Writing Question

EVERYTHING SHOULD BE 100 PERCENT HUMAN WRITTEN PLEASE UPLOAD THE AI REPORT AND PLAGIARISM REPORT

PART 1

Create a narrated slideshow, recorded video, or voiceover screen presentation that is 4 to 6 minutes long.

The first step in an IT career is often understanding the device right in front of youyour personal computer. Capella University has minimum computer requirements. Does your computer stack up?

A family-run bike shop is making a big move. They are transitioning from paper records to digital systems and are planning to expand to multiple locations. You have been brought in as an IT consultant to guide their transition. Your task is to evaluate operating systems, recommend software solutions, and support your decisions with solid reasoning and research.

Instead of writing a report, you will create a professional multimedia presentation to present your findings and recommendations. This assignment encourages you to use Generative AI to help with research, ideation, and organization of your content, while also emphasizing your own analysis and decision-making.

Create a narrated slideshow, recorded video, or voiceover screen presentation (4 to 6 minutes) that includes the following sections:

Slide 1: Introduction

  • Briefly introduce yourself and your role in helping the bike shop transition to digital tools.
  • Summarize the goal of the presentation.

Slide 2: Operating System Comparison

  • Compare Windows and Mac operating systems.
  • Highlight strengths and weaknesses of each from a small business perspective.
  • Include factors like cost, compatibility, ease of use, and long-term support.
  • Use Generative AI to help generate comparison points, but clearly explain your own conclusions.

Example AI prompt:
“Compare Windows and Mac operating systems for small business use in areas like productivity, support, and cost.”

Slide 3: Recommended Operating System

  • State which system you would recommend for the bike shop and why.
  • Provide a clear rationale supported by what you’ve learned.

Slide 4: Productivity Software Solutions

  • Recommend specific tools the bike shop should use for word processing, spreadsheets, expense tracking, and marketing design.
  • Use AI to brainstorm options and summarize their pros and cons.
  • Tailor your recommendations to the needs of a small, growing business.

Example AI prompt:
Suggest a suite of productivity tools for a small business that needs to manage documents, bookkeeping, and marketing.

Slide 5: Supporting Research and Best Practices

  • Use AI-assisted research to support your recommendations.
  • Reference insights from reliable sources such as business tech guides, software review sites, or industry summaries.
  • You may use a summarized quote or chart to back up your points.

Example AI prompt:
Summarize best practices for selecting software and systems for small business growth.

Slide 6: AI Reflection

  • Briefly explain how Generative AI helped you with the research or idea development.
  • Include examples of prompts you used and how you applied the information.
  • Reflect on how AI supported your thinking without replacing it.

Slide 7: Conclusion and Final Recommendations

  • Recap your overall recommendation for the bike shop.
  • Restate the value of the systems and tools you have selected.
  • End with a clear, professional closing message.

Grading Criteria

  • Effective comparison of Mac and Windows systems for small business use.
  • Appropriate software for daily business functions.
  • Use of evidence and research to support recommendations.
  • Clear explanation of how AI was used during the process.
  • Presentation that is well-structured, engaging, and professionally delivered.
  • Narration is clear and content is free of grammatical or technical errors.

Generative AI can help you ask better questions, organize information, and uncover new ideas but your voice and reasoning should guide the story. This presentation is your opportunity to showcase not just what tools are available, but why they matter for real-world business success.

Important: Remember to conduct quality checks on the information and resources you gather using GenAI to ensure that the information is accurate and resources are reliable.

Your assessment should also meet the following requirements:

  • Written communication: Write with few spelling, grammatical, or mechanical errors.
  • Length of paper: 4 to 6 minute presentation.
  • Sources: Cite at least two sources. See the for APA resources specific to your degree level.

PART 2

With a proliferation of bad actors in cyberspace and the explosion of personal and corporate shared data, the need to protect computer networks has never been more important.

You’ve been brought in as a cybersecurity analyst to assess the wireless infrastructure of a growing company. Your task is to identify a realistic wireless network threat, explain how it might compromise specific areas of the network, and recommend both policies and technical defenses to protect against it.

This is a hands-on, professional-style project. Your analysis will be submitted as a briefing document along with a custom network diagram that shows how the threat might unfold in the provided network layout.

Generative AI may be used throughout your research and planning. You are encouraged to use it to generate threat descriptions, brainstorm defenses, or summarize policy recommendations. Be sure to verify any information you receive and build on it with your own thinking.

Project Components

Your submission will include:

  1. A written briefing (about two to three pages).
  2. A custom network diagram that visually represents how the selected threat might breach the network.

Each section below includes sample prompts to guide your use of Generative AI.

1. Threat Identification and Description

Choose a wireless network threat such as rogue access points, wireless denial-of-service, packet sniffing, or man-in-the-middle attacks.
Describe how the threat works, how it is typically delivered, and what systems or data it targets.

Sample prompt:
“Describe how a wireless man-in-the-middle attack works and what it usually targets in an enterprise environment.”

2. Vulnerability Analysis

Review the provided . Describe specific points in the network that are vulnerable to the selected threat.
Focus on physical locations (such as routers or public access areas), authentication gaps, or outdated protocols.

Sample prompt:
“What are common vulnerability points in small business wireless networks for rogue access point attacks?”

3. Custom Network Diagram Required

Create a version of the provided network diagram that visually demonstrates how your selected threat could compromise the network.
Use arrows, icons, or labels to show the threat’s entry points and its potential impact. You may use tools like Microsoft Visio, Lucidchart, Canva, PowerPoint, or Google Drawings.
Include this diagram as part of your final submission (paste it into your document or submit as a separate image/PDF).

