Assignment – 1 ( Info Tech & Mobile Application)

 

Web Services Project

4 Page summary paper

  • Investigate alternative tools and frameworks for building web services (do not use ASP.NET)
  • Talk about specific tools, ie software platforms, OSes, and computing architectures 
  • What software is needed and compare this with other common approaches for Mobile development
  • To what community/constituent group (personal or enterprise) is this type of Mobile development targeted
  • Argue the need for cross-platform Mobile development frameworks.

No Plagiarism

APA Format*************** 

Please answer the following

During this semester, we examined several areas of governance and ways in which governance models are applied and regulated by governments and industryAs you get closer to starting your own dissertation, you will need to choose a topic in your first dissertation class DSRT 736, so it is essential to start preparing.This week, let us take a look at some topics to consider, and by the end of the week, we could have several ideas for dissertation topics.Since you have already examined several research articles, another way would be to examine previous dissertations in these areas.Visit the University of Cumberlands’library, go to the Dissertation Database, and locate an interesting topic on governance models, frameworks, regulations, etc.Here are some pointers that will help critically evaluate some viable topics.•Is the topic attainable for a first-time dissertation student?•Is the problem rooted in the literature?•Is the research empirical, i.e., is there a survey, is therean interview guide, has the data been analyzed via some statistical tool?•Is there a theoretical model or framework discussed?Discuss the topic, the problem the model has been used in the research, and any present findings.Do not read the entire dissertation, as the abstract and chapter one introduction should give a clear understanding of the research

Homework

 

Define several forms of metadata that can be useful to an investigation. How is it valuable to an investigator?

Post between 200 and 300 words.

Need .cpp using Microsoft Visual C++ 2010 express

  

Need .cpp using Microsoft Visual C++ 2010 express
 

Write a program that prints the message, “Hello, my name is Hal!”
Then, on a new line, the program should print the message “What would you like
me to do?” Then it’s the user’s turn to type in an input. You haven’t yet learned how
to do it—just use the following lines of code:
 

string user_input;
getline(cin, user_input);
 

Finally, the program should ignore the user input and print the message “I am sorry,
I cannot do that.”
This program uses the string data type. To access this feature, you must place the line 

  

Write a program that computes the sum of the first ten positive integers,

Qualitative Data Collection Instrument

 

Using the topic and research question you developed in week 1, you will design a qualitative instrument that could potentially answer your topic/research question if it were to be applied to a qualitative study. Keep in mind, this may take some stretching if you wrote your question leaning quantitatively. The purpose here is not to box you in but to ensure that you have a solid understanding of both methodologies.

Directions:

You will develop a word document to include:

  1. View the rubric and examples to make sure you understand the expectations of this assignment.
    1. Rubric for Data Instrument.docx
    2. Qualitative Instrument Samples.pdf
  2. Your research question in the form of a qualitative question (if it was not already).
  3. An instrument or protocol (interview, ethnography, focus group protocol, etc) that could be used to answer the qualitative version of your research question.
  4. A one paragraph description/justification of how your chosen instrument/protocol is the best choice for answering the qualitative version of your research question.

rp

, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Exp19_Word_Ch04_HOEAssessment_Security

 Exp19_Word_Ch04_HOEAssessment_Security 

 Exp19 Word Ch04 HOEAssessment Security 

 Word Chapter 4 Hands-On Exercise Assessment – Security 

  

Project Description:

You are enrolled in a cyber security course at your local university. One of the assignments is to write a group paper with another student about password security. You and your partner conducted research on the topic and wrote a final draft of the report. Your partner has provided some feedback and suggestions, and you will review the feedback and make corrections to the paper where needed. You will also need to document the sources of the information used for the paper. You will use track changes, accepting and rejecting them as necessary, credit sources used in the preparation of the report, address your partner’s comments, include a table of contents and an index.

     

Start Word. Download   and open the file named Exp19_Word_Ch04_HOEAssessment_Security.docx.   Grader has automatically added your last name to the beginning of the   filename. 

 

Apply the following   formatting to the whole document:
  • Document is double-spaced.
  • The font is Times New Roman.
  • There is no paragraph spacing before or after any paragraph.
  • Margins are 1” at the top, bottom, left, and right.
  • Alignment is left.

 

Ensure that All   Markup view is displayed. On the first page, reject the replacement of the   three words used, i.e., recognize, choices, and employed. Accept all other changes in the document and stop   tracking.

