Mobile Applications – Paper

From a development team of one to two people to an enterprise-level team with multiple divisions, the topic of mobile development will eventually come up. 

  • Compare & Contrast mobile applications vs websites.
  • Research and discuss the importance of developing a mobile strategy.
  • Discuss different system mobile functionalities.
  • Explain the social aspect of mobile interfaces.
  • Discuss two – three mobile application development myths.
  • Argue the need for adaptive vs dedicated mobile websites.

– apa

– 7 pages

Own Words Easy Words Own writing needed

questions (1-3)  100 words  

1.Discuss and identify leader traits and attributes that are most beneficial in implementing the best decisions in an organization. 

2.Explain the differences in charismatic and transformational leadership and how both leadership styles impact organizational effectiveness.  Please note how these leadership styles affect implementing new innovative technologies.

3.Review table 8.1 in the reading this week, note the work characteristics and the traditional versus high-performance focus, note which focus is best for strategic decisions and which is best for operational decisions.  Please explain.

1-3 (100 words)

4.How do geographically dispersed teams collaborate effectively?

5.Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team.  Please note the pros and cons of each tool. 

6.Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

***The paper should meet the following requirements:

4-5 pages in length (not including title page or references)

APA guidelines must be followed. 

The organization of this paper must include: a title page; an introduction; headings for each section (for this paper those sections should be Team Collaboration, Tools, Selected Tool); a conclusion; and a reference page.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Exp19_PowerPoint_Ch04_ML1_Painting

Exp19_PowerPoint_Ch04_ML1_Painting

Exp19 PowerPoint Ch04 ML1 Painting

PowerPoint Chapter 1 Mid-Level 1 – Painting

Project Description:

You are preparing a presentation on Impressionism as your final project in your art history class. You will mention some of the major artists, show a couple of the paintings from this movement, and provide information about where the original artworks may be seen 

     

Start PowerPoint. Download and   open the file Exp19_PPT_Ch04_ML1_Painting.pptx.   Grader has automatically added your last name to the beginning of the   filename.

 

Click Slide 1 and change the   subtitle Student Name to Marie   LaPointe.

 

Insert Painting1.jpg as the background on Slide 1. Set the Transparency   at 75%.

 

 

Select the SmartArt graphic on   Slide 2. Apply the Wipe animation. Set the Effect Options to From Right in   the Directions section and One by One in the Sequence section. Set Start to   After Previous. Set Duration to 02.50 and Delay to 00.25.

 

 

Remove the background of the   picture on Slide 3.

 

 

Apply the Split animation to the   top table on Slide 4. Set the Effect   Option to Vertical Out. Set Start to After Previous. Set Duration to 01.50 and set Delay to 00.25.

 

 

Apply the Split animation to the   bottom table. Set the Effect Option to Vertical Out. Set Start to After   Previous. Set Duration to 01.25 and set Delay to 00.50.

 

Apply the Shape animation to the   chart on Slide 5. Set the Effect Option to Out. Set Start to After Previous.   Set Duration to 02.50 and set Delay to 00.25

 

Duplicate Slide 6.

 

 

Replace the existing picture on   the new Slide 7 with Painting2.jpg.

 

Apply the Morph transition.   Compress all pictures in the presentation.

 

 

Create a Summary Zoom using   Slides 1, 2, 4, and 5. Type Impressionism in the title placeholder of the new Slide 1.

 

 

Save and close Exp19_PPT_Ch04_ML1_Painting.pptx. Exit   PowerPoint. Submit the file as directed.

TCO

  

1. (TCO A) Organization XYZ has just been granted access tothe LAN of the ABC organization to access Web-based applications over theInternet. Organization ABC has established what type of access? (Points : 5) 

Extranet   Internet   Remote Protocol Exchange   Intranet  

Question 2. 2. (TCO B) The ________________ is a WAN network thatincludes hundreds of thousands to millions of machines and users worldwide. (Points : 5) 

Intranet   Metropolitan Area Network (MAN)    Internet   Ethernet  

Question 3. 3. (TCO B) Which of the following is considered a componentof a network? (Points : 5) 

Server   Client   Circuit    All of the above  

Question 4. 4. (TCO C) Which is true about a network hub? (Points : 5) 

 When a frame is sent from one   computer to another, the hub retransmits it to all computers attached.   it keeps a table of addresses and   ports.   Each circuit connected to it is   not shared.   Internally, the logical topology   is a set of point-to-point circuits.  

