HCI

http://web.media.mit.edu/~stefan/mas890/downloads/BeyondBeingThere.pdf    https://neiu.desire2learn.com/d2l/le/content/2934476/viewContent/1094417/View

https://www.youtube.com/watch?v=ppnRQD06ggY  http://spectrum.ieee.org/automaton/robotics/humanoids/the-uncanny-valley 

http://www.asktog.com/basics/firstPrinciples.html

3/1 Assignment

Getting Started: 

The Bible provides a wealth of insight into our lives. God’s Word provides principles that can shape our worldview toward beneficial behavior. However, the Bible also characterizes mankind as born with a sinful nature. We are told in Romans 8:7 “The sinful mind is hostile to God. It does not submit to God’s law, nor can it do so” (New International Version). Due to mankind’s desire to seek selfish ends in all of life, we tend not to do what is right but only what is in our best interest, or so we think. However, God has a plan. Proverbs 19:21 says, “Many are the plans in a man’s heart, but it is the Lord’s purpose that prevails.” Although the sinful nature of humankind is inherent, God has an eternal design. We, too, need a plan in our oversight of information technology use. God’s Word also reminds us that the goal is to treat our fellow members of society with the same respect we want to enjoy. Matthew 7:12 is commonly referred to as the Golden Rule. Jesus said, “So in everything, do to others what you would have them do to you. For this sums up the Law and the Prophets.”

Instructions: 

  1. Review the material in the “Getting Started” section above, and read Romans 8:7, Proverbs 19:21, and Matthew 7:12.
  2. Be sure to address the following prompts in your paper:
    1. In what areas of your professional life could the Golden Rule, Matthew 7:12, apply?
    2. How should this rule be used in developing a governance plan in technology?
  3. Your paper should be at least 250 words in length.

Operational excellence

1. what a community of practice is. Why are they important and how can they impact the culture within an organization? Have you ever needed to research a technical issue and found yourself on a community web page where others have expressed a similar issue and receive responses from the community to aid in addressing the issue? What about professional organizations which publish how-to steps for technical concepts? Please provide examples in your response where such resources can be helpful to others in the IT community.

Response should be 300 words.

 Information Technology and Organizational Learning Assignment:

 Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter).  Reflect on the various challenges are present in the digital era.  Will things get better or more complicated as times goes on?  Explain.  What are some methods to assimilate new generations into the workforce to think about competitive advantage?

The above submission should be two pages in length (one page for each chapter) and adhere to APA formatting standards.**Remember the APA cover page and the references (if required) do not count towards the page length**Note the first assignment should be in one section and the second section should have the information from the Information Technology and Organizational Learning assignment. The paper requirements for the two pages applies to the second part of the assignment directly related to the Information Technology and Organizational Learning assignment. 

 

Information Technology and Organizational Learning

ISBN: 9781138238589

Authors: Arthur M. Langer

Publisher: CRC Press

Publication Date: 2017-10-17

Pet Food Customer Orders Data Insights

  Tasks:

· Which customers order and reorder the wet food, and when are they likely to try it?

· Are there certain characteristics of the pets, customers or their orders that impact how likely they are to purchase the wet food, and keep ordering it?

· Based on this data, what do you suggest we focus on to get more customers taking and continuing to enjoy our wet food?

Including data cleaning, visualization, 3 different methods (linear regression and other related models)

Write a program that will calculate

  

Write a program that will calculate the total price to purchase all the components required to build a state-of-the-art gaming computer from newegg.com. You will need to conduct some analysis on newegg.com (or amazon.com) regarding the possible options and prices to be considered. However; assume the computer will consist of the following components:

Prepare at least 5 sets of input data (Test data) along with their expected output for testing your program. Your test data can be presented in the form of a table as was shown in Assignment 1. Be sure that you provide expected output for each test case.

 

Discussion Reply!!! About 50 words

  

  • Review contributions to threats and  vulnerabilities on a home network and determine if they have gaps in  their understanding.
  • Provide feedback on a classmate’s home  network security measures they are not currently using. Do you have any  other suggestions or recommendations for them?

What threats do you need to be concerned about on your home network?

  • One threat would be a malware attack that gains access to my devices  and information, which in turn could expose me to data theft. Another  threat is coming across any phishing or Smishing (SMS phishing) attacks  with malicious links intended to compromise my data. I avoid on any  links from emails nowadays because of how many phishing emails I get  lately. 

What are the vulnerabilities of each of your devices on your home network?

  • For laptops and smartphones in the house, simple things such as not  having the OS updated or incorrectly installed software or hardware pose  as vulnerabilities. Poor quality passwords are also easier to  manipulate thank a secure password (Comptia). IoT devices like an Echo  have a network called Sidewalk that allows the devices to connect with  others in the surrounding area, which I disabled when I got the  notification for it on the app.

What techniques can you use to protect your devices on your home  network? (Make sure to discuss how you will protect your network traffic  on your wireless network.)

  • One technique that I currently use is utilizing a “guest” network  for guests to our home and our IoT devices we have in the house. We do  this to limit traffic on our main network for security. For my  work-at-home setup, we use a VPN and MFA to get on the company network,  so even on the go I can remain secure. I also ensure to password protect  all devices that I can, avoid connecting to public networks and try to  make sure all devices remain updated (Comptia).

Discuss some home network security measures you are not currently using but may consider using.

  • Given the amount of personal data on each device, I have been  contemplating encrypting some files along with finding a good password  manager to help me maintain keeping my passwords up to date and changed  regularly without me forgetting them. I am also going to start  performing more security assessments on my network to keep it secure  (Comptia).

Network Security: What Is It, Why Does It Matter and What Can You Do to Make Networks More Secure? 2020. Comptia. Accessed October 26, 2022. https://www.comptia.org/content/guides/network-security-basics-definition-threats-and-solutions

Tiny Encryption Algorithm..Cipher text to plain text

 

In this assignment you are to modify the algorithm presented in figure 11.9 (TEA) to use Cypher Block Chaining .  Your algorithm will use the encryption and decryption algorithms within a chain of blocks according the specifications of CBC (64 bit block size). Your output is supposed to be able to show the entire message or even portions of the message both encrypted and then later decrypted. 

Basically, read a string from input, simulate CBC encryption on it. Output the encrypted results and then decrypt it and produce the decrypted result. 

How you build that user interface to show how the algorithm works is entirely up to you as long as you show the required results.