[Solved] Usability Journal Read Chapters

[Solved] Usability Journal Read Chapters

Question 1

Read Chapter 3 – https://opentextbook.site/informationsystems2019/chapter/chapter-3-software-information-systems-introduction/

The move to cloud computing continues to progress at a very rapid pace. Many companies are taking advantage of the benefits and features cloud computing offers in the form of Infrastructure as a Service, Platform as a Service, and Software as a Service. Regarding software, consider what applications your company uses. What applications are possibly outsourced to a cloud service provider? For example, your company may be using Microsoft Office 365 for email and office suite applications. Beyond this, what more specific software is your company currently using which may be cloud-based. Why are they using this system and what benefit does using the cloud for this service provide?

Your response should be 250-300 words. Follow APA 7 guidelines for references.

Usability Journal

Read Chapters 5 and 6, Interaction Design 5th Edition

Each day, we use the Internet on our personal computers and mobile devices to access information and purchase goods. Websites often have their own mobile form factor while others maintain the same Website user experience, creating challenges when trying to use navigation, overcome errors, search, and complete the most mundane tasks. For this assignment, you are to review a website as well as a Mobile Site. For example, you would evaluate Amazon.com on Microsoft Edge (PC) and Amazon.com on your iPhone using Safari. Conducting a heuristic evaluation (self-evaluation), you will write an assessment on each Website answering the following questions: 

  1. What Website did you evaluate?
  2. What industry does the company participate in?
  3. Looking at the online website, address three issues that require revision? For each issue, please provide a screenshot and explicitly mark why you feel this issue is problematic.
  4. Looking at the online website, how would you suggest that the issues requiring revision are corrected based on what you have learned in the class so far?
  5. Moving to the mobile site, compare those same three features. Did you find the user experience to be problematic or better suited for the mobile form factor?
  6. With the mobile site, how would you enhance the experience for those same issues you found on the Website to be problematic. 

This paper length is 4 -6 pages. Since this is a personal review of a website, sources are not necessary. However, you are still to follow the APA format in presenting the paper. Assignment should be in a separate word document.

[Solved] Page 139 Microsoft Project

[Solved] Page 139 Microsoft Project

 

You need access to Microsoft Project software. If you don’t have it installed in your computer you can at least download a trial version.

Go to Appendix on page 139 Microsoft Project and create a file as directed and enter the information from pages 139-145 on your Microsoft Project based on chapter 7.

Provide screen shots to show your work (i.e. tasks, resources, network diagram).

What did you learn from chapter 4 as you apply the concepts on chapter 4 to the Microsoft Project software?

[Solved] Three Vulnerability Severity Code

[Solved] Three Vulnerability Severity Code

1.What are some risks, threats, and vulnerabilities commonly found in the Workstation Domain that

must be mitigated through a layered security strategy? 

2.

File-sharing utilities and client-to-client communication applications can provide the capability to

share files with other users (for instance, peer-to-peer networking or sharing). What risks and/or

vulnerabilities are introduced with these applications?

3.

Explain how confidentiality can be achieved in the Workstation Domain with security controls

and security countermeasures.

4Explain how data integrity can be achieved in the Workstation Domain with security controls and

security countermeasures.

5.

Explain how availability can be achieved in the Workstation Domain with security controls and

security countermeasures.

6.

Although users of desktop applications might not create mission-critical data, all of their data

represents a resource that, if lost, can result in a permanent loss of information or productivity.

Explain what countermeasures and best practices should be implemented to avoid this potential

disaster.

7.

What is the purpose of the Microsoft® Windows Security Configuration and Analysis snap-in?

Explain.

8.

How would you go about updating the Windows Security Options File? Explain how this option

can help mitigate risk in the Workstation Domain.

9.

What does the Microsoft® Windows executable GPResult.exe do and what general information

does it provide? Explain how this application helps mitigate the risks, threats, and vulnerabilities

commonly found in the Workstation Domain.

10.

What is the risk involved in caching logon credentials on a Microsoft® Windows system?

11.

What is the current URL for the location of the DISA Military STIGs on Microsoft® Windows 7

operating systems?

12.

Within the Windows 7 Security Technical Implementation Guide (STIG), what are the three

Vulnerability Severity Code Definitions defined?

13.

DumpSec is a tool used by system administrators performing information assurance on a

Microsoft® Windows 7 workstation. What is the purpose of this tool?

14.

From the Windows 7 Security Technical Implementation Guide (STIG), where can Windows 7

File & Registry Settings be reviewed and audited on a Windows 7 workstation?

15.

As per DoD and information assurance procedures, who must be notified if any exceptions to

DoD STIGs standards for workstation configurations are to be implemented?

[Solved] “ 1 ” “

[Solved] “ 1 ” “

1.

What is an IT risk assessment’s goal or objective? 

2.

Why is it difficult to conduct a quantitative risk assessment for an IT infrastructure?

3.

What was your rationale in assigning a “1” risk impact/risk factor value of “Critical” to an

identified risk, threat, or vulnerability?

4.

After you had assigned the “1,” “2,” and “3” risk impact/risk factor values to the identified risks,

threats, and vulnerabilities, how did you prioritize the “1,” “2,” and “3” risk elements? What

would you say to executive management about your final recommended prioritization?

5.

