Assignment

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. 450 words minimum

In today’s fast-paced, often “agile” software development, how can the secure design be implemented?

discussion

 

Do you believe Artificial Intelligence or Machine Learning is the future of cybersecurity? Explain why or why not.

Quantitative Research

 Write a brief paper in APA format of 500-1000 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and include the tables below to support your findings. Refer to the APA Sample Research Paper as a template for your write up.

A survey was conducted to analyze the debt of individuals in the United States. A researcher obtained this secondary data and ran Chi-Square and Crosstabulation analyses to determine if people who defaulted on loans is associated the level of education they completed. Additionally, the researcher wanted to determine which education level(s) are more likely to default on a loan. The results of his analyses are provided below.

Write the Results section of the paper and present the results using appropriate APA-formatted tables and figures. Include one research question and one set of an aligned null and alternative hypothesis to address the research goals outlined above. Follow all APA conventions and include the proper APA statistical notation. A clustered bar chart comparing the number of people who defaulted or did not default on a loan, for each education level, is included to help the reader visualized the data and should be included in your paper as an APA-formatted figure.

project 8

  

Project 8 

1. You are approached by a hospital to maintain the data records of its patients. Which file organization technique would you suggest? Why?

2. What are the advantages and disadvantages of each access control method? Which of these methods would you recommend for a highly secure system with several files and several users?  Provide reasons for your answers.

Prepare the slide with a diagram and link to the reference 

2 slide each question 

BSWA FP

Final Project Topic Name:  Security and the Cloud

In 100 words (1)

1.  Include a short paragraph describing your project (  Security and the Cloud ) and how you intend to research it. 

In 200 words (2)

2. Brief abstract describing final project (  Security and the Cloud ).

3. 500-600 words, double spaced, written in APA format, showing sources and a bibliography

Please include the following:  

 What is ( Security and the Cloud ).

Advantages/Disadvantages

Challenges one might face

Conclusion:

References:

Apply: Signature Assignment: SDLC Presentation

 

Refer to Ch. 3, “Pine Valley Furniture Company Background,” in Part One, “Foundations for Systems Development,” of Modern Systems Analysis and Design. In this course, there are weekly assignments incorporating Pine Valley Furniture, and you might use components from the previous week’s assignment to complete future Pine Valley Furniture assignments. 

Imagine this scenario: You work for Pine Valley Furniture. The board of directors is considering launching a WebStore and does not know what is involved in developing a new system. You have been asked to present to the board of directors to help them know what to expect.

Create a 12- to 16-slide presentation directed to the board of directors in which you:

  • Explain the importance of using systems analysis and design methodologies when building an information system.
  • Justify the systems development life cycle (SDLC) implementation, and explain why that’s the best option, rather than the quick and easy process.
  • Summarize the criteria for selecting commercial off-the-shelf software (COTS) presented in Modern Systems Analysis and Design, Ch. 2.
  • Identify additional criteria that are, or might be, used to select COTS.
  • Consider if the choice was between alternate custom software developers rather than pre-written packages.
  • Select appropriate criteria for comparing multiple application custom development bids.
  • Briefly define each of these criteria.
  • Briefly summarize the project management process.
  • Explain which of the 4 project management process phases you think is most challenging.
  • Explain how to mitigate the risks for that stage.

Include speaker notes and media, such as graphics or tables.

Cite any references and graphics used to support your assignment.

Format your citations according to APA guidelines.

5s week 3 assignment PL

 Answer each of these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 

10. How many public cameras is too many? 

No copy paste strictly, plagiarism results in course termination.