4s week 11 assignment IA

In 350 words

What are some of the characteristics and operations of some of the malicious software that exists today?

Include references.

No copy-paste, use your own words.

BSWA Week 9

In 300 words.

 Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

Multi-Touch Screens Versus Mouse-Driven Screens

 

Multi-Touch Screens Versus Mouse-Driven Screens

Resources

The following resources may be helpful when completing this assignment.

Scenario

Computer applications that run on desktop and laptop computers  have, for a long time, been designed to be driven by dragging and  clicking a mouse. With the introduction of tablet personal computers,  the trend has shifted toward using touch-based screens. We now have  access to touch-based TVs, touch-based monitors, touch-based laptops,  and touch-based tablets. Touch and multi-touch devices provide end users  with the ability to interact physically with an application much more  naturally.

Imagine that you are the Information Technology Director of a  major chain restaurant, and you have been assigned to design a menu  ordering application that can run on all devices. Examine whether using a  touch-screen monitor, a tablet, or a mouse to select menu items to  place an order would be most efficient. Speculate how employees would  interact with these devices and the type of emotional reaction that  customers and employees will experience while placing a beverage,  appetizer, or entrée order.

Instructions

Write a 4–5 page paper in which you:

  1. Differentiate between the interaction types and styles that apply to multi-touch screens and applications running on them.
  2. Determine the conceptual model that you would use when designing a product for your restaurant.
  3. Describe the key analogies and concepts these monitors expose  to users, including the task-domain objects users manipulate on the  screen.
  4. Determine one utility or tool in an application for touch-based  and mouse-driven screens that should be designed with memory retention  or recall. Provide a rationale for your response.
  5. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. You may use the resources above or others of your choosing.

This course requires the use of Strayer Writing Standards. For  assistance and information, please refer to the Strayer Writing  Standards link in the left-hand menu of your course. Check with your  professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Analyze the functionality required to allow an application to run on multiple types of devices.

Essential Concepts Project

 

The purpose of this hands-on project is to give students an opportunity to create a hierarchical folder structure (CLO 1, MLO 1.1) and explain key terms and concepts related to information systems (CLO 7, MLO 1.3). To do this, use the weekly readings, along with the video tutorial, to complete the Essential Concepts Project.

Part 1. Read the following modules in the Technology for Success textbook:

  • Module 3: Computer Hardware (pages CC 3-1 to CC 3-28)
  • Module 4: Operating Systems and File Management (pages CC 4-1 to CC 4-21)
  • Module 5: Software and Apps (pages CC 5-1 to CC 5-33)

Next, create a new Microsoft Word document (.docx). In 2-3 pages, answer the following questions:

  1. What does it mean to live in a “modern information society?”
  2. What types of input and output devices would be ideal for a college student completing his or her coursework?
  3. What characteristics are common among operating systems? List types of operating systems, and examples of each. How does the device affect the functionality of an operating system?
  4. Leah Jacobs is starting her own dance studio and wants to create digital media and use productivity software to support her business. She is hiring a graphic artist to create a logo for her business. She wants to use the logo across all visual communications at the company, from business cards to database forms, to websites and social media. What programs and apps should she consider using to run her business?

Part 2. Create a class folder so that you can save files in the proper folders. As an organization scheme, do the following:

  1. Create the folders you need onto the location of your choice. This may be your Documents folder, a flash drive, or the desktop if you are working on a CBU machine. Begin by creating a folder called LastnameFirstname. Inside of the LastnameFirstname folder, create a folder called CIS 265. Inside the CIS 265 folder, create the following folders: Office and Operating System, Word, PowerPoint, Excel, Access, and Outlook, Integrated Capstone Project.

  2. Expand the hierarchical tree so that all the folders are visible (via Windows Explorer).

  3. Press the Prnt Scrn button on your keyboard. This will take a snapshot of the screen and put it in the computer’s clipboard (temporary memory).

  4. Open the document you’ve already created for this Essential Concepts assignment. Press the Paste button or press Ctrl and V. This should paste a picture of the screen onto the last page of the document.
  5. The finished product should consist of a copy of the screenshot showing that you have created the folders.


(IMPORTANT: You should use these folders to save all your work throughout this course.)

Part 3. Attach and submit your completed project (which should be a single Word document with word processing and/or screen shots (in Full Screen Reading view) of all assignment components, labeled and in order) by the assigned due date.

Essential Concepts Project Scoring

Assignment ComponentsPossible
Points

Part 1  

  • Questions 1-4 answered correctly

15 x 4 = 60

Part 2  

  • Includes a LastnameFirstname folder
  • Includes the CIS265 sub-folder
  • Includes all seven (7) application sub-folders
  • Displays all folders in the correct hierarchy

 Below is an outline of what each page of your Essential Concepts Project should look like:

Page 1Essential Concepts ProjectFirst and Last NameCourse TitleCalifornia Baptist University_____________________________________________________

Pages 2-4I n 2-3 pages, answer the questions above._____________________________________________________________

Pages 5-6
Insert or paste screen shots of your class hierarchical folder and organizational scheme.

computing

 

File submission: Presentation - Autobiography



Objective of the activity

Through this activity, the student will be able to develop a presentation of his autobiography in which he applies the skills learned in the module.

Instructions

Before doing the exercise, access the resources, including the tutorials. This activity is graded only once. The activity is individual.

