Mobile -2

 

What are some of the things that contribute to mobile app “Usability”?

And,  since texting is so cumbersome (limited size, tiny keyboard, etc) compared to full-feature applications, why is it so wildly popular?

Algorithms and Applications

Please read and respond with 150 words or more. Be sure to provide references.

  

Share with the class your experience with this module—what is easy, and which topics/concepts you are struggling with. 

In our daily lives, we use sorting a lot. Please describe at  least two real-world examples of using sorting. How does the sorting  make your work or daily life easier? 

Ethics

 

“Human beings are made in the image of God” (Gen 1:27), so they should be treated as unique and special creations, and any organization should exercise compassion, dignity, fairness, and respect for all. This assignment asks students to consider the ethics behind data and its collection. It asks the fundamental question of whether or not it is acceptable for information to be gathered on private citizens for use of a greater purpose.

Information is collected on private citizens, as well as large and small companies. How this information is used has been, and still is, controversial. In 500 words or more, discuss ethics in the use of information with the Edward Snowden leak. Was it ethical for the CIA and other organizations to collect data on these citizens? Was it justified? What might this surveillance have prevented? From the Christian worldview, we are to support and encourage each other (John 13:35; 15:17; Ephesians 4:32). When necessary, we are to admonish and confront each other. If you were the judge for this case, how would you interpret this case, done in love, and with caution about our own shortcomings (Proverbs 27:5; Matthew 18:15-17; Galatians 6:1)?

PROGRAMMING

1- A program declares an int variable named evenNum and initializes it to 2. Write the C++ code to display the even integers 2, 4, 6, 8, and 10 on separate lines on the computer screen. Use the do-while statement. 

———————————————————-

2- Create a program that allows the user to enter an unknown number of sales amounts for each of three car dealerships: Dealership 1, Dealership 2, and  Dealership 3. The program should calculate the total sales. Display the total sales with a dollar sign and two decimal places. 

a.  Create an IPO chart for the problem, and then desk-check the algorithm using 23000 and 15000 as the sales amounts for Dealership 1; 12000, 16000, 34000, and 10000 for Dealership 2; and 64000, 12000, and 70000 for Dealership 3.

b.  List the input, processing, and output items, as well as the algorithm, in a chart similar to the one shown earlier in Figure 8-16. Then code the algorithm into a program. 

 c.  Desk-check the program using the same data used to desk-check the algorithm.

d.  If necessary, create a new project named Intermediate19 Project, and save it in the Cpp8Chap08 folder. Enter your C++ instructions into a source file named  Intermediate19.cpp. Also, enter appropriate comments and any additional instructions required by the compiler. 

e.  Save and then run the program. Test the program using the same data used to desk-check the program.

Figure 8-16 ATTACHED

Practice: Pareto Charts

 

Assignment Content

  1. There are several tools and techniques featured in the textbook that are used for quality control in IT projects. A Pareto chart is a type of histogram that can be used to define quality problems in a system. It allows you to see what areas need improvement.

    Create a Pareto chart based on the information below. First, create a spreadsheet in Excel using the data in the table or use the Pareto Chart template. List the most frequent customer problems first. Check your entries so your resulting chart looks like the one in Figure 8-7 in the textbook.

    Customer Complaints; Frequency/Week
    Customer is on hold too long; 90
    Customer gets transferred to wrong area or cut off; 20
    Service rep cannot answer customer’s questions; 120
    Service rep does not follow through as promised; 40

    Submit your chart.

dq

 The latest generation of mobile devices are portable enough to carry at all times, connected to voice and data networks, and contextually aware by using sensors and networks to preemptively complete tasks.  Many of today’s mobile applications are personalized, and are not useful if they can only access the data on the phone.  For a user to get, for example, sports scores, retrieve stock quotes, or perform accounting work, the mobile device needs to communicate with one or more servers, starting with the Window servers.

  1. Discuss effective use of screen real estate
  2. How does mobile user interface designs & websites reduce end-user self-efficacy?
  3. What are the challenges of integrating mobile applications with multiple databases? 

cybersecurity

Scenario

You are a security professional for Blue Stripe Tech, an IT services provider with approximately 400 employees. Blue Stripe Tech partners with industry leaders to provide storage, networking, virtualization, and cybersecurity to clients.

Blue Stripe Tech recently won a large DoD contract, which will add 30 percent to the revenue of the organization. It is a high-priority, high-visibility project. Blue Stripe Tech will be allowed to make its own budget, project timeline, and tollgate decisions.

As a security professional for Blue Stripe Tech, you are responsible for developing security policies for this project. These policies are required to meet DoD standards for delivery of IT technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency.

To do this, you must develop DoD-approved policies, standards, and control descriptions for your IT infrastructure (see the “Tasks” section in this document). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies, standards, or controls in place.

Blue Stripe Tech’s computing environment includes the following:

  • 12 servers running the latest edition of Microsoft Server, providing the following:
    • Active Directory (AD)
    • Domain Name System (DNS)
    • Dynamic Host Configuration Protocol (DHCP)
    • Enterprise resource planning (ERP) application (Oracle)
    • A research and development (R&D) engineering network segment for testing, separate from the production environment
    • Microsoft Exchange Server for email
    • Email filter
    • Cloud-based secure web gateway (web security, data loss protection, next-generation firewall, cloud application security, advanced threat protection)
  • Two Linux servers running Apache Server to host your website
  • 400 PCs/laptops running Microsoft Windows 10, Microsoft 365 office applications, and other productivity tools

Tasks

  • Develop a list of compliance laws required for DoD contracts.
  • Determine which policy framework(s) will be used for this project.
  • List controls placed on domains in the IT infrastructure.
  • List required standards for common devices, categorized by IT domain.
  • Develop DoD-compliant policies for the organization’s IT infrastructure.
  • Describe the policies, standards, and controls that would make the organization DoD compliant.
  • Develop a high-level deployment plan for implementation of these polices, standards, and controls.
  • Write a professional report that includes all of the above content-related items and citations for all sources.

Quick start guide

 Venesor – this is a good first draft, but there’s too much text!  A quick guide should be a very graphical document; in the best scenario, your reader can just look at the pictures and get the point without even reading the text at all.  Notes and details do not belong in this type of document.