What are some of the things that contribute to mobile app “Usability”?
And, since texting is so cumbersome (limited size, tiny keyboard, etc) compared to full-feature applications, why is it so wildly popular?
What are some of the things that contribute to mobile app “Usability”?
And, since texting is so cumbersome (limited size, tiny keyboard, etc) compared to full-feature applications, why is it so wildly popular?
Please read and respond with 150 words or more. Be sure to provide references.
Share with the class your experience with this module—what is easy, and which topics/concepts you are struggling with.
In our daily lives, we use sorting a lot. Please describe at least two real-world examples of using sorting. How does the sorting make your work or daily life easier?
see attached
“Human beings are made in the image of God” (Gen 1:27), so they should be treated as unique and special creations, and any organization should exercise compassion, dignity, fairness, and respect for all. This assignment asks students to consider the ethics behind data and its collection. It asks the fundamental question of whether or not it is acceptable for information to be gathered on private citizens for use of a greater purpose.
Information is collected on private citizens, as well as large and small companies. How this information is used has been, and still is, controversial. In 500 words or more, discuss ethics in the use of information with the Edward Snowden leak. Was it ethical for the CIA and other organizations to collect data on these citizens? Was it justified? What might this surveillance have prevented? From the Christian worldview, we are to support and encourage each other (John 13:35; 15:17; Ephesians 4:32). When necessary, we are to admonish and confront each other. If you were the judge for this case, how would you interpret this case, done in love, and with caution about our own shortcomings (Proverbs 27:5; Matthew 18:15-17; Galatians 6:1)?
1- A program declares an int variable named evenNum and initializes it to 2. Write the C++ code to display the even integers 2, 4, 6, 8, and 10 on separate lines on the computer screen. Use the do-while statement.
———————————————————-
2- Create a program that allows the user to enter an unknown number of sales amounts for each of three car dealerships: Dealership 1, Dealership 2, and Dealership 3. The program should calculate the total sales. Display the total sales with a dollar sign and two decimal places.
a. Create an IPO chart for the problem, and then desk-check the algorithm using 23000 and 15000 as the sales amounts for Dealership 1; 12000, 16000, 34000, and 10000 for Dealership 2; and 64000, 12000, and 70000 for Dealership 3.
b. List the input, processing, and output items, as well as the algorithm, in a chart similar to the one shown earlier in Figure 8-16. Then code the algorithm into a program.
c. Desk-check the program using the same data used to desk-check the algorithm.
d. If necessary, create a new project named Intermediate19 Project, and save it in the Cpp8Chap08 folder. Enter your C++ instructions into a source file named Intermediate19.cpp. Also, enter appropriate comments and any additional instructions required by the compiler.
e. Save and then run the program. Test the program using the same data used to desk-check the program.
Figure 8-16 ATTACHED
Please see HW 9 document for the question.
Create a Pareto chart based on the information below. First, create a spreadsheet in Excel using the data in the table or use the Pareto Chart template. List the most frequent customer problems first. Check your entries so your resulting chart looks like the one in Figure 8-7 in the textbook.
Customer Complaints; Frequency/Week
Customer is on hold too long; 90
Customer gets transferred to wrong area or cut off; 20
Service rep cannot answer customer’s questions; 120
Service rep does not follow through as promised; 40
Submit your chart.
The latest generation of mobile devices are portable enough to carry at all times, connected to voice and data networks, and contextually aware by using sensors and networks to preemptively complete tasks. Many of today’s mobile applications are personalized, and are not useful if they can only access the data on the phone. For a user to get, for example, sports scores, retrieve stock quotes, or perform accounting work, the mobile device needs to communicate with one or more servers, starting with the Window servers.
Scenario
You are a security professional for Blue Stripe Tech, an IT services provider with approximately 400 employees. Blue Stripe Tech partners with industry leaders to provide storage, networking, virtualization, and cybersecurity to clients.
Blue Stripe Tech recently won a large DoD contract, which will add 30 percent to the revenue of the organization. It is a high-priority, high-visibility project. Blue Stripe Tech will be allowed to make its own budget, project timeline, and tollgate decisions.
As a security professional for Blue Stripe Tech, you are responsible for developing security policies for this project. These policies are required to meet DoD standards for delivery of IT technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency.
To do this, you must develop DoD-approved policies, standards, and control descriptions for your IT infrastructure (see the “Tasks” section in this document). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies, standards, or controls in place.
Blue Stripe Tech’s computing environment includes the following:
Venesor – this is a good first draft, but there’s too much text! A quick guide should be a very graphical document; in the best scenario, your reader can just look at the pictures and get the point without even reading the text at all. Notes and details do not belong in this type of document.