human computer unit5

 

Mobile devices, the Internet, and other technologies have made a large impact on the daily lives of people all over the world.

Consider how one particular technology item has affected society from a human–computer interaction (HCI) perspective, and answer the following questions:

  • Discuss the technology’s impact on social, ethical, and legal issues.
  • How do you think the role of this technology has changed HCI since its inception?
  • How do you see the future of this technology further changing HCI?

Data Analysis

Imagine your organization is going to build an application utilizing Big Data and Machine Learning. You are going to propose your idea to upper management with supporting system design. Develop an APA-formatted paper that presents a detailed analysis and research-based information pertaining to ALL of the following topics

  • List and describe the type of data you will need for your application, and how you will ensure the quality of the data.
  • List and explain the technologies, tools, and software packages that will be used to build the application.
    • Provide the design of your Big Data database. Explain why you chose the database compared to others. Also, include supporting theories for the schema you came up with.
    • Describe in detail why the chosen technologies are adequate to process the data.
    • List and describe the types of the statistical analysis methods that will be used.
  • List and describe the benefits from the customer’s perspective and organization’s perspective. Please pinpoint where the benefits are drawn from – data, technology, software package, process, and etc.
  • List and describe the concerns and downsides that may be introduced by the application and the Big Data from multiple perspectives – law, regulations, social, etc. Provide solutions, processes, application modules, etc. that mitigate the concerns, problems, issues.
  • Provide a data flow diagram, database design, and sample code of a module for your application.

For each of the following

  

CS 315  

1. For each of the following operations determine the result in $t0. The answer should either be expressed in hexdecimal or binary in 4 bit groups (nibbles). Given the following:

$t1 0x3FFF 7FFC

$t2 0XFFFF 0000

$t3 0x0000 FFFF

a.  and $t0, $t1,$t2

b.or $t0, $t1, $t3

c. nor $t0, $t1, $t2

d. xor $t0, $t1, $t3

IOT and Social Media

 

Although uniquely compliant with current law and guidance, is the collection and aggregation of data from the IoT and social media an ethical use of data. In 750-1,250 words, explain your opinion with supporting evidence. Make sure to address:

  1. How has the IoT and social media been affected by cybersecurity over time?
  2. Acceptable Use Policy. Although users agree to the conditions of it, is the data being collected used for entirely ethical purposes?
  3. User Agreement. If you use something that is provided for free, how does a company make a profit (e.g., how are free products and services monetized)?
  4. If companies build security directly into IoT devices before implementing the hardware into the system, the security would be sounder and could be tested ahead of time, instead of building security around the device as an afterthought. Suppose that you are one of the executive members in the company and face this option. However, the built-in security would cost three times higher than the regular without built-in security. Provide your rationale of the decision in light of the Christian worldview.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

Network Design Paper UMUC

    