Sample prompt:
“Describe how I can visually represent a packet sniffing attack in a small business Wi-Fi network.”

4. Defense Strategy

Recommend a primary technical defense that could help prevent or mitigate the threat.
Explain how it works and why it would be appropriate for this network setup.

Sample prompt:
“What security features in wireless routers help prevent man-in-the-middle attacks?”

5. Policy Recommendation

Find and summarize a security policy or standard that addresses the selected threat.
Explain how this policy would be applied to the network scenario. Include a citation to a valid source (NIST, SANS, company policy guide, etc.).

Sample prompt:
“Summarize a formal security policy that protects against rogue wireless devices.”

6. Supporting Practices

Suggest two additional practices that reinforce your policy recommendation. These may include employee training, regular audits, secure guest access, or password rotation schedules.

Sample prompt:
Give examples of practices that help enforce wireless network security policies in small businesses.

7. Reflection on AI Use

Write a short paragraph explaining how Generative AI supported your project. Mention prompts you used, how you adapted the content, and how it helped guide your thinking.

Sample prompt:
Help me reflect on how AI supported my cybersecurity research project.

Important: Remember to conduct quality checks on the information and resources you gather using GenAI to ensure that the information is accurate and resources are reliable.

  • Written communication: Write with few spelling, grammatical, or mechanical errors.
  • Length: 23-page professional briefing document with section headings.
  • Visuals: A clearly labeled diagram that shows how the selected threat could breach the network
  • Sources: Proper citations for all sources and references

PART 3

Prepare a 23 page report for a bike shop owner, explaining the options for data storage, database development, and data security and recommending an overall solution for the organization.

With the explosion of data, there is a need to keep it safe, organized, and useful. Databases are a key solution to this: They not only store data but allow queries to find connections and correlations, which in turn are helpful to organizations to better serve their customers.

The family-owned bike shop is growing fast, and they need your help designing a structured way to store, organize, and retrieve data. You will use Generative AI to simulate how SQL works and build a deeper understanding of relational databases, data security, and storage options.

Instead of running code in a database environment, you will enter SQL-related prompts into a Generative AI tool and analyze the output. You will also complete a short written report recommending a database solution for the bike shop.

Part 1: SQL Simulation Activity (Required)

Use a Generative AI tool to simulate the following MySQL commands. Enter each as a prompt, analyze the response, and take one or two screenshots of the outputs to show completion.

You can enter each prompt one at a time or adapt them as needed.

Required AI prompts:

  1. “Create a MySQL command to create a table named contacts with name, work phone, mobile phone, email, and relation_id fields.”
  2. “Create a table named relation_types with fields for relation_id and relationship. Use char or text appropriately.”
  3. “Write a MySQL insert statement that adds at least three records into the relation_types table.”
  4. “Write a MySQL insert statement that adds five contact records to the contacts table, including phone numbers and email addresses.”
  5. “Write a SELECT query that shows name and email from the contacts table.”
  6. “Write a SELECT query that lists name and email ordered alphabetically by name.”
  7. (Optional challenge prompt): “Write a JOIN statement that shows contact names and their corresponding relationship type from the relation_types table.”

After completing the activity, screenshot one or two full outputs and submit them with your written report.

Part 2: Recommendation Report for the Bike Shop

Prepare a short report (two to three pages) that explains your recommendation for a data storage solution. This report should demonstrate your understanding of database design, SQL structure, and secure practices. Include the following sections:

1. Storage Options

Explain the difference between in-house data storage and cloud-based storage.
Describe the pros and cons of each for a growing small business.

Sample AI prompt:
“Compare in-house and cloud data storage for a small business.”

2. Databases vs. Spreadsheets

Explain how relational databases differ from spreadsheets.
Include a definition of what makes a database “relational” and how it benefits business operations.

Sample AI prompt:
“Explain the differences between spreadsheets and relational databases, especially for managing inventory and expenses.”

3. Recommended Solution

Recommend a database solution for the bike shop based on your SQL experience.
Explain why a relational database is more appropriate for tracking contacts, relationships, inventory, pricing, payroll, and other operations compared to spreadsheets.

4. Database Security and Backup

Describe best practices for securing a small business database and ensuring data is regularly backed up.

Sample AI prompt:
“List best practices for securing a small business database and creating a backup strategy.”

5. AI Reflection (Short Paragraph)

Write a short paragraph explaining how you used Generative AI in this assignment.
Mention some of the prompts you used, how helpful the tool was, and how you ensured the accuracy of the information.

Important: Remember to conduct quality checks on the information and resources you gather using GenAI to ensure that the information is accurate and resources are reliable.

Prompt:
Create a MySQL command to create a table named contacts with name, work phone, mobile phone, email, and relation_id fields.

Sample Output from Generative AI:

CREATE TABLE contacts (

name TEXT,

phone_work CHAR(10),

phone_mobile CHAR(10),

email TEXT,

relation_id INT

);

Explanation:
This SQL command creates a table called contacts with the following columns:

  • name stores the full name as a text field.
  • phone_work and phone_mobile use CHAR(10) to store 10-digit phone numbers.
  • email stores email addresses as text.
  • relation_id is an integer used as a reference to another table (typically a foreign key).

Review the activity.

Your assessment should also meet the following requirements:

  • Visuals: One to two screenshots showing your SQL simulation using Generative AI.
  • Written Communication: Write with few spelling, grammatical, or mechanical errors. See the for more help.
  • Length: A written report (about two to three pages) covering all five sections.
  • Format: Clear organization, professional tone, and appropriate citations for any external content and your own voice and reasoning in all recommendation sections.

WRITE MY PAPER

Comments

Leave a Reply