Discussion

Class,

From the humdrum of the mid-2000s web apps, Apple radically changed the mobile world with the iPhone, offering well-designed apps of their own and curating apps that were accepted into the App Store.  That influence has been far reaching, prompting Google to push their boundaries and develop material design, a design language that has become the distinctive hallmark of Android apps.  When compared to the web world where some popular apps could get away with mediocre design, why do mobile apps face a higher design bar? 

  • When compared to the web world where some popular apps could get away with mediocre design, why do mobile apps face a higher design bar?
  • Compare and contrast native mobile app design versus standard desktop app design.  Discuss considerations for choosing one over the other.  Elaborate on main advantages vs disadvantages.

  • You must apply and use the basic citation styles of APA.
  • Do not claim credit for the words, ideas, and concepts of others.
  • Use in-text citation and list the reference of your supporting source following APA’s style and formatting
  • Do not copy and paste information or concepts from the Internet and claim that is your work.  It will be considered Plagiarism and you will receive a zero for your work.
  • Use this link to access the Discussion Board

IT 640 Milestone One Guidelines and Rubric Overview

Within an organization, the dependability of network infrastructures has become top priority. The fundamentals of how this infrastructure works within the organization requires a systems thinking mindset and the ability to properly develop an analysis plan. You have been tasked with analyzing the current network architecture of the organization and determining any key changes that should occur as the organization prepares for future growth. You will evaluate traffic patterns to determine critical aspects of your business and provide basic insight into what should be done to the network from a capability aspect and from a security viewpoint as the organization prepares for future growth. Ultimately, you will recommend a design for the future network architecture of the organization.

Prompt

For this milestone, you will create a project analysis plan. Your plan will identify the network applications of the current network including a description of how the current network is designed by explaining how the different layers of the Open Systems Interconnection (OSI) model relate to each other within the network.

Refer to the following files when completing this milestone:

To complete this assignment, address the following critical elements:

  • Identify the network applications that are a part of the current network.
  • Identify and label the components of the network with the appropriate OSI network layer(s) (refer to the Organizational Network Diagram – Current file)
  • Provide a nontechnical description of the role and functions of key components, including routers, switches, and firewalls.
  • Provide a brief analysis of the current network configuration in terms of day-to-day business operations. Consider the following questions as a guide to your analysis:
    • What is the impact of losing connectivity between the Dallas router and the Memphis router? Which applications might be impacted between locations?
    • What is the risk of just having a single router or switch within the Memphis office?
    • How effective is the firewall in the current network?
  • Summarize the project requirements and deliverables

What to Submit

Your assignment should be 1 to 2 pages in length with double spacing and should conform to academic writing standard expectations for mechanics, content organization, and use of APA style.

See attached additional resources.

Case Study Analysis

 Read the Module 1 Case Study Assignment 1 and address the following question in a word document and then submit/upload your document. Document format is listed below.

Question: In approximately two pages, compare the benefits and drawbacks of Google Wallet and Apple Pay from a consumer’s standpoint, a retailer’s standpoint, and a bank’s standpoint.

Your word document should have the following;

  • Title page, with your name, class, date, and assignment identifier
  • Body of the paper (one or two pages) double spaced, 12 point font, New Times Roman, 1-inch margins on all sides
  • References should be identified/listed on a separate page (last page of submission). All references must follow APA format.
  • Save in Word Document

