Where do you see the future of Information Technology going and where do you see yourself in this mix after obtaining PhD in Information Technology from UC?

Where do you see the future of Information Technology going and where do you see yourself in this mix after obtaining PhD in Information Technology from UC? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Policy,legal and ethics

  text book :  A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology Fifth Edition 

 Answer the following questions from Chapter 5 in the text with a paragraph that contains at least five sentences. 

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment 2: General Computer Concepts Activity

Download the attached General Concepts Assignment file and answer the questions.

If you need some help, review the examples of screen shots for questions 1 and 2.

Remember, in the instructions, it states your final submission for this assignment will need to be just one (1) .doc.

For questions that require text response, such as discussing security fixes, be sure to include at least 5 complete sentences.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Analyze how advanced security concepts are applied to develop secure code

You are tasked with examining Artemis Financial’s web-based software application by conducting a vulnerability assessment. Implementing what you have learned so far and using the supporting materials provided to assist you, review and analyze the security vulnerabilities specific to Artemis Financial’s web-based software application and document the following in the Vulnerability Assessment Report Template.

  1. Interpreting Client Needs: Review the scenario to determine your client’s needs and potential threats and attacks associated with their application and software security requirements. Document your findings in your Vulnerability Assessment Report. Consider the following regarding how companies protect against external threats based on the scenario information:
    • What is the value of secure communications to the company?
    • Are there any international transactions that the company produces?
    • Are there governmental restrictions about secure communications to consider?
    • What external threats might be present now and in the immediate future?
    • What are the “modernization” requirements that must be considered, such as the role of open source libraries and evolving web application technologies?
  2. Areas of Security: Use what you’ve learned in Step 1 and refer to the Vulnerability Assessment Process Flow Diagram provided. Think about the functionality of the software application to identify which areas of security are applicable to Artemis Financial’s web application. Document your findings in your Vulnerability Assessment Report and justify your reasoning for why each area is relevant to the software application.

*Please note: Not all seven areas of security identified in the Vulnerability Assessment Process Flow Diagram may be applicable for the company’s software application.

  1. Manual Review: Refer to the seven security areas outlined in the Vulnerability Assessment Process Flow Diagram. Use what you’ve learned in Steps 1 and 2 to guide your manual review. Identify all vulnerabilities in the code base by manually inspecting the code. Document your findings in your Vulnerability Assessment Report. Be sure to include a description identifying where the vulnerabilities are found (specific class file, if applicable).
  2. Static Testing: Integrate the dependency check plug-in into Maven by following the instructions outlined in the tutorial provided. Run a dependency check on Artemis Financial’s software application to identify all security vulnerabilities in the code. Specifically, record the following from the dependency check report in your Vulnerability Assessment Report:
    1. The names or vulnerability codes of the known vulnerabilities
    2. A brief description and recommended solutions provided by the dependency check report
    3. Attribution (if any) that documents how this vulnerability has been identified or documented previously
  3. Mitigation Plan: Interpret the results from the manual review and static testing report. Identify steps to remedy the identified security vulnerabilities by creating an action list that documents how to fix each vulnerability in your Vulnerability Assessment Report.

*Please note: You do not need to fix these vulnerabilities in this project.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Website Review

Refer to Textbook: Interaction Design by Helen Sharp, Jennifer Preece, and Yvonne Rogers 

Publisher: Wiley Evaluation of Best Buy E-Commerce Website. Including images is highly encouraged to demonstrate the usability issues within site. Use the following points as guidelines when writing the Website Review:

  • Metrics: As much as possible, use measurable criteria as you’ve read in the Preece text. Identify those methods you’ve applied in your review of the Website.
  • Application: Using the Nielsen 10 heuristics for usability design, explain how each task can be improved.

 The assignment should be between 3 – 4 pages. Follow APA 7 guidelines for references and in-text citations.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

TMA TM352??

  

Question 1 (35%)

Assignment description

You should be able to start solving this TMA part after studying week 3. We expect you to develop a client-side application that connects to any website (online) and execute the HTTP get command to retrieve any web page content. You are free to choose the programming language, we recommend JAVA, as it is the language we are using in this course. It is up to you, which technology to use, whether low level using socket or higher level using for instance HttpURLConnection library JAVA packages, it is about using the HTTP client commands.

