Discussion

 What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents. 

Technology Entrepreneurship

 

From a technology entrepreneurial perspective, the dangers of having exclusive focus on the product or service without due consideration to whether it sincerely addresses a real market or public concern raises numerous ethical issues. Address the following questions:

With the development of several COVID-19 smartphone applications used for tracking COVID affected people and virus heighten areas,

· Is this a possible violation of personal safety?

· Should all personnel be required to download and use the COVID app for monitoring and tracking purposes?

· What are crucial areas of commercialization of the COVID-19 smartphone app? Do you agree with the medical and social safety of their importance and if so why do you agree or disagree that commercialization of innovation is important. 

· What are the external and internal environmental uncertainties?

· What is the risk profile associated with the smartphone tracking app?

· What other rewards besides financial and monetary gains can be obtained using this app?

NOTE:  

  • 5-7 pages in length (excluding cover page, abstract, and reference list)
  • Include at least 5 online references to support your research. 
  •  Assignments will need actual references from EBSCO host, google scholar, and semantic scholar With a website link at the end.  Only use APA 7th edition. (There should be Abstract and conclusion) 

PLEC Week 8

 Answer each these questions in a paragraph with at least 3-4 sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Chat application demo (using Angular and spring)

 

I want to demo chat web application with technology Angular 8 or above (frontend) and Spring (backend) with mysql databse

1. user can signup and login and chat with each other (one to one chat for example facebook)

2. web page design is not needed.

4. all chat should be store in database. if user have some chat and when it logout then after login all previous chat should be present in chat history.

3. it should be work in windows 10.

Networking

 1) Name the three essential elements of a basic structured cabling network? How are they installed and what are the components that are involved with them?   (300 words)

Need to 2 Replies discussion for same question for 150 words too.

5s week 8 assignment PL

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

include references. do not copy paste.

legal process in Digital Forensics

 For this assignment, please discuss the following:

  • How does the Fourth Amendment relate to the legal process of digital forensics?
  • How do exigent circumstances apply to the legal process?
  • Explain UFED, its purposes, and one of the primary reasons law enforcement will use this service.
  • Explain CDMA and GSM, their significance as it relates to the cellular network.

Network Assignment

 

Assignment Details

Part 1

For many thousands of years, the primary method of communication was for people to physically gather together to share ideas and discuss concerns. In today’s technology driven world, huge numbers of people gather together without ever directly seeing each other. This is done through social media. Social media is known to produce great changes on how individuals and communities communicate and perceive each other.

Complete the following in a minimum 1-page response:

  1. Briefly, define social media such as Google+®, Twitter®, Pinterest®, LinkedIn®, and Facebook® and how it differs from traditional media. In addition, how has social media impacted the workplace?
  2. Given the increased prevalence of social media, how has your personal perspective of multiculturalism and diversity been impacted?
  3. Select an organization you belong to. How do you think your perspective has impacted that organization? How do you feel that others in the organization have been impacted?

Part 2

As an information technology professional, you are faced with opposing perspectives on ethical issues in your daily work. Research opposing perspectives on ethical issues faced in the Information Technology field as it pertains to networking. An example might be the difference in perspectives of utilizing biometrics for authentication.

Take into consideration the opposing perspectives of different technologies, as it relates to ethics and complete the following in a minimum 1-page essay.

  1. Identify the opposing perspective you have chosen.
  2. Explain the ethical implications that are inherent with both sides of the issue.
  3. Given the ethical implications on both sides of the issue, evaluate the ethical implications on both sides.
  4. Provide your perspective on how you might apply the issue in a work situation.