Computer 8

Write 1 paragraph for each: 

1) Which software-development methodology would be best if an organization needed to develop a software tool for a small group of users in the marketing department? Why do you think this? Which implementation methodology should they use? Why?

2)Which technologies have had the biggest effect on globalization and why?

Qualitative Data Collection and Analysis

 

1(100 WORDS). What is discourse analysis? Give an example of how this could be used in a research study.

For example, using discourse analysis to study the social interaction of Pokemon Go users. One could collect conversations of user discussing community event days to understand what motivates them to join in on those days.

2(WORDS). What is data collection? What types of qualitative data do you think you could collect and why? (choose just 1-2 to discuss)

3(WORDS). What is the purpose of coding your data? Select one type of coding strategy mentioned in this week’s materials and describe how it can be used in a (or your) research study. 

H5

  Download and read the document and answer all questions in the document. Please see attached document H5 & APA Criteria doc.      

Discussion Board: OS Hardening

You provide a lecture to the working group regarding the importance of security education, awareness, and training due to the oft-quoted security maxim that users/humans are the weakest link in the security chain. While making users aware of security risks and training them how to protect company assets will reduce risk, it is important to put technical controls in place to protect the operating systems and applications that employees use every day.

Discuss the importance of “hardening” the PCS client workstations and servers. Make recommendations for operating system hardening options and describe how these are related to the concept of “system-specific policies” discussed earlier in the course. One of the working group members blurts out that antivirus protection is a waste of computing resources and patching applications takes too much time. Be sure to address these two concepts in your initial thread. Include at least one research reference and associated in-text citation using APA standards. In your replies to your peers further, discuss the importance of software security.

IMPACT OF IT -8

 

With any invention there will be trial and error. When it comes to technology, the errors can be extremely costly, more frequent, and sometimes deadly. Software applications are so in depth, that they are almost always released with bugs. On the opposite end of the spectrum, some technology has made our lives safer and even extended our life span. Put your proverbial “critical thinking” hats on for this week.

Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources.

 

Topics:

  • Do you believe we are too dependent on computers? Why or why not?
  • In what ways are we safer due to new technologies?
  • What are some recent examples of technology that has been created that is used to “save lives”?
  • What technologies have inadvertently taken lives?

Encryption Standards

Analyze the structure of advanced encryption standards and why it makes it so strong. 

500 words

APA format needed with references

Discussion Board: Acceptable Use Policies

Discussion Board: Acceptable Use Policies

Do some research to find an Acceptable Use Policy (AUP) for employees that is published on a company’s website. Review the policies and discuss whether they are complete. For example, the textbook says that a good policy states “explicitly” the punishment/ramifications for violating the rule. If the AUP is unclear, suggest ways it can be improved. Is the AUP over-inclusive, in your opinion/does it go too far/not far enough? Does your employer have an AUP? Do you know what it is? Have you violated it and suffered the consequences, or do you know someone who has? Why is an AUP an important security concern?