demonstrate how the concept of blockchain technology can be useful for protecting electronic medical records.

Current Trends in Computer Science & IT are forever changing. Even for IT professionals, the task of keeping up with trends in technology can seem daunting. There are certain areas of technology that become more sought after than others but as IT professionals you must have a little understanding of all areas. For example: Database Management, Application Design and AI just to name a few. For this assignment, you will write two essays based on the following prompts, which focus on current topics in Computer Science & IT.

Prompt

Write a 1,500-2,000 word essay demonstrating how the concept of blockchain technology can be useful for protecting electronic medical records.

Explain how you would assess the operating system requirements for virtualization if the organization wanted to virtualize 25% of physical stand-alone servers.

In this scenario, you are a security engineer for a company where 50% of the servers are virtualized, 25% are physical servers acting as hypervisors, and 25% of the servers are stand-alone physical machines. Write one paragraph showing in-depth technical detail for each of the following:

-Explain how you would assess the operating system requirements for virtualization if the organization wanted to virtualize 25% of physical stand-alone servers.
-Describe how you would implement controls to secure guest-to-host interaction between the virtualized operating systems and their hypervisors.
-Choose a project operating system you would use to manage the analysis, planning, and implementation of the virtualization project.

In the last 2 paragraphs, talk about your opinion.

Show how McLuhan’s theory view of technology might apply to two similar or contrasting objects of design today that have stretched us to breaking point.

Part One:
Can we handle the scale, pattern, or pace of change in the various technological inventions and innovations that now confront us?
Are we unprepared and uneducated in what to do with these new technologies/extensions?
Is technology outpacing us?
Can we cope?
Have these technologies made us feel ‘out of place’?

Part Two:
Show how McLuhan’s theory view of technology might apply to two similar or contrasting objects of design today that have stretched us to breaking point.

Please find the attached documents for the background to the essay and assesment.

What kinds of theories of sexuality does the film present?

In this response paper, you should choose ONE film covered in the historical period we have discussed up until now (1890s-1960s) and analyze its sexual ideologies and theories in respects to one of the themes or discourses or contexts we have discussed in class. What kinds of theories of sexuality does the film present? You should take into account historical, industrial and technological as well as social contexts such as genre convention, mode of production/industrial status (industrial status, independent, exploitation, avant-garde), modes of reception, exhibition and circulation, mode of address, as well as its place in a larger socio-cultural framework. Make sure you have a coherent and clear research question and thesis argument from the outset of your essay. You may choose to write about a film that we have watched in full length in class, though you may want to deal with a film we have seen in excerpted form. Films mentioned in the course readings can also be possible sources for examination. Some discourses you may choose to focus on include (but are not limited to) the following: •Social classification and sexual marginality – sexual typology (engage with Gayle Rubin)•Sexual Liberation/ Sexual Revolution•Repression/Censorship (engage with Foucault’s argument)•Ontology and representation (engage with Bazin’s argument)•Relationship between Public and Private Spheres in constructing sexuality•Economies of Production vs. Economies of Consumption•Procreation and Reproduction vs. Individual Pleasure/Orgasm•Specific modes of production –choose a single film/object (stag films, early shorts,art cinema, avant-garde cinema)•Considerations of obscenity and legal contexts – historical contexts of obscenity inrespects to the sexual image•Personal and Political Definitions of Sex•What is the relationship between aesthetic form, narrativity and sexual content?•Sex and Time/Duration, Sex and Narrative Propulsion•The Hetero-Homo Continuum Please use appropriate bibliographic citation for secondary and primary texts you are paraphrasing or quoting. You are free to refer to the readings we have dealt with in class up to this point and may look ahead in the course packet for further suggestions. Plagiarism, using someone’s words and ideas as your own without proper citation, will be met with failure and may result in further disciplinary action.

Cite an example of unethical behavior as related to corporate or an individual’s behavior in the use of technology/data or unethical manipulation of such

1. Submit a 3-page analysis of an article that cites an example of unethical behavior as related to corporate or an individual’s behavior in the use of technology/data or unethical manipulation of such. Your analysis should include a summary of the article, your analysis of the ethical problem presented in the article, and how the topic relates to a biblical world view. The ethical problem should be clearly stated. Do not assume that your summary makes the ethical problem self-evident.
2. Article Selection: It is recommended that you choose a topic that is related to your major; however, the topic must incorporate technology. This should be a specific event, not an article such as “Five Ways Companies are Unethical with Data”. Such an article may be a good starting place but will not be sufficient for this assignment. The article will be current – from within the past 3 years. You can likely find an example from as recent as this week/month. As this may be a news article, be sure that you are using a valid source of news. You should find multiple sources reporting the same information to ensure that your assessment of the reporting is accurate. Feel free to cite from these additional sources as well as your main article.
3. Biblical Worldview: You will include at least two biblical references in your analysis.
4. Use APA format, including in-text citations and a reference page.

