Subtopics for Search Engine Optimization. Need additional points added to each subtopic mentioned in the document.
Business application
In this 250-to-300-word journal entry, reflect on the THS case study (attached) and the strategic reasons why the organization pursues a consumer and provider mobile health IT strategy. Assess the technical and nontechnical resources needed to launch a consumer and provider mobile application. What is the respective value of each of these applications to the business?
CIS337 Final Project part 1
Follow Assignment PDF then Follow Journal Rubric and answer questions
Please complete the following questions after completing the assignment
Please reflect on the following questions in your journal:
- What, if any, challenges do you foresee in completing your final project?
- What are you hoping to learn as a result of this project?
- Are the outcomes for the assignment clear to you?
Research paper management
Project to implement the website which consists of research papers and functionalities includes sorting and searching the desired paper using REACT. Must include
>authentication
>database consisting of user details and uploaded research papers
>paper should be of editable pdf format
> sorting functions includes based on keyword, year, and techniques used
Practical Connection Assignment
Practical Connection for information Goverence
Software -Model
Assignment Description
Please read chapter 2 of your textbook and review lecture slides/ and library resource and reputable articles/journals and in your own word explain your understanding of the following Software Process Models:
A) The waterfall model and its problems
B) Incremental development model AND Incremental development benefits AND Incremental development problems.
computer mediated collaborated work
For your initial reaction post, focus on what constitutes a collaborative interaction.
- Are there other collaborations that you can think of, for which there is a technological help?
- Why is it important to understand how people collaborate?
Do include some of the learning from the mandatory reading part and connect with one or more of the articles listed. Make sure you include references/sources in your posts.
https://www.interaction-design.org/literature/book/the-encyclopedia-of-human-computer-interaction-2nd-ed/computer-supported-cooperative-work
http://egerber.mech.northwestern.edu/wp-content/uploads/2013/10/2014_CrowdfundingWorkCommunities_CSCW_Accepted.pdf
http://fid.cl/courses/hci/collaborative/lda_quality_camera_ready.pdf
Computer Science
Assignments:1
Learning About OWASP
Visit the OWASP website.
Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP.
See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.
Safe Assign is software that verifies the originality of your work against on-line sources and other students.
Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. For your first written assignment, you have unlimited times to retry your assignment.
To improve Safe Assign score, submit references in a separate document or paste in the text section.
Attach your WORD doc and then hit SUBMT.
Assignment:2
Learn About creating good password security.
An IT Security consultant has made three primary recommendations regarding passwords:
1. Prohibit guessable passwords
o such as common names, real words, numbers only
o require special characters and a mix of caps, lower case and numbers in passwords
2. Reauthenticate before changing passwords
· user must enter old pw before creating new one
3. Make authenticators unforgeable
· do not allow email or user ID as password
Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations. Do you agree or disagree with these recommendations. Would you change, add or delete any of these? Add additional criteria as you see necesarry.
Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.
To improve Safe Assign score, submit references in a separate document or paste in the text section.
Attach your WORD doc and then hit SUBMT.
Assigment:3
Do a bit of research on JSON and AJAX.
How do they relate to the the Same-Origin policy?
Using WORD, write several short paragraphs on each. A total of 200-300 words.
Use your own words and do not copy the work of another student.
Attach your WORD document here.
Assignment:4
You are the web master of a college website. You share a server with other school departments such as accounting and HR.
Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.
Write your answer using a WORD document. Do your own work and use your own words. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.
You have three attempts.
To improve Safe Assign score, submit references in a separate document or paste in the text section.
Attach your WORD doc and then hit SUBMT.
Assignment:5
Do a bit if research into File Inclusion Vulnerability.
- What is it?
- Why is is dangerous?
- What is the difference of low and remote inclusion?
- What methods can me employed to prevent a security breach?
- What programming languages are vulnerable to this type of attack.
Post between 100-300. Use your own words. Do not copy the work of another students.
Assignment:6
You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:
· Who is likely to attack your site?
· When are attacks likely to occur?
· What sort of attacks might take place?
· How can you best minimize attacks and protect the integrity of your site?
Write between 200-300 words.
Assignment 2(Week2)
Complete the following assignment in one MS word document:
Chapter 2 – discussion question #1 & exercises 4, 5, and 15(limit to one page of analysis for question 15)
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).
MS Excell
I have an assignment in MS excel spread sheet
