It472 week 9

DQ9: The fourth function is the presentation logic: the display of information to the user and the acceptance of the user’s commands (the user interface). These four functions (data storage, data access logic, application logic, and presentation logic) are the basic building blocks of any information system.

  • Explain the process of user interface design including the user interface structure and user interface standards? Give examples.
  • Develop two use scenarios for a Web site that sells some retail products (e.g., books, music, clothes). Submit your screenshot of the layout here.

Advanced modelling and visualization

provide you with some experience evaluating the use of mark embellishments within visualizations. 
Tasks:

Below is a link to a recently published academic paper that describes a series of experiments on mark embellishments. Read the paper and write a report explaining the underlying research question, the approach taken by the authors, and your personal response to the results of the experiment. Your goal here is to perform an abstract analysis of a research effort using the approaches described in the textbook.

https://kosara.net/papers/2015/Skau-EuroVis-2015.pdf

Your report should consist of three sections on 1-2 pages.

First, describe the underlying research question(s) in your own words. Why perform this research? What’s the impact for the potential outcomes? What principles in the textbook that relate to the research questions?
Second, describe the approach taken by the authors to find answers. How was the paper organized to assist their approach?

Third, discuss your personal response to the results obtained by the authors. Are you convinced by what they found? Do you have any objections to their findings, and if so, why? Are there any counterexamples of visualizations that you believe refute their claims?

Linux Firewall Exploration Lab

Task 1: Using Firewall

Task 2: Implementing a Simple Firewall

Task 3: Evading Egress Filtering

Task 3.b: Connect to Facebook using SSH Tunnel.

Task 4: Evading Ingress Filtering

Topic

  develop an introduction to your Chapter 2 where you clearly explain the overall research topic, literature gathering process, and the scope and organization of the literature review. The introduction should conclude with a paragraph that describes the sequence of the literature you will include and the literature analysis process. After the introduction, you should incorporate possible headings/subheadings that you plan to cover and include at least 20 scholarly references.  Continue to develop a draft of Chapter 2 where you clearly provide a well-developed introduction and other sections relevant to your topic.   please work to submit at least 12  pages of literature 

Info Security & Risk Mgmt

Please see the attached document for the information

4 pages, APA format

For this part of the project:

  1. Research risk assessment approaches.
  2. Create an outline for a basic qualitative risk assessment plan.
  3. Write an introduction to the plan explaining its purpose and importance.
  4. Define the scope and boundaries for the risk assessment.
  5. Identify data center assets and activities to be assessed.
  6. Identify relevant threats and vulnerabilities. Include those listed in the scenario and add to the list if needed.
  7. Identify relevant types of controls to be assessed.
  8. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk assessments.
  9. Develop a proposed schedule for the risk assessment process.
  10. Complete the draft risk assessment plan detailing the information above. Risk assessment plans often include tables, but you choose the best format to present the material. Format the bulk of the plan similar to a professional business report and cite any sources you used.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide
  • Estimated length: 4–6 pages

Building a desktop

 

  • List the steps that you will take in assembling all of the components that you identified in the first 3 phases of this project. These steps should be detailed enough to explain what you are doing. For example, what care would you take in mounting the motherboard to the case (consider the standoffs, proper grounding, ESD, and the like)? Determine at what points you would do quality check during the assembly. Indicate whether you will be partitioning your hard drive(s) and rationale related to that.
  • Finalize a reference list for all references used in all 4 phases of this project. Please used the reference that is attached. 
  • Be sure your paper is appropriately formatted as indicated below:
    • APA formatted cover page as well as the entirety of the document.
    • Paragraphs are coherently organized including the use of proper grammar and correct spelling.
    • Includes clearly organized using graphics and tables (where appropriate).

Acronyms are spelled out on first use.

IT476 week5

Adams, Ives, and Scott Incorporated is an agency that specializes in representing clients in the fields of sports and entertainment. Given the nature of the business, some employees are given a company car to drive, and each company car must be assigned to an employee. Each employee has a unique employee number, plus an address and set of certifications. Not all employees have earned one or more certifications. Company cars are identified by their vehicle id, and also contain a license plate number, make, model, and year. Employees represent clients. Not all employees represent clients, while some employees represent many clients. Each client is represented by one and only one employee. Sometimes clients refer one another to use Adams, Ives, and Scott to represent them. A given client can refer one or more other clients. A client may or may not have been referred to Adams, Ives, and Scott by another client, but a client may be referred by only one other client. Each client is assigned a unique client number. Additional attributes recorded for each client are name, address, and date of birth.

Create an ERD by first identifying the entities, then their relationships, and finally add the attributes to each entity.

Document everything including ERD diagram using Open ModelSphere or Dia.

Cakes By Monica Excel Assignment

 

Cakes By Monica Excel Assignment

 

For this assignment you will perform calculations in an Excel file. You can find the file in Week 2. Please note, it is your responsibility to have the correct software!

Instructions:

Cakes by Monica (a bakery under the umbrella of the Café Brulé restaurant) in Vermillion, SD makes cupcakes for customers to purchase both in the store and in bulk orders for birthday parties and weddings.

Suppose in the short-run, a bakery like Cakes by Monica has a fixed amount of capital but can hire college students from a local college easily to increase production as needed.  A production schedule is provided for you where Q is dozens of cupcakes.

a) Using the schedule provided, calculate the marginal product of labor when K = 3. 

b) Using your calculations, for which workers are there increasing, decreasing, and negative marginal returns to labor? 

c) Suppose this bakery decides to add another unit of capital in the long-run.  Find the marginal product of the 4th unit of capital and the marginal product of labor when K = 4.

d) Create a graph of the marginal product of labor for K=3 and K=4.

e) Using your graph and the data, how does the addition of another unit of capital affect the productivity of labor? 

Please provide all answers (calculations and written explanations) in the provided Excel File. Save your file with your Firstname_Lastname and submit it in the designated area.