Usability Evaluation

Perform a usability evaluation of an existing e-commerce Website. 

Including images is highly encouraged to demonstrate the usability issues within the site.  

Use the following points as guidelines when writing the Website Review:

1. System Identification: What Website are you evaluating? What is its main purpose, and what are the target users? 

2. Tasks and Activities: As an evaluation participant, what are you trying to complete with the system? Be sure to identify at least three use cases. Upon identification, complete each identification path you are trying to identify, including the strengths and weaknesses of each task and activity.

3. Metrics: As much as possible, use measurable criteria as you’ve read in the Preece text. Identify those methods you’ve applied in your review of the Website.

4. Application: Using the Nielsen 10 heuristics for usability design, explain how each task can be improved.

5. Assessment: Recommend five changes the Website platform selected can make to improve its usability posture.

Advanced Operating Systems Project

CSE 461 Project I

The first part of this project requires that you implement a class that will be used to simulate a disk drive. The disk drive will have numberofblocks many blocks where each block has blocksize many bytes. The interface for the class Sdisk should include :

Class Sdisk
{
public :
Sdisk(string diskname, int numberofblocks, int blocksize);
int getblock(int blocknumber, string& buffer);
int putblock(int blocknumber, string buffer);
int getnumberofblocks(); // accessor function
int getblocksize(); // accessor function
private :
string diskname;        // file name of software-disk
int numberofblocks;     // number of blocks on disk
int blocksize;          // block size in bytes
};

An explanation of the member functions follows :

  • Sdisk(diskname, numberofblocks, blocksize)
    This constructor incorporates the creation of the disk with the “formatting” of the device. It accepts the integer values numberofblocks, blocksize, a string diskname and creates a Sdisk (software-disk). The Sdisk is a file of characters which we will manipulate as a raw hard disk drive. The function will check if the file diskname exists. If the file exists, it is opened and treated as a Sdisk with numberofblocks many blocks of size blocksize. If the file does not exist, the function will create a file called diskname which contains numberofblocks*blocksize many characters. This file is logically divided up into numberofblocks many blocks where each block has blocksize many characters. The text file will have the following structure :
    Bytes 0 – blocksize-1Block 0Bytes blocksize – 2*blocksize-1Block 1Bytes 2*blocksize – 3*blocksize-1Block 2……Bytes ?-?Block numberofblocks-1
  • getblock(blocknumber,buffer)
    retrieves block blocknumber from the disk and stores the data in the string buffer. It returns an error code of 1 if successful and 0 otherwise.
  • putblock(blocknumber,buffer)
    writes the string buffer to block blocknumber. It returns an error code of 1 if successful and 0 otherwise.

IMPLEMENTATION GUIDELINES : It is essential that your software satisfies the specifications. These will be the only functions (in your system) which physically access the Sdisk. NOTE that you must also write drivers to test and demonstrate your program.

Exp22_PowerPoint_Ch01_Cumulative_Want_to_Waffle

Exp22_PowerPoint_Ch01_Cumulative_Want_to_Waffle

Exp22 PowerPoint Ch01 Cumulative Want to Waffle

PowerPoint Chapter 1 Cumulative – Want to Waffle 

  

Project Description:

Want to Waffle is a successful mobile food business. The company was started by two culinary students and their families to finance the students’ college education. A year later they own three food trucks that sell breakfast waffles, waffle sandwiches, and dessert waffles. Street-food lovers line up around the block when the food trucks park in their neighborhood. The truck locations are advertised via Twitter and on Facebook, so waffle lovers can follow the trucks from place to place. The business has increased its revenue and profits, and the owners are looking to expand their operation by offering franchises. They need to prepare a presentation for an important meeting with financiers.

     

Start PowerPoint. Download and   open the file named Exp22_PPT_Ch01_Cumulative_Franchise.pptx.   Grader has automatically added your last name to the beginning of the   filename. 

 

Change the theme variant to the   last one (orange variant).

 

Change the theme color to Yellow   and the theme font to Candara.

 

Create a new slide after Slide 1   using the Panoramic Picture with Caption layout. Type Interested in   Bringing Waffle Love to Your Town? in the middle placeholder. Type The   opportunity can be yours! in the bottom placeholder.

 

Select the text Waffle Love in the middle placeholder,   change the font size to 32 pt and change the font color to Gold, Accent 1.

 

 

Click or select Slide 2. Use the   Reuse Slides option to insert all of the slides from Waffles.pptx into the open presentation. Ensure the Use source   formatting check box is not selected so that the inserted slides take on the   design and formatting of the open presentation.

 

Type the following speaker note   on Slide 1: We have a great opportunity for you to join our growing   waffle family. (Include   the period). 

