The following research paper is required for this class and is due:June 10 th at 11:59PM.If you submit it by June 3 rd you will earn 10 bonus points. Papers should be created with Microsoft Word in...

1 answer below »
The following research paper is required for this class and is due:June 10th
at 11:59PM.If you submit it by June 3rd
you will earn 10 bonus points.
Papers should be created with Microsoft Word in the APA style and have a title page, short abstract, body, and conclusion. The “body” should contain between 1000 and 2000 words and include a Works Cited page, headers and other appropriate APA elements.See the document in the resource tab named “APA Guide.” The APA style has specific criteria including: font, spacing, margins, etc.Be sure and follow these criteria in your paper.
Include in your paper at least two “good” sources not counting the course text and make sure that you have solid content, and have not padded the writing with unnecessary wordiness to reach the word count.Use photos or diagrams if appropriate. Make sure you cite the source of any artwork you use in the APA style.
Choose one of these paper topics.
A) A friend who has physical movement disabilities wants to get started using a computer. She has some movement in her arms and hands, but limited dexterity with fingers. Recommend several possible input devices to her that will make it easier for her to use the computer, and provide information on brands and models, pricing, where to buy them, and how to set them up. The audience is the person with the disability.
B) A startup company needs to purchase computers for their employees. The top priority is that the administration, maintenance, and upkeep on them be extremely simple, because there will be very limited IT support available in-house. Develop a proposal that recommends hardware and operating systems for 100 users (50 desktops and 50 notebooks). Assume that the users will need to do standard business computing only (Web, e-mail, Office applications). Compare at least three brands and specific models for both desktops and notebooks, with costs for each, and make a final recommendation of what you think is the best choice, with an analysis that justifies your decision. The audience is the company's operations director.
C) A company needs to implement security that will prevent computers from being removed from the offices in which they are placed, and that will prevent anyone except authorized users from accessing them. Research and recommend a both cost-effective physical security system and a cost-effective, easy-to-use biometric identification system. The audience is the company's operations director.
Papers will be judged on:

  • Practical value of the work for the intended audience. In other words, would it be genuinely helpful to the person in the scenario? (40%)

  • Accuracy and completeness of the information presented (40%)

  • Adherence to length, formatting, and citation guidelines (10%)

  • Grammar and spelling (10%)


Submit papers as attachments here in the Assignment.
This assignment is worth a maximum of 100 points.
This assignment is verified by TurnItIn, an anti-plagiarism service. Your paper will be run through an automated system that identifies areas of plagiarism against web databases. Any papers found to be plagiarized from online sources without sufficient research documentation will receive a failing grade.

Submission
Answered Same DayDec 21, 2021

Answer To: The following research paper is required for this class and is due:June 10 th at 11:59PM.If you...

David answered on Dec 21 2021
134 Votes
Abstract
Title of assignment
Name of student
Abstract
The main purpose of this document is to recommend cost effective physical security
system and a cost effective, easy-to-use biometric identification system wh
ich will
prevent anyone except authorized users from accessing them.
There are various reasons to implement cost effective physical security system as listed
below:
1. Due to threat such as virus in the system, that user can not login into windows or
operating system. Also file gets corrupted. A security policy to mitigate that threat is
install antivirus software and scans system and do not download infected file.
2. Other Threat is gaining unauthorized access to files by hackers or any employee of
company. The hacker may access the integrity of the system by gaining knowledge of the
concepts and then he may try to submit the changed files and then by doing all this he can
commit the fraud or theft which can destroy the information or infect the organizations
system.
3. Equipment such as web server also subject to threats. The vulnerability associated
with this is that there are no mark ups available and will need an external toll for such
manipulations. A security policy to mitigate that threat is install antivirus software.
Biometric identification system
Biometric identification system is an automated technique for recognizing the users
which are depend upon either behavioral or physiological features of person. This
technique is based on various physical features of user such as voice recognizing,
fingerprints, eye recognizing, different facial pattern etc. The various features of
physiological biometric identification system consist of shape of body, weight, height,
eye shape, the pattern of face, the skin or thumbs shape or fingerprints. The various
features of behavioral biometric identification system consist of voice recognizing, user
Also has the keystroke sequence and also includes the signature and gait.
[PBworks]
Cost effective and easy to use Biometric identification system
The Biometric identification system depends upon application to application. In order to
find true BIS, user must know their requirements. The cost of BIS depend upon ...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here