Assignment and Discussion

 

Week 9 – Discussion

In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability. 

 

Internet Research – Wk 9

For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed. 

 

Week 9 Discussion – The Remote Worker

 In no less than 250 words, describe a solution to securely connect a remote worker from their home and connected to the Internet to their company network.  How does this solution work and what is needed on the company network and the remote worker’s network to accomplish your solution?  Respond to two other learners by the end of the week. 

   

Week 9 Assignment

  • 9.1 Give examples of applications of IPsec.
  • 9.2 What services are provided by IPsec?
  • 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
  • 9.4 What is the difference between transport mode and tunnel mode?
  • 9.5 What is a replay attack?
  • 9.6 Why does ESP include a padding field?
  • 9.7 What are the basic approaches to bundling SAs?
  • 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?

Discussion

 

There have been many books and opinion pieces writ-ten about the impact of AI on jobs and ideas for societal responses to address the issues. Two ideas were mentioned in the chapter – UBI and SIS. What are the pros and cons of these ideas? How would these be implemented?

Questions 1: Classes and Pointers

Instructions

This question set covers material on C++ classes (regular and templates) as well as pointers and references (readings from Chapters 1-3 in your book).  Use the lecture slides, your notes, textbook, and other resources to research questions.

When given a choice, always choose the best answer.  Answers such as “None” or “All”, maybe be listed in any order.  For short essay questions, answer in a cohesive paragraph in your own words. If you research any answers in your book or elsewhere, do not copy wording from those sources.

To better understand how any code works: create a C++ project in Visual Studio and test the code.  Include any needed header files.

SQL Servers installation and access (Cyber Security)

 Using your textbook, the Internet, and any other suitable references, answer the following questions in your own words. Save your answers in a single file (minimum length of a full page of content).  Remember to include any sources that you use.

  1. Why would you perform a silent installation?
  2. Under what circumstances would a system administrator lose access to an instance of SQL Server? Give an example.
  3. Oracle offers a free download of all editions of the Oracle Database.  How does the company derive benefits from this approach?

Cloud_computing_week_15

Discussion Topic – Define Scalability and list five (5) to ten (10) potential relationships that align with the Pareto principle, such as how 80% of sales come from 20% of customers. 

 

Paper:

write a paper on governing the cloud. The following are the items to discuss in the paper (please use a different section heading for each topic):

  • List and describe five ways you think the cloud will change the future of TV.
  • List and describe five potential uses for intelligent fabric.
  • List and describe five ways the cloud will influence the mobile application market or vice versa.
  • Discuss the importance of HTML 5.
  • Discuss how the cloud will impact future operating systems.
  • List and describe three potential location-aware applications.
  • List and describe five ways intelligent devices may work together.

Paper requirements:

  • Minimum 1500 words (excluding title page, table of contents, abstract, and references pages)
  • Minimum of seven (7) references
  • Format your paper consistent with APA guidelines
  • When submitting the assignment, please ensure you are submitting as an attached MS Word document.

Facial Expression Recognition

Write a final paper on Facial Expression Recognition with including these topics.

Introduction

History

Types of comparisons in Facial Recognition

Components of Face Recognition

How Face Recognition Works

Face Recognition Techniques

Popular Face Recognition Algorithms

Databases

Advantages and Disadvantages

Sample of Devices

Conclusions

There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices?

Please write 350 words essay on following

 There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices? 

InfoTech Import in Strat Plan (ITS-831)

Discussion: IT Project Management

Word Count: 300+ words

What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents.

Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

At least one scholarly source should be used in the discussion. Be sure to use information from your readings and other sources. Use proper citations and references in your post.

Reading resources:

Chapter 13, “Privacy and Ethical Considerations in Information Management”. Managing and Using Information Systems, Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta, John Wiley & Sons 

Chapter 11, “Managing IT Projects” pp. 246-259. Jenkin, T. A., Chan, Y. E., & Sabherwal, R. (2019). Mutual Understanding in Information Systems Development: Changes within and across Projects. MIS Quarterly, 43(2), 649–671. Retrieved from  https://doi.org/10.25300/MISQ/2019/13980  

plagiarism check required, APA format, within 8hrs

Answer the following questions

 

  1. Demonstrate understanding of VBA’s functionality, applications, and differentiation from Visual Basic.
  2. Apply VBA to the development of automation macros, providing standardized, scalable, cost-effective, and error-free business solutions.
  3. Critique VBA’s use in automation for Web browsers to leverage the Internet to produce effective business solutions.
  4. Construct VBA automation solutions to maximize the functionality of Microsoft Office Applications to control functionality within the Office suite and automate repetitive jobs.
  5. Summarize how businesses can solve issues while remaining innovative, competitive and become more profitable by eliminating waste and performing a more complex and accurate analysis of data using VBA’s automation solutions.