R paper

Coming soon……

empowering leadership and effective collaboration


This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

  1. How do geographically dispersed teams collaborate effectively?
  2. Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team.  Please note the pros and cons of each tool. 
  3. Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Creating website using infinity free(I will provide the username and password)

Create web pages for your database using PHP. You should have one page that will return all the information from the database. You should create additional pages that will allow you to do various queries of your database. You should be able to retrieve and insert data; also include functionality to delete data from your database. I will be looking for these features. Feel free to handle those functions however you feel is best for your project. 

Create an html form that will allow you to enter in new information for the database. The information should be handled by a PHP script that will take the data and input it into the database. 

The interface doesn’t have to look real pretty at this point. That will be done in the next phase. If you want to go ahead and make things look nice, feel free to do so.

If you have not yet created a home page, create a separate home page that contains links to each of the web pages you create to access your database.  Your database (must have a minimum of two tables) is not to be displayed on the home page; be creative on this page.   On each of the database pages create a button (link) to go back to the home page. Your project must have more than one page; your home page should have links to other pages to perform operations on the database.  Some appropriate picture or image should be on the home page that relates to you project.  Make your project look as professional as possible.  You may want to show it during a interview.

Create a text file in which to store hyperlinks to your home page and PHP scripts.  Turn in this file to the appropriate submission box.

Week 10 Discussion – Cyber Law

Discussion on Social media:

Social media platforms such as Facebook, Twitter, and even Tiktok have become very powerful and influential.

Please give your thoughts on whether governments should regulate the content of content on these media. Minimum 450 words. Please add references in APA format.

week -13 cpm

Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment. 

Week 7 Assignment


The scenario:

The Prime National Properties Group is considering selling some of its educational facilities. The facilities have been tracked in an Access database. Shelly Williams, the President of the company, has asked you to prepare a report. Import the Access data in the file Facilities_Data as a table into Excel. Using the PMT function, calculate the monthly payments the company could expect. The company would charge an 8% rate over 10 years. The result should be a positive number. Mr. Williams also asked you to calculate an extra processing fee for monthly loan payments using the IF function. If a monthly loan payment is less than $6000, the company would charge a processing fee of $150; otherwise, there would be no processing fee. Filter the rows to display only those facilities where there is a $0 processing fee. Hide all of the address fields and the processing fee column. Save the Excel file as Lastname_Firstname_Educational_Facilities

For this assignment, you will need the following files:

New blank Excel workbook



You will save your files as:



  1. Open the Word document Educational_Report, and then save the file as Lastname_Firstname_Educational_Report
  2. Add a cover page of your choice, and then complete the content controls on the cover page.
  3. In the report, format headings as Level 1 or Level 2, and then insert a table of contents on a new page.
  4. In the worksheet, hide all of the address fields and the processing fee column
  5. paste the Excel data into the Word document.
  6. Add an appropriate heading formatted as Level 1, and then update the table of contents.
  7. In each file, insert the your name as a field in the footer

Upload the completed assignment files in the Assignment area. 

itec 6610 How your team plans to perform the risk assessment Assignment:


How your team plans to perform the risk assessment


Successful information assurance programs apply industry standards and best practices to identify security risk and then form dynamic, crossfunctional teams, when required, to develop a plan to address these gaps in a way that is sensitive to the needs of key stakeholders.

To prepare for the Project in this Week, assume that the fictitious organization is large and growing rapidly, with both internal and external IT risks involving employees, customers, business partners, suppliers, and contractors. Clearly state any other assumptions you make.

You have been asked to assess risks associated with access and authorization in your organization. Develop a brief scenario that depicts a threat related to access and authorization. Below are two example use cases for a single scenario to guide you. You will need to develop your own scenario as well as your own use cases.

Use Case 1: Employee Provisioning-There needs to be an enterprise process for employee account provisioning. This should include setting up employees with the correct access rights, based on their role. When employees change roles, their access should be appropriately changed. Today, employees are given access to resources using Active Directory groups. When they go to a new job, the old access rights often are not removed like they should be, and this is a security concern.

Use Case 2: Separation of Duties-Administrators need a high level of access for their jobs. Today, their credentials allow them to administer servers and create accounts locally on the servers and in Active Directory. They can also edit log files and delete accounts and groups in Active Directory. This is a security concern, and roles should be set up so server administrators can do their job but not the job of an Active Directory administrator. The role that is allowed to create accounts should not be able to create new roles, and managers should approve new accounts. Keeping an administrator’s access in line with his or her role is a best practice, and it may be required by regulations such as Sarbanes-Oxley.

Please develop at least two others and explain them.

Write a 5- to 7-page paper about the risk assessment process that you plan to perform. Cover the following points:

• Your introduction should include the following background information:
• The country where the headquarters is located
• The nature of the organization’s operations
• The general organizational structure
• The country/ies in which the organization operates
• In describing the scenario and the two use cases you created, you should include the following regarding risk assessment planning:
• How your team plans to perform the risk assessment and identify the gap
• What other teams would be involved in a successful risk assessment
• How poor access and authorization management affects security risk and business processes
• Who the stakeholders are and the most important activities they may perform that involve accessing data and resources

Assignment,Due Date 20th June

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study 

My course details:  Descriptive Statistics ,  Paired and Independent samples t-tests .

  1. describe the essential characteristics of quantitative research.
  2. Apply inferential statistical tests on problems requiring parametric and non-parametric analyses.
  3. Identify potential research designs for various problems.
  4. Analyze statistical information in the professional literature on a topic related to their own research project. 

 Note: Minimum 500 words not including title and reference page. References should be taken from peer revived 

 Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 
Share a personal connection that identifies specific knowledge and theories from this course. 
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.  
You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace 

histogram using MATLAB

 How to save one Histogram of Multiple dicom images using matlab 

 and then plot the best fit line  

2 Discussions and 1 case Study

Discussion 7.1

What are the 5 pillars of Cyberwarfare?

Discussion 7.2

Describe the 5 stages of APT 

100-130 Words only for discussions 

Case Study 7.1

Describe 3 theories/ideas that you think characterize the future of Cyberwarfare, and explain their significance.

Writing Requirements

  • 3-4 pages in length  (excluding cover page, abstract, and reference list).

Refrences should not be older than 2015

Refrences should not be older than 2015

Refrences should not be older than 2015

Refrences should not be older than 2015