short answer

 

Please respond to the following:

  • As a team leader for a development group, one of your responsibilities is to identify and suggest new technologies. You believe jQuery is a technology that can be evaluated. List and explain at least three benefits that jQuery provides to web design and development. Select one benefit and include the URL of a website that uses this feature. Explain how the feature is being used on the website.
  • Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. 

Chapter 8

 

Chapter 8  discusses the concept of collection. Assume that An agency has focused its system development and critical infrastructure data collection efforts on separate engineering management systems for different types of assets and is working on the integration of these systems. In this case, the agency focused on the data collection for two types of assets: water treatment and natural gas delivery management facilities. Please identify what type of critical infrastructure data collection is needed for pavement and storm water management facilities. 

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, identify what type of critical infrastructure data collection is needed for pavement and storm water management facilities. 

B) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.
 

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)

Discuss Howell and Mendez’s three perspectives on followership. Note how these behaviors influence work productivity.

 

Week 15 Discussion

After completing the reading this week, we reflect on a few key concepts this week:

Discuss Howell and Mendez’s three perspectives on follower-ship. Note how these behaviors influence work productivity.

What is the big five personality model?

What is the Myers-Briggs test? How is it similar to the Big five model? How is it different than the Big five model?

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive. Substantive posts will do at least TWO of the following:

Ask an interesting, thoughtful question pertaining to the topic

Expand on the topic, by adding additional thoughtful information

Answer a question posted by another student in detail

Share an applicable personal experience

Provide an outside source

Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread. Please ensure to use information from your readings and other sources from the UC Library. Use APA references and in-text citations.

mad discussion

  

Enterprise Risk Management Integrating with Strategy and Performance Executive Summary. (2017, June). Retrieved from https://www.coso.org/Documents/2017-COSO-ERM-Integrating-with-Strategy-and-Performance-Executive-Summary.pdf

Do, H., Railwaywalla, M., & Thayer, J. (2016). Integration of ERM with Strategy (p. 35). Retrieved from Poole College of Management, NCSU website: https://erm.ncsu.edu/az/erm/i/chan/library/Integration_of_ERM_and_Strategy_Case_Study.pdf

fter reading the main articles this week, and any other relevant research you locate, please discuss the following in your main post:.

  • Which case study in the paper was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

Evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history.

Evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  

The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page. 

Ethical Hacking_Week15

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

BI Wk7

Chapter 12 & Chapter 13

Q1. Research Apple Home Pod. How does it interact with smart home devices?  Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and report your findings. – 300 words

 

Q2 to Q4 150 words each

Q2. Some people say that chatbots are inferior for chatting. Others disagree. Discuss.

Q3. Discuss the financial benefits of chatbots.

Q4. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.

Q5. Exercise – Compare the chatbots of Facebook and WeChat. Which has more functionalities? – 200 words

Q6-Q9 – 150 words each 

Q6. Compare the IoT with regular Internet.

Q7. Discuss the potential impact of autonomous vehicles on our lives.

Q8. Why must a truly smart home have a bot?

Q9. Why is the IoT considered a disruptive technology?

Q10. It is said that the IoT will enable new customer service and B2B interactions. Explain how. —225 words 

Q11. Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities. —225 words 

written assignment

 In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work?  

Discuss the impact of cloud processing environments on application security. Be sure to define cloud computing, application security, and the various types of implications.

  

The paper is to be between 2,000 and 2,500 words. 

It must be formatted using APA style. 

A least five scholarly resources must be utilized. Scholarly resources include journal articles in peer reviewed journals, textbooks, and Educational and Government websites. Wikipedia, message boards, blogs, and commercial websites are not scholarly. While you can cite a commercial website, it will not count as one of the scholarly sources. The paper will be evaluated using plagiarism scanning technology, so be careful to include citations and follow APA procedures when dealing with direct quotes. It is expected that one of the five sources will be your text.

  

The PowerPoint should support a 10-minute presentation. 

Avoid slides with many words on it. 

One tip is to not use a font smaller than 20 point. 

Ensure that you have enough slides to address the topic, 

Do not go over the 10-minute limit.

Include a slide that discusses who wrote what, and who presented what