Identify a risk-mitigation solution for each of the following risk factors:

a. User downloads and clicks on an unknown e-mail attachment 

b. Workstation OS has a known software vulnerability

c. Need to prevent eavesdropping on WLAN due to customer privacy data access

d. Weak ingress/egress traffic-filtering degrades performance

e. DoS/DDoS attack from the WAN/Internet

f. Remote access from home office

g. Production server corrupts database

[Solved] Threat Agent Profile –

[Solved] Threat Agent Profile –

Overview

To be able to defend a network from threats most effectively, you must first understand the threats you are protecting the system from and what it is you are trying to protect. In this assignment, you’ll be theorizing possible threats for different types of organizations.

Section 1.3.1 of the textbook describes threat agents. It also outlines the contents of a threat agent profile. There are 7 elements to a profile (see section 1.3.1 of the textbook).

Deliverable

Select two (2) different industries of your choice and provide the following information for each. Save your work in a .doc/docx word file that includes your name and submit the document using the link above.

Industry (Some examples: Retail, Hotel, Aerospace, Education, Manufacturing, etc.)

Assets – what do companies in your selected industry need to protect? Processes? Data? Be Specific.

Threat Actors – What actors may have an interest in that industry’s assets? Be as specific as possible. This will relate to the plausible goals of the specific actor.

Threat Agent Profile – Identify the threat agents profile (overview of the threat agent, goals of the threat agent, mode of operation, level of motivation, capabilities, and constraints). Include references.

Threat actor capabilities – How advanced are these threat actors? What kind of capabilities do they have? For example, can they conduct human intelligence operations? Do they have custom malware written for specific manufacturing systems?

Recommended Defenses – Using what you know so far, what defenses or precautions should the industry take in defense of the specific threat actor you have identified?

Provide any sources you used

[Solved] Specific Regarding Specific Class

[Solved] Specific Regarding Specific Class

I have mentioned several times that you will be doing a team project this semester…lots to do in the project and lots to manage…

You have all worked on team projects in the past…and some of you (okay, most of you…okay, all of you) have expressed concerns over doing a team projects…and you have talked about the many issues and problems that go along with a team project…

But we won’t let that happen this semester!…because this semester, we have the choice of managing the project as with waterfall or agile…

For this assignment, given what we have discussed about waterfall and agile development, tell me which process do you think would work better in school projects – agile or waterfall?…explain why you think one will work better, and why you think the other will not work as well…be VERY SPECIFIC regarding SPECIFIC class projects and SPECIFIC class project tasks, and how they line up to either agile or waterfall processes…use your past experience with group projects as a reference…

DO NOT GIVE ME DEFINITIONS…

Again, when you have completed this, you should have 1 to 2 pages…if you have any questions about anything, just let me know…

[Solved] Work Already Completed

[Solved] Work Already Completed

For this week, we need to get in sync so that development can begin…so what you need to provide for this week is an MS-Word document with the following:

  • Description of your graduate project, as submitted in CS 700…
  • Reason(s) for choosing the project you did…
  • Description of any work already completed…
  • Any concerns you have about actually developing your project…
  • Copy of your Final Documentation from CS 700…

If I feel that additional review is needed, I will reach out to you via email to schedule a meeting so that we can review these items in detail…

[Solved] Reduced Using Pesticides 5

[Solved] Reduced Using Pesticides 5

With good hypothesis knowledge, determine if the following are good hypothesis statements. if not, suggest how they could be changed to be a good hypothesis statement.

1. chocolate causes acne

2. Bark beetles kill trees in the spruce family.

3. Doritos are better than lays potato chips.

4. Bacterial growth can be reduced using pesticides

5. The sun will rise tomorrow

6. in 100 years, people will fly

[Solved] Least Three Leadership Standards

[Solved] Least Three Leadership Standards

 

Understanding professional standards for educational leaders as determined by experienced peers can be helpful when exploring and developing your leadership style. After reviewing the 2015 Professional Standards for Educational Leaders, prepare a chart using the template in this week’s resources to explain the following in sufficient detail with supportive references citing:

  • Explain at least three leadership standards you believe you have already developed and justify why.
  • Select at least three leadership standards you believe you still need to further incorporate into your leadership style and briefly explain how you might accomplish this leadership growth.

Length: one chart, not including title and reference pages

References: Support your response by utilizing and referencing the Professional Leadership Standards for Educational Leaders. Include a minimum of 2 scholarly resources in addition to the PSEL guide.

The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards, 

[Solved] Word Choice May

[Solved] Word Choice May

For this assignment, you will write emails explaining a situation to both an employer and a friend.

Your employer has asked you to work on a day that you have already requested off for personal reasons. You are unable to change your plans and must therefore explain why you are unable to work (a family wedding or similar event is a possible choice for this). Your friend has asked you to assist him or her with moving on the same day. Again, you are unable to help because of the same prior engagement.

  1. Write an email to your employer explaining why you are unable to work on the day specified.
  2. Write an email to your friend explaining why you are unavailable to help with his or her move.
  3. In a short, 1-page reflection, explain the differences between how you have communicated in the two emails. Familiarity with the other person, formality, type of language used, and other factors you may wish to include.
  4. Keep in mind the audiences to whom you are writing. Ideas of grammar, formality, and word choice may be very different depending on your audience, but in both cases, clarity and succinctness are important.