Before starting the creation of your presentation, learn what an autobiography is, the concept, characteristics and examples (Cáceres-Ramírez, 2018). Also, learn about the parts that make up an autobiography. (Educational magazine Partsdel.com, 2017-09).

The purpose of this activity is for the student to develop a presentation using MS Power Point.

What are we going to do?

The goal is to develop a presentation of your autobiography that carries the message in an engaging way.

How are they going to do?

Access the readings on Autobiography.
Please use MS Power Point 2016 application.
The document must be engraved with the title of your work; for example: Autobiography - María De Los Oliveros.
The parts of the job are:
Cover, Index, Introduction, Personal Data, Development, Conclusion, Recommendations
Use a theme (themes). Look at the recommendations given in the resources.
Titles and subtitles must be in "bold" and centralized
You must align the content of the slides in "justify"
The letter must not be less than 30.
It must contain header. The header must be your first and last name. It must have the creation date. It must have the slide number.
It must be free of grammatical and spelling errors. They can use the "Spelling & Grammar" must have configured the "Language" (Review).
Deliverable

Skills to be assessed (see assessment criteria):

Create the presentation and save with the correct name
Use themes
Add images
Transition movement on slides
Animation movements in text and graphics (images)
Use at least three types of layout (design)
Type and size of letters
Error free
Using the note area
Regarding content, it will be evaluated that all parts of the autobiography are present
The activity is individual. The work must be delivered on time, without spelling or grammatical errors. The works will be submitted to the tool to detect similarity of content (now Urkund). You must include references in APA format, three years old or less.

 
Basic review resources  Cáceres-Ramírez, O. (2018). The autobiography: concept, characteristics, examples. Recovered from https://www.aboutespanol.com/la-autobiografia-concopio-caracteristicas-ejembres-2879746 (Links to an external site.) Module resources and tutorials. Educational magazine Partsdel.com, professional writing team. (2017). Retrieved from https://www.partesdel.com/partes_de_la_autobiografia.html (Links to an external site.). Supplemental Review Resource  Microsoft. (2019). Tips for creating and presenting an effective presentation. Retrieved from https://support.office.com/es-es/article/sugencias-para-crear-y-realizar-una-presentaci%C3%B3n-eficaz-f43156b0-20d2-4c51-8345-0c337cefb88b 

Search the UC Library and/or Google Scholar for a “Fortune 1000” company that has been successful in integrating Big Data Analytics with their Business Intelligence?

 

This week’s article provided a case study approach which highlights  how businesses have integrated Big Data Analytics with their  Business Intelligence to gain dominance within their respective  industry.  Search the UC Library and/or Google Scholar for a “Fortune  1000” company that has been successful in this integration. Discuss the  company, its approach to big data analytics with business  intelligence, what they are doing right, what they are doing wrong, and  how they can improve to be more successful in the implementation and  maintenance of big data analytics with business intelligence. 

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at  least two scholarly journal articles to support your positions, claims,  and observations, in addition to your textbook. The UC Library is a  great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.

Reading Assignments

 

Big Data Visualization: Allotting by R and Python with GUI Tools. (2018). 2018  International Conference on Smart Computing and Electronic Enterprise  (ICSCEE), Smart Computing and Electronic Enterprise (ICSCEE), 1https://doi.org/10.1109/ICSCEE.2018.8538413

Integrated Understanding of Big Data, Big Data Analysis, and Business Intelligence: A Case Study of Logistics. Sustainability 2018, 10(10), 3778; https://doi.org/10.3390/su10103778

Security Risk Assessment

 Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format double space and have to include at least two references and 400 words. 

  • When should the architect begin the analysis?
  • What are the activities the architect must execute?
  • What is the set of knowledge domains applied to the analysis?
  • What are the tips and tricks that make security architecture risk assessment easier?

BSW W9

In 200 words,

Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is it dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

Assignment and Discussion

 

Week 10 – Discussion

Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database. Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not?

Writing Assignment – Wk 10

Some common biometric techniques include:

  1. Fingerprint recognition
  2. Signature dynamics
  3. Iris scanning
  4. Retina scanning
  5. Voice prints
  6. Face recognition

Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs. 

Week-10 Discussion

 In no less than 250 words, describe a hacking tool that is used to gain access to a network.  Explain how the tool is used, how it works and how a netwoprk administrator can prevent this tool from access the network 

 

Week 10 Assignment

  • 10.1 What are three broad mechanisms that malware can use to propagate?
  • 10.2 What are four broad categories of payloads that malware may carry?
  • 10.3 What are typical phases of operation of a virus or worm?
  • 10.4 What mechanisms can a virus use to conceal itself?
  • 10.5 What is the difference between machine-executable and macro viruses?
  • 10.6 What means can a worm use to access remote systems to propagate?
  • 10.7 What is a “drive-by-download” and how does it differ from a worm?
  • 10.8 What is a “logic bomb”?
  • 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
  • 10.10 List some of the different levels in a system that a rootkit may use.
  • 10.11 Describe some malware countermeasure elements.
  • 10.12 List three places malware mitigation mechanisms may be located.
  • 10.13 Briefly describe the four generations of antivirus software.
  • 10.14 How does behavior-blocking software work?
  • 10.15 What is a distributed denial-of-service system?