Assignment

Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.

For this task, take a close look at the data representation choices:

  1. Start by identifying all the charts and their types
  2. How suitable do you think the chart type choice(s) are to display the data? If they are not, what do you think they should have been?
  3. Are the marks and, especially, the attributes appropriately assigned and accurately portrayed?
  4. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  5. Are there any data values/statistics presented in table/raw form that maybe could have benefited from a more visual representation?

Assignment Link: http://book.visualisingdata.com/chapter/chapter-6

Assignment Requirements: At least 500 words in length

References: At least three peer-reviewed, scholarly journal references.

Discussion 11

 Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. 

The discussion questions this week are from Chapter 11 (Jamsa, 2013).
Chapter 11 topics:
  • Define software architecture.
  • Define and describe SOA.
  • Compare and contrast a web page and a web service.
  • Search the Web for companies that offer web services and then describe three to five web services that programmers might integrate into the applications they create.
  • Discuss what it means for a web service to be interoperable.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.   

Create a Project Proposal

  Create 3-4 pages project proposal for the below scenario : attached the project  proposal template. 

  • Develop a project definition and scope that defines the project and articulates the business context for the project.
  • Identify problems that the proposed system is expected to solve (or opportunities the proposed project is expected to produce).
  • Create project objectives.
  • Create the project methodology or game plan.
  • Compile a high-level schedule for completing the project scope.

Scenario B: Internet Bank 

Imagine you work for a start-up company that is launching an internet bank. The internet bank will provide the following financial products and services to its customers:

· Accounts and deposits

· Credit, debit, and travel cards

· Loans

· Insurance

· Investments

· Tax services

Senior management and investors have identified the following key technical factors for the success of the internet bank:

· Scalability: The technology and software application infrastructure must accommodate high growth and new users without impacting the service levels delivered to existing users.

· Availability: Users must be supported with robust, consistent, and reliable access; excellent performance 24 hours a day, 7 days a week.

· Security: Industry-accepted security practices and a multi-level authentication system have to be put in place to authenticate and identify each user before they access their accounts and initiate transactions.

· Manageability: The technology and software applications infrastructure must be easy to manage, support, and update. 

You have been assigned to analyze your organization and develop a technical architecture to support the business processes of this internet bank.

linux

 What makes something a script versus a program?  Based on your research, describe what you think the differences are between a script and a program. What is each item better at? Describe a situation where you would use each. 

Assignment_DataScience

Data Science is a vastly growing field. Part of what makes this such a significant field to be in is its applicability to many other fields and nearly every industry. One of these is Artificial Intelligence (AI). Specifically, artificial neural networks (ANN) is a sub-field of AI. The topic is addressed beginning on page 249 of the text. The text notes issues with deep learning based on the vanishing gradient problem’s effect on learning. This is rather significant as it has made for ineffective learning, poor training, and test performance.

From the readings, intuitive reasoning, and experience, these (deep learning and vanishing gradient) appear to be related. Describe how these are related. While this is the case, also describe how these are different.

Need 3 pages with APA format and references as well.
This is ISBN of the text:9780133128901

User Training

Topic: What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between being overwhelmed with false positives and the danger of ignoring true incidents?  What effects would false positives have on an organization?  Make sure to cite your sources.[500 words]

Assignment should follow all APA rules and include a min. of (1) citation/reference

EH Week14 P14

 

Hello,

i need this paper by 12/02 afternoon.

Strictly No plagiarism please use your own words.

please review the attachment

Assignment Questions:

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication.

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

social engineering attack (Cyber Security)

 

You have a new CEO (this is the same new CEO from Weeks 8 and 9). They are non-technical and came to your organization from a completely different market segment. You’ve been tasked with training this CEO on how to spot and avoid falling victim to a social engineering attack. You will also develop a pretend phishing email to test the CEO to see how much your training worked.

Use any persuasive techniques you have at your disposal. If you need to draw pictures, draw pictures. Slides, infographics, interpretive dance – any of these can be used to convey to the CEO what social engineering is and how to avoid falling prey. If you use something other than a letter or memo you’ll need an introductory document (yes, with letterhead!)

For the phishing email, you can type it out in Microsoft Word. It is understood that the phishing email might not be grammatically correct.

***Give your CEO a name. CEOs can be any gender***