Network Design Paper UMUC has recently acquired a building in Frederick,  Maryland. This new building will house some administrative offices, lecture rooms, library, and computer labs. Building dimensions: Length: 240 Feet Width: 95 Feet Height: 30 Feet The 40-year-old two-story building has the following existing layout: There will be six computer labs that will be used for instruction. Each of these labs will have 21 computers (20 student computers and 1 instructor computer). Each of these labs will also have a server in the closet located inside the lab. In addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students to do their homework. There will be 30 computers in this lab and a server in the closet. The library will also have some computers to allow students access to the library resources. There will be 10 computers for student’s use in the library, and 5 computers for Library staff. There are five lecture classrooms in the building. Each of this room will have a computer for instructor’s use. Finally, there are various offices in the building. Each of these offices will have one computer for the staff use, with the exception of the Admission office that will have 5 computers for staff use. Equipment Inventory Workstation Placement Number of Workstations Users Total WS 6 Instructional Computer labs 21 WS Student and Instructor 132 WS (based on 20 WS for students and 1 WS for instructor on each lab) Student Computer Lab 30 WS Student 30 WS 5 various offices 5 WS Staff 5 WS Admission office 5 WS Staff 5 WS Library 10 WS Student 10 WS Library 5 WS Staff 5 WS Server Staff To be determined by students Network Connecting Devices IT Staff To be determined by students Printers To be determined by student Two server rooms have been allocated, one on the first floor and one on the second floor. Your task is to design the network for this new building with the following criteria: • Student-accessed computers should be on separate network from the staff-accessed computers. • The whole building will share one Internet access connection (T-1 link from Verizon). This connection will come into the Server Room on the first floor. • Security is very important for UMUC as we have to protect students and employees data as well as any intellectual property that UMUC has on the servers and computers. • The network has been assigned the 10.15.0.0 network address for all computers and devices. For Internet routing use 191.1.1 network address. • The network should use physical cable (not wireless), but do provide wireless access in the Student Lobby area. Submission should include (in no more than three pages, excluding diagrams and references): Network Addressing: 1. Define the subnet (based on: rooms, floor, department, or other criteria). 2. For each subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices. Physical Network Design: 1. Define the topology that will be used. 2. Select the appropriate network media to use. 3. Select the appropriate network connecting devices to use. 4. Physical layout of the computers on the floor plan. 5. List of additional servers or network devices needed to implement the network. 6. Justifications for your network design (number 1 – 5 above) You will be evaluated on your ability to o Implement appropriate IP addressing scheme o select and justify appropriate cable media that includes the length of each cable segment and number of nodes on each segment o select and justify appropriate topology such as star, bus, or ring for your network o select and justify of your selected network equipments o select and justify appropriate network services to meet network requirements o select and justify security implementation for the network o use proper grammar, formatting, network terminology, and reference citations Feel free to use any drawings or attachments, and assume any number of computers or users (not when provided here). You will be graded on the basis of right media, topology and knowledge of network concepts. Grading Rubric Criteria 0-59% 60-79% 80-89% 90-100% IP Addressing 30% Student fails to demonstrate adequate subnetting knowledge Student demonstrates some knowledge of subnetting Student demonstrates proper subnetting for the network but failed to provide all IP addressing information needed Student demonstrates proper subnetting for the network and provide all IP addressing information needed Network Requirement 40% Student fails to design proper network to address the given scenario Student misses some critical network design and/or misses on the justifications Student designs a network that address most of the requirement and are able to justify some of the design Student designs a network that met all requirements and are able to justify the design Network Technical Knowledge 20% Student does not have grade

Enhancing Class Rectangle

  

(Enhancing Class Rectangle ) Create a more sophisticated Rectangle class than the one youcreated in Exercise 9.11. This class stores only the Cartesian coordinates of the four corners of therectangle. The constructor calls a set function that accepts four sets of coordinates and verifies thateach of these is in the first quadrant with no single x – or y -coordinate larger than 20.0. The set func-tion also verifies that the supplied coordinates do, in fact, specify a rectangle. Provide member func-tions that calculate the length , width , perimeter and area . The length is the larger of the twodimensions. Include a predicate function square that determines whether the rectangle is a square.
 

professor instructions;
 

Do exercise 9.12 on page 429 for 100 points.
This exercise makes a reference to Exercise 9.11. Here is the code for Exercise 9.11: Ex09_11.zip
DO NOT click drag the code into your new project. The code MUST be copied and pasted into new .h/.cpp files which you create. If you drag copy code into your project and then send it to me it probably will not contain that code!! This means you WILL have a rectangle class (Rectangle.h and Rectangle.cpp) and a file called Ex09_11.cpp that has your main function.
Before submitting your project check your archive and be sure it contains your .h and .cpp files.
I will be looking for the following in your program.
*Your program MUST use Cartesian coordinates (x and y coordinates for a total of eight coordinates per figure, each corner of your rectangle is an x,y coordinate). This is a major modification of the supplied code.
*You must follow my previous instructions regarding how to start your program. What you are doing is editing the supplied code so instead of the class Rectangle using width and length it will use cartesian coordinates as defined above.
*Do not have the user enter the coordinates. Hard code them into your program.
*You must include a default constructor for the rectangle class. The default constructor should have the following coordinates ( point 1:(0,0), point 2:(0,1), point 3:(1,1), point 4:(1,0). Be sure the constructor has the set function as described in the textbook assignment. I recommend you pass these points as eight integers (0,0,0,1,1,1,1,0).
*Your program must instantiate four objects of the Rectangle class.
• Your first object should form a rectangle but not a square using your supplied coordinates.
• Your second object should form a square using your supplied coordinates.
• Your third object should should not be instantiated with any points allowing your default constructor points to be used
Hint: Remember that your constructor header can contain default values. If you create an object without passing values those default values will be used. See example program in chapter.
• Your fourth object should not form a rectangle or a square and the default coordinates should replace your original coordinates.
Hint: Compare two sides to determine if they are unequal in length.
The textbook assignment asks for a set function that tests if any coordinates are over 20. You do not have to write that function.
 

