System Maintenance are used in industry? · “Importance”: How important is System Maintenance? · “BPR”: How does System Maintenance correspond with…