What role do end-users play in the development and improvement of computer systems? Provide examples of computer systems that you have used and how you could contribute to making them better.
Assignment
Compare and evaluate in 500 words or more qualitative v quantitative risk assessment.
Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.
Network Analysis
An example of a simple technology or process and map/graph the social and cultural relationships surrounding that tech. Identify specific nodes (also referred to as “actors”) that make up the technology, and classify the nature of the relationships between them. When mentioning connections you need to explain what difference it makes. Example of table is given below of the map.
Sorting and Graph Data
Please respond to the following with 150 words or more and cite your references.
Choose two of the sorting algorithms we introduce in this module and discuss how they work. Discuss the characteristics of graph data structure; use three examples to demonstrate the kinds of questions that graph can solve.
VPN
Virtual private networks, or VPNs, offer a secure mechanism for accessing a network. Often, they are a convenience to access an organization’s infrastructure. VPNs also need to be considered in an organization’s business continuity plan. As an example, many organizations had not planned for the COVID-19 pandemic. Many had to convert their operations to a work-from-home structure, and infrastructures may not have been set up to handle the traffic.
locate and integrate at least two quality, academic resources (in addition to your textbook) on mitigating the security risks associated with VPNs. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.
Please respond to the following in a post of at least 200 words:
How to write a pseudocode for
How to write a pseudocode for a multiplication table up to 10, it have to display it like below:
1 2 3 4 5 6 7 8 9 10
2 4 6 8 10 12 14 16 18 20
week-1
Relate any incident you have been involved with that relates to a web security issue.
Discussion Board
For this Discussion Board, please complete the following:
Almost all the programming languages provide a concept called loop, which helps in executing one or more statements up to a desired number of times to accomplish one or more tasks. Assume that you are the programmer hired by a bank to write a program for its automated teller machines (ATM). Give an example where you want to use a loop statement to accomplish a task in the program and answer the following questions:
- In that example, can you accomplish the same task without using a loop statement? Why or why not?
- What are the benefits of using a loop statement for that example?
Write a programming
Write a programming that meets the following criteria
-Provide a list of three food specials that the customer can choose from
-The customer can only choose one of the specials
-If they don’t choose one of the options listed no message should be printed
Data visualization
Kirk (2016) states that the topic of color can be a minefield. The judgement involved with selecting the right amount of color for a particular application can be daunting. With regards to visualizations, there are different levers that can be adjusted to create the desired effects (Kirk, 2016). The levers are associated with the HSL (Hue, Saturation, Lightness) color cylinder.Select and elaborate on one of the following:
- Color Hue Spectrum
- Color Saturation Spectrum
- Color Lightness Spectrum
1 complete page
2 references
STRICTLY no plagiarism
