Describe mobile (UID) user interface design. Discuss mobile application development today.
Intro to data mining
PFA to complete this.
Create an order menu as following.
Assignment 2
Create an order menu as following.
1. Filet-O-Fish…………………………………$2.00
2. McDouble……………………………………$3.50
3. Big Mac…………………………………….…$3.99
4. Cheeseburger……………………………….$2.99
5. McChicken…………………………………..$3.00
6. Soft Drinks…………………………………..$1.00
7. 1% Milk…………………………………….…$1.50
8. Premium Tea……………………………..…$1.00
—————————————————
Prompt a user to choose an item from the order menu, also ask the user how many of
the chosen item he/she wants. Then the program will generate a receipt.
e.g. Filet-O-Fish x 2……………………………..$4.00 (@$2.00)
Sub-total………………………………………$4.00
HST 13%………………………………………….$0.52
Total…………………………………………….$4.52
Assignment W9 (E-commerce)
1-2 pages
Assume that you have been appointed to start an e-Commerce retail business selling various merchandise online and accepting credit card payments for them. List all the steps necessary to build and lunch this e-Commerce business.
Write a C# program to help a local restaurant
Write a C# program to help a local restaurant automate its breakfast billing system. The program should do the following: a. Show the customer the different breakfast items offered by the restaurant. b. allow the customer to select more than one item from the menu. c. calculate and print the bill. Assume that the restaurant offers the following breakfast items (the price of each item is shown to the right of the item): Plain Egg $1.45 Bacon and Egg $2.45 Muffin $$0.99 French Toast $1.99 Fruit Basket $2.49 Cereal $0.69 Coffee $0.50 Tea $0.75 Use an array, of the struct menuItemType and include the following methods: showMenu, priceCheck – which calculates and prints the check. (the billing amount should include a 5% tax). You may assume that the customer can select multiple items of a particular type.
Write a program that allows
Write a program that allows the user to input a matrix and outputs the reduced echelon form. Please have comments on the code.
Exp19_Excel_Ch05_ML1_RealEstate.xlsx
Need assignment completed
Presentation on responsibilities of cloud provider and consumer in security controls
For this assignment’s scenario your management is considering deploying several VMs for the next project to the cloud in an IaaS service model to replace your current on-prem data center. They have asked you how hosting the workload in the cloud will change responsibility for security controls. Develop a PowerPoint presentation of no more than ten slides and provide guidance on who will be responsible (the cloud provider or your organization) for various security controls. Give specific examples using the VM you deployed in the previous module as a guide. Consider patching, intrusion response, software updates, network access, security monitoring, system redundancy, and physical security.
Instructions:
- This PowerPoint can include pictures, animation, whatever will professionally allow you to get your message across.
- Make sure to use your Speaker Notes (under the bottom of slides) to narrate your presentation materials, topics, images, etc. Remember that the slides are used to organize the topics you are presenting, while the speaker notes are used to narrate (explain, elaborate, etc.) your presentation.
- Review the directions carefully, consider all of your options, and provide details with explanations. Defend your work with examples and references.
- All assignments are expected to adhere to APA formatting standards (references and citations), reflect a high level of scholarship, use correct grammar, and reflect critical thinking and problem-solving skills.
Windows Hardening Recommendations Scenario
As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.
The following are issues to be addressed through hardening techniques:
§ Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in the dictionary.
§ Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.
§ Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to access any protected resources in the Always Fresh IT infrastructure.
§ To protect servers from attack, each server should authenticate connections based on the source computer and user.
Tasks
Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.
Required Resources
§ Internet access
§ Course textbook
Submission Requirements
§ Format: Microsoft Word (or compatible)
§ Font: Times New Roman, size 12, double-space
§ Citation Style: APA
§ Length: 2 pages
Self-Assessment Checklist
§ I addressed all issues required for the summary report.
§ I created a well-developed and formatted report with proper grammar, spelling, and punctuation.
§ I followed the submission guidelines.
Human Computer Interaction
- For the Usability Journal assignment, you are to write three (3) journal entries.
- Each entry shall be approximately 300 words each.
- Each entry shall focus on an object that contains a bad usability design.(NO WEBSITES OR APPS!!!)
- Example objects includes doors, faucets, light switches, doors, ovens, microwaves, pianos. Real objects!!!!
- Explain why the object being described does not maintain good usability practices.
- The deliverable shall include citable examples of best practices from academic literature explaining why the product/object does not follow best practices.
Example: A remote control.
- What about the remote control makes the device both a good and bad example for the usability perspective?
- Each deliverable will contain:
- Three entries with 300 words for EACH entry
- APA citation with examples from scholars explaining best practices that should be followed
- An example image of the bad design practice followed
- An example of good potential practices to follow