Categories
Technology

I am expecting about 2 paragraphs for this assignment.

I want you to find a failed product. Find out or come up with who the target persona was for the product (i.e for the twitter phone maybe young millennials who spent 1 hr+ a day on twitter. I want you to think about where they went wrong with their design ( could be price, overall design etc).
And think what if anything they could’ve done to make the product a success. I am expecting about 2 paragraphs for this assignment.

Categories
Technology

Please follow the instruction read it first and try to fit it on those 4 or 5 pa

please follow the instruction read it first and try to fit it on those 4 or 5 page the each step need to taka a screenshot

Categories
Technology

How has the president addressed, or ignored, congress?

Write about Cyber security and the Office of the National Cyber Director and how it came to be. Write about past Cyber breaches and the actions of Congress and the President.
Instructions below:
Research Paper (12 pages)
The first five pages should present your thesis and set up your argument. Summarize your topic,
its background, and the problem your paper seeks to address.
In the second portion of the paper students must complete a case-study of a contemporary issue
using newspaper sources (for example, trade, federal workers pay, Syria, immigration, Dodd-
Frank alterations, Affordable Care Act implementation, budgets, omnibus spending, etc). This
portion of the paper should analyze contemporary presidential-congressional relations on that
specific issue. How has the President addressed, or ignored, Congress? In what ways has the
president challenged Congress’s authority? In what ways has Congress pushed back? What
political factors have affected the issue and relationship? Are members of Congress taking the
lead on this issue or is the President?
The topic and issue do not have to match perfectly. That said, they should relate to one another.
So for example, if you plan on writing about immigration, you should choose academic sources
analyzing U.S. immigration policy emphasizing the roles Congress and the president have
historically played.
The paper is required include a minimum of three academic sources (books or articles).

Categories
Technology

Describe each step.

1. Textbook Chapter 2 and 3 describe many pitfalls on the path to data fluency. Pick any two pitfalls from the book and apply your knowledge of SDLC on each scenario to suggest ways to improve data fluency in these scenarios. (40 points)
2. The employee education department of a large corporation has been centralized. As a consequence, the educators must travel among all locations of the branches. They use their smart phone to interact and share their schedules and data. What are the steps you would take to secure these transactions by applying your knowledge of the security triad? Describe each step. (30 points)
3. Usability is a term that denotes the ease with which people can use an interface to achieve a particular goal. Conduct Internet research and find out what usability test is? Then describe how you would evaluate the usability of a smart phone scheduling app for the above corporation. (30 points) Must include the link/URLs/sources of your search results.
4. Save your Word document as HW2_FL.docx where FL are your first and last name initials.
5. Submit your file.
Book: Data Fluency: Empowering Your Organization with Effective Data Communication

Categories
Technology

How will the dost’s harmonized national r&d agenda contribute to the attainment of the middle-class aspirations as stated in ambisyon natin 2040 and the targets of the philippine development plan 2017-2022?

1. What are the provisions of the 1987 Philippine Constitution to the S&T in our country?
2. How important are DOST and its attached institutes and related agencies to Philippine nation-building? Give examples
3. How will the DOST’s Harmonized National R&D Agenda contribute to the attainment of the middle-class aspirations as stated in AmBisyon Natin 2040 and the targets of the Philippine Development Plan 2017-2022? Give specific examples.
4. Name five (5) members in the Order of the National Scientist and specify their contributions to S&T in the country.
Comments from Customer
Discipline: Science, Technology and Society (STS)

Categories
Technology

How we capture, define, analyze and design emotions in today’s interactive digital media in uae and elsewhere

Research question:
How we capture, define, analyze and design emotions in today’s interactive digital media in UAE and elsewhere
– 10/pgs 5000 words
– Cover pg, references, appendix
– Structure: title, introduction, conclusion, references, + some sections ( findings & discussion )
– Using websites, magazines, news papers, book (no need to be credible source) example:
https://www.forbes.com/sites/forbesagencycouncil/2020/09/21/the-role-of-emotions-in-uxui-understanding-emotional-design/?sh=70f8e4a125be

Categories
Technology

Answer the following question(s):

Learning Objectives and Outcomes
Examine threats and vulnerabilities to an IT infrastructure.
Assignment Requirements
Consider the following security threats and vulnerabilities to domains of a typical IT infrastructure:
User Domain: Lack of awareness or concern for security
Workstation Domain: Malicious software introduced
LAN Domain: Transmitting private data unencrypted
LAN-to-WAN Domain: Exposure and unauthorized access to internal resources from the outside
WAN Domain: Denial of service (DoS) or distributed denial of service (DDoS) attacks
Remote Access Domain: Brute-force password attacks
System/Application Domain: Data loss from errors, failures, or disasters
Answer the following question(s):
Choose a domain along with its listed threat or vulnerability. What is at risk? What could be affected? (5)
Fully address the question in this discussion and provide valid rationale(s) for your choices.
Self-Assessment Checklist
I fully addressed the question(s) in the discussion instructions.
I included justification or rationale for my choices, where applicable.
I followed the submission guidelines.

Categories
Technology

(40 points)

1. Textbook Chapter 2 and 3 describe many pitfalls on the path to data fluency. Pick any two pitfalls from the book and apply your knowledge of SDLC on each scenario to suggest ways to improve data fluency in these scenarios. (40 points)
2. The employee education department of a large corporation has been centralized. As a consequence, the educators must travel among all locations of the branches. They use their smart phone to interact and share their schedules and data. What are the steps you would take to secure these transactions by applying your knowledge of the security triad? Describe each step. (30 points)
3. Usability is a term that denotes the ease with which people can use an interface to achieve a particular goal. Conduct Internet research and find out what usability test is? Then describe how you would evaluate the usability of a smart phone scheduling app for the above corporation. (30 points) Must include the link/URLs/sources of your search results.
4. Save your Word document as HW2_FL.docx where FL are your first and last name initials.
5. Submit your file.
Book: Data Fluency: Empowering Your Organization with Effective Data Communication

Categories
Technology

Remote access domain: brute-force password attacks

Learning Objectives and Outcomes
Examine threats and vulnerabilities to an IT infrastructure.
Assignment Requirements
Consider the following security threats and vulnerabilities to domains of a typical IT infrastructure:
User Domain: Lack of awareness or concern for security
Workstation Domain: Malicious software introduced
LAN Domain: Transmitting private data unencrypted
LAN-to-WAN Domain: Exposure and unauthorized access to internal resources from the outside
WAN Domain: Denial of service (DoS) or distributed denial of service (DDoS) attacks
Remote Access Domain: Brute-force password attacks
System/Application Domain: Data loss from errors, failures, or disasters
Answer the following question(s):
Choose a domain along with its listed threat or vulnerability. What is at risk? What could be affected? (5)
Fully address the question in this discussion and provide valid rationale(s) for your choices.
Self-Assessment Checklist
I fully addressed the question(s) in the discussion instructions.
I included justification or rationale for my choices, where applicable.
I responded to at least two other students’ views (5 points).
I followed the submission guidelines.

Categories
Technology

Please read the instruction as necessary and follow the direction therein.

Please do not create the video but topology and content for the video only
Please read the instruction as necessary and follow the direction therein.