Data

 

Write a short paragraph (< 100 words) on the importance of programming in data analytics. Also, write the advantage of open source language like R over other licensed programming software.

Requirements for Discussion Assignments

Compose a well-developed post (< 100 words) that is comprehensive in answering questions posed on the discussion board

Swift Programming

**The programming needs to be done in Swift language. . The program is about implementing an app that shows the biography of each character of the game.**

Analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure.

Analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.  

MI

 Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.

Identify one cryptographic attack and how you can protect against it. 

.Ask an interesting, thoughtful question pertaining to the topic

· Provide extensive additional information on the topic

· Explain, define, or analyze the topic in detail

· Share an applicable personal experience

· Provide an outside source 

· Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources. Use proper citations and references in your post.

Application Security in software development

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. How does Application Security relate to software development?
    1. Define application and software development
    2. Briefly describe the role of application security in software development
  2. Discuss two software development approaches
    1. For each briefly discuss the high-level principles/approach
    2. Discuss how Application Security should be included in each phase/step of the approaches
    3. Discuss what elements of the application should be addressed and how.  Examples: data at rest, data in motion, identity management, etc.
  3. Discuss the potential downfalls that can occur if Application Security is not integrated with application development

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

IT204 office 365 Application assignment 2

Note: Unicheck is not used for this assignment since you are re-formatting  instructor supplied text.

Use the text below and format as described. Copy and paste it into your document. The font for the header is Arial Black or another sanserif font. Use Times New Roman for the body. Your press release should fit on one page. You may need to adjust the photo’s size to make this happen. Run spell check to correct misspelled words as there are intentional misspelling and grammar errors in the original.

We will discuss the tools for this assignment in class, you can use online sources as a refresher.

Submit by Sunday 11:59 PM.

Email Richard Lanier with any questions. [email protected]

This is the beginning of the document you will submit.

(1 blank line from the top of the page)

Press Release (Center, 20 point Arial Black font, red color with a light gray fill)

For Immediate Release 1/12/2021 (center, underline, 12 point Arial Black font not bold)

(2 blank lines)

Celebrate the end of Covid! (Times New Roman font, bold 12 point, centered. Indent the following paragraph one tab)

You are invited to atend an a walkathon (Times New Roman font, 12 not bold 1.5 line spacing) to raise money for the capital area food bank. (capitalize and bold and underline the words capital area food bank) All money that is raised will be donated to feed hungry people in the Washington area. Please wear a mask ans social distance.

Date: Saturday, June 19, 2021

Time: 10:00 AM 

Place: The Mall in Washington, D.C. (Use bullets and indent two tabs for the date, time, place)

Contributions accepted. You decide what to give. (Indent two tabs, but no bullet)

Come join the fun! (Bold, 14 point, center, yellow highlight)

(1 blank space.  Make a bullet list for the following. Left align the list, one space, 14 point  not bold)

Exercise while helping people.

Wear comfortable walking shoes.

Free water and snacs will be provided.

Wear a mask and social distance. (add one line)

Insert a photo of someone jogging on the right of the type you just pasted. Rotate the photo and add a picture border.  Add as many lines as needed after the photo to fit the following information. Add a picture watermark titled Press Release.

Sponsored by students of I Global University, Fals Church, va (left align, 12 point type)

For more information, contact

Your name

Your email address

Check the document properties. Who created it? When was it created. Write this at the bottom of the page. Created by ______________ Date _______________.

Add a page border and a watermark. Add a light value background color to the page.

Discussion

  After reading chapter 13,  analyze the advantages and disadvantages of digital signatures. You are also required to post a response to a minimum of two other students in the class by the end of the week.  You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted. 

Response to Peers – Week 5 – Info tech

Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

IDM W 7 D

 Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects. Consider both supervised and unsupervised cases. 

Watch a Netflix Film “The Social Dilemma” and consider your role in the world of social media employee or consumer

Assignment:

1. Please give me all the details of considering my role of employee or consumer.

   write 4-5 paragraph to justify my role and issue surrounding the design and operation of systems for the functional areas of business because of social media.

2. list down atleast 10 different points to allow me speak in discussion.

Engage: Join your classmates for a live discussion on this film. 

Current Events: Watch a Netflix Film “The Social Dilemma” and  consider your role in the world of social media employee or consumer.

Consider well the use of social media systems within the functional areas of business. 

Deeper into a few issues surrounding the design and operation of systems for the functional areas of business.

This discussion will focus on SM within organizations – cost, commitment, champion or catastrophe.