Assignment – Mobile User Interface Design

People are using their mobile phone browsers more and more every day to find information about businesses, make product decisions and purchases, and even determine the quality of a business based on what they can find online.  Write a seven to 10 (7 – 10) page paper in which you: 

  1. How to Choose a Mobile Web Development Option.
  2. Research and discuss effective use of screen real estate.
  3. Compare and contrast different mobile platforms (i.e. Android, iOS).
  4. The tools of mobile interface design.
  5. Discuss mobile information design.
  6. Choosing mobile web options.

Your assignment must follow these formatting requirements:

  • Use at least ten – twelve (10 – 12 ) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. 
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment.

Business intelligence

Complete the following assignment in one MS word document:

Chapter 1 –discussion question #1 & exercise 15 (limit to one page of analysis for question 15)

Chapter 2 – discussion question #1 & exercises 4, 5, and 15(limit to one page of analysis for question 15) Question 4 is not a group assignment.  It is an individual assignment.

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

IT214 Week 6

Weekly Assignment/Discussions via Unicheck Week 06

Write a Python program to convert temperature from Celsius to Fahrenheit and Kelvins; from Fahrenheit to Celsius and Kelvins.

Document your program – to include your name, course, date written, and the formulas used in the conversions as COMMENTS at the top of your program.
Instruct the user on how to enter the data you are requesting.
 

You must use the IF, ELSE, ELIF statements or a combination of these statements.
 You must functions [at least three functions]  You must have error trapping routine(s)
 You must have an exit to you program

physical security

Identify and research the latest electronic technology security being used to provide the highest level of security possible. For example, you can research “wireless signals such as radio, laser, and microwave,” the project “imaging system for immersive surveillance current technologies,” or another new or emerging technology of your choice.

  1. Find a resource–a scholarly article, security organization article/whitepaper, or web article. Give the article’s APA style reference information.
  2. Summarize the article. Include all major points.
  3. Explain how this technology can and is being used. What kind of location, organization, level of needed security, etc., would need this form of technology? Justify your choice.
  4. Explain the advantages of using this new technology over the older technology options.

Be sure to use APA style in your assignment. Use your best grammar and punctuation. Expected length is 3 pages. 

What are the differences between

  

1.) What are the differences between a linked list and a stack?

2.) What are the differences between a stack and a queue?

3.) Explain exactly why a reference variable can’t be changed once it is set.

4.) Create a pointer to the start of the list called startPtr. (The list is empty!)

6.) Assume that the list pointed to by startPtr is maintained in alphabetical order. Provide the statements necessary to insert the following node properly: “Pritchard”, 66.5 (Note: you do not know what is in the list, only that it is maintained in alphabetical order.)

Use pointers previousPtr, currentPtr and newPtr to perform the insertions. Assume that newPtr points to the new node.

8.) Write a while loop that deletes all the nodes in the list and frees the memory associated with each node. Use pointer currentPtr and pointer tempPtr to walk along the list and free memory, respectively.

9.) Write the code to declare a structure “myNode” that holds an integer value and a next pointer.

10.) Assume you have a linked list of “myNode” structures and the pointer “head” points to the first node of the list. Write a function that takes the head pointer as a parameter and returns a pointer to the last node in the list.

11.) Assume you have a linked list of “myNode” structures and the pointer “head” points to the first node of the list. Write a function that takes the head pointer as a parameter and a second parameter which is the number to search for. The function returns a pointer to the node if the number is found and NULL if the number is not in the list.

12.) Assuming the following structure definition write a proper push function to save a number to a list used as a stack.

struct Node

{

int number;

struct Node *next;

};

13.) Assuming the previous structure definition from problem 12, write a proper remove function to remove a number from a list used as a queue.

Research

 

Assignment Instructions

Select from one of the following scenarios:

  1. You are the IT administrator for your  company. One of the employees discovers a loophole in the security  whereby the employees may access the personnel records of other  employees in the company. Personnel records include names, addresses,  Social Security numbers, disciplinary actions, annual reviews, and  salary information. You are working on a time-sensitive project and do  not fix the problem for 2 weeks. As you are fixing the problem, you note  that several employees have accessed personnel records using the  loophole.
  2. You are the CIO of a large national auto  retailer. As a part of your service, you offer auto loans through your  dealerships. This requires your company to collect and store personally  identifiable information on your customers. Additionally, you store  customer bank account and credit card information so that customers can  use automatic payment options for their loans. Recently, your company  has been hacked, and a significant number of client accounts have been  breached. The CEO is demanding that the IT group handle this privately  rather than reporting the breach for fear that publicizing the  information will have a negative effect on quarterly earnings.

Analyze your chosen scenario from the aspect of  computing ethics and privacy ethics. Discuss the ethical dilemma from  the perspective of societal ethics, organizational ethics, and  individual ethics. Research on the Internet to determine what data  security and privacy laws are relevant in this scenario. Describe each  law and consequences for violation of the law. Discuss the reputational  and financial impact this scenario might have on the organization. From  the perspective of the IT administrator in scenario 1, or the  perspective of the CIO in scenario 2, how would you respond to the  situation? Justify your response from an ethical and legal perspective.

Assignment Requirements

  1. Your paper should be 2–3 pages in length and follow APA format.
  2. Include Table of 
  3. Use Times New Roman 12 pt font.
  4. Select one of the scenarios provided.
  5. Analyze the scenario from a computing ethics and privacy ethics perspective.
  6. Analyze the scenario from a societal ethics, organizational ethics, and individual ethics perspective.
  7. Identify relevant data security and privacy laws for this scenario and the consequences for violating these laws.
  8. Discuss the reputational and financial impact on the organization in the chosen scenario.
  9. Discuss how you would respond to the situation and justify your choice.