Data Visualization Assignment

 Review The Power of Good Design and select three of the ten principles noted for good design. Next in R, utilize these three principles in a problem that you will solve. First note the problem to solve, the dataset (where the information was pulled from), and what methods you are going to take to solve the problem.  Ensure the problem is simple enough to complete within a two-page document. For example, I need to purchase a house and want to know what my options are given x amount of dollars and x location based on a sample of data from Zillow within each location. 
Ensure there is data visualization in the homework and note how it relates to the three principles selected. 

The power of Good design Link for 10 Principles: https://www.vitsoe.com/gb/about/good-design

Artificial Intelligence

What types of smart devices are they and how can they be used for the benefits of consumers. Include both the advantages and disadvantages of it.Provide examples and present your written findings. 

 

Requirement 

APA format. You must include 3 scholarly reviewed references that are DIRECTLY related to the subject. 

Pages : 3 ( 1000 words)

SE494 week 5 mid

APA FORMAT AND CITATIONS 

1. Download some new app onto your mobile device that you’ve heard about (if you do not have a mobile phone call me and we’ll come up with an alternative), and then you will

2. Write a 2-3 page paper in MS-Word about SOME OF (but not ALL OF) these aspects from Chp 1-4 of the text, on this new app you downloaded:

  • Techno-fixation
  • Haptic Interface
  • Multi-Modality
  • Emotional Impact
  • Economical Impact
  • Safety-critical situations
  • Usability
  • User Experience
  • Interaction as Brand
  • Interaction as Package
  • technology acceptance
  • Innovation
  • Building on Past Success
  • Designing the Interaction
  • Platform Design
  • Prototyping

Use IGU-style formatting for this report.  Include citations. Originality must be 70% or more.

RUBRIC

40%   Your Detailed analysis of aspects of the app.  I do not need to see an explanation of each and every feature of the app – what I am looking for here is your analysis of the app’s performance in terms of some of the items in the bulletized list above.  Stating that “it is very usable” tells the reader very little about the app.

10%  Juried support for your analysis of this mobile app.  For instance “because I like it” is NOT juried support. An opinion offered by a documented user community, or a well-known magazine, or a university for instance, would be juried support.

25%  Your Opinions.  Here you can state what you like or don’t like about it, but I expect your opinion to be based on some specific design aspect or feature or flaws or something else like usability, design, convenience, tie-in with other apps, customer profile, basket design, credit-card usage, etc and not just “I like it a lot”.

25%   Academic style IGU format. Citations. spelling. grammar. percentage of match in Turnitin of < 30%.  DO NOT copy a review from a webpage! Downloading a review and turning it in as your work will be scored as a zero (0). 

Assignment

Answer the following exercise taken from Ch5. Look carefully at how messages and mailboxes are represented in an email system that you use. Model the object classes that might be used in the system implementation to represent a mailbox and an e-mail message. Use figure 5.10 as an example (also found in Ch5 presentation slide #28). 

You may use the link as a resource which includes PowerPoints from the Book.

https://software-engineering-book.com

The plan is for your client, a federal government agency, which is preparing for a Microsoft Azure cloud pilot.

  

You are employed as a cloud administrator at Cyber Domain Consultants, a firm specializing in Microsoft Azure cloud adoption support.

Your current client, a federal government agency, has hired your firm to help with the agency’s upcoming Azure cloud pilot. The agency has 1,000 employees and several regional offices throughout the country. The agency has a small data center but does not have space in its server room for any more racks, so a cloud solution would eliminate the need for additional hardware. In addition, the chief information officer wants to have the ability to set up a system quickly and be able to decommission it promptly. He also does not want to worry about upgrades, patches, or maintaining the servers. The CIO wants to explore hosting applications and services in the cloud.

Thus, the agency has budgeted $100,000 over the next year for a pilot program to test the feasibility of using Azure as the cloud provider.

