Project paper

Your final report will consist of your project topic, external system analysis (i.e. Blog 2), set of user requirements (i.e. P2: Personas) and prototype with detailed. explanations for all design considerations. Design considerations should be informed by existing literature, whether the textbook or other resources. Your prototype should consist of a minimal of 3 system mock-ups with detailed descriptions for each.
Example: If I were to redesign my academic social network, SocialXYZ to be mobile friendly, I might showcase 3 distinct views of the new system including one for the homepage, another for the discussion board and a third for the profile since those feature are very important for how I use the system. For each of these views, I would use Photoshop or another image editor (even MS Paint would work) to redesign the look and feel of the system as it should look on a smartphone. These design considerations would relate back to the textbook.
Report Grading Rubric
Introduction (2.5pts): The introduction will provide an overview of the system you plan to (re)design.
Background (5pts): The background will integrate Blog 2 (Analysis of Existing Systems) and P2 (Requirements Gathering). In this section, identify the strengths and weaknesses of existing systems and what design considerations you, as the designer, have considered. In this space, you will want to include screenshots and / or mock-ups of those existing systems. You should not include any components of the system you plan to propose.
Design (30pts): The design section will include at least 3 detailed screenshots of your proposed system with detailed explanations. You can construct mock-ups using any techniques available. There are lots of free-Photoshop alternatives, so I encourage you to explore them. Each mock-up should also be accompanied by a detailed description of the design and how it relates to material discussed in this course.
Textbook Terms: (10pts) Bold and include at least 10 HCI-Related Terms from the textbook, class notes or slides.
Conclusion (2.5pts): Your conclusion should highlight your overall approach and summarize your work.
References (5pts): Include a minimum of 5 resources / references that provided you with information for your system. Resources may consist of personal interviews, system documentation, newspaper, magazine, or journal articles, websites, etc. Follow proper MLA formatting.
Formatting (5pts): Spelling and grammar should be thoroughly checked before submitting your work. Points are deducted for spelling/keyboarding and grammatical errors. All work should be attempted using the SocialXYZ wiki. If do not use the wiki, reports must be double spaced using a 12-point font and 1″ (inch) side margins. Heading should be used to designate appropriate sections of the paper.
Format: PDF document 
Notes: Please note that your paper is a culmination of much of the work you have already done (SUS analysis, Personas) with added sections for your system design. Regarding the prototype, keep in mind that it is a non-working prototype, which simply means it will consist of 3 system mock-ups (aka renderings / drawings / screenshots) of your proposed system along with explanations for your design considerations. If you are having grave difficulty using software, you may hand-draw / sketch your design. Remember, the primary goal of this exercise is to get your concept across and provide some rationale, so have fun with the design. Also, if you have any concerns, please consult me. I’ll help out, of course. Finally, I have provided a paper template that you can follow. Considering that your paper will include numerous screenshots, please shoot for a minimum of 5 pages.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Review Company’s Security Policy

 you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Research Paper: Blockchain

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?Your paper should meet the following requirements:

  • Be approximately four to five pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Network Design and Plan – Part 1

 

Project Part 1: Network Design

Scenario

The Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.

The senior network architect has asked you to create a network design that includes the following components:

§ Current infrastructure elements

§ A logical topology that separates the Accounting and Sales departments

§ Redundant communications

§ Justification for continuing with IPv4 or upgrading to IPv6

Tasks

For this part of the project, perform the following tasks:

1. Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.

2. Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locations within the private and protected network segments.

3. Include a high-level plan that ensures communications are available 24/7.

4. Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.

5. Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. You may use a software tool or simply pencil and paper. You will update this design later in the project.

6. Create a draft report detailing all information as supportive documentation.

7. Cite sources, where appropriate.

Required Resources

  • Internet access

§ Course textbook

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font:      Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide
  • Length of report: 3–4 pages

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Barcode photoshopped

I want someone to photoshop a paper and to know how to create barcode

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Business intelligence- 28hr

Chapter 3 –discussion question #1-4 & exercise 12 

Chapter 4 – discussion question #1-5 & Case pg. 243 The Target story answer the two case questions on page 244 integrating concepts and examples from that case. 

The above assignments should be submitted in one-word document.

Include an APA cover page and a reference page.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

I have trouble solving my CS assignment.

I have trouble creating a labyrinthe required for my CS assignment. I was wondering if it was possible to either debug my assignment or to create band new one that solves my assignment. I am willing to pay.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

PSA2

 Complete a Physical Security Assessment (internal and external) of your place of work or living area. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Case Studies

D 2.1

From the lecture and from chapter 2 of the book, What are the types of hackers and what defines them? A hacker’s skills can range from the novice to the very experienced.  What differentiates a novice hacker versus a very experienced hacker?  What are the ways that a hacker can “perfect” their skills?  

CS 2.1

Conduct research on one of the following attacks (DAPT, Stuxnet, Duqu, or the Iran Certificate Attack.  In a 3 to 4 page paper (not including title and reference pages) provide a brief synopsis of the attack.  Use what you’ve learned in the first 3 chapters of the course.  Some information that should be included in your paper is, the type of attack, why the attack occurred, and who conducted the attack.    Be sure to cite your sources and follow APA formatting.  Some sources for the attacks can be found on page 50 of your online textbook. 

\

Book Review Chapter 2

Chapter two, write a 3-4 page review (not including the Title page or Reference page) of the chapter. The review is to give your point of view on one of the topics  based on the web sites found on page 50 of the book

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Python Homework Assignment

I have trouble creating a desired labyrinth design with Python.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now