Attach below
Security Architecure & Design agile design implementations
Part 1: 600 words
As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?
Part2: 600 words
In today’s fast-paced, often “agile” software development, how can the secure design be implemented?
data visualizing
- Refer back to the dataset you selected for Homework Assignment 2 (Week 3) and address each of the following three questions. Each response should be 2-3 paragraphs with an explanation of all terms and reasons for your decisions.
- Identify a chart type that could be used to display different editorial perspectives of your dataset and explain why you felt it to be appropriate.
- Identify two other chart types that could show something about your subject matter, though maybe not confined to the data you are looking at. In other words, chart types that could incorporate data not already included in your selected dataset.
- Review the classifying chart families in Chapter 6 of your textbook. Select at least one chart type from each of the classifying chart families (CHRTS) that could portray different editorial perspectives about your subject. This may include additional data, not already included in your selected dataset.
- By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
text book: http://book.visualisingdata.com/chapter/6
Questions
refer to the case study 7.1 from the images attached in the uploads and response to the questions asked.
textbook:
Project Management: Achieving Competitive Advantage (5th ed.) Jeffery K. Pinto
Work 7
Answer question in the document
Write a complete C program that finds
Write a complete C program that finds and lists each 4-digit postive integer, X, that has the strange property that X to any positive power will end in those same 4 digits.
digital media week2
References for this work.
This week, you watched the Social Media Revolution 2019 #Socialnomics and read:
https://moz.com/blog/category/social-media
This week you also watched:
https://www.pbs.org/video/innovation-humanitarian-relief-e6xivw/
This week you read
https://www.sciencedirect.com/science/article/pii/S1877050917326704
???? Topic 1: Social Media
This week, you watched the Social Media Revolution 2019 #Socialnomics and read The Beginner’s Guide to Social Media.
Discussion: As you review the multiple statistics that display in Social Media Revolution 2019 #Socialnomics, and reflecting on what you read about social media, assess the impact of social media in your life. Question #1: What role does Social Media play in your life? Are you aware of the social media policies of the organizations where you work, attend school, or volunteer? Have you used social media to resolve problems, participate in a cause you are passionate about, or to learn about UMGC? How does Social Media impact your personal and professional communications?
???? Topic 2: Digital Humanitarianism
This week you also watched Innovations in Humanitarian Relief (PBS online video)
Discussion: In the wake of natural disasters and acts of terror, several tech companies are making an effort to improve traditional responses effort in humanitarian relief.
Question #1: Do you think that humanitarian aid workers constantly need new ways of thinking, new products and new processes to better respond to disasters? Why or why not?
???? Topic 3: Cyber Psychology
This week you read: Cyber psychology and cyber behavior of adolescents-the need of the contemporary era
Discussion:
Cyber psychology evaluates how we interact with others using technology, how we can develop technology to best fit our requirements, and how our behavior and psychological states are influenced by technology. Cyber psychology applies psychological theory to explain how individuals interact in cyberspace and how these interactions might affect our offline lives. It offers a new way to define the self and society.
Question #1:
How does technology impact psychology? List at least three advantages and at least three disadvantages.
Question #2:
Do you present yourself differently in different online spaces? In what ways are you different and in what ways are you consistent? Why do you think this is?
Minimum Topic Response: PLEASE RESPOND IN THREE OR MORE SENTENCES PER TOPIC. NOTE 1: Please make sure you answer EACH item and LABEL each item (#1, #2, #3, etc) so that I can easily check that each item has been answered. NOTE 2: Please do not attach a file to the conference–enter your reply into the text area provided. NOTE 3: After you post your response, please review it to make sure it is formatted correctly and is easy to read.
Cryptography
you will analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure. You must use a minimum of four scholarly articles to complete the assignment. The assignment must be properly APA formatted with a separate title and reference page. 2 pages
Assignment
APA Paper: Research and discuss 2 mobile apps that you find useful in your own personal or professional lives. Discuss the functionality and usefulness along with any improvements that you would recommend. The paper must be 2 pages (at least 500 words) and add the APA Title Page and References page (4 pages total). Use 2 peer reviewed references.
Knowledge systems
Please read Chapter 12: Knowledge Systems: Expert Systems, Recommenders, Chatbots, Virtual Personal Assistants from the attached book and answer the following questions.
1. Some people say that chatbots are inferior for chatting. Others disagree. Discuss.
2. Discuss the financial benefits of chatbots.
3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.
4. Compare the chatbots of Facebook and WeChat. Which has more functionalities?
5. Research the role of chatbots in helping patients with dementia.
6. Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done.
Answer these questions in APA 7th edition format and include atleast 4 references, including 2 scholarly references. All answers should be completed in total 5 to 6 pages. STRICTLY NO PLAGIARISM