Computers
Cloud computing.
1-Case Project 7-5: Would your school or place of work benefit from cloud computing? Identify at least two cloud computing vendors and research their features and costs. Then look at one element of your school or work
Information security policy.
Q1. Discuss the purpose of an Information Security Policy and how it fits into an effective information security architecture. Your discussion should include the different levels of policies and what should be covered in an information security policy.
Computer forensic tools.
Read the presentation and do the 2 exercises at the end of the presentation. write what you found most surprising about your findings.
Communication and technology artifacts
In this assignment you will be demonstrating your understanding of how infrastructure effects access to and use of technology and summarizing the idea of affordances, complete with examples of how affordances impact technological choice and usage.
Wireless Network Encryption
Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it.