As computers become more integrated into our daily lives, how does the job of computer crime law enforcement units change?

Computers are becoming smaller, faster, and more powerful. They are also integrated into more devices, systems, and infrastructure. Currently it is possible to purchase a refrigerator with a built-in screen for World Wide Web access, and other home appliances are also available for incorporation into newly constructed or retrofitted “smart houses.”

What kind of security risks might these devices pose? As computers become more integrated into our daily lives, how does the job of computer crime law enforcement units change? Provide two specific examples.

Describe the most common vulnerabilities, risks, and issues that your plan will address.

For the Health Systems, Inc. hospital you also are responsible for creating a security and privacy plan. The purpose of your plan is to describe standards that help ensure the privacy and integrity of the many different facets of a network.

Include the following in your 5–6-page security and privacy plan:

Create an enterprise-wide network security plan for the above mentioned organization.
Describe the most common vulnerabilities, risks, and issues that your plan will address.
Include policies that protect the hardware and physical aspects of the network.
Identify hardware areas that need to be secured.
Describe steps that will be taken to ensure the security of the operating systems and network files.
Discuss measures that are necessary to protect the transfer of data for remote employees.
Apply the concepts from the unit’s assigned hands-on virtual labs.
Additional Requirements

What technology will be implemented to provide secure remote access for users?

Windows Network Proposal – Networking

You have been hired by Fixing Windows LLC as an Information Technology consultant to develop a technology proposal. Fixing Windows LLC manufactures and distributes solar panel for the consumer market. Your job is to submit a proposal that meets their criteria.

Current Implementation/Concerns:

  • The company will have 3 locations (New York, San Antonio, and Miami) but are planning to grow rapidly due to high demand in solar panels. Main staff will be at San Antonio and Miami offices.
  • Data security is priority since patent and trademarks are at stake.
  • New York sales personnel will need secure remote access to Miami office.
  • The WAN connectivity is in place and it is not an issue. There is ample bandwidth in place.
  • Feel free to make other assumptions but they need to be noted in the paper.

Topics to Cover:

Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.

Describe the technical and business reasons for each choice, citing other resources as appropriate. The Windows Server 2016 operating system should be used for all aspects of the solution.

The topics include: 

DNS and DHCP

  • How had DHCP installation and authorization been implemented?
  • DHCP scope design (e.g., lease times, number of scopes, address range)
  • Will a form of DHCP fault tolerance be implemented?
  • Will DHCP reservations be used for servers?
  • How can IPAM be utilized?
  • How will IPv6 be utilized?
  • How will DNS be implemented?
  • DNS Security
  • How will DNS be handled for the second and third site?
  • What namespace should Fixing Windows LLC implement?
  • What types of zones needed?

File Services, DISTRIBUTED FILE SYSTEM (DFS) AND BRANCHCACHE:

  • How will the shares be secured?
  • Will quotas be used? FSRM be configured?
  • Will DFS be implemented?

Remote Services and NETWORK POLICY SERVER (NPS):

  • What technology will be implemented to provide secure remote access for users?
  • Who should have remote access?

Discuss these other server 2016 Networking concepts:

  • HIGH PERFORMANCE NETWORK SOLUTIONS
  • SOFTWARE-DEFINED NETWORKING (SDN)

Submission Requirements:

There are specific requirements for the assignment: The final submission should contain at least 6 pages’ worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 10 pages’ worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 10 pages in length.) It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required; APA format for the title page is optional.

  • At least one diagram must be included (not counted towards the minimum length described above). You can have more.
  • The submission must cover all of the 6 major topics outlined above. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed.
  • The structure of the final submission is flexible. There is no specific format required, although it should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the 6 topics required, as well as a summary.
  • At least one non-textbook, non-LabSim, non-Wikipedia reference is required; preferably, this would be a “best practice” guide or similar content from Microsoft or an experienced provider of Microsoft solutions.
  • Be sure to properly quote or cite any sources used. APA format is required for in-text citations and the list of works cited at the end. It is expected that you are already familiar with UMGC’s “Policy on Academic Dishonesty and Plagiarism.” It is available in the Academic Policies section of the Syllabus; there are also links in the Webliography. In its simplest form, if you are using text from a source, you must cite and/or quote it. If plagiarism is found, then there will be a penalty to the grade.