Please go through the attached documents completely before providing the answer
discussion question 1
Please respond to the following:
- According to the textbook, one of the toughest problems in investigating systems requirements is ensuring that they are complete and comprehensive. Imagine that you are a systems analyst. Decide the primary way in which you would ensure that you secure the necessary information during an interview session with a client.
- Devise a plan for accommodating conflicting responses for the same procedure from two different people you interviewed.
Technology Entrepreneurship
From a technology entrepreneurial perspective, the dangers of having exclusive focus on the product or service without due consideration to whether it sincerely addresses a real market or public concern raises numerous ethical issues. Address the following questions:
With the development of several COVID-19 smartphone applications used for tracking COVID affected people and virus heighten areas,
· Is this a possible violation of personal safety?
· Should all personnel be required to download and use the COVID app for monitoring and tracking purposes?
· What are crucial areas of commercialization of the COVID-19 smartphone app? Do you agree with the medical and social safety of their importance and if so why do you agree or disagree that commercialization of innovation is important.
· What are the external and internal environmental uncertainties?
· What is the risk profile associated with the smartphone tracking app?
· What other rewards besides financial and monetary gains can be obtained using this app?
NOTE:
- 5-7 pages in length (excluding cover page, abstract, and reference list)
- Include at least 5 online references to support your research.
- Assignments will need actual references from EBSCO host, google scholar, and semantic scholar With a website link at the end. Only use APA 7th edition. (There should be Abstract and conclusion)
VPNs
- Explain some of the security risks associated with VPNs.
- Describe how organizations can mitigate these risks.
- Determine the effect of penetration testing and any applicable laws on VPNs.
Business Process Redesign
If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.
Your paper should meet the following requirements:
• Be approximately 4-6 pages in length, not including the required cover page and reference page.
• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Data Mining using Python
I have a data set from data.gov, that needs virtualization using data mining with python notebook.
group project
BSWA week2 P2
Hello,
i need this paper by 1/21 afternoon.
Strictly No plagiarism please use your own words.
Visit the OWASP website.
https://www.youtube.com/watch?v=RGA5kLO9vjs
Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP.
See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.
Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism
BSWP Week 4
Assignment on secure passwords.
Then pick and three passwords: one not secure, one acceptable, and one very secure. Then write a brief description of the passwords you have chosen, indicating why they are secure or not secure.
Post between 200 and 300 words.
Reflection
Reflection