Categories
Technology

The reading and examples are available in the reference list.

Write a value proposition for the alternative you selected. An explanation of how to write a value proposition is provided in the reading titled Value Proposition, which also gives two examples of value propositions. You can model your value proposition after the examples. The reading and examples are available in the reference list.
The due date for posting your completed Activity 9 in your Assignments Folder is the end date of Week 7.
Please post your final Activity 9 to this link.

Categories
Technology

How has the president addressed, or ignored, congress?

Write about Cyber security and the Office of the National Cyber Director and how it came to be. Write about past Cyber breaches and the actions of Congress and the President.
Instructions below:
Research Paper (12 pages)
The first five pages should present your thesis and set up your argument. Summarize your topic,
its background, and the problem your paper seeks to address.
In the second portion of the paper students must complete a case-study of a contemporary issue
using newspaper sources (for example, trade, federal workers pay, Syria, immigration, Dodd-
Frank alterations, Affordable Care Act implementation, budgets, omnibus spending, etc). This
portion of the paper should analyze contemporary presidential-congressional relations on that
specific issue. How has the President addressed, or ignored, Congress? In what ways has the
president challenged Congress’s authority? In what ways has Congress pushed back? What
political factors have affected the issue and relationship? Are members of Congress taking the
lead on this issue or is the President?
The topic and issue do not have to match perfectly. That said, they should relate to one another.
So for example, if you plan on writing about immigration, you should choose academic sources
analyzing U.S. immigration policy emphasizing the roles Congress and the president have
historically played.
The paper is required include a minimum of three academic sources (books or articles).

Categories
Technology

Describe each step.

1. Textbook Chapter 2 and 3 describe many pitfalls on the path to data fluency. Pick any two pitfalls from the book and apply your knowledge of SDLC on each scenario to suggest ways to improve data fluency in these scenarios. (40 points)
2. The employee education department of a large corporation has been centralized. As a consequence, the educators must travel among all locations of the branches. They use their smart phone to interact and share their schedules and data. What are the steps you would take to secure these transactions by applying your knowledge of the security triad? Describe each step. (30 points)
3. Usability is a term that denotes the ease with which people can use an interface to achieve a particular goal. Conduct Internet research and find out what usability test is? Then describe how you would evaluate the usability of a smart phone scheduling app for the above corporation. (30 points) Must include the link/URLs/sources of your search results.
4. Save your Word document as HW2_FL.docx where FL are your first and last name initials.
5. Submit your file.
Book: Data Fluency: Empowering Your Organization with Effective Data Communication

Categories
Technology

How will the dost’s harmonized national r&d agenda contribute to the attainment of the middle-class aspirations as stated in ambisyon natin 2040 and the targets of the philippine development plan 2017-2022?

1. What are the provisions of the 1987 Philippine Constitution to the S&T in our country?
2. How important are DOST and its attached institutes and related agencies to Philippine nation-building? Give examples
3. How will the DOST’s Harmonized National R&D Agenda contribute to the attainment of the middle-class aspirations as stated in AmBisyon Natin 2040 and the targets of the Philippine Development Plan 2017-2022? Give specific examples.
4. Name five (5) members in the Order of the National Scientist and specify their contributions to S&T in the country.
Comments from Customer
Discipline: Science, Technology and Society (STS)

Categories
Technology

(40 points)

1. Textbook Chapter 2 and 3 describe many pitfalls on the path to data fluency. Pick any two pitfalls from the book and apply your knowledge of SDLC on each scenario to suggest ways to improve data fluency in these scenarios. (40 points)
2. The employee education department of a large corporation has been centralized. As a consequence, the educators must travel among all locations of the branches. They use their smart phone to interact and share their schedules and data. What are the steps you would take to secure these transactions by applying your knowledge of the security triad? Describe each step. (30 points)
3. Usability is a term that denotes the ease with which people can use an interface to achieve a particular goal. Conduct Internet research and find out what usability test is? Then describe how you would evaluate the usability of a smart phone scheduling app for the above corporation. (30 points) Must include the link/URLs/sources of your search results.
4. Save your Word document as HW2_FL.docx where FL are your first and last name initials.
5. Submit your file.
Book: Data Fluency: Empowering Your Organization with Effective Data Communication

Categories
Technology

How we capture, define, analyze and design emotions in today’s interactive digital media in uae and elsewhere

Research question:
How we capture, define, analyze and design emotions in today’s interactive digital media in UAE and elsewhere
– 10/pgs 5000 words
– Cover pg, references, appendix
– Structure: title, introduction, conclusion, references, + some sections ( findings & discussion )
– Using websites, magazines, news papers, book (no need to be credible source) example:
https://www.forbes.com/sites/forbesagencycouncil/2020/09/21/the-role-of-emotions-in-uxui-understanding-emotional-design/?sh=70f8e4a125be

Categories
Technology

Answer the following question(s):

Learning Objectives and Outcomes
Examine threats and vulnerabilities to an IT infrastructure.
Assignment Requirements
Consider the following security threats and vulnerabilities to domains of a typical IT infrastructure:
User Domain: Lack of awareness or concern for security
Workstation Domain: Malicious software introduced
LAN Domain: Transmitting private data unencrypted
LAN-to-WAN Domain: Exposure and unauthorized access to internal resources from the outside
WAN Domain: Denial of service (DoS) or distributed denial of service (DDoS) attacks
Remote Access Domain: Brute-force password attacks
System/Application Domain: Data loss from errors, failures, or disasters
Answer the following question(s):
Choose a domain along with its listed threat or vulnerability. What is at risk? What could be affected? (5)
Fully address the question in this discussion and provide valid rationale(s) for your choices.
Self-Assessment Checklist
I fully addressed the question(s) in the discussion instructions.
I included justification or rationale for my choices, where applicable.
I followed the submission guidelines.

Categories
Technology

Remote access domain: brute-force password attacks

Learning Objectives and Outcomes
Examine threats and vulnerabilities to an IT infrastructure.
Assignment Requirements
Consider the following security threats and vulnerabilities to domains of a typical IT infrastructure:
User Domain: Lack of awareness or concern for security
Workstation Domain: Malicious software introduced
LAN Domain: Transmitting private data unencrypted
LAN-to-WAN Domain: Exposure and unauthorized access to internal resources from the outside
WAN Domain: Denial of service (DoS) or distributed denial of service (DDoS) attacks
Remote Access Domain: Brute-force password attacks
System/Application Domain: Data loss from errors, failures, or disasters
Answer the following question(s):
Choose a domain along with its listed threat or vulnerability. What is at risk? What could be affected? (5)
Fully address the question in this discussion and provide valid rationale(s) for your choices.
Self-Assessment Checklist
I fully addressed the question(s) in the discussion instructions.
I included justification or rationale for my choices, where applicable.
I responded to at least two other students’ views (5 points).
I followed the submission guidelines.

Categories
Technology

Please read the instruction as necessary and follow the direction therein.

Please do not create the video but topology and content for the video only
Please read the instruction as necessary and follow the direction therein.

Categories
Technology

No graph should be included in the summary

Please read the following paper (attached) and prepare a summary report:
Please use your own words to tell the story, and do not directly copy entire sentences from the original paper.
Format requirement for the summary report:
Two pages, single space,
No graph should be included in the summary
Font style/Size: Times New Roman/11
Margin size: 1.0 inches on each side
Please explain in your word, do not copy from an article or an outside source. Only summzie the article attached.