Mobile Applications Design, Difficulty and Considerations

Think about the last time you utilized a mobile application or attempted to build your own mobile website.  What planning process did you go through before you began your project?  You may have considered the steps or tasks you needed to perform.  You may also have considered the resources and platforms needed for your outcome.  For example, which model fits your business domain needs?  Do you have time constraints that will make completing the web application/site difficult within a reasonable period of time?  You may also have considered the myths that surround developing mobile apps and the difficulties generally associated with mobile app development.

1. Why is mobile development difficult?  Explain

2. How does design & utility make a difference between good vs great websites?

3. How is deciding between a mobile application vs a mobile website an important consideration by developers? Explain.

Instructions:

> 500 Words At least.

> You must apply and use the basic citation styles of APA.

> Do not claim credit for the words, ideas, and concepts of others.

> Use in-text citation and list the reference of your supporting source following APA’s style and formatting

> Do not copy and paste information or concepts from the Internet and claim that is your work.  It will be considered Plagiarism and you will receive a zero for your work.

Network Management

Hello,

i need this paper by Thursday 7pm.

Strictly No plagiarism please use your own words.

Need content 4 pages and 1 reference page.

Network Management: You were just brought into an organization as its CTO. The board thinks the organization’s networks may not be effectively managed and require you to do an assessment of various automated network management tools. The network management tools the board is interested in are used for (a) security policy compliance, (b) network bandwidth management, and (c) network asset management. Your report to the board must identify each tool by product name and provide a short explanation about how each tool works. In addition, the report must compare, at least, two tools for each of the three network management areas. Which is the best tool for each area and why? Can one tool be used for managing more than one area? Why or why not? 

Required Section Headings:

Introduction

Policy Compliance Tool

Bandwidth Management Tool

Asset Management Tool

Tool Comparison

Summary/Conclusion

Computer Networks

Write a survey paper 4 pages long based on these research papers: 

https://lms.manhattan.edu/pluginfile.php/1097980/mod_folder/content/0/04-Network%20Infrastructure%20services/chap03firewall.pdf?forcedownload=1

and 

https://lms.manhattan.edu/pluginfile.php/1097980/mod_folder/content/0/04-Network%20Infrastructure%20services/dnshack.pdf?forcedownload=1

Write a program that reads in the file climate data 2017 numeric

  

Write a program that reads in the file climate_data_2017_numeric.csv and prompts the user to enter the name of a field (other than Date), and then outputs the highest and lowest values recorded in that field for the month of August.The file climate_data_2017_numeric.csv contains the following fields:Date
Minimum temperature (C)
Maximum temperature (C)
Rainfall (mm)
Speed of maximum wind gust (km/h)
9am Temperature (C)
9am relative humidity (%)
3pm Temperature (C)
3pm relative humidity (%)
Your program should work like this:Maximum temperature (C)
Available field names:
Minimum temperature (C)
Maximum temperature (C)
Rainfall (mm)
Speed of maximum wind gust (km/h)
9am Temperature (C)
9am relative humidity (%)
3pm Temperature (C)
3pm relative humidity (%)

Please enter a field name: Minimum temperature (C)
Statistics for field ‘Minimum temperature (C)’:
Min: 1.0 Max: 14.6
Customer: python

Within the next two days my data set looks like this :

Date,Minimum temperature (C),Maximum temperature (C),Rainfall (mm),Speed of maximum wind gust (km/h),9am Temperature (C),9am relative humidity (%),3pm Temperature (C),3pm relative humidity (%)
2017-06-01,8.0,18.3,0,43,10.3,54,17.8,39
2017-06-01,7.4,23.3,0,24,12.1,80,22.5,55
2017-06-01,7.9,13.9,0.4,20,10.5,82,13.6,57
2017-06-02,8.0,14.7,0,20,10.6,64,13.3,69
2017-06-02,8.3,24.2,0,30,14.7,78,22.5,57
2017-06-02,8.5,18.1,0,41,10.7,61,16.4,50
2017-06-03,9.1,23.1,0,28,14.7,86,22.9,57
2017-06-03,9.9,14.3,0,19,10.8,76,13.1,73
2017-06-03,10.7,17.4,0,41,13.4,64,16.4,66
2017-06-04,4.4,15.8,0,13,5.7,100,15.5,53
2017-06-04,10.5,19.7,1.4,28,12.2,77,19.0,57
2017-06-04,12.8,22.6,0,31,16.3,77,22.5,52
2017-06-05,5.6,17.5,0,28,8.7,82,16.8,57
2017-06-05,10.1,25.3,0,31,15.0,71,24.9,30
2017-06-05,9.4,19.6,0,28,11.5,78,19.2,41
2017-06-06,8.7,13.9,6.4,43,11.8,78,12.6,68
2017-06-06,9.2,25.2,0,41,17.9,38,24.5,13
2017-06-06,9.1,17.9,0,59,11.2,58,14.7,43
2017-06-07,5.9,14.3,0,28,8.3,91,14.0,54
2017-06-07,8.8,15.5,54.6,56,13.3,82,14.2,85
2017-06-07,5.0,22.8,0,31,12.4,68,22.5,39
2017-06-08,9.9,22.5,0,48,13.0,75,22.1,25
2017-06-08,3.6,15.0,0,30,6.6,86,14.0,56
2017-06-08,12.4,18.1,61.0,44,13.3,91,16.9,84
2017-06-09,10.4,18.9,3.4,52,12.5,90,18.2,64
2017-06-09,6.6,15.0,1.8,22,11.0,98,13.9,66

ITP-4 – Project Execution, Tracking, and Changes

Full details, requirements and grading criteria are provided in the attached document below.

Most of the project work so far has dealt with project planning.  The purpose of this Individual project is to consider project execution, monitoring and control, and changes.  During project execution, things may change from what was planned, either intentionally (scope change) or unintentionally (risks and problems).  In this project, your team will field and deal with various project changes, and will monitor and track what happens to the project when things change.

rs

While this weeks topic highlighted the uncertainty of Big Data, the author identified the following as areas for future research.  Pick one of the following for your Research paper:

  • Additional study must be performed on the interactions between each big data characteristic, as they do not exist separately but naturally interact in the real world.
  • The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined.
  • New techniques and algorithms must be developed in ML and NLP to handle the real-time needs for decisions made based on enormous amounts of data.
  • More work is necessary on how to efficiently model uncertainty in ML and NLP, as well as how to represent uncertainty resulting from big data analytics.
  • Since the CI algorithms are able to find an approximate solution within a reasonable time, they have been used to tackle ML problems and uncertainty challenges in data analytics and process in recent years.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

DS PCA

 —————–Practical Connection – 550 words —————–

Provide a reflection of at least 550 words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements:

  • Provide a 2 full pages double spaced minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  • Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism). 

CIS 222 DB 3

 1 page apa format

Unit 3 DB: Risk Management Framework

As the CISO, you are heading a newly assembled project team to focus on securing the PCS Corporate network. You have selected the NIST Risk Management Framework (RMF) as the basis of your program due to the large number of government contracts you support. Your first tasking is to analyze the system and determine what security requirements are appropriate.Consider the six phases of the Risk Management Framework and how each phase adds value to securing the corporate network. Make a case for the phase that PCS should spend the most time and resources in accomplishing. Include at least one research reference and associated in-text citation using APA standards. In your replies to your peers discuss the other ideas presented by the RMF team.