- Discuss Howell and Mendez’s three perspectives on followership. Note how these behaviors influence work productivity.
- What is the big five personality model?
- What is the Myers-Briggs test? How is it similar to the Big five model? How is it different than the Big five model?
Assignment and Discussion
Week 10 – Discussion
Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database. Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not?
Writing Assignment – Wk 10
Some common biometric techniques include:
- Fingerprint recognition
- Signature dynamics
- Iris scanning
- Retina scanning
- Voice prints
- Face recognition
Select one of these biometric techniques and explain the benefits and the vulnerabilities associated with that method in 3-4 paragraphs.
Week-10 Discussion
In no less than 250 words, describe a hacking tool that is used to gain access to a network. Explain how the tool is used, how it works and how a netwoprk administrator can prevent this tool from access the network
Week 10 Assignment
- 10.1 What are three broad mechanisms that malware can use to propagate?
- 10.2 What are four broad categories of payloads that malware may carry?
- 10.3 What are typical phases of operation of a virus or worm?
- 10.4 What mechanisms can a virus use to conceal itself?
- 10.5 What is the difference between machine-executable and macro viruses?
- 10.6 What means can a worm use to access remote systems to propagate?
- 10.7 What is a “drive-by-download” and how does it differ from a worm?
- 10.8 What is a “logic bomb”?
- 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
- 10.10 List some of the different levels in a system that a rootkit may use.
- 10.11 Describe some malware countermeasure elements.
- 10.12 List three places malware mitigation mechanisms may be located.
- 10.13 Briefly describe the four generations of antivirus software.
- 10.14 How does behavior-blocking software work?
- 10.15 What is a distributed denial-of-service system?
Room reservation site
Hello, this needs to be a very basic webpage. This is project for a school assignment and doesn’t need to be flashy or extra. Think the simpler the better. As long as it works and hits all the points listed below ill be fine. Requirements:
- Allow users to login to the site
- Create a database to hold login info for website, reservation info, & conference room info
- Allow users to register to the site
- Users should be able to reserve rooms for a specified date and time range
- Validate user input
- Display error messages when appropriate.
- List conference room reservations sorted in date and start time order
- Allow two display options:
- All-display all conference room reservation schedules; past and future
- Future-display conference room reservations that are scheduled in the future only
This site is to be hand coded ONLY do not use and site builders, any plugins/widgets, I only need it to be very basic. This is not a professional site it is a school project. I have provided a link of what is considered too far and not what im asking for.
http://mdimond.info/2550/conference/login.php
* Do not allow reservations outside of business hours or during the weekends
discussion
A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization.
Reply post
For this week’s discussion, please view the Periodic Table of Visualization at the following link (http://www.visual-literacy.org/periodic_table/periodic_table.html). Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. Provide the class with a brief description of your choices and explain why you made your choices. Also, describe what advantage do your choices have over the others. Remember to also reply to at least two of your classmate’s posts on this questions and include all in one single thread.
BI Week 15 Assignment
Complete the following assignment in one MS word document:
Chapter 13- discussion question #1-4 & exercise 3 & 4 & 6
When submitting work, be sure to include an APA cover page and include at least two APA formatted eferences (and APA in-text citations) to support the work this week. All work must be original (not copied from any source).
Discussion 1. Compare the IoT with regular Internet.
Discussion 2. Discuss the potential impact of autonomous vehicles on our lives.
Discussion 3. Why must a truly smart home have a bot?
Discussion 4. Why is the IoT considered a disruptive technology?
Exercise 3. AT&T is active in smart city projects. Investigate their activities (solutions). Write a summary.
Exercise 4. It is said that the IoT will enable new customer service and B2B interactions. Explain how.
Exercise 6. Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities.
411F7
CHECK ATTACHMENT
2 discussions due in 16 hours
50 words in initial post:
INSTRUCTIONS:
- Respond to the below topic in a minimum of 50 words. (5 points)
- Reply to at least 1 of your classmates. Be constructive and professional in your responses. (5 points)
Your participation in this online activity will count toward this week attendance.
How to Manage your Outlook Mailbox Effectively
There are many benefits of using email over paper, phone, and face-to-face communications such sending messages whenever you wish. You do not have to wait for the people you need to talk with to be in their offices. Other users can send email messages to you, even if you do not have your email program open. Your messages can be as long as you wish, so you are not limited to the short time typically allowed on some voice mail systems. You can also attach a file (such as a spreadsheet or word processing document) to a message.
Describe some of the issues that can be caused by not properly managing the size of one’s Outlook® mailbox.
What are some ways to organize messages and clean up or reduce the size of one’s Outlook® mailbox?
TEYLOR’S POST:
One of the most effective ways to organize your messages would be by creating certain folders for your important mail. Creating folders and using the quick step tools allow us to reduce our mailbox size. Also responding to mail that takes us seconds to reply helps with this as well. If we do not correctly manage our mailbox important mail could be overlooked and ignored.
INSTRUCTIONS:
- Respond to the below topic in a minimum of 50 words. (5 points)
- Reply to at least 1 of your classmates. Be constructive and professional in your responses. (5 points)
Your participation in this online activity will count toward this week attendance.
Digital Literacy
It’s hard to imagine a job that doesn’t require a working knowledge of a personal computer.
Research the term digital literacy. Use several different websites to get an idea of what this term means.
What does it mean to be digitally literate, especially in career that you plan to pursue, and why is it important?
SHELBY’S POST:
Digital literacy becomes very important when you are trying to start your career. Digital literacy means having the knowledge to work and learn how to communicate through the internet. In most careers you use web browsers, email, PowerPoints and have to create and edit things and that is digital literacy.
D15
Please go through the attachment for assignment details.
Ethical Hacking week 2
Wk 2 Research Assignment
Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.Your assignment should be 3-4 paragraphs in length.
Data structure (Python)
Please following the requirement which is in the PDF file(cs261 assignment instruction), and give the same output as the PDF file shows.
Then, answer the 4 questions which I give in word file and I also provide the pdf files which the questions required.