We expect a desktop client application having at least the following features:

1- The URL of the website should be entered by the user once the program runs. [5 marks]

2- To retrieve and display the server response header information. [5 marks]

3- Read and display the source (HTML) contents of the web page. [5 marks]

4- To save the retrieved information in a text file with HTLM extension. [5 marks]

5- To deal with exceptions in case something goes wrong. [5 marks]

6- Screen shots (at least two) showing that the client application runs properly. [5 marks]

You need to provide the whole project source code.

Along with your project, please create a file named README. txt that contains your name and email address along with the name of your application and a brief description of programming langue used how to run the application whether using IDE or you provided an executable, in all cases you should provide the source code of your project. [5 marks]

Question 2 (40%)

You should be able to start solving this TMA part after studying week 4. We expect you to practice developing a server-side web application (we recommend you to use JAVA servlets) to generate a response to an HTTP get request. 

It is up to you to decide what the web application should do, but we will grade it based on the technologies used. We expect a web application having at least the following features:

1- It contains a get method that response to a get HTTP client request [5 marks]

2- The server side get method receives at least one parameter form the HTTP client request. [10 marks]

3- The get method response should include the received parameter and other content. [5 marks]

4- We expect you to run the client application developed in part1 to execute the server-side web application and retrieve its content. [5 marks]

5- We except you to provide an HTML page (using the form tag) that can be used to execute the web application as an alternative to the client application created in question 1. [5 marks]

6- Screen shots (at least two) showing that the execution of the website runs properly. [5 marks]

Along with your project, please create a file named README. txt that contains your name and email address along with the name of your application and a brief description of programming langue used how to run the application, in all cases you should provide the source code of your project. [5 marks]

Question 3 (25%)

Assignment description

You should be able to start solving this TMA part after studying week 5. We want you to write code to perform symmetric encryption on a string plaintext using a ciphering algorithm such as DES, AES or TripleDES. 

§ The parameter sent form the client application in the previous questions should be encrypted before being sent to the server-side application. [10 marks].

§ We expect also that the server-side application should be updated to decrypt the parameter received [15 marks]. 

Along with your app, please create a file named README. txt that contains your name and email address along with the name of your app and a brief description of what the application does, along with any special instructions that the user might need to know in order to use it properly (if there are any). 

README. Txt file content example:

Sami  Student <[email protected]>

Programming language: JAVA

All application can run within NetBeans IDE and any standard web browser.

How to structure the submitted files for the three questions?

§ Create a folder and call it “TM352_YourID_BranchName_FALL2019”, inside this folder create a folder for each questions and call it question (replace X with 1 for question1 and 2 for question2) and put each app project in the corresponding folder. 

§ Zip the folder “TM352_YourID_BranchName_ FALL2019”and submit it as single file. [2 marks]

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

PPT

Instead of assigning a traditional exam for your “Final Exam”,  you will demonstrate your understanding of the importance of the final  two phases of the Data Analytics Lifecycle: Communicating the Results  and Operationalizing. You have studied various analytic methods, along  with surveying various available tools and techniques. But as a Data  Scientist, you must also communicate what your team has accomplished.
For your Final “Exam”, you will create a Final Sponsor  Presentation. You have been hired by Aetna to use big data to improve  patient health. The case study you will use can be found at: https://gigaom.com/2012/11/20/how-aetna-is-using-big-data-to-improve-patient-health/ .
Your assignment is to take this case study and create a  PowerPoint Presentation of the Final Sponsor Presentation, as described  in Chapter 12 of your text. (Make sure to use the format presented in  Chapter 12.)
 
You will submit a PowerPoint Presentation file (ppt or pptx) with  at least the following slides: (You can submit more, but I’m mainly  looking for these six slides)
 

  1. Title (Your name + other info)
  2. Situation and Project Goals
  3. Executive Summary
  4. Approach
  5. Method Description
  6. Recommendations
  7. Note: There is no direct information in the case study that  covers the specific analytics methods used. You will extrapolate from  the provided information in the case study and provide your own  interpretation of the method (or methods) the Data Science team used.  Draw from what we have covered this semester and map what you learned to  what that team probably did. There is no rubric for this assignment. I  want you to be as creative as possible. Tell the story. Inspire your  sponsors. 

        

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Employment challenge in the digital era

 

Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter).  Reflect on the various challenges are present in the digital era.  Will things get better or more complicated as times goes on?  Explain.  What are some methods to assimilate new generations into the workforce to think about competitive advantage?

