Discussion

Physical Security — 

My father used to tell me that ”locks keep honest people honest”.

Answer the following question(s):

What do you think he meant by that? Is there any such thing as total security?

Fully address the question(s) in this discussion; provide valid rationale or a citation for your choices; 

Initial post should be at least 350 words in length.

graphic design

 

Module 01 Content

  1. Jennifer Schiff reports at least 12 ways bad website design can affect your business.

    Access Jennifer Schiff’s article by clicking here.

    For this written assignment read the article from the link above and complete the following items:

    • Summarize the effects of using bad visual design elements.
    • Examine the response viewers may have and how that may negatively affect business.
    • Answer the question, “Why it is so important to use visuals in specific ways to effectively reach viewers?”
    • Include whether you believe it is important to use visuals strategically in business and website communication. Why or why not?
    • Support the items above by including relevant quotes and paraphrases from academic/scholarly sources.

      This written assignment should be at least one page in length and use APA formatting with a reference page (template here).

      APA_Paper_Template_07232019.docx

      Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.

      Save your assignment as a Microsoft Word document. (Mac users, please remember to append the “.docx” extension to the filename.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:

https://www.proquest.com/docview/1873605469?accountid=40836

Week 3 Assignment

Subject:  Leading Strategic Change with Technology

Companies often have many sources of disparate data and the systems used do not directly link or share data. Therefore, data must be collected and stored in repositories. 

Chapter 8 explains that a data lake contains unorganized or unstructured data, whereas a data warehouse contains structured data which has been organized for a specific purpose. 

Chapter 8: Understanding Data’s Impact on Business

Note: 300 words with intext citations with 4 references must needed

final paper-1

  Delete Yourself from the Internet

(Is it possible and how can it be accomplished?)

Do you feel you are vulnerable to hackers or identity thieves because you have a large online presence? Have you ever thought of removing your personal data from the net? Well, it’s not quite as simple as it should be. There are a few easy-to-follow steps that should point you in the right direction that can be found online, but the story does not end there. How can you make sure your personal information or financial data will not be exposed on sites that do not have your written permission? Is it possible to completely remove yourself from the web?

Facebook’s practices were under scrutiny when it was revealed that the data of more than 50 million Facebook users found its way into the hands of UK-based Cambridge Analytica, which reportedly used it to better target political ads for the Trump campaign during the US 2016 presidential election.

The more troubling aspect of the story is that your personal data on these free services is often somewhat exposed because you opted-in to all sorts of onerous provisions when you first signed up for these “free” services. That’s exactly why some users are choosing to completely delete or deactivate accounts when and where possible.

So, how can deleting yourself from the internet prevent these companies from acquiring your information? Some say there is no sure way to completely remove your information, but there are ways to minimize your online footprint, which would lower the chances of your data getting compromised.

Project Plan

In this case project, we will determine the many options and the companies that collect your personal information. They’re called data brokers and they have names like Spokeo, Whitepages.com, PeopleFinder, BeenVerified, as well as plenty of others. 

1) In addition to the sites named above, list 5 additional agencies you find that collect this type of personal data. Hint: Many of them claim to be marketing agencies.

2) Provide a list of the companies that you find that claim to be able to remove your personal information from the data broker sites and the methods they use to delete this information.

3) Write a report with a step-by-step written summary of the processes and the methods which describe how you would go about DELETING yourself from the Internet. 

Computer 8

Write 1 paragraph for each: 

1) Which software-development methodology would be best if an organization needed to develop a software tool for a small group of users in the marketing department? Why do you think this? Which implementation methodology should they use? Why?

2)Which technologies have had the biggest effect on globalization and why?

Assignment 11

In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs.