BSWA Week 8

 In 300 words, 

You are the web master of a college website. You share a server with other school departments such as accounting and HR.

Create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.

Assignment

 

Web Analytics: The Importance of Defining Goals and Funnels

Explore and understand why defining goals and funnels are important. Please, answer the following questions:

1. What is a Website goal, define how this will assist you in visitor engagement and why would you want negative goals?

2. Describe the five funnel shapes and give examples of what they mean.

3. Can you think of a 6th funnel shape and example? (i.e. some ideas might be thought of by better understanding the Amazon shopper or a “wishlist”)

 Please submit a Word Doc with your answers, in 500 words or more, and use references in support of your answers. 

Machine Language

 

In this assignment, you are given 5 programming challenges (20 pts per question). And you need to write MASM assembly codes using techniques we covered about 8086 assemblies in our previous lectures. You may write your assembly code for each question in separate files (e.g. 1.asm, 2.asm, …, 5.asm) and submit them (compressed or separately) through D2L system. Your code should be able to be executed in MS-DOS or its compatible systems and produce the correct output. The due time for this assignment is 10/01/2020 11:30 pm Central US time.

======= Challenges ======

Q1> Create a stack in RAM from address 0x20000 and initialize its capacity with 10 bytes. Store two values A1h, B2h in turn and pop the values to AX and BX registers separately. In the end, interrupt the procedure and return.

Q2> Store two values A1h and B2h in RAM, your data segment should start at address 0x20000 and offsets 8 and 16 (in decimal) respectively. In the end, interrupt the procedure and return.

Q3> Calculate 2^10 (2 to the power of 10) with a loop and store the result to the DX register. In the end, interrupt the procedure and return.

Q4> May or may not use the ES register, iteratively copy 10 continuous byte values stored in memory from 0x20000 to 0x20100. In the end, interrupt the procedure and return.

Q5> Sequentially scan 10 bytes from your code segment (from the beginning) and accumulate the summation result to the DX register. In the end, interrupt the procedure and return.

week 10

 

This week’s journal articles focus on empowering leadership and  effective collaboration in geographically dispersed teams, please answer  the following questions:

How do geographically dispersed teams collaborate effectively?

Please find at least three tools on the market that teams can use to  collaborate on a geographically dispersed team. Please note the pros  and cons of each tool. 

Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why. 

 

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover  page, an introduction, a body with fully developed content, and a  conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to  transition thoughts. Don’t forget that the grade also includes the  quality of writing.

 

https://doi.org/10.1111/peps.12108

http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=eue&AN=112508299&site=eds-live&custid=s8501869&groupid=main&profile=eds_new

Job search 4.0

Research project manager’s positions and please post the following. Please do not copy and paste from web sites.

  1. Find three different job postings in the area you live in for a Project Manager. What are the items in the three job ads that are the same? Are there any major differences? Also, look up how much a project manager earns in your area. 
  2. In your opinion was any of the information that you uncovered in your search interesting or surprising?
    2000 words 

introduction to information technologies

Apply the knowledge obtained in this chapter and prepare a research paper in  MLA style named:  History of cryptocurrency.

  • with at  least 4 pages long.
  • document should have an overview of how the Internet has evolved from its beginnings in the 60’s until today.
  • make sure the document complies with all MLA style standards.
  • when done upload the document.

Network traffic analysis

It is expected that your report will be in the region of 1500 words.

You are expected to conduct an analysis of this network packet capture— (will provide) using Wireshark. You are required to present your findings in a factual manner, to convince decision makers of a large corporation on business strategies.

Network Security Technologies and hardening

 

  • This week we discussed Network Security Technologies and hardening of Devices. What are some of the Security Basics when it comes to workstations and ways to secure Server environments? Identify a minimum of two additional Network Devices and ways to secure the devices? Please provide input based on this week’s reading and homework assignments, personal experience, and internet research with a cited reference in APA format.