(Information Technology and Organizational Learning)

The above submission should be one -page in length and adhere to APA formatting standards

**Remember the page length does not include the APA cover page or any references**

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 3: Training Guide

 Hide Assignment InformationInstructions

You’ve won the business! Faster Computing has agreed to the project. As the final stage of pre-implementation, you have been asked to produce a training guide that will demonstrate how to install Linux and provide an overview of several common commands, as follows:

(11.1.3: Install the software.) 

  • Use a hypervisor of your choice to install Linux. Many hypervisors are available, such as Oracle’s VirtualBox, which is a free download. In addition, as part of UMGC’s agreement with VMware, you can download VMware Workstation for free. See below for specific screenshot requirements. You should include at least 3 screenshots (e.g., disk partitioning, timezone selection, creating the default account). Each screenshot should be accompanied by a brief explanation of what you did.
    NOTE: It is not necessary to include screenshots of installing the hypervisor software.

(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)

  • Demonstrate command-line operations that will provide the following information:
    • A listing of files in a directory and common file attributes
    • The current directory (hint: also known as the present working directory)
    • Create a file, then copy it to a different directory
    • Create a second file and move it to a different directory
    • Remove the first file, as well as the copy you created
    • The manual page for a given command
    • Create a text file, then use an editor to modify the content. Then display the content of the modified file

(1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.)

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., ls, cp, mv, rm) in your documentation as well as in your screenshots. 

(11.2.1: Configure technology according to stakeholder specifications and requirements.)

  • Show running processes on the system. Demonstrate how to search for a specific process
  • Forcibly stop a running process

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., top, kill, -9, ps) in your documentation as well as in your screenshots. 

(13.1.1: Create documentation appropriate to the stakeholder.)

The deliverable for the final phase of the project is a written paper with screenshots. There is no minimum or maximum page requirement, but all of the requirements must be met.  Use the Training Guide Template to record your work. This section will be graded upon the overall usefulness of the training guide to the organization.

(11.3.1: Add and update systems as required.) 

This portion of the training guide helps determine your submission is unique.

Important Requirement

On the final screenshot, you need to open a command line and type in the following commands (without the quotes):

“date”

“echo CMIT391”

“echo <your name here>” (Replace your name here with your name)

The recommended format is to provide screenshots incorporated within the written narrative. The screenshots must all be your own. Screenshots from external sources are not permitted. You must include the specific screenshot listed above or your project will not be accepted.

(1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.)

The training guide must have a cover page, an introduction, summary, and at least 3-5 references.

(1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.)

Employ proper spelling and grammar. All Linux commands must be lower case.

(2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.)

In your conclusion of at least a paragraph, summarize why using Linux is beneficial for employees, management, and the organization as a whole.

How Will My Work Be Evaluated?

In this training guide, you will demonstrate how to install Linux and provide an overview of common commands for your client/customer. You’ll be combining your technical skills with effective communication techniques to provide learning resources for the client/customer.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension. 
  • 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal. 
  • 1.2.3: Explain specialized terms or concepts to facilitate audience comprehension. 
  • 1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience. 
  • 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions. 
  • 11.1.3: Install the software. 
  • 11.2.1: Configure technology according to stakeholder specifications and requirements. 
  • 11.3.1: Add and update systems as required. 
  • 13.1.1: Create documentation appropriate to the stakeholder. 

Due DateAug 3, 2021 11:59 PM 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

EMA workbench

Chapter 5 discusses decision making using system modeling. The author briefly mentions an open source software tool, EMA Workbench, that can perform EMA and ESDMA modeling. Find EMA Workbench online and go to their main website (not the GitHub download site). Then do the following:

  1. Under documentation, go to the Tutorials page.
  2. Read through the Simple Model (in your chosen environment), and the Mexican Flu example. 
  3. Decide how you could use this software to create a model to help in developing a policy for a Smart City.

To complete this task, you must do the following:

As indicated above, explain how you could use the EMA Workbench software to develop a model to help create a policy for a Smart City. Explain what policy you are trying to create (i.e. traffic light placement, surveillance camera coverage, etc.), and what key features you would use in your model. Then, explain how EMA Workbench would help you. NOTE: keep your models and features simple. You don’t really need more than 3 or 4 features to make your point here.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now