(Human Computer Interaction Class) One paragrah Discussion about GUIs/

Please respond to the following:

  • GUIs play an important role in how an end user interacts with an operating system. Describe an instance where you did not have an intuitive experience with a GUI. Recommend the key areas that could have been improved. If you have only had intuitive experiences with GUIs, explain what made the experience so great.

Identify three social media websites and explain how they are used to carry out cyber stalking and cyber bullying crimes.

 Computer technology has provided the criminal justice system with a number of benefits such as program algorithms that identify scanned fingerprints and facial recognition. It has increased intelligence and record keeping capabilities. However, it has provided literally millions of potential victims of crime. It started out with financial crimes (such as fraud and ransom software), and it progressed to luring victims to locations for murder, rape, and kidnapping. Victims of computer crimes include the criminal using social media as a weapon.
The commander of a newly formed cyber-crime unit is very knowledgeable about fraud and various financially motivated viruses. The one thing he is not that familiar with is the impact that social media has on victims of crimes such as cyber bullying and cyber stalking.
The commander has you temporarily attached from the human trafficking and sex crimes unit to bring his cyber teams up to date on how to understand what cyber victims of stalking and bullying are going through and how best to approach them for maximum effective investigation.
Devise a plan on explaining the aspects of cyber bullying and cyber stalking to the cyber-crime unit.
Focus your discussion on the following:
Identify three social media websites and explain how they are used to carry out cyber stalking and cyber bullying crimes.
Explain why comments made on social media are so impactful on the emotions of the victim.
Identify the types of cyber-crimes that may ultimately lead to a physical crime against the victim
Advise the cyber-crime unit team members on what types of assurances should they provide the victim to obtain his or her cooperation in the investigation and to ultimately keep him or her safe. 

Problem 1- Planning

1.Everyone has been involved in projects. What is the largest project you have been involved in? (You do not have to have been the project manager, but could have played another role.)

  1. Write one sentence that describes the objective of the project.
  2. Describe specifically how this project meets the definition of a project used in this textbook. (How is it unique? What were the time constraints? If it is over, how did you know it was over? If it is ongoing, how will you know when it is over?
  3. What was your role? Were you the project manager, a volunteer, some other role? If you were not the project manager, who was?
  4. Was the project part of a larger portfolio or program of projects?
  5. Who else was involved?
  6. What was the budget?
  7. Did you anticipate any risks at the outset? Did the project experience any outside forces that caused a change in either the objectives or the approach to achieving those objectives?

2. Go online and search for project life cycle models. Identify at least two that are different from the PMI model, and compare and contrast the phases. Be sure to cite your sources.

Text

Title: Project Management 

Subtitle: https://opentextbc.ca/projectmanagement/ 

Authors: Adrienne Watt 

Publisher: BCcampus Open Education 

Publication Date: 2019 

Edition: 2nd Edition 

Cloud Collaboration Services

 

  1. Research a cloud collaboration service. Some collaboration service categories include:
    • Project management
    • Calendar sharing tools
    • File sharing and synchronization tools
    • Instant messaging
    • Video conferencing
  2. In a Word document, identify the following and write a brief summary of what you learned in your research:
    • The features and functionality of the collaboration service
    • Who provides the service and billing/pricing options
    • Whether the service is aligned towards personal or business use

SECURE CLOUD ARCHITECTURE

Title: Cloud-Based Web application 

You are part of a startup company. A startup company is a newly formed business with particular momentum behind it based on perceived demand for Web Based Software applications in one of the given fields below. The intention of your startup is to grow rapidly as a result of offering something that addresses a particular market gap in one of the following areas.  Your team was tasked to Develop a new Cloud-Based Web application for Desktop and Mobile for one of the topics below.

  • A new Food delivery app
  • A new Dating App
  • A new Real Estate sales app
  • A new Healthcare application

Select just ONE  of  topic and then explain what this new application would do.

As a startup company, your team has limited resources ( less money and very small  IT infrastructure ) .  

Once you have done that, answer the following questions.

Question 1 What cloud service model you would  use for this app when you are  developing the software ?

Question 2  What cloud service model you would  use  so  the customer can access to the software and use it?

Question 3 What cloud deployment  model  you would use to keep data  and all transactions?

Exp19_PowerPoint_Ch01_CapAssessment_Winter_Camp

 

Exp19_PowerPoint_Ch01_CapAssessment_Winter_Camp

 

#Exp19_PowerPoint_Ch01_CapAssessment_Winter_Camp

#Exp19 PowerPoint Ch01 CapAssessment Winter Camp

Project Description:

You are the director of Covenant Harbor and will be offering a winter day camp opportunity for boys and girls in grades 1-6 during the winter break from school. You have been asked to put together a presentation to advertise the winter camp.