 

Modify the Title   style to reflect the first comment left by your partner. Reply to the first   comment by typing Adjusted Title style. (include the period.)   and mark the comment as Resolved.
 

  Find the second comment which is in the Poor   Password Practices section, and italicize the passwords as instructed in   the comment, but not the commas. Mark the comment as Resolved.
 

  Create a new paragraph before the word Password   as indicated by the third comment on page 3. Delete the comment.

 

Change the Bibliography   Style to APA Sixth Edition. Click before the period in the last sentence in   the first paragraph in the Poor   Password Practices and Their Consequences section, with the sentence   ending with and other well-known   passwords. Insert the following article citation:
 

  Author: Storm, Darlene
  Title: Worst, Most Common Passwords for the Last 5 Years
  Periodical Title: ComputerWorld
  Year: 2016
  Month: January
  Day: 20
  URL: http://www.computerworld.com/article/3024404
  Note: Mac users do not need to add the URL.
 

  Insert a citation to the same source before the period in the last sentence   in the third paragraph on page 3, with the sentence ending with offline password managers are even free.   

 

Click before the   period at the end of the last sentence in the first paragraph of the Recommended Password Practices   section, with the sentence ending with should   not just be added to the end. Insert the following website citation:
 

  Author: Schneier, Bruce
  Name of Web Page: Choosing Secure Passwords
  Name of Web Site: Schneier on Security
  Year: 2014
  Month: March
  Day: 3
  URL: https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html   

 

Insert a footnote   after the last password example in the Poor   Password Practices section. Type the text: Common passwords as obtained   from data breaches. (include the period.) Change the number format for footnotes to   1, 2, 3 in the Footnotes dialog box. (Click Apply, not Insert.)

 

Insert a blank page   at the end of the report and insert a bibliography in APA style on the blank   page with the title Works Cited.   The bibliography should be double-spaced with no paragraph spacing before or   after. 

 

Ensure that   bibliography is formatted with the Times New Roman font and 12 pt size, and   that all text in the bibliography should be Black, Text 1 font color. Center   the Works Cited title. 

 

Insert the Ion   (Light) cover page. Change the Year to 2020. Type Password   Recommendations as the Document title. Type your first and last name as the   Author. Delete the Document subtitle placeholder.

 

Create a table of   contents, using the Classic style format with a dot leader, on a new page   positioned between the cover page and the current page 2.

 

Insert a footer with   a centered page number, using Banded format. Do not display the page number   footer on the first page. Numbering begins with page 1 on the Table of   Contents page.

 

Mark the following   words as index entries, selecting Mark All for each: access   control,   rainbow tables, password manager, and phishing. Select the first   occurrence of Offline password managers and set a cross-reference as See online password managers.
 

  Note, please be sure to search your document to ensure that all occurrences   are marked as specified; press CTRL+F and use the Navigation Pane to locate   each one.

 

Add an index on a   blank page at the end of the document. Use Classic format with 2 columns and   accept all other default settings.

 

Save and close Exp19_Word_Ch04_HOEAssessment_Security.docx.   Exit Word. Submit the file as directed.

Discussion Board, Fundamentals of Database Systems

For this Discussion Board, please complete the following:

As systems manager for XYZ company, you have found a severe problem in managing the company’s information resources because much of the company’s data are decentralized and stored in dissimilar forms. Data could be found in spreadsheets, small personal databases, proprietary databases, and even Word documents scattered across the network. The redundancy, error, inconsistency, and decentralization caused a real problem in controlling the information service.

Your post should include the following details:

  • Why is controlling the information asset through a centralized database management system (DBMS) critical to XYZ’s long-term success?
  • How has decentralized information hurt XYZ’s competitive advantage?

Global Marketing

 

What do you see as some of the challenges that we will face in global marketing in the years to come?

After reviewing this week’s resources and your research, in your own words identify and explain two challenges facing global marketing leaders. Explain the impact and provide at least one strategy to address and tackle each challenge identified.  Discuss the impact of the pandemic on global marketing. 

 Your initial response to the discussion question should be 250-300 words. You must have at least one course (our text) and one non-course scholarly/peer reviewed source in your initial posting.  Sources require in-text citations and must be incorporated into the body of the post in addition to a full APA citation at the end of the post.  

References:

6 Post-Pandemic Marketing Strategies With Long-Term Benefits