 

Delete Slide 3. Move Slide 5 (92% increase in sales) so that it   becomes Slide 4.

 

Increase the font size of the   bullets on Slide 3 to 32 pt.

 

Increase the font size of the   title on Slide 5 to 54 pt. Change the font color to Gold, Accent 1.   Double-click the Format Painter to apply the format to the titles on Slides 6   and 7, and the caption A Natural   Franchise on Slide 8.

 

Create a Notes and Handouts   footer with the following: Franchise Information. Apply to all.

 

Click or display Slide 1. Insert   the WaffleTexture.jpg image file.   Crop the image by dragging the middle bottom sizing handle up until it is at   0″ on the vertical ruler. (HINT: Shape Height will be 3.75″ at this   point). Deselect the Lock aspect ratio in the Format Picture pane. Change the   width of the cropped image to 13.33“. 

 

Apply the Drop Shadow Rectangle   Picture Style. Set the horizontal position of the image to 0″ and the vertical position to 0″

 

Click or display Slide 2 and   insert the DessertWaffle.jpg image   file. Apply the Simple Frame, White Picture Style.

 

On Slide 8, insert the Waffle.jpg image file. Change the   width of the image to 7.3″.

 

Apply the Simple Frame, White   Picture Style. Set the horizontal position of the image to 5.4″ and the vertical position to 1.6″.

 

On Slide 7 convert the list to   the Basic Timeline SmartArt graphic.
 

 

On Slide 6 convert the list to   the Lined List SmartArt graphic.

 

On Slide 3, select the text Why We’re HOT in the title placeholder   and apply the Gradient Fill: Red, Accent color 5; Reflection WordArt Style to   the text. Increase the font size of the WordArt to 60 pt.

 

Check the presentation for   spelling errors. Make corrections as needed on the slides.

 

Save and close Exp22_PPT_Ch01_Cumulative_Franchise.pptx.   Submit the file as directed.

SECURITY POLICY & STANDARTS – 06

Part 1: Research Remote Access Policies (0/1 completed)

Note: In this part of the lab, you will review internet resources on remote access policies in order to form a basis for their purpose and usage. Understanding the reason behind a remote access policy is key to understanding the component policies and procedures. Please take the time to review the research thoroughly and think through the concepts of the policy itself.

1. In your browser, navigate to and read the “Remote Access Policy” template at https://www.sans.org/information-security-policy/.

2. Using your favorite search engine, locate a remote access policy for a higher education institution.

3. Using your favorite search engine, locate a remote access policy for a healthcare provider.

4. Write a brief summary of the information during your research. In your summary, focus on the key elements of the remote access policy. You should also identify any unique elements of remote access policies for higher education and healthcare institutions. Be sure to provide links to the remote access policies you identified in steps 2 and 3.

Part 2: Create a Remote Access Policy (0/7 completed)Note: As you found in your research, different industries have similar but different policies. When using a policy template, it is important to ensure that the template matches the needs of your specific industry and business.

  1. 1. Review the following risks and threats found in the Remote Access Domain:
    • The organization is a local credit union that has several branches and locations throughout the region.
    • Online banking and use of the internet are the bank’s strengths, given its limited human resources.
    • The customer service department is the organization’s most critical business function.
    • The organization wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
    • The organization wants to monitor and control use of the internet by implementing content filtering.
    • The organization wants to eliminate personal use of organization-owned IT assets and systems.
    • The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
    • The organization wants to implement security awareness training policy mandates for all new hires and existing employees. Policy definitions are to include GLBA and customer privacy data requirements, in addition to a mandate for annual security awareness training for all employees.
  2. 1. Identify a security control or countermeasure to mitigate each risk and threat identified in the Remote Access Domain. These security controls or countermeasures will become the basis of the scope of the Remote Access Domain policy definition to help mitigate the risks and threats commonly found within the Remote Access Domain.
  3. 2. Review the following characteristics of the fictional Healthwise Health Care Provider:
    • Healthwise has several remote health care branches and locations throughout the region.
    • Online access to patients’ medical records through the public Internet is required for remote nurses and hospices providing in-home medical services.
    • Online access to patients’ medical records from remote clinics is facilitated through a virtual private network (VPN) and a secure web application front-end over the public Internet.
    • The organization wants to be in compliance with the Health Insurance Portability and Accountability Act (HIPAA) and IT security best practices regarding remote access through the public internet.
    • The organization wants to monitor and control the use of remote access by implementing system logging.
    • The organization wants to implement a security awareness training policy mandating that all new hires and existing employees obtain remote access security training. Policy definition is to include HIPAA and electronic protected health information (ePHI) security requirements and a mandate for annual security awareness training for all remote or mobile employees.
  4. 1. Create an organization-wide remote access policy for Healthwise Health Care:

Healthwise Health Care

Remote Access Policy for Remote Workers and Medical Clinics

Policy Statement
Define your policy verbiage.

