DISC 2

profilelewcan13

cryptographic algorithms DISC 2

Analyze the role cryptographic algorithms play; you will go into depth on this topic in your first milestone assignment. Next, explain how these algorithms could be utilized in a way that would strengthen an organization’s existing plan. Finally, in responding to your peers’ posts, assess your peers’ recommendations and discuss whether additional modifications are needed.

 

PLEASE READ THIS.IT IS VERY IMPORTANT

Allow your discussion posts to be detailed and capable of sharing knowledge, ideas and points.  You must discuss the topic using your own words first.  Using your own words indicate you understand the topic of discussions.  Secondly, you must cite your sources in-text.  This is necessary to justify your points. Sources from several sources showed good research abilities.  Lastly, you must provide references at the bottom of your post.  A discussion post without justification with sources does not show proper research abilities. A terse and not detailed discussions represent post that would not provide enough sharing of knowledge or proper understanding of the topic. DO NOT just copy and paste a sentence from online with citation at the end as your own discussion. I have not asked for definitions, I asked for discussions and will not buy this.  You must show understanding of the discussion topic by using your own words to describe the topic and then justify that with sources.

 

 

use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA citation method (citation should be relevant and current). Page-length requirements:1–2pages (graduate courses). Make sure you cite if you take a piece of someone’s work, very important and your reference should relate to your writing (don’t cite a reference because it relates to the course and not this very paper) at least 4 current and relevant academic references. No heavy paraphrasing of others work.

 

please communicate for any clarifications and please read instructions and follow them. Some tutors don't pay attention to instructions at all. Very important

 

 

I am not doing try and error here so please do not send a hand shake if you have no ideas or experience with research.

    • 7 years ago
    • 20
    Answer(1)

    Purchase the answer to view it

    blurred-text
    • attachment
      cryptographic_algorithms.docx