Human Computer Interaction Discussion 3

which of the cognitive frameworks do you feel best help users determine how to complete a task and activity? 

After reading Chapter 4, which of the cognitive frameworks do you feel best help users determine how to complete a task and activity? You are required to write a statement that is LIMITED to 150 words. This is an opinion question; therefore, research is not required. Should you cite the work of others, please provide the source of your opinion in APA format.
 

Week 3 Discussion

Data means nothing unless it is organized and presented in a manner that makes it informational. In Chapter 7, the problem is presented as Data rich, information poor. We live in a world where immense amounts of data are constantly being collected about virtually anything and everything. However, knowing what to do with these data and how to use it for effective decision making in business is the challenge. What then is business intelligence? How does data aggregation work, and why is data cleansing so important? Support your reasoning.

Chapter 7: Accessing Organizational Information—Data Warehouses

Note: 250 words with intext citations and 2 references must needed.

Status Report

Use the Week 8 Status Report Template [DOCX] to complete this assignment.

In Week 10, you will provide a detailed project presentation for your new information system project. Because of its importance to the organization, your presentation must be thoughtful and visually appealing. To help you stay on track for this three-week effort, the executives have assigned you a project manager. For each week leading up to the presentation, you are expected to turn in a short (less than one page) status report.

It must address just four things:

  1. What did you expect to accomplish on the project this week?
  2. What did you actually accomplish on the project this week?
  3. What issues have arisen, and what help do you need?
  4. What do you expect to accomplish on the project next week?

CIS 222 Assignment 3

 1-2 page apa format

After receiving your briefing of the threat analysis, the Executive Board has an increased interest in your security program. The CEO has asked for an overview of your plan for implementing the fixes to the problems. You advise that risk management is a continuous process but offer a briefing on the framework and some of the immediate “fixes” that will be implemented in the initial projects.Based on your research for Unit 3:

  • Explain the overall RMF process to the board and how it will improve security overtime.
  • Select the categorization of the corporate network using the Low-Moderate-High impact levels for confidentiality, integrity, and availability and brief that decision to the board.
  • Give some examples of planned fixes to improve security for those areas.
  • Explain how this effort will require financial and organizational support.
  • Explain how the impact levels selected for categorization will aid in resource allocation.

The requirements for your assignment are:

  • 1-2 page APA paper excluding title and reference pages
  • Provide at least two references and in-text citations in APA format
  • College level writing

Refer to the attached document for the grading rubric. 

Recommending Network Technology

 

Assignment Content

  1. Research networks in the context of your project.

    Write a 150-word response about which resource(s) you found to be most useful in terms of not only researching the different types of networks that exist, but which might be best for a given scenario. What criteria are you using, or thinking of using, to determine which type of network is most appropriate for your project?

    Submit your assignment.

Course name: InfoTech in a Global Economy

Course Reflection:

We looked at several topics on global IT strategies, technologies, models, and networking during this session.As you get closer to starting your own dissertation, you will need to choose a topic in your first dissertation class, DSRT-736, so it is essential to start preparing. This week, let us take a look at some topics to consider, and by the end of the week, we could have several ideas for dissertation topicsSince you have already examined several research articles, another way would be to examine previous dissertations in these areas.Visit the University of Cumberland’s library, go to the Dissertation Database, and locate an interesting topic on global IT.Here are some pointers that will help critically evaluate some viable topics.

  • Is the topic attainable for a first-time dissertation student?
  • Is the problem rooted in the literature?
  • Is the research empirical, i.e., is there a survey, is there an interview guide, has the data been analyzed via some statistical tool?
  • Is there a theoretical model or framework discussed?

Discuss the topic, the problem the model has been used in the research, and any present findings.Do not read the entire dissertation, as the abstract and chapter one introduction should give a clear understanding of the research.

Discussion: Communications Security for Remote Workers & Mobile Platforms

 

Before you begin, read: https://us.norton.com/internetsecurity-privacy-what-is-a-vpn-tunnel.html OR search for “tunneling protocols used in vpn” and choose an appropriate resource from the Internet.

Background: The COVID-19 pandemic forced many  organizations to rapidly transition existing employees to a “work from  home” situation. The overall success of such arrangements has encouraged  many companies to adopt Work From Home (previously known as “telework”  or “telecommuniting”) for all or part of the work week as a permanent  strategy. In these situations, a secure means of accessing the  organization’s internal networks and resources must be provided to the  dispersed workforce. Virtual Private Networks are a frequently deployed  technology solution capable of addressing and compensating for the  myriad privacy and security concerns that arise in “Work from Home” or  telecommuting situations.

VPN’s depend upon tunneling protocols as foundation technologies. For  this briefing paper, identify and discuss the four main tunneling  protocols that can be used to provide virtual private network access  between remote users and a company’s internal (corporate) networks and  resources. Provide examples of how each protocol can be used within a  VPN solution.

Format: this week, your deliverable should be  formatted as a 5 to 7 paragraph briefing paper. You should have an  introduction, analysis sections, and an appropriate summary section.  Include citations (in the text) and references (at the end) to support  your work and allow your readers to fact check your analysis and  conclusions.

Assembly language code

 

1. Create a variable that is a BYTE with the value 67. What is the value shown in memory? Show work verifying the value that is set.

2. Create a variable that uses 8-bits and correctly stores the value -83. Show what the memory contains and work verifying the result.

3. Create an unsigned 16-bit number that stores the value 13330 (decimal). Show what the memory contains and work verifying the result.

4. Create a signed 16-bit number and store the value -32 (decimal). Show what the memory contains and work verifying the result.

5. Create a variable to hold the value 12345678h (unsigned). (a) Move that variable’s value to the EAX register. (b) Set the AH register to 12. (c) Set the AL register to the value 34. Show the values of the EAX register before and after each parts (a)-(c). Verify that data is being moved as expected and describe it.

6. Write a program using signed 8-bit variables that computes finalVal = 2*X + 3*Y – Z. X, Y, and Z should be variables that are created in your .data section. Additionally, start with X = 1; Y should be set to five times the value of X. Z should be two times the value of X. Only X should be set in the data section; Y and Z should start uninitialized and then set in the main procedure as described. Create the program in assembly to compute finalVal. Does the value that is computed make sense (show work). In separate runs of the program double your value of X continuing to set the values for X, Y, and Z such that Y = 5X and Z = 2X until the value stored in finalVal no longer make sense. What are the values of X, Y, and Z before and after the result stored is correct. Show the contents in memory and describe why the value in finalVal no longer makes sense.

Graduate Research and critical Analysis

ASSIGNMENT

Step 1, Brainstorm: Think about your field of study as a master’s student. Use one of the two methods taught in class and find 3 articles that report on relevant problems related to the industry associated with your master’s degree program (think about scandals within the last 5 years). Come up with one example using the format below in a simple Word document.

Step 2, Create your Word Document and Answer Questions (it should look similar to p. 5 in Foundations):

FOR EXAMPLE: If my major is Computer Science, I would come up with something like Issue/Problem . 

Issue/Problem 

1) People Involved: 

2) Link to 3 research Articles: 

3) My Research Question: What have researchers learned about