project answer

Data analysis and summary are required

Please use data analysis software for data analysis, complete data analysis and conclusions, and put forward corresponding suggestions

project showed in the file below

answer (a) and (b)

Usability Journal

For the Usability Journal assignment, you are to write three (3) journal entries. 

  • Each entry shall be approximately 300-400 words each.
  • Each entry shall focus on an object that contains a bad usability design.
  • Explain why the object being described does not maintain good usability practices.
  • The deliverable shall include citable examples of best practices from academic literature explaining why the product/object does not follow best practices.

Example: 

  • A remote control. 
    • What about the remote control makes the device both a good and bad example for the usability perspective?
    • Each deliverable will contain:
    • Three entries with 300-400 words for EACH entry
    • APA citation with examples from scholars explaining best practices that should be followed
    • An example image of the bad design practice followed
    • An example of good potential practices to follow

database

 The exercise consists of doing exercises from attachment named “2.5 instructions” from the information on “1.9.docx” attachment.  

Discussion Reply!!! About 50 words

 

  • What advice or encouragement do you have for your classmate?
  • What did you learn about the topic from the visual aid? 
  • Do you have any suggestions for how your classmate could revise their visual?

 Based on the text I believe that using PowerPoint is going to be the  best option for my speech so that I can show visual representations of  some of the data points that I will be talking about, as well as adding  context to my points. When considering what visual aid I should use, I  considered the more technical aspect of my speech and how important the  data is in some of the points I am making. I wanted to make sure that  the data I’m talking about is making sense to my audience, so showing  visual comparisons will help the audience make sense of the data I  mention during the speech. Some of the points I make might be surprising  to people, so it will help to see photos of some things in real life to  help people realize that the things I am saying are true. I also  committed a slide to mention some of the other interesting things to do  with my topic that I don’t have time to discuss because I’d like to  leave the audience with something to think about and google when I am  done.  

SECURITY POLICY & STANDARTS

NIST Cyber Security Frameworks

When a company is looking for potential vendors/suppliers for a project, what would be the impact if the company asked vendors submitting proposals to provide information about their cybersecurity framework profile? How would that affect the supplier-customer relationship?

Assignment

 The latest generation of mobile devices are portable enough to carry at all times, connected to voice and data networks, and contextually aware by using sensors and networks to preemptively complete tasks.  Many of today’s mobile applications are personalized, and are not useful if they can only access the data on the phone.  For a user to get, for example, sports scores, retrieve stock quotes, or perform accounting work, the mobile device needs to communicate with one or more servers, starting with the Window servers.

  • Discuss effective use of screen real estate
  • How does mobile user interface designs & websites reduce end-user self-efficacy?
  • What are the challenges of integrating mobile applications with multiple databases? 

 

  •  Late assignments will not be accepted. 
  • This is a required assignment and is worth 50 points.
  • You must apply and use the basic citation styles of APA.
  • Do not claim credit for the words, ideas, and concepts of others.
  • Use in-text citation and list the reference of your supporting source following APA’s style and formatting
  • Do not copy and paste information or concepts from the Internet and claim that is your work.  It will be considered Plagiarism and you will receive a zero for your work.

Apa format

Risk Assessment vs Vulnerability Assessment: How To Use Both ?

400-500words no format

The calculation of risk is fundamental to security assessment and threat molding, for real-world calculation risk might be as:

Credible Attack Vector * impact = Risk Rating

Apply this equation to your organization or any real-life situation and explain in detail how you will use it?   

This assignment should be in APA format 400-500