Question 5. 5. (TCO C) Hubs and switches also act as __________ to helpprevent attenuation. (Points : 

 repeaters   firewalls   junction points   layer 2 devices  

Question 6. 6. (TCO D) A ___________ connect(s) two similarnetworks having the same network protocol and chooses the best routebetween two networks when there are multiple paths. (Points : 5) 

 router   modem   router and modem   None of the above  

Question 7. 7. (TCO D) In the case of Internet operation, a networkaccess point is ______.(Points : 5) 

 the point that links regional ISPs   used by National ISPs to exchange   data   used to exchange data between   local servers and local ISPs   used as a redundant path between   local ISPs  

Question 8. 8. (TCO E) Your organization has been the victim of arecent DoS on one of your public websites. Your CIO wants this problem tohave minimal impact on your organization in the future. What is the besttechnology to deploy to quickly detect and take action on a DoS attack onceit starts? (Points : 5) 

Firewall   Intrusion   detection system   Traffic filters and traffic limiting   Honeypot  

Question 9. 9. (TCO E) Your organization has decided to host a webserver that will be accessible by the public. Organizational leadership isconcerned about the web server being compromised and thus allowing theremaining network to be compromised. You want to come up with a solution tohost and secure the Web server internally but still protect yournetwork. What should you do?(Points : 5) 

Use a firewall    Put the web server on the DMZ   Put the web server in front of the   firewall.   Chassis based switch  

Question 10. 10. (TCO F) The building block design approach is sometimescalled ______. (Points : 5) 

wide and shallow    narrow and deep   wide and deep   narrow and shallow  

Question 11. 11. (TCO F) Your company is new and finally has acquired anoperating facility. You are in change of designing the network.Organizational leadership has explained to you that they want a networkthat is simplistic, standardized, and that can be implemented in less thanone year. What design option would best suit the needs of the organization? (Points : 5) 

Needs analysis   Traditional network design    Building-block network design   Lateral network design  

Question 12. 12. (TCO G) __________ policies attempt to allocate costsassociated with a WAN or a mainframe to specificusers. (Points : 5) 

 Charge-back   Web spinning   Internet access fees   Support staff billing

Question 2. 2. (TCO B) Discuss and support your opinions of why combining voice and data is a major organizational challenge. Include your thoughts on its possible impacts on the organization in terms of competitive advantage, internal organization, and so forth. (Points : 25)

Question 3. 3. (TCO C) Switched Ethernet networks dominate the landscape of computer networks today. What improvements do Switched Ethernet networks have over its predecessor Shared Ethernet networks? Be specific and answer in details. (Points : 25) 

Question 4. 4. (TCO C) What are the preferred technologies used in the three technology layers in backbone design? Describe each of the technologies in detail

Question 5. 5. (TCO D) What are the principal organizations responsible for Internet governance, and what do they do? (Points : 25) 

Question 7. 7. (TCO F) What are some major problems that can cause network designs to fail? Provide the problems in detail. (Points : 25) 

Question 6. 6. (TCO E) Viruses and worms are issues that any networking professional must face. Compare and contrast viruses and worms. Be n. (Points : 25) 

Question 8. 8. (TCO G) The total cost of ownership (TCO) is a measure of how much it costs per year to keep one computer operating. TCO includes the cost of support staff to attach it to the network, install software, administer the network (e.g., create user ids, backup user data), provide training and technical support, and upgrade hardware and software. It also includes the cost of time “wasted” by the user when problems occur or when the user is attempting to learn new software. Discuss in detail at least three approaches that can be used to reduce network costs. (Points : 25) 

Research Paper

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Test with Rstudio graphs

Review the below table. Suzie has an issue. She can either move to NY or FL and needs to review some data that her agent gave her. The agent reviewed house prices and crime ratings for houses that Suzie would be interested in based on her selection criteria. She wants to live in an area with lower crime but wants to know a few things:

she gave you some additional information that you need to consider:

  •  She has $100,000 to put down for the house.
  •  If she moves to NY she will have a job earning $120,000 per year.
  •  If she moves to FL she will have a job earning $75,000 per year.
  •  She wants to know the following:
    •  On average what location will she be able to pay off her house first based on average housing prices and income she will receive?
    •  Where should she move and why? Please show graphics and thoroughly explain your answer here based on the new information provided above.

Problem 4- Legal

Question I – Kansas passes a statutes which says all corn must be grown and processed in a certain manner so as to avoid harmful pesticides.  This statute is challenged as being unconstitutional.  What are the two factors for the court to consider when deciding whether the statute is constitutional?

Question II – Downtown Cincinnati, in an area known as “Over the Rhine”, has long been an area of poverty containing empty and rundown buildings.  The city of Cincinnati wishes to use this area to create new businesses and spark economic development.  Would the eminent domain power allow the city to take this property from the building owners for the purpose of economic rejuvenation and elimination of “blight” within the city?  What U.S. Supreme Court case would serve as precedent for this issue?

Text-

Title: Business 

ISBN: 9780357447642 

Authors: Marianne M. Jennings 

Publication Date: 2021-01-01 

Edition: 12th Edition

response project scope analysis

 (Earl)One of the main benefits of a project scope analysis is providing a comprehensive project plan into a working idea. This method can form a proper outline with strategic objectives, deadlines, and task distributions for each project goal. A project with a properly laid out plan with clear goals tends to have a greater chance of succeeding. It will also provide the client with clear objectives and hurdles with any system implementation. The project scope analysis is also an excellent way to maintain budgeted finances. It’s essential that tasks stay on target as it will help with customer satisfaction but will also help minimize the chance of going over budget. I can say from first-hand experience that a project scope analysis helps keep a project on track and provides a genuine understanding of the expectations of each person involved. I was on a major project with my employer last ye. The project manager over it utilized this same method to keep everything on track and updated for each technical hurdle and o provide accurate status updates to the client.