 Case Study 1:  Digital Wallets on Mobile Devices: Apple and Google

One of the fastest-growing segments of the online payments business is mobile payments. U.S. mobile payments are expected to reach $140 billion by 2019 and purchases using mobile devices could account for half of all online retail sales by 2017.Google introduced one of the first digital wallet products that would work on a mobile device in 2011 when it also introduced support for the operation of NFC chips in its Android mobile operating system. Google Wallet stores a MasterCard account for users that agree to maintain a cash balance with the card’s issuing bank, so it operates essentially as a debit card. Google Wallet does not charge a fee to merchants or the MasterCard issuing banks, nor does it charge a transaction fee. Instead, it generates revenue from advertisers who pay to display ads, offer coupons or other promotions (specific ads are displayed based on the mobile device’s proximity to the stores that are making the offers). Google Wallet has been slow to catch on with users.In 2014, Apple introduced a digital wallet product for its mobile devices called Apple Pay. In operation, Apple Pay is similar to Google Wallet; however, the infrastructure and revenue model is different. Apple Pay charges the issuing banks a fee of 0.05 percent of the transaction amount and guarantees each transaction; that is, if the transaction is fraudulent, Apple will cover the loss. Credit card companies normally charge merchants a fee ranging between 2 and 3 percent of the transaction amount, so the additional Apple Pay fee serves as a low-priced insurance plan for them. Consumers will not be charged at all for using Apple Pay and will not be given advertising messages. Further, Apple has stated that it does not collect information about consumer buying habits from Apple Pay data. Apple arranged for American Express, Discover, MasterCard, and Visa credit cards to be included in their system, along with a group of large card-issuing banks. They also included major retailers such as Bloomingdales, Disney, Staples, Walgreens and Whole Foods. These participants will be able to collect data on consumer buying habits, but only on those consumers that use their card or shop at their stores. Apple reported that more than a million credit cards were registered with Apple Pay in the first three days it was available. After Apple Pay’s introduction, an increase in the number of retailers that accept NFC payments (as you learned in this chapter, NFC technology is used by both Google Wallet and Apple Pay) caused an increase in the use of Google Wallet. 

(Schneider 499)

Schneider, Gary. Electronic Commerce, 12th Edition. Cengage Learning, 20160226.  

Social networking

 Social networking Web sites create online communities of Internet users that eliminate barriers created by time, distance, and cultural differences. These sites allow people to interact with others online by sharing opinions, insights, information, interests, and experiences.  Members may use the site to interact with friends, family members, and colleagues they already know, but that they may also wish to develop new personal and professional relationships on the sites.

Social network advertising uses social networks to inform, promote, and communicate the benefits of products and services, and there are several advertising strategies.  Banner ads on social networks can either be displayed to each visitor to the Web site or by using the information in user profiles, directed toward those members who would likely find the product most appealing.  People frequently make decisions based on input from their close group of friends and advertising and use an individual’s network of friends.  Company-owned social networking websites allow users to talk about new products, services, or improvements they would like to see and the company can implement customer-submitted ideas. Viral marketing is where users pass along a marketing message to others, creating the potential for exponential growth.

Many companies are using social media to advertise, collect information, or gather background on individuals. Do you think this is ethical?

Data Recovery

 

Use the web or other resources to research at least two criminal or civil cases in which  recovered files played a significant role in how the case was resolved.

Use your own words and do not copy  the work of another

Please follow the APA format and use proper Citations.

C# Polling

 In this exercise, you’ll write a simple polling program that allows users to rate five social-consciousness issues from 1 (least important) to 10 (most important). Pick five causes that are important to you (for example, political issues, global environmental issues). Use a one-dimensional array topics (of type String) to store the five causes.  To summarize the survey responses, use a 5-row, 10-column two-dimensional array responses (of type Integer), each row corresponding to an element in the topics array. When the program runs, it should ask the user to rate each issue. Have your friends and family respond to the survey. Then have the program display a summary of the results, including:  

  1. A tabular report with the five topics down the left side and the 10 ratings across the top, listing in each column the number of ratings received for each topic. 
  2. To the right of each row, show the average of the ratings for that issue. 
  3. Which issue received the highest point total? Display both the issue and the point total. 
  4. Which issue received the lowest point total? Display both the issue and the point total.

Data

Stephanie: Gun control 8, immigration 10, health care 6, taxes 2, global warming 9 

Hassan: Gun control 7, immigration 6, health care 8, taxes 9, global warming 5

Ryan: Gun control 2, immigration 3, health care 8, taxes 9, global warming 1 

Lori: Gun control 3, immigration 2, health care 8, taxes 9, global warming 1 

David: Gun control 7, immigration 9, health care 8, taxes 6, global warming 10 

Legal Abstract

*Below is the instructions, and I have attached an SAMPLE EXAMPLE document 

Legal Abstracts – Instructions

A sample legal abstract is posted in Blackboard. Use the sample as your template.

Make sure that your case or controversy is current — within the last 6 months — because older cases or controversies are often misleading or not relevant because of subsequent legal developments. Cases can be overturned; statutes or regulations can be amended or repealed. 