Do include a function that gets called to check if your coordinates form a square or rectangle as mentioned in the textbook assignment.
Keep your code simple. To decide if the rectangle is a square compare its height verses width.
You choose which points and values to compare. If length = width is a square.
This is a programming project intended to show that you know how to program functions and understand constructors.
Review my supplied image of the program’s output as a guide.
If you submit the code that I am supplying you will receive zero points.
*AGAIN, do not have the user make the coordinate entries. Code it into the program.
Deadline: As posted
IMPORTANT: Any submitted exercise or project that fails to compile and run shall receive zero points.
*You must have a rectangle class (Rectangle.h and .Rectangle.cpp files) that stores those cartesian coordinates and tests those coordinates for rectangle, square or neither in your program. You do not have to test if the rectangle is skewed. Just if it is square or not square.
 

this is how it should output;

IT 505-1 week2

BUSINESS CASE: New-Horizon Insurance Company needs your service to establish a new IT network.  Main parameters of the given case.

New-Horizon company has a four-story office building in the city. There are four offices in that building.  In each office, there will be

  • 25 desktop computers
  • 10 portable/laptop computers and need a wireless connection (WiFi)
  • One network printer for all employees in each section.
  • All office computers must have access to the network 

So, there are four local area networks in the building.

You should be developing and drawing network diagrams. Your name and the company name must be written on each diagram. You should label all network devices in your diagrams.

Question 1: 

Develop and draw a network diagram of LOCAL AREA NETWORK for one Office Section only. You will be presenting only one of the LANs in the building. Draw only one LAN considering one of the offices in the main building.

Question 2: 

Draw the block diagram for INTRANET to connect all LANs in the main building. All computers in the main building will be connected to each other with this network. There is one database for customer all transactions. All computers in the main building should have access to this database.  This is your Backbone Network Diagram.

Here you should represent all LANs by using a simplified LAN diagram that was covered during the virtual class. 

Question 3: 

Finally, you should be connecting all computers in the main building to the INTERNET as well.

Use https://www.draw.io  to develop/draw three network diagrams. And place them in your MS Word document and upload them.  

In your network diagram; You should write your name on the upper right section of the DRAW.io diagram and export it as JPEG. And insert into your answer MS Word document.

Rules and guidelines 

Follow proper guidelines 

If there is a diagram(s) then the word count is between min 100 and max 400 words.

Dreamz

  

Description of the Company/Case:
 

Dreamz Inc. develops software and learning solutions for clients worldwide. The main office of the organization is located on six floors of a building in Chicago where 100 users occupy each floor. While the first floor houses the corporate office, the other floors house the Administrative, Finance, HR, Engineering, Marketing, IT, and Research departments. All users need e-mail, file and print, and Internet services. To provide these services, the organization has 10 servers that are used as LAN, proxy, and database servers. The users in the finance and HR departments require sufficient bandwidth and access applications from an Oracle server. This server is accessible to users only in the finance and HR departments; these users can also access the server from the Internet. Dreamz Inc. is also connected to the Internet from the same network and has Web and e-mail servers hosted for Internet access. With expanding business, Dreamz Inc. has setup three branch offices in St. Louis, Detroit, and New Jersey. These three branch offices need to be connected to the main office and other branch offices. Another fourth office at San Francisco comprises a network of five users and requires a single Internet connection.
 

Assignment 2: Final Project: Design LAN and WAN
 

Dreamz Inc. has a branch office in Canberra, Australia. Telnet and a few other delay-sensitive applications run between the offices at Chicago and Canberra. Ensure that the network allows:
•24X7 availability of the network.
•Expansion of the network.
•Deployment of any vendor product and running of any protocol on the network.
Submit the following designs in a presentation or as MS Visio files and the remaining submissions as MS Word documents to the W6: Assignment 2 Dropbox:
•Design a LAN for Dreamz Inc. This will include the topology, transmission media, bandwidth, network devices, network protocol, and a firewall.
•List the information you need to design the network. Mention the reasons for obtaining each piece of information.
•Assess the advantages and disadvantages of the design.
•Design the WAN network for Dreamz Inc. including topology, bandwidth, and the routing protocol.
•Design the Internet connectivity and security for the network.
•Design the network connectivity for the California office to Dreamz Inc.’s private network.
•Design a verification plan for both LAN and WAN for Dreamz Inc. 

Contingency planning

Contingency Planning

Contingency planning is a risk mitigation process for developing  back-up plans in anticipation of events (scenarios) that might disrupt  ‘business as usual’. Business continuity planning is an expanded version  of contingency planning that typically encompasses a more comprehensive  and extended response plan for getting back to ‘business as usual’. In a  well-formatted, highly-detailed research paper, address the need to  contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the  required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at  least two scholarly journal articles to support your positions, claims,  and observations, in addition to your textbook. The UC Library is a  great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.