Technical Writing

Total Assignments: 1047

Researching at least three methods by which you can monitor threats to a computer network.

For topical assignment #4, you are researching at least three methods by which you can monitor threats to a computer network. Describe and provide background informationon each method. Your paper should be 1,000 words and should include APA formatting, see the example I posted in the home area. Upload your assignment here i...

Visual media can have a significant impact on how effectively a message is communicated.

Visual media can have a significant impact on how effectively a message is communicated. Appropriate and strategic visuals can inspire the audience, lend clarity to a message, and, in general, say things that words alone cannot. Throughout this course, you decided on a message to communicate, determined the most effective platform or medium for that message, and selected the most appropriate visuals to support the message. Fo...

This project you will research and evaluate mobile forensics- related software and write a proposal for review by the chief information officer (CIO) of a company.

In this project, you will research and evaluate mobile forensics- related software and write a proposal for review by the chief information officer (CIO) of a company. In completing this project, you'll gain practical knowledge of the mobile forensic evaluation process as well as of the processes involved in writing a persuasive proposal. This project will help you to identify and understand standards and practices in mobile forensics, as well as the in...

Assignment is based in Jasanoff’s “Technologies of Humility: Citizen Participation in Governing Science,” one of our readings for this week.

This week’s Critical Thinking assignment is based in Jasanoff’s “Technologies of Humility: Citizen Participation in Governing Science,” one of our readings for this week. Begin your paper by briefly differentiating between Jasanoff’s “technologies of hubris” and “technologies of humility.” Then choose a technological development that has some effect on your personal life or your community (e.g. GMOs, transportation, the Internet, resource mining, communication, artificial int...

Analytic Report on a Technical or Scientific TopicChecklist Adhere to the Format and Length requirements.

Unit 7: P6 - Analytical ReportWriting Assignment #6: Core Assessment - Analytic Report on a Technical or Scientific TopicChecklistAdhere to the Format and Length requirements.Use the report format in Chapter 23 ...

the attached strategic audit report on Samsung See attached guidelines.

Complete the attached strategic audit report on Samsung.  See attached guidelines.  The following sections below needs to be completed:Executive Summary (1 page)History of Samsung (1 page)Im...

The final project for this course is the creation of a risk assessment and mitigation strategy for a fictional airport that includes

The final project for this course is the creation of a risk assessment and mitigation strategy for a fictional airport that includes four distinct organizations. Based on a provided scenario, you will develop a report for the management team that includes personnel recommendations for IT team members, a comprehensive assessment of IT security risks, and suggested strategies and approaches for minimizing the identified risks.  I am needing help with the second Milestone asap...

The state of your technology with respect to both organizational capabilities and of evaluation of the innovation or technology.

The subject is "Google Car".Goal: Review of the state of your technology with respect to both organizational capabilities (to the extent that you can) and of evaluation of the innovation or technology. Please add this content to the growing body of your homework assignments...

Describe the features of a secure password

Please answer the question located in the word documentWhat is a password cracker? How does a password cracker work?Describe the features of a secure password?Download Attachment: ISSC459_Week3_Assignment_LastName_FirstName.doc...

This project, you will learn how to extend and implement the rudimentary methods of aSimpleLinkedBag and a SimpleArrayBag.

In this project you will learn how to extend and implement the rudimentary methods of aSimpleLinkedBag and a SimpleArrayBag. Both of these classes will implement theSimpleBagInterface<T>. You will then use these methods to create a very familiar game, where you have a Window with Shapes which disappear when clicked. These Shapes will either be the CircleShape or SquareShape classes. These Shape instances will be stored in yo...

Proposal writing for technical communication.

I need a Proposal writing for my technical communication class, I have attached 3 documents named:- Proposal_Assignment ( Assignment was given from teacher and topic, I have to do the topic 1 )- Phased_Proposal: it looks like example of the proposal that you have to do with different topi...

Analyze five Google technologies that are currently under research and development

In your final case study, you will analyze five Google technologies that are currently under research and development, including the self-driving automobile and four other technologies of your choice.  The last chapter of your textbook discusses the search and advertising technologies of Google.  While Google is best known for their search and advertising technologies, they also have a multi-billion dollar research and development department that works on cutting-ed...

Taker's Appliances and Electronics, LLC owned and operated by Tommy Take.

You have a client named Taker's Appliances and Electronics, LLC, owned and operated by Tommy Take. Taker's is located in a rural area of Southwest Virginia, and the majority of its customers are poorer residents of the Appalachian regions of Virginia, Tennessee, Kentucky, and West Virginia. Since his business is located in a rural area where there is little competition, Tommy tends to charge about 10–20% more than most other retail outlets....

If requested by your instructor please include an assignment cover sheet.

Follow these procedures: If requested by your instructor, please include an assignment cover sheet. This will become the first page of your assignment. In addition, your assignment header should include your last name, first initial, course code, dash, and assignment number. This should be left justified, with the page number right justified. For example:...

The article Difficult Conversations, which defines a difficult conversation explores how to take emotions

Review the article Difficult Conversations, which defines a difficult conversation, explores how to take emotions out of the discussion, and provides eight skills needed to maintain professional relationships during conflict.Engaging in painless conversations can be difficult but can also lead to successful outcomes. In working toward a successful outcome, appropriate preparation and the removal of any threat stimulus tha...

A program that allows a user to select a number base

For this assignment you will create a program that allows a user to select a number base (in the range of 2 to 16, inclusive), enter digits for the number base, validate each digit as it is entered, and display the resulting value in base 2, 8, 10 and 16. Use MASM and IRVINE32 link library....

A little electronic magic at Alibaba.com pp. 560-562 Three topics have been created

Topic 2: Technology’s Impact on Importing/ExportingRead DRS,  “A little electronic magic at Alibaba.com,” pp. 560-562. Three topics have been created. Based on the required readings, the simulation, ...

Acunetix WVS checks web applications for SQL injections cross-site scripting etc.

"Acunetix Web Vulnerability ScannerAcunetix WVS checks web applications for SQL injections, cross-site scripting, etc.It includes advanced penetration testing tools to ease manual security audit processes, and also creates professional security audit and regulatory compliance reports...

Computing has a tremendous impact on photojournalism as traditional wet darkrooms have all but disappeared

Computing has a tremendous impact on photojournalism as traditional “wet” darkrooms have all but disappeared, and remarkably dynamic digital imaging software has become commonplace in the newsroom....

Google: The quest to Balance Privacy with Profits

Google: The quest to Balance Privacy with ProfitsHow can Google use its power to improve the lives of its stakeholders?Do you feel that there is any way that Google can respect privacy and yet still maintain its profitability?...