Statistics Associated with apps in Google Play

The Google Play marketplace provides an online mechanism for developers to share their apps. What are some of the statistics associated with existing apps in Google Play? Identify three different apps in Google Play and discuss aspects that make the apps successful. 

Ethical Hacking week

 Assignment Questions:

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication.

S1/4 Discussion

  1. Review Chapter 13 in Principles of Information Systems. 
  2. In the discussion linked below, respond to the following prompts:
    1. Discuss the concerns and issues of privacy and compliance with the interconnected world of the internet.
    2. Discuss the various laws and regulations associated with cybercrime. Select two regulations or laws and provide an in-depth description. What are the challenges of enforcing such laws or regulations? Based on your understanding of the law or regulation, how could it be more completely and efficiently enforced?
    3. Do these laws and regulations need to be enhanced (regulation vs. net neutrality)? Explain why or why not.
  3. Your initial post should be a minimum of 300 words 

Research Assignment

 

Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs(300 words) in length and uploaded as a TEXT DOCUMENT. (add References please)

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

https://www.lifewire.com/learn-how-antivirus-4102748

http://www.sans.org/newsletters/

http://news.cnet.com/security/https://www.onlinesecurity.com/news–publications-pagehttp://www.esecurityplanet.com/viewshttp://netsecurity.about.com/
https://www.techrepublic.com/

Data Analysis

 Present the data below:

  • Last updated – Oldest to newest
  • List of Area coordinators with courses and highlighted updated date
  • Graph and data analyzing the percentage of courses that were last updated more than 5 years, 4 years, 3 years, 2 years, and 1 year.  

Course developer contact list

  • List of Area Coordinator with the list of their CDev’s teaching in their content area.
  • List of Course Developer with a list under their names with of instructors eligible to teach in their content area and a list of those who have taught in their area in the past 2 years with their contact information.

In the data, if there is a * for last contract, means that it’s too old and there is not date listed.  If there is a blank for last maintenance, this means the course has not been maintenance. 

Research paper on the emerging technologies

Write a Research paper on emerging technologies. 

Your research paper must be at least 5 pages in length, double-spaced, 12 font, and include at least 5 references, at least 2 of which must be peer-reviewed. 

The cover page and reference page are NOT included in the 5-page length requirement. 

Interactive Design

  1 page

Describe how Interaction Design in social and mobile Web technologies influences a user to seek information or purchase products online?

with APA 7 format and minimum 3 intext citations.