administration of network resources

 Explain how folder and file auditing works within Microsoft Server 2016 and describe why a business may want to use it. This initial response must be a minimum of 180 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

heuristic evaluation

 Instructions Part 1: User and Task Analysis (This task is worth 11 marks/50) a. Identify and describe One primary Persona for your application. Include all components of the persona description, as discussed in the lectures. Note: This application can serve a wide variety of users and as such, may have multiple primary personas. The persona you choose will guide your consideration for the subsequent steps in this exercise. (3 marks)) b. Identify and describe one primary and one secondary tasks/use cases in the system (primary tasks are important and frequently used functions by your primary persona, secondary tasks are desirable but are of less importance to your primary persona than primary ones). Provide a brief (text) description of the task/use case and the outline of the steps in the basic flow scenario and TWO alternative flow scenarios of the use case. (4 marks)  Note: Tasks such as Register/Login should not be used as an example of any use case. These supplementary functions are designed to allow a user to access the main functions of the system. c. Produce Two State Transition Networks (STNs) to describe the interaction flow in your use case scenarios (for both the basic and two alternative flows in each use case). Use an abstract depiction of the screens with no detail on design elements of the interface. Your STNs need only depict states and user actions between states in the use case scenarios. (4 marks) Note: Generally speaking, an interface state changes when an event occurs. For example, an entry of text in a text field, a click of a button, etc. Your STNs need to depict all possible states of interaction in the use case scenarios. Part 2: Interface Prototype (This task is worth 24 marks/50) Design and prototype a user interface for your application that demonstrates clearly the two use cases you defined. The interface should include enough user interaction to allow it to be demonstrated to a user. For each use case scenario, you need to produce the following. a) Detailed screen design(s) for every state in the STN. (Snapshots of the screens (or photos) from the interface you built for your prototype are sufficient). Indicate the mapping between the screens you include and states/actions on your STN – (ensure you have a complete set of screens for your STNs). b) For EVERY screen/state, i. Describe the interface elements chosen. ii. Justify the layout used, e.g. by an appropriate choice of design pattern, or to satisfy a specific usability principle. iii. Indicate which features you used to provide feedback. iv. Indicate how the design deals with user error. Axure and Balsamiq are the prototyping tools supported by our Teaching Associates. Interface designs produced using these tools are sufficient for this exercise. You are free to choose other toolkits or programming languages to develop the interface. However, no additional marks will be awarded for using more sophisticated tools or programming languages. (12 marks for every use case- a total of 24 marks) Part 3: Heuristic Evaluation (This task is worth 15 marks/50) For every use case, do a heuristic evaluation of the individual states of the interface, identifying all usability issues. Report on the usability issues in an objective manner and present the issues in a systematic and standard format using the templates (Excel spreadsheet) provided and discussed in the lectures. Your report should include, a) the usability problems you identified with some justification of the severity score assigned to the problems and your suggestions for addressing the issues you identified in subsequent revisions of the interface, and, (8 marks) b) the good design features that should be maintained in any subsequent revision of the application. (7 marks) 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

PPT with complete notes for CRM project

Professional Consulting in Information System (IS) – Project plan and report

Project Idea:

development, adoption and implementation of Customer Relationship management system (CRM) in business.

Requirement:

————-

1. Create PPT with detailed speaker notes

2. minimum 25 pages without title page and references

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Social media Anlaytics

Question:

 What is social media analytics? How is it done? Who does it? What comes out of it? Unique answers only. 

Length:250 words

Format: MS word

Citations: Required

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Sentiment Analysis

 

This 4 page APA style research paper will be a written overview of the latest articles, research reports, and cases on text mining, data mining, and sentiment analysis. Describe recent developments in the field. Review the ‘Questions for Discussion’ at the end of chapter five to give you some ideas on what you can research and focus on. Do NOT just list the question and answer it, rather, write in paragraph format with transitional sentences and subheaders to move from one thought to the next. While you can include some historical information you should focus on where these concepts are current and where they are headed in the future.

Look at some of the leading magazines for talk about business intelligence – like CIO  https://www.cio.com/ , https://www.dbta.com/BigDataQuarterly/ or https://www.codemag.com/Magazine/ByCategory/Data%20Warehousing

 

A suggested layout for your 4 page paper (including cover and references pages) would be:

  • Cover page
  • Introduction to your paper (tell the reader what you’re going to discuss in this paper – one to two paragraphs)
  • Various topics (use subheaders to break up your work and transition from one thought to the next) regarding text mining, data mining, and sentiment analysis
  • Summary (about two-three paragraphs)
  • References page (at least four)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Review the article

For this assignment, review the article:Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414and evaluate it in 3 pages (800 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

It is an objective evaluation.

