“please provide a brief explanation of how the position (as a Mobile Application Developer) for which you are applying for CPT approval directly relates to your program of study (Ph.D IT). Please be sure to write clearly and legibly!”

Hi,

I need to submit this answer asap. if anyone can briefly provide me the best unique answer that would be really helpful. 

My Roles and Responsibilities as a Mobile Application Developer relates to IT

Detailed Scope of work:

 Support and enhance the development of the AISD Mobile application

 Experience with Tabris.js or other mobile development platforms.

 Strong Experience in JavaScript required.

 Experience with Node, React, Java, NPM, XML, OOP, UI/UX, NoSQL, GIT, MVC

o

Mobile app development Objective C/Swift – Apple, Gradle/Kotlin – And

roid

o Apache Cordova/Adobe Phone Gap

o Component based frameworks

o Developing and working with APIs

o Google Firebase and Cloud Console

 Assist Programmers with the development of multiple Java applications.

o

Applications must authenticate using single sign‐on (SSO) through our portal

, preferably   using SAML or Oauth2 for authentication.

 Experience with SAML

 Experience with Oauth2

 Experience with unit testing, Spring 5, Spring Boot, and Training/Mentoring

developers.

 Vue.js

 Hibernate

dis_dba11

 While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.  

one and half page in apa formart, with 2 scholar references , no plagarism of any kind

Incident Detection 2.0

select an industry. You may use the same industry you used in earlier discussions, or you may select a new industry.

Please respond to the following in a post of 100 words:

  • Distinguish between incident detection precursors and incident detection indicators.
  • For your selected industry, describe the challenges associated with incident detection precursors and incident detection indicators.

Professional Ethics and Responsibility

 Review in 400 words or more the video above called Cloud Security Myths.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

Corporate Ethics Portfolio

 

The corporate Board of Directors has asked you to provide a portfolio of your research into the expansion of the company into the country you presented on in Wk 4.

Include an overall corporate code of ethics based on your review of professional associations, such as IEEE, ACM, SANS, ISACA, ASIS, and ISC(2). Include the following in your portfolio:

  • Based on the ethical challenges identified in Week 4, choose and depict 2 risks to the corporation related to each challenge in a 1-page table using either Microsoft Word, PowerPoint, or Excel.
  • A 1- to 2-page corporate code of ethics using Microsoft Word based on your review of professional associations, such as IEEE, ACM, SANS, ISACA, ASIS, and ISC(2), and the ethical challenges identified
  • A 1- to 2-page concise synopsis of classical ethical theories
  • A 1- to 2-page process to logically evaluate ethical dilemmas as they arise with the expansion of the company into the country you have chosen. Ensure that the process reflects the code of ethics you provide; for example, your process could start with identifying which part of the code applies to a particular new dilemma and move through assessing the various choices you could make along with any resulting consequences. The end goal is to help your corporation manage complex ethical questions with a variety of stakeholders.

All references need to adhere to APA guidelines and images should not be copied unless you’ve obtained author permission or used copyright-free images. 

Submit your assignment.