Your first assignment is to develop a Comprehensive Cloud Plan for the agency’s CIO. Follow the instructions in the next section to learn more about this assignment.

SE493 Week 3D

Discussion Topic

Please read chapter 5 textbook and reputable online library resources and Review PP slides chapter 5, pages 33 to 35 and in your own word discuss what is your understanding of Client-server architecture?

Comments to 2 classmates must be of substance; not just “I agree” or “Good Post.” The purpose of the responses is to convert the discussion forum into a quality learning environment through which you improve your knowledge and understanding of the subject matter.

Penetration Test Report

Hide Assignment InformationTurnitin®Turnitin® enabledThis assignment will be submitted to Turnitin®.Instructions

There are two deliverables due for Project 2.

  • A video showing your exploitation, credential theft, and data exfiltration.
  • A penetration test report that discusses the steps and actions in the video and how they are relevant to the client. The report also includes your recommendations for the client.

Use Microsoft Stream to create the video.

If you have not already done so last week:

Upload and submit two items for this assignment:

  • the Hacking Video Demonstration showing your exploitation
  • the Penetration Test Report document

How Will My Work Be Evaluated?

Penetrating the system (gaining access) is only the beginning for a penetration tester. You must also be able to clearly communicate your findings and recommend corrective actions in a way that a nontechnical audience can understand. Therefore, the written report describing the engagement’s technical details is a critical part of the job.

Having the best keyboard penetration skills in the business will not help if you are not able to properly document findings and convey critical issues to the client. A successful penetration proposal could lead to additional business from the client’s subsidiaries and partners.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

2.1.2: Describe the context surrounding the issue or problem.

  • In the Hacking Video Demonstration and the Penetration Test Report, address the client in the correspondence. Provide a brief introduction explaining the services performed and a summary at the end of the report. Summarize the actions of the attacker during the penetration test. Validate the attack methodology using industry approved techniques. Include at least two to three references in IEEE format.

2.1.3: Explain the significance of the issue or problem.

  • In the Hacking Video Demonstration and the Penetration Test Report, discuss the vulnerability you exploited on the system. Explain how you were able to steal credentials and take data important to the company. Discuss the implications, including loss of revenue and company reputation.

10.1.2: Gather project requirements to meet stakeholder needs.

  • In the Penetration Test Report, you need to address the fact that the client has asked you to use other accepted practices and tools to exploit its systems. You will need to use tools such as Kali, Metasploit, John the Ripper, and include screenshots with date and time stamps, IP addresses, and ports that show how you connected the attack system to the victim machine.

12.2.1: Identify systems for the risk assessment.

  • In the Penetration Test Report, you need to address the fact that during any scan report, it is critical that you list the IP address of the system you are using to connect to the client’s corporate network (for auditing purposes) as well as the IP address of the system(s) that you are exploiting. Discuss the scope of engagement and the limitations of your actions to stay within the parameters of the penetration test.

12.2.2: Perform a risk analysis.

  • In the Hacking Video Demonstration and the Penetration Test Report, explain to the client in clear terms the security issues that are present on the system. Discuss the exploit you used to compromise the Linux system and the steps to mitigate this vulnerability. Provide detailed information on the versions of the vulnerability and application software.

13.1.1: Create documentation appropriate to the stakeholder.

  • In the Penetration Test Report, explain to the client the actions that you used during the engagement. Talk about how an attacker would know how to get into the system and what methods could be used to compromise the victim machine. Finally, discuss the post exploitation techniques that allowed the attacker to get the credentials of a user account and to extract confidential data from the target system.

When you are finished, click “add a file” to upload your two deliverables, and then click the Submit button.   

IT 207 week 3

Each question should be 250 words and provide references and no plagiarism 

1.    How do GUIs improve the experience of interacting with the PC? Are there any limitations of GUIs relative to the CLI (command-line interface)?

2.    Compare the Windows taskbar to the CentOS 7 Top Bar.