Cloud Security Myths.

 

Review in 500 words or more the video above called Cloud Security Myths.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested. 

essay

 

In a virtual world (VW) of massively multiplayer online role-playing games (MMORPGs), collaboration and communication are provided through the Internet between MMORPG-ready devices such as the Microsoft Xbox, and Sony PlayStation, and by using the Web browser. Gamers around the world can play against other gamers without seeing their opponent face-to-face. The Internet and MMORPG devices have become a social phenomenon. For example, a mobile game, called “Game of War” enables players to play against each other anywhere around the world. Other diversions include Second Life which isn’t really a game at all, but rather just that, another life people can live online through their online persona. 

Before you begin this assignment, engage in an online game or experience such as Game of War, Second Life, or Words with Friends, which has a phone app you can download free or play from your computer on the internet or even as a Facebook app.  Any game where you are playing against a live person over the web.  If you have difficulty finding an online multiplayer game, reach out to your instructor for guidance.

Write a paper with screen shots from your experience in which you complete the items below. Be sure to include what your choice was in the introduction paragraph. 

  1. Describe cognitive social phenomena that occur specifically to the context of the MMORPG that wouldn’t happen in a face-to-face checkers game.
  2. Compare and contrast the MMORPG user interaction environment to the face-to-face environment where a board game like Scrabble is being played. Next, identify whether or not the environment has an impact on the player’s ability to play Words With Friends in an online environment.
  3. Outline and describe the user interface requirements that a game designer needs to include in order to engage players in a MMORPG environment.
  4. Use at least (3) quality resources in this assignment. NOTE:Wikipedia and similar Websites do not qualify as quality resources
  5. Format your assignment according to the following formatting requirements:
    1. This course requires use of new Strayer Writing Standards (SWS). The format is different from other Strayer University courses. Please take a moment to review the SWS documentation for details.
    2. Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
    3. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.
    4. Include a reference page. Citations and references must follow SWS format. The reference page is not included in the required page length.

NOTE:  Although there is not a specific page length, you should fully explore and answer the questions asked.  Typically you’ll have two or three paragraphs with your main point supported by a few sentences of fact for each. The goal is to convince the reader that you have done your assigned reading and the additional research being asked. 100% original work is required. 

The specific course learning outcomes associated with this assignment are:

  • Compare and contrast the various cognitive models.
  • Construct evaluation techniques to the user experience and system usability in the design process.
  • Describe the differences in developing user interfaces for different application environments.
  • List the general principles used in the heuristic evaluation of a user interface design.
  • Use technology and information resources to research issues in human-computer interaction.
  • Write clearly and concisely about human-computer interaction topics using proper writing mechanics and technical style conventions.

Operational Excellence Discussio.

Discussion: This week we focus on the concept of the balanced scorecard.  Please note what it is and how organizations use balanced scorecards.  Note any alternative methods organizations use instead of the balanced scorecard and why they would use these methods over the balanced scorecard.

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

D&L

 

Inspect 5 doors in your building with locks

Topic :Physical security

Enterprise Risk Management – Research Paper

Your task this week is to write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Business Continuity and Disaster Recovery planning

 

A. Research and select an organization that effectively implement the disaster recovery and business continuity plan. Identify the list of activities involved in the process and highlight the significance of this plan to the organization.

B. Discuss the Business Impact Analysis in Disaster Recovery and Business Continuity Plan

Prolog Assignment

In the two-people game of ten questions, one person is answerer and the other person is questioner. They decide one topic to confine the scope, say Olympics games. The answerer decides an Olympic game in his/her mind and does not reveal the game to the questioner. Questioner is supposed to ask a maximum of ten questions to guess the answer.

Design a Prolog script that plays the role of an answerer. For example, queries can be related to:

• Team size (2 for badminton doubles, 1 for swimming)

• Number of teams in a game (2 for badminton doubles, many for swimming)

• Arena type (court for badminton doubles, pool for swimming)

• Play device (shuttle cock or racket for badminton doubles, water for swimming, ball or

racket for tennis, javelin for javelin throw, etc.)

• Game mode (knock out, timed)

• Performance type (score, win)

There should be only one form of query, for example: has(ball), has(pool), has(team), has(teamsize,2), has (teams_per_game, 2), etc. And one form of decision: is(badminton).

Prolog script should be able to play the game 5 times, choosing a different game each time.

Developing Your Design Solution

 

Data representation is the act of displaying the visual form of your data. The process of identifying the most effective and appropriate solution for representing our data is unquestionably the most important feature of our visualization design. Working on this layer involves making decisions that cut across the artistic and scientific foundations of the field.

Here we find ourselves face-to-face with the demands of achieving that ideal harmony of form and function that was outlined in Chapter 6, Data Representation. We need to achieve the elegance of a design that aesthetically suits our intent and the functional behavior required to fulfill the effective imparting of information. According to Kirk 2016, in order to dissect the importance of data representation, we are going to “look at it from both theoretical and pragmatic perspectives.”

Instructor’s discussion question:

Three storytelling techniques are discussed in the text (pages 161-209) in which data is presented and stories are being interpreted. What is the importance and the advantages of using these techniques? Provide an example of each technique.

Reference

Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design. Thousand Oaks, CA: Sage Publications, Ltd.