The abstract is a summary of the author’s article in the words of the student. Abstracts submitted containing the original article’s text in full or part will not receive full credit. Your abstract should reflect a summary in your own words of the material in the article you are discussing.

Abstract topics should address current legal issues, controversies, cases or developments affecting cybersecurity law as we examine it in this course. For further guidance on topics, consider the subjects covered in each of the class modules. Articles may be chosen from technical journals or websites, legal journals or websites, or general news or information sites. 

To restate, the timeliness of your selected case, controversy or issue is crucial, because an article about a case that has subsequently been overturned or a law that has been amended or repealed not only does not keep you properly informed on current legal issues, it may actually provide incorrect information that can negatively impact your decision making when analyzing potential legal issues. 

Each abstract must contain the following headings:

Article title

Author

Publication

Publication date

URL

Facts of the dispute

The background of the case or controversy.

Plaintiff’s claim

In a criminal case, the Plaintiff is the State or the appropriate governmental entity. What legal wrong does the plaintiff claim that the defendant committed?

Defendant’s claim

How has the defendant answered? In the early stages of litigation, the defendant may not have answered the complaint. 

Applicable law (i.e. statute, regulation, treaty)

Usually, the applicable law is mentioned in the article. If not, try to determine which law or laws apply. 

Issue of law

This is the legal question that is the foundation of the case. Courts rule on an issue of law by interpreting the law as applied to the facts of the case. 

Holding (if an adjudicatory body has rendered a decision)

This is the ruling that a court issues after it applies the law to the facts of the case. If a case is still ongoing, the court may not have issued a holding. 

Impact on IT

Finally, include your evaluation of the possible impact on cybersecurity in the enterprise of the particular legal issues in the article under the following heading. Here is where you get to apply your knowledge and skills as an IT professional. If you can find additional commentary on the case or controversy discussed, include it here. 

SE 492 week 3

Read chapter 4. 200 words and citations 

You need access to Microsoft Project software. If you don’t have it installed in your computer you can at least download a trial version.

Go to Appendix on page 139 Microsoft Project and create a file as directed and enter the information from pages 139-145 on your Microsoft Project based on chapter 7.

Provide screen shots to show your work (i.e. tasks, resources, network diagram).

What did you learn from chapter 4 as you apply the concepts on chapter 4 to the Microsoft Project software?

Programming with C++

2 different assignments. Need them finished in 10 to 12 hours. 

1-Please  complete the following assignment using visual studio and upload the project or .cpp file:

Instructions: Write a cpp program to print “Hello, World!

—————————————————————————————————-

2- Archie wants a program that calculates and displays a team’s final score in a football game, given the numbers of the team’s field goals, touchdowns, one-point conversions, two-point conversions, and safeties. First, create an IPO chart for this problem, and then desk-check the algorithm twice. For the first desk-check, use 3, 2, 2, 0, and 1 as the numbers of field goals, touchdowns, one-point conversions, two-point conversions, and safeties. For the second desk-check, use your own set of data. After desk-checking the algorithm, list the input, processing, and output items in a chart similar to the one shown in Figure 3-25(SEE ATTACHED BELOW), and then enter the appropriate C++ declaration statements.

 Save your document(cpp file) with the name football followed by your initials. Example football-rf.cpp 

Assignment

 The textbook content for Understanding Operating Systems is organized through 1-6 chapters. Week 1 provides an introduction to those key elements associated with Operating Systems (OS). These first four chapters establish the working components of Memory Management,  Memory Management Virtual Memory Systems, and Processor Management. Week two continues these introductions with additional management functions.  Answer the following questions  (Don’t cut and paste answers form the book or the Internet) :

  1. Research additional information and provide a brief explanation for the following terms:
    1. Thread scheduling priorities
    2. CPU Cycle time
    3. Processor bottleneck
    4. Processor Queue Length
    5. I/O Interrupts
  2. In your own words briefly explain the following terms:
    1. Page Map Table (PMT)
    2. First In First Out (FIFO)
    3. Job Table (JT)
    4. Least Recently Used (LRT)
  3. Discuss the functional purpose and difference between, “job clocks” and “wait clocks”.
  4. Explain any confusion that might exist between the term and it’s use, “main memory” and  “secondary storage”.