I have online work to do in excel it’s easy but time consuming please help
bi15
1. Compare the IoT with regular Internet.
2. Discuss the potential impact of autonomous vehicles on our lives.
3. Why must a truly smart home have a bot?
4. Why is the IoT considered a disruptive technology?
5. AT&T is active in smart city projects. Investigate their activities (solutions). Write a summary.
6.It is said that the IoT will enable new customer service and B2B interactions. Explain how.
7.Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities
be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).
2 pages length
202010
Final Assignment – Project Plan (Deliverables):
Securing IoT Devices: What are the Challenges?
Security practitioners suggest that key IoT security steps include:
1) Make people aware that there is a threat to security;
2) Design a technical solution to reduce security vulnerabilities;
3) Align the legal and regulatory frameworks; and
4) Develop a workforce with the skills to handle IoT security.
Final Assignment – Project Plan (Deliverables):
1) Address each of the FOUR IoT security steps listed above in terms of IoT devices by explaining in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.
2) If you owned a large company like RING, SimpliSafe, MedicalAlert or NEST that experienced a data breach due to faulty security settings on one of your IoT devices (such as a video doorbell or medical alert bracelet or a similar device) what would you tell your business partners and customers? Prepare a letter to send to your customers explaining the situation and what you plan to do about it. Keep in mind you want to do all you can to avoid losing business over this breach.
Question 2:
Your Research Project on “Cloud computing” topic the surveillance state consists 750 word research paper with at least 3 sources.
You must include at least 3 quotes from your sources enclosed in quotation marks and cited in-line.
There should be no lists – bulleted, numbered or otherwise.
Write in essay format with coherent paragraphs not in outline format.
Do your own work. Zero points will be awarded if you copy other’s work and do not cite your source or you use word replacement software
DM W 12 A
Please check the attached document for questions
IT Project Management
n your initial post, answer the following questions about IT Project Management. In addition to your course textbook (chapter 11), utilize the UC library for information and examples.
What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents.
Computer science
What is software engineering?
4 Weeks / Intro to Programming Concept
Currently Unavailable to complete
Dates are:
01/05/2021-
01/30/2021
vulnerability
Do a bit if research into File Inclusion Vulnerability.
- What is it?
- Why is is dangerous?
- What is the difference of low and remote inclusion?
- What methods can me employed to prevent a security breach?
- What programming languages are vulnerable to this type of attack.
write in 300words.
Support and Software Deployment 2.0
Please respond to the following:
- Your software has gone live and is in the production environment. The project gets handed over to the IT support team. Research support after software deployment. What are some of the challenges that can happen?
1000 words
Dissertation on IoT Cybersecurity
Discuss the theory that supports your research model in terms of your outcomes and predictors of those outcomes.