asignment

 

FORENSIC DESIGN ASSESSMENTS

This task relates to a sequence of assessments that will be repeated across Chapters 6, 7, 8, 9 and 10. Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.

For this task, take a close look at the interactivity choices:

  1. Start by identifying all the interactive features deployed, listing them under the headers of either data or presentation adjustments
  2. How suitable are the choices and deployment of these interactive features? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential interactive features and functions, what would you do differently or additionally?

Assignment Link: http://book.visualisingdata.com/chapter/chapter-7

Access control discussion 11

Discuss the importance of guidelines and procedures for access control.

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly cite the references.

Data Security

Considering the importance of data in an organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately 3-4 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

short answer

 

please respond to the following:

  • Introduce yourself to your peers by sharing something unique about your background. Explain how you expect this course will help you move forward in your current or future career.
  • Imagine that you are a lead developer for a social media company and that one of your responsibilities is to help mentor junior developers. The junior developer that you are currently mentoring made a comment at a recent code review meeting that JavaScript is too cumbersome because of the cross-browser issues (for example, some functions do not work correctly on all Web browsers).
    • Explain to the junior developer how JavaScript fits into the client or server architecture. Your response should include the major pros and cons of using JavaScript in the client or server model.
    • The junior developer countered that web applications can be written without JavaScript and can function just as efficiently as applications that are written with JavaScript. Suggest another way that you could develop a website without JavaScript or any other client-side scripting. Compare this website’s functionality in relation to JavaScript and the requirements on the clients and servers.

HackerView Vulnerability Assessment

 Prepare answers according to the questions given in this week’s homework document.  The assignment is that you “provide a remediation plan based on the HackerView vulnerability assessment”  I have attached a sample assignment as a guide and a pdf that need to be followed. 

I have to submit this assignment on 11/5 2020 at 11:00 pm EST

Java Programming

 I have an assignment that is almost complete but there are some lines of code causing it not compile and I can’t get to any of the logic errors. I would like these fixed along with some explanation of what you did. You can put this is lines of comment and I can delete them later. 

The syntax errors I caught are as follows on the lines I see: Controller class: 167; Person class: 139, 143 (there was a third at the end but i got rid of an extra }) Several lines in the Controller class don’t have a syntax error but they probably are logic errors: 39, 42, 69, 74, 79, 82, 86, 108, 111, 127, 130, 150, 153, 159, 163. 

There could also be logic errors elsewhere. There may also be typographical errors as well because the professor has always had at least one. 

Organ Leader and Decision Making

 This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age.  Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

computer ethics A2

  

Assignment 2 

In a typical 1000-word essay, discuss what is unique about IT and Computers as far as ethical issues? 

How should people approach ethical issues that IT, Information Networks and Computer Technology present? 

Do not select passages from any resources! You must express your opinion from your reading of the course materials and online resources.

Students have to include proper citations. The essay’s quality of writing is part of the assessment. Therefore, grammatical, typographical or syntactical errors will affect the grade. No late submission. It WON’T be accepted.

Pseudocode and Flowchart Solution

Instructions:

Create a PowerPoint that contains a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. Use Microsoft PowerPoint® for Pseudocode and the flowchart.

  • Problem 1: Create a list that contains the months of the year.
  • Problem 2: Create a loop to print the month number and name (do not hard code the month number)

Consider using the attached enumerate method to help!