Steps to Perform:

Step

Instructions

Points    Possible

#Start   PowerPoint. Download and open the file named Exp19_PPT_Ch01_CapAssessment_WinterCamp.pptx. Grader has   automatically added your last name to the beginning of the filename. Save the   file to the location you are saving your files.

#Change the theme variant to the blue variant.   (first row, fourth column).

#Change   the theme font to TrebuchetMS.

#On Slide 1, type Winter Break Camp in the title placeholder and Friendships   and Memories in   the subtitle placeholder.

#Add a   new slide after Slide 1 with the Title and Content layout. Type Overview in the title placeholder.

#Type the following bulleted text in the content   placeholder at the level listed.
  • Dates   (first level)
 • December 26, 27, 28, and 31 (second level)
 • 8 am to 4 pm (second level)
  • Activities (first level)
 • Swimming (second level)
 • Sledding (second level)
 • Arts & Crafts (second level)

#Use the   Reuse Slides option to insert all of the slides from Winter Break Camp.pptx after Slide 2.

Delete Slide 3. Move Slide 5 (Sledding) so that it becomes Slide 4.

#On   Slide 1 insert the Snowflake.jpg image.   Crop the image on all sides so that only the snowflake is remaining. Resize   the image to height of 2.11” and the width to 2.22”. Hint: Uncheck Lock aspect ratio in the Size pane. 

#Apply the Beveled Oval, Black picture style to the   inserted image. Position the image horizontally at 3.7″ and vertically at 4.3″.

#Apply   the Fill: Dark Blue, Accent color 1; Shadow WordArt style to the text in the   title placeholder (Winter Break Camp).

#Change the layout of Slide 7 to Panoramic Picture   with Caption. Add the Snowman.jpg   image in the picture placeholder. Apply the Drop Shadow Rectangle picture   style.

#On   Slide 6, convert the bulleted list to a Vertical Bullet List SmartArt graphic.   

#Type the following in the Notes pane for Slide 1: Join Us for   Winter Break Camp. (including   the period).

#Create   a Notes and Handouts footer with the following: Winter Camp Details. Apply to all.
 

#Check the presentation for spelling errors. Make   corrections as needed on the slides.

#Save   and close Exp19_PPT_Ch01_CapAssessment_Winter   Camp.pptx. Submit the file as directed.

Total   Points

100

Position Paper

 

Nyce, Caroline Mimbs. “The Cure for Burnout is Not Self Care.” The Atlantic, published 13 September 2022. https://www.theatlantic.com/ideas/archive/2022/09/what-is-quiet-quitting-burnout-at-work/671413/ 

Carmichael, Sarah Green. “Quiet Quitting is the Fakest of Fake Workplace Trends.” The Washington Post, published 27 September 2022. https://www.washingtonpost.com/business/quiet-quitting-is-the-fakest-of-fake-workplace-trends/2022/09/27/bbf5e354-3e5c-11ed-8c6e-9386bd7cd826_story.html 

Authentication in the Modern World

We discuss authentication from the perspective of computers and users. For this discussion, pivot to consider the modern world and human-to-human interactions. We are often faced with authenticating people we don’t know in various ways. For example, this might be an in-person Craigslist transaction in a parking lot, a blind date arranged from a dating app, or an official (police or contractor) showing up at your door. How do you authenticate someone in the real world? What mechanisms are used to positively identify and confirm their identities? Each of those scenarios may have different strategies, so pick two distinct scenarios to discuss and compare.

        Parameters 

  • Posts should be 250 to 300 words in length
  • Must include at least one source outside of your textbook, and it should be included in the reference list at the end of the post
  • All sources should be used in the content of the post using APA format

Week 5 Assignment

https://www.nsls.org/blog/what-is-servant-leadership-and-how-to-apply-it

https://www.langston.edu/sites/default/files/basic-content-files/TransformationalLeadership.pdf

Please go through the above 2 articles and ANSWER below questions:

Research what it means to be a “servant leader” in an organization.

1. How this style of management can affect team and organizational effectiveness

2. How this style of leadership can inform the ethical practices of an organization. 

3. If there are situations when this type of leadership is not appropriate. 

Note: 300 words with intext citations and 3 references needed.

Week 3: Mobile App vs Web Sites

From a development team of one to two people to an enterprise-level team with multiple divisions, the topic of mobile development will eventually come up. Write a seven to ten (7 – 10) page paper in which you:

  • Compare & Contrast mobile applications vs websites.
  • Research and discuss the importance of developing a mobile strategy.
  • Discuss different system mobile functionalities.
  • Explain the social aspect of mobile interfaces.
  • Discuss two – three mobile application development myths.
  • Argue the need for adaptive vs dedicated mobile websites.

Your assignment must follow these formatting requirements:

  • Use at least ten – twelve (10 – 12 ) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. 
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment