Interactivity Research Assignment

  

Week 7 Interactivity Research Assignment

Background: Applying the material covered in Chapter 6 and now in Chapter 7 specifically focusing on Interactivity, the assignment for this chapter will analyze the gallery of 49 chart types from Chapter 6 and provide the following for 5 of your choice.

  1. Select 5 chart type options from the gallery of 49 presented      in Chapter 6
  2. For each, select 3 of the 5 most often used data adjustment      features and for each describe in detail how you would apply each to each      of the 5 chart types. Example for one: Chart Type Selected – Word      Cloud.  The 3 Data Adjustments selected: Contributing – force input      from the viewer/user to select one word from a drop-down list before      moving forward with the display. The results would display the visualization      with the stats for the word the viewer/user selected.  The format for      this information should be in a table format with no attempt for full      sentences.
  3. Immediately following this table, provide your perspective      related to any problems, issues or constraints in selecting 3 data      adjustment features for each chart type selected. You do not have to use      the same data adjustment features for each chart type.  An example of      issues could be after selecting a Stream Graph and a Framing data      adjustment feature, any example I developed did not make sense.  I      also had to change the data adjustment feature of navigating as my first      choice because I could not think of an example to fit the data and chart      type.   Do NOT use any suggestion if any is provided in the text      for interactivity.  Do not copy my examples. You must not copy and      paste any information from the text from the pages in the gallery.       You must apply what you have learned from the previous chapters and not      copy and paste from other sources.  When you do use other sources to      help gather any knowledge such as the text and other online materials such      as the book companion site or the library, include each as a source on the      reference page following APA formatting.
  4. For each chart type selected, provide examples for each of      the 3 Presentation adjustments and why those examples fit the data and      chart type.  Again, use a table format instead of attempting      sentences.
  5. Immediately following this table, provide your perspective      related to any problems, issues or constraints in developing the examples      of the 3 Presentation adjustments for each chart type selected. An example      could be after selecting a Waffle Chart and a Focusing presentation      adjustment feature, I had to develop 4 examples before the final choice made      sense.  Do NOT use any suggestion if any is provided in the text for      interactivity. Do not copy any example I provided.  You must not copy      and paste any information from the text from the pages in the      gallery.  You must apply what you have learned from the previous      chapters and not copy and paste from other sources.  When you do use      other sources to help gather any knowledge such as the text and other      online materials such as the book companion site or the library, include      each as a source on the reference page following APA formatting.
  6. In a conclusion, provide your reflection on the chapter      contents, the material and discussions in the discussion forum, and the      efforts to complete the above requirements to include how these activities      and knowledge will assist you in the future for your data visualization      projects.  These future projects could be the possible initiations at      your organization or personal effort or maybe an upcoming class or degree      requirement.

Your research paper should be at least 3 pages (800 words), double-spaced, margins are normal, have at least 4 APA references, and typed in an easy-to-read consistent font family (size no lager than 12) in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

****The work submitted must be your own.  The work submitted must contain all sources used to complete all the content included.  All wording must be your own.  If you do include direct quotes, these must be cited corrected and must not be more than 3% of the total content.

Imoprtance of strategic IT planning 5

 Discussion: The Future of Offices

Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? Will offices as we think of them today exist in the next ten years? Why or why not?

At least two scholarly sources should be used in the initial discussion thread. Use proper citations and references in your post.

Note: Answer should be a minimum of 300 words

security architecture 17

 

Select an organization that has leveraged Cloud Computing technologies to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

  • Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
  • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
  • Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
  • Conclusion:  Summarize the most important ideas from the paper and make recommendations or how they might have achieved even greater success.

Use the following databases for your research:

  • ACM Digital Library
  • IEEE/IET Electronic Library
  • SAGE Premier
  • Other reputable sources are OK.

URL: https://ucumberlands.libguides.com/security

  • The paper must adhere to APA guidelines including Title and Reference pages.
  • There should be at least three scholarly sources listed on the reference page. 
  • Each source should be cited in the body of the paper to give credit where due. 
  • Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.
  • The body of the paper should be 4 pages in length. 
  • The Title and Reference pages do not count towards the page count requirements.

The Software Factory

It is necessary to explore all of the stakeholders involved within a software’s development to understand the pedigree of the software from a security standpoint. This will then allow a security professional to make informed decisions toward risk management.

Explore where and how the Adobe reader software is developed. In 500-750 words, report your findings. Make sure to address the following:

  1. Where does Adobe indicate their product is located/headquartered?
  2. Where is the software really developed and by whom?
  3. How many are involved in the development of Adobe and what threat might that pose to end users?
  4. What best practices should be considered during the development of the software to reduce security issues in reference to Software Development Life Cycle (SDLC)?

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

Cs 008 Lab abour resume

There has two website: Learn Cs 008 (https://learncs8.com/index.php)and the other one called AWS. Follow instructions with LearnCs008 Lab 3 resume and do it on AWs. 

Application Security to Software development

 

  1. How does Application Security relate to software development?
    1. Define application and software development
    2. Briefly describe the role of application security in software development
  2. Discuss two software development approaches
    1. For each briefly discuss the high-level principles/approach
    2. Discuss how Application Security should be included in each phase/step of the approaches
    3. Discuss what elements of the application should be addressed and how.  Examples: data at rest, data in motion, identity management, etc.
  3. Discuss the potential downfalls that can occur if Application Security is not integrated with application development

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

The Meat Lady Dilemma

 Mrs Parker owns and operates a meat shop that processes and packages parcels of minced meat that is being sold to schools in the US. Her scales are all calibrated to perform measurement in pounds, however when the parcels are packaged, they need to be labelled in ounces. Mrs Parker has established that 1 pound is equivalent to 16 ounces. In each production cycle, 250 packs of meat are processed and the weight in pounds varies for each package. Mrs Parker is also interested in knowing the total costs, the total revenue and the total profit of each production run, given that the costs to produce and package an ounce of meat is US $0.25 and that the selling price of an ounce of meat is US $0.55. Because you are a budding Software Engineer, she has sought your assistance in creating a software solution that can be used within the business establishment. 

Required: A. Specifically identify the type of control structure which is needed to process the meat in each production run and provide a reason for your choice (4 marks) 

B. Your solution needs to represent the meat packages which are to be processed, how would you represent this appropriately in your program and what has guided your choice?  (4 marks) 

C. Construct a C# program that will solve Mrs Parker’s dilemma by making use of the choices made above. 

i. Implementation of the control structure to process the meat (2 marks) 

ii. Implementation of the meat packages to be processed (2 marks) 

iii. Calculation of costs, revenues, and profits (6 marks) 

iv. Appropriate program outputs displayed to the user