Categories
Technology

A chart/graph needs to be made from that data as well.

This is a excel assignment. All information you need is attached. (Use sample for when you input data). A chart/graph needs to be made from that data as well. Please see 3rd attachment
Comments from Customer
Discipline: Computer Applications

Categories
Technology

Physical controls: control entry into buildings, parking lots, and protected areas, such as a lock on an office door

Assignment Requirements
Shovels and Shingles is a small construction company consisting of 1 multi-purpose server and 25 networked workstations and laptops. All employees have Internet access and use email. The construction manager and workers use tablet PCs in the field.
The following are types of security controls:
Administrative controls: Policies approved by management and passed down to staff, such as policies on password length
Logical/technical controls: Control access to a computer system or network, such as a username and password combination
Hardware controls: Equipment that checks and validates IDs, such as a smart card for or security token for multifactor authentication
Software controls: Controls embedded in operating system and application software, such as NTFS permissions
Physical controls: Control entry into buildings, parking lots, and protected areas, such as a lock on an office door
Answer the following question(s):
What are two types of data and connections that Shovels and Shingles should protect?
Which types of security controls would protect that data?

Categories
Technology

Please give all references accordingly.

Please write a page and summary and reflections on how you learned from the uploaded word document, as well as your own findings through other sources. Please give all references accordingly.

Categories
Technology

I am expecting about 2 paragraphs for this assignment.

I want you to find a failed product. Find out or come up with who the target persona was for the product (i.e for the twitter phone maybe young millennials who spent 1 hr+ a day on twitter. I want you to think about where they went wrong with their design ( could be price, overall design etc).
And think what if anything they could’ve done to make the product a success. I am expecting about 2 paragraphs for this assignment.

Categories
Technology

Please follow the instruction read it first and try to fit it on those 4 or 5 pa

please follow the instruction read it first and try to fit it on those 4 or 5 page the each step need to taka a screenshot

Categories
Technology

How has the president addressed, or ignored, congress?

Write about Cyber security and the Office of the National Cyber Director and how it came to be. Write about past Cyber breaches and the actions of Congress and the President.
Instructions below:
Research Paper (12 pages)
The first five pages should present your thesis and set up your argument. Summarize your topic,
its background, and the problem your paper seeks to address.
In the second portion of the paper students must complete a case-study of a contemporary issue
using newspaper sources (for example, trade, federal workers pay, Syria, immigration, Dodd-
Frank alterations, Affordable Care Act implementation, budgets, omnibus spending, etc). This
portion of the paper should analyze contemporary presidential-congressional relations on that
specific issue. How has the President addressed, or ignored, Congress? In what ways has the
president challenged Congress’s authority? In what ways has Congress pushed back? What
political factors have affected the issue and relationship? Are members of Congress taking the
lead on this issue or is the President?
The topic and issue do not have to match perfectly. That said, they should relate to one another.
So for example, if you plan on writing about immigration, you should choose academic sources
analyzing U.S. immigration policy emphasizing the roles Congress and the president have
historically played.
The paper is required include a minimum of three academic sources (books or articles).

Categories
Technology

Describe each step.

1. Textbook Chapter 2 and 3 describe many pitfalls on the path to data fluency. Pick any two pitfalls from the book and apply your knowledge of SDLC on each scenario to suggest ways to improve data fluency in these scenarios. (40 points)
2. The employee education department of a large corporation has been centralized. As a consequence, the educators must travel among all locations of the branches. They use their smart phone to interact and share their schedules and data. What are the steps you would take to secure these transactions by applying your knowledge of the security triad? Describe each step. (30 points)
3. Usability is a term that denotes the ease with which people can use an interface to achieve a particular goal. Conduct Internet research and find out what usability test is? Then describe how you would evaluate the usability of a smart phone scheduling app for the above corporation. (30 points) Must include the link/URLs/sources of your search results.
4. Save your Word document as HW2_FL.docx where FL are your first and last name initials.
5. Submit your file.
Book: Data Fluency: Empowering Your Organization with Effective Data Communication

Categories
Technology

How will the dost’s harmonized national r&d agenda contribute to the attainment of the middle-class aspirations as stated in ambisyon natin 2040 and the targets of the philippine development plan 2017-2022?

1. What are the provisions of the 1987 Philippine Constitution to the S&T in our country?
2. How important are DOST and its attached institutes and related agencies to Philippine nation-building? Give examples
3. How will the DOST’s Harmonized National R&D Agenda contribute to the attainment of the middle-class aspirations as stated in AmBisyon Natin 2040 and the targets of the Philippine Development Plan 2017-2022? Give specific examples.
4. Name five (5) members in the Order of the National Scientist and specify their contributions to S&T in the country.
Comments from Customer
Discipline: Science, Technology and Society (STS)

Categories
Technology

Remote access domain: brute-force password attacks

Learning Objectives and Outcomes
Examine threats and vulnerabilities to an IT infrastructure.
Assignment Requirements
Consider the following security threats and vulnerabilities to domains of a typical IT infrastructure:
User Domain: Lack of awareness or concern for security
Workstation Domain: Malicious software introduced
LAN Domain: Transmitting private data unencrypted
LAN-to-WAN Domain: Exposure and unauthorized access to internal resources from the outside
WAN Domain: Denial of service (DoS) or distributed denial of service (DDoS) attacks
Remote Access Domain: Brute-force password attacks
System/Application Domain: Data loss from errors, failures, or disasters
Answer the following question(s):
Choose a domain along with its listed threat or vulnerability. What is at risk? What could be affected? (5)
Fully address the question in this discussion and provide valid rationale(s) for your choices.
Self-Assessment Checklist
I fully addressed the question(s) in the discussion instructions.
I included justification or rationale for my choices, where applicable.
I responded to at least two other students’ views (5 points).
I followed the submission guidelines.

Categories
Technology

(40 points)

1. Textbook Chapter 2 and 3 describe many pitfalls on the path to data fluency. Pick any two pitfalls from the book and apply your knowledge of SDLC on each scenario to suggest ways to improve data fluency in these scenarios. (40 points)
2. The employee education department of a large corporation has been centralized. As a consequence, the educators must travel among all locations of the branches. They use their smart phone to interact and share their schedules and data. What are the steps you would take to secure these transactions by applying your knowledge of the security triad? Describe each step. (30 points)
3. Usability is a term that denotes the ease with which people can use an interface to achieve a particular goal. Conduct Internet research and find out what usability test is? Then describe how you would evaluate the usability of a smart phone scheduling app for the above corporation. (30 points) Must include the link/URLs/sources of your search results.
4. Save your Word document as HW2_FL.docx where FL are your first and last name initials.
5. Submit your file.
Book: Data Fluency: Empowering Your Organization with Effective Data Communication