Questions 1: Classes and Pointers

Instructions

This question set covers material on C++ classes (regular and templates) as well as pointers and references (readings from Chapters 1-3 in your book).  Use the lecture slides, your notes, textbook, and other resources to research questions.

When given a choice, always choose the best answer.  Answers such as “None” or “All”, maybe be listed in any order.  For short essay questions, answer in a cohesive paragraph in your own words. If you research any answers in your book or elsewhere, do not copy wording from those sources.

To better understand how any code works: create a C++ project in Visual Studio and test the code.  Include any needed header files.

SQL Servers installation and access (Cyber Security)

 Using your textbook, the Internet, and any other suitable references, answer the following questions in your own words. Save your answers in a single file (minimum length of a full page of content).  Remember to include any sources that you use.

  1. Why would you perform a silent installation?
  2. Under what circumstances would a system administrator lose access to an instance of SQL Server? Give an example.
  3. Oracle offers a free download of all editions of the Oracle Database.  How does the company derive benefits from this approach?

Cloud_computing_week_15

Discussion Topic – Define Scalability and list five (5) to ten (10) potential relationships that align with the Pareto principle, such as how 80% of sales come from 20% of customers. 

 

Paper:

write a paper on governing the cloud. The following are the items to discuss in the paper (please use a different section heading for each topic):

  • List and describe five ways you think the cloud will change the future of TV.
  • List and describe five potential uses for intelligent fabric.
  • List and describe five ways the cloud will influence the mobile application market or vice versa.
  • Discuss the importance of HTML 5.
  • Discuss how the cloud will impact future operating systems.
  • List and describe three potential location-aware applications.
  • List and describe five ways intelligent devices may work together.

Paper requirements:

  • Minimum 1500 words (excluding title page, table of contents, abstract, and references pages)
  • Minimum of seven (7) references
  • Format your paper consistent with APA guidelines
  • When submitting the assignment, please ensure you are submitting as an attached MS Word document.

Facial Expression Recognition

Write a final paper on Facial Expression Recognition with including these topics.

Introduction

History

Types of comparisons in Facial Recognition

Components of Face Recognition

How Face Recognition Works

Face Recognition Techniques

Popular Face Recognition Algorithms

Databases

Advantages and Disadvantages

Sample of Devices

Conclusions

There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices?

Please write 350 words essay on following

 There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices? 

InfoTech Import in Strat Plan (ITS-831)

Discussion: IT Project Management

Word Count: 300+ words

What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents.

Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

At least one scholarly source should be used in the discussion. Be sure to use information from your readings and other sources. Use proper citations and references in your post.

Reading resources:

Chapter 13, “Privacy and Ethical Considerations in Information Management”. Managing and Using Information Systems, Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta, John Wiley & Sons 

Chapter 11, “Managing IT Projects” pp. 246-259. Jenkin, T. A., Chan, Y. E., & Sabherwal, R. (2019). Mutual Understanding in Information Systems Development: Changes within and across Projects. MIS Quarterly, 43(2), 649–671. Retrieved from  https://doi.org/10.25300/MISQ/2019/13980  

plagiarism check required, APA format, within 8hrs

Answer the following questions

 

  1. Demonstrate understanding of VBA’s functionality, applications, and differentiation from Visual Basic.
  2. Apply VBA to the development of automation macros, providing standardized, scalable, cost-effective, and error-free business solutions.
  3. Critique VBA’s use in automation for Web browsers to leverage the Internet to produce effective business solutions.
  4. Construct VBA automation solutions to maximize the functionality of Microsoft Office Applications to control functionality within the Office suite and automate repetitive jobs.
  5. Summarize how businesses can solve issues while remaining innovative, competitive and become more profitable by eliminating waste and performing a more complex and accurate analysis of data using VBA’s automation solutions.

InfoTech in a Global Economy 3.1

 Find a peer-reviewed scholarly journal article discussing electronic innovation and the government. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing.  

 

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

 

  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Threat Assessment

You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Write between 200-300 words.

Use your own words.