Refer to the attached document.
Mobile Apps Info Description
People are using their mobile phone browsers more and more every day to find information about businesses, make product decisions and purchases, and even determine the quality of a business based on what they can find online. Write a seven to 10 (7 – 10) page paper in which you:
- 1. How to Choose a Mobile Web Development Option.
- 2. Research and discuss effective use of screen real estate.
- 3. Compare and contrast different mobile platforms (i.e. Android, iOS).
- 3. The tools of mobile interface design.
- 4. Discuss mobile information design.
- 5. Choosing mobile web options.
The Assignment must follow these formatting requirements:
- Use at least ten – twelve (10 – 12 ) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
- Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
- Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The (7 – 10 pages) does not include cover page and the reference page.
Assignment
Writing Assignment:
- Find an article of interest to you. It can be a magazine or newspaper article. Try to utilize the library website to find an article.
- Actively read and annotate the article; submit a file of your annotations (.jpeg, PDF, etc.)
- write a 1 page summary and review of the article – consider these guidelines:
Summaries should be no less than 200 words; do not plagiarize; use minimal quotes; paraphrase more often Critique the article: Is it reputable? How would it be useful to you if you were researching that topic?
Include an APA reference (bibliography entry) These should be thoroughly proofread to look for grammatical mistakes. Submit the written assignment and annotated article.
Discussion 250 words
Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. Explain your answer (whether you believe all data should or should not be encrypted).
Discussion Questions 4-5 sentences
Review your storyboard before beginning this thread. For this discussion, define what elements you would control with CSS and why. Are there instances where you would need to use more than one style sheet for a site? Explain how you might use multiple style sheets or various kinds of styles (inline, embedded, external).
Computer science
You are the Lead of the Test team in your Department. Your team is typically exposed to software for testing once it is developed, packaged and ready to be deployed on the web. They ask that you test and approve it before it is deployed. Your team usually finds errors with every feature on the site. The department thinks your team does a great job finding defects. They then fix the code, and in a few weeks you can test it again. To accommodate this cycle of test and retesting, your team schedules three full cycles of testing for every project you receive to test.
Your Department manager ask you to collaborate with him and the other team leaders to shorten the time it takes to design, develop, test and deploy software. What will you suggest?
Write down a few points you would like to bring up at the meeting.
Detection, Prevention, Remediation, Offense and Defensive Security Postures/Tool-sets
There have been many large corporate cyber attacks that have made the news.
Pick one of the examples and write a summary.
What could have been different to prevent the attack or what action did the company take in response to the attack?
SE493 week 9
APA FORMAT & references and 350 words each questions
Please read chapter 24 and review PP slides and reputable resources and discuss:
What is software standards? Importance and problems with Standards. Are you in favor or against standards?
Note: you DO NOT NEED TO DISCUSS Product and process standards.
Question 2
What is configuration management? And briefly escribe the following configuration management activities:
1)Version management,
2) System building,
3) Change management,
4) Release management.
Please list your reference/s
Create a presentation
You are part of a team selected by the Chief Information Officer (CIO) to perform a security audit for one of the companies explored in this course:
- Devil’s Canyon (Wks 4–5)
Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results of your security audit based on the following audit process:
- Potential Risk to be Reviewed: Describe the risk. (10pts)
- Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data.
- Regulation and Compliance Issues: Analyze how regulations and compliance issues could impact the organization. (10pts)
- Provide a detailed analysis of regulations and compliance issues, beyond the simple explanation in score point two.
- Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues. (10pts)
- Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk. (10pts)
- Example: Determine whether anti-virus software is in use.
- Example: Determine whether virus signatures are periodically updated.
- Example: Determine whether periodic virus scans are performed.
- Provide a detailed analysis of the resources and/or tools available, beyond the simple explanation in score point two. (10pts)
- IT Security – Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources.
- Review the various options available to address those processes and methods previously explained, and which ones might be feasible. (10pts)
- IT Security – Measures: Analyze the various security measures that could be taken within the organization. (15pts)
- Demonstrate a detailed understanding of what the alternatives are to approach security, how much security is needed, different methods to employ, etc.
- Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level).
- Example: 100% of servers and PCs have virus software installed.
- Example: 100% of the virus software installed is set to automatically update, including virus signatures.
- Example: 100% of the virus software installed is set to automatically perform a scan at least weekly.
Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references. (10pts)
Note: The title page and reference page do not count toward the assignment – power point and summary – length requirements.
30/s3
Write a 4-5 page paper (deliverable length does not include the title and reference pages)
- What does the term intellectual property encompass, and why are organizations so concerned about protecting intellectual property?
- What are the strengths and limitations of using copyrights, patents, and trade secret laws to protect intellectual property?
- What is plagiarism, and what can be done to combat it?