Purpose/Objectives
Define the policy’s purpose as well as its objectives and policy definitions

Scope
Define whom this policy covers and its scope. What elements, IT assets, or organization-owned assets are within this policy’s scope?

Standards
Does the policy statement point to any hardware, software, or configuration standards? If so, list them here and explain the relationship of this policy to these standards. In this case, Remote Access Domain standards should be referenced, such as encryption standards and VPN standards; make any necessary assumptions.

Procedures
Explain how you intend to implement this policy for the entire organization.

Guidelines
Explain any roadblocks or implementation issues that you must overcome in this section and how you will surmount them per defined guidelines. Any disputes or gaps in the definition and separation of duties responsibility may need to be addressed in this section.

Challenge Exercise (0/1 completed)Note: The following challenge exercise is provided to allow independent, unguided work – similar to what you will encounter in a real situation.

For this portion of the lab, you will create training documentation for remote employees of Healthwise Health Care. This training will provide remote employees with methods they can use to secure their home network before connecting a company computer, as well as guidance on how to access the corporate network while traveling.

Use the internet to find information about remote access policies and home network protection, and then use this information to create a training document for remote employees.

Systems Architecture

 

Select one of the categories of applications:

·  Big data

·  Location Based Services

·  Mobile applications and mobility

·  Cloud computing

Research the applications type and pick an example application.

Complete a 2-3-page paper with an abstract and conclusion (plus cover sheet and reference page) that discusses:

· What programming languages would you suggest for the application development?

· What could impact the availability and performance of the application?

· Give an example of documentation or diagrams used in development.

· What might you include in a testing plan.

· What are the security considerations for this application?

Research Paper

Building an economy: Government planning vs. entrepreneurial innovation  

Be approximately 5 pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
At least two scholarly journal articles to support your positions, claims, and observations,

Create single presentation – PPT with notes for about 25 slides on Chapter 25 Datacenters Overview; Chapter 26 Running a Datacenter

Create single presentation – PPT with notes for about 25 slides without title, synopsis, bibliography, and/or closing slides.

Subject: Business Network Systems Management – 03478 – Sp22

Book: The-practice-of-system-and-network-administration-volume-1, 3rd-edition,

      Author: Thomas A. LimoncelliChristina J. HoganStrata R. Chalup

Chapter 25 Datacenters Overview; Chapter 26 Running a Datacenter

1. First Write a brief synopsis of the chapter in 1-2 paragraphs for your post 

2. ** you must create a single PowerPoint presentation which summarizes the key points the author makes in the chapter(s). 

** You must also incorporate outside data from your own personal experiences, case studies, outside literature, or some other outside source which helps to illustrate the authors’ points. 

** Make sure that you highlight and cite the outside references to get appropriate credit for them. 

**** Important: Do not simply re-write the authors’ original texts. Summarize and paraphrase what the authors were saying in your own words. 

** The presentation must contain at least 25 content slides with notes 

  (not including the title, synopsis, bibliography, and/or closing slides). 

Create an application

  

Create an application that uses a structure to store the following data about a customer account: Last Name, First Name, Customer Number, Address, City, State, Zip Code, Telephone Number, Account Balance, and Date of Last Payment. The application should allow the user to save customer account records to the file, search the file for a customer by last name or customer number, and print a report listing all the customer records in file.

Input validation: When entering a new record, make sure the user enters data for all fields. Do not accept negative numbers for the account balance.

Week 7 Powerpoint

Instructions

Instructions:

Prepare a 6-8 slide Microsoft PowerPoint highlighting the content from the paper

Submission Instructions:

You may use resources from the APUS Online Library, any library, government library, or any peer-reviewed reference (Wikipedia and any other publicly-reviewed source is not accepted).

The paper must by at least 6-8 pages double-spaced, 1″ margin all around, black, 12 point fonts (Times New Roman, Arial, or Courier) with correct citations of all utilized references/sources, (pictures, graphics, etc are extra – allowed but extra for the minimum page count).

The title page and references are also required but don’t count in the minimum page count.

The PowerPoint of 6-8 slides is a summary of this paper. No new topics, ideas or concepts are introduced in the PowerPoint that is not included in the paper. A minimum of 10 references are needed.

The paper will be subjected to checking against plagiarism.

The required number of pages do not include title or references pages – although these must be included.