Link – https://www.riverpublishers.com/journal_read_html_article.php?j=JCSM/4/1/4

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

content management system

 write a brief one-page proposal explaining how you are planning to tackle this project( Content management system)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Responding to Guest Concerns about Cyberattacks

 

This week, your internship assignment is with the company’s Guest Relations office.

You have been asked to draft a letter to guests to address concerns about the impacts of possible cyber attacks. This particular letter should reassure guests that the company is taking positive steps to protect guest privacy. The guests’ concerns extend beyond privacy of information in databases. There have been news reports detailing situations where hackers have attacked internal building monitoring and control systems to spy on guests and invade their privacy.

In order to write an effective notification letter, it is first necessary to understand the required perspective for such a letter.

From a technical perspective, this type of attack is a data security problem because the attackers are stealing data by attacking at the point of creation (data at rest) and then along the transmission paths (data in transit).  The impact of this type of attack is a loss of confidentiality.

From a people perspective, this type of attack is viewed as an attack on the privacy of guests and is categorized as a loss of privacy.

Managers need to address this problem from both perspectives. With internal technical staff, the conversation would revolve around data security. But, with guests and Guest Relations staff, the conversation needs to address concerns about the possible loss of privacy.

Secondly, we must consider the required “tone” for such a letter. The letter must be factual but, more importantly, it is necessary to show an appropriate amount of empathy and understanding for the recipient’s feelings. Empathy and emotional intelligence are important leadership skills for managers.

Having empathy and/or acting in an empathetic manner (aware of and sensitive to the emotions of guests and customers), allows a manager to respond appropriately when a cyberattack occurs.  As you write this letter, you will need to find a balance between addressing the emotional aspects of a cyberattack (need for a supportive and calming response — less information may be best) and the need to develop trust by providing information about a situation which can invoke fear and concern.

After you read this week’s readings on data security, read this definition of Emotional Intelligence and this discussion article about What Emotional Intelligence Is and Is Not. Then, read about three types of empathy https://www.huffingtonpost.com/entry/types-of-empathy_us_56f171cde4b03a640a6bcc17.

Next, read one or more of these articles about a cyber attack that affected hotel operations and created fear and concern among guests and employees.

1. Hackers use ransomware to target hotel guests’ door locks

2. Hackers are using hotel Wi-Fi to spy on guests, steal data

3. 20 hotels suffer hack costing tens of thousands their credit card information

Using what you’ve learned about data security AND emotional intelligence, draft a letter that Padgett-Beale could use to inform and calm its guests should a similar cyberattack (door locks, guest WiFi access, or credit card Point-of-Sale breach) affect one of the company’s hotel properties. Your draft letter will also be used to train employees in how they can and should respond to guest concerns

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Milestone

 subject ISOL-535-   CRYPTOGRAPHY

In the second milestone writing assignment, you will analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

visual logic console

 

Directions: Use Visual Logic Console for all inputs and outputs.  If you are not familiar with Visual Logic, a flow chart can be used instead of a program to answer the questions that require Visual Logic.

Choose any 4 out of 5 Questions.

1. Write a Visual Logic program that calculates the following.    

a) The user enters an amount

b) The program calculates the interest at 5%. Write a procedure to calculate the interest earned and the total amount which includes the interest.

c) Write the output using format currency to display the interest earned and the total amount calculated in b).

Copy and paste the program and the output for credit and upload the program file.

2. Write a Visual Logic program where the user rolls two dice and the program displays the sum of them. Each dice contains numbers from 1-6.

a) Use random for the first dice. Display the first dice.

b) Use random for the second dice. Display the second dice.

c) Add them together as the sum.

Copy and paste the program and the output for credit and upload the program file.

If the highest subscript in an array is nine and the subscripts start at zero, what is the size of the array?

Think about arrays that they use in everyday life situations. What are the advantages of using these types of arrays? Are there any disadvantages?

5.       a) Write a Visual Logic program to declare and populate an array to hold five student test scores.  

           b) Write a Visual Logic program to calculate the student’s average for the test scores. Output the average test score.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now