Information Literacy

As you approach the end of the course, take a moment to reflect over the last few weeks. Write a response to the following in a minimum of 150 words:How have your skills in writing, critical thinking, or information literacy (like using databases and the online library) changed as a result of this course work? Provide at least 1 specific example.How will effective writing skills impact your college and career goals? What resources will you continue to use in your future coursework?What study skills, academic lessons, and/or life lessons have you learned in the course of going through this class?

Read more

The Fourth Sprint

You are on the fourth sprint of your application. You still have three sprints left and your project sponsor is concerned about the increasing number of defects and the potential increase in costs. His concern is that his superiors will want to kill the project. Propose a plan to your sponsor to control both the number of defects and the potential increase in costs. Justify your response.1 page with 1 source due in 4 hours

Read more

Web Harvesting Research

You are required to write a 4,000 word (with 10% over/under) research paper based on your practical project for this module. The paper should contain rigorous evidence and references from the primary (your own effort of social data harvesting) and/ or secondary data collection (third-party available dataset or current literatures) you undertook. Research Rationale and MotivationAs part of practical research in this module and learnt from the weekly studios, you will be harvesting a suitable dataset using the relevant tools, i.e. Tableau, Python, Facebook or Twitter API or third party Tool(s) and extracting relevant information from the results. Therefore, you should start your paper with the motivation or rationale of your research, especially the business aim of your project. The design and approach of your project such as the reasons for the choice of social web harvesting, scope for strategic or tactical decision making, business values, public interest, marketing campaign, product reviews, branding and marketing, customers’ preferences or other etc. Research Tools and MethodsYou need to discuss your research into suitable tools and/ or APIs and the justification for your choice. Based on this, you should then document the design of your project and show clearly how your research project communicates with any third-party service or API. Results and VisualisationsYou should discuss the results with necessary business or social implications and relate that back to the motivation or rationale of your social media project. Visualisation is very important, so the report should also contain suitable visualisations for your business storytelling out of the social data you collected. Limitations and ImplicationsIn addition, project limitations and recommendations are desirable. Conclusion and AppendicesFinally, draw a conclusion with key results to nicely conclude your web harvesting research. You are encouraged to compare various technical tools and techniques to demonstrate the social media analytics skills you have learnt. You can implement your social web harvesting research project using any suitable language / technology / third-party tools you see fit. You can hard-code queries or you can provide a suitable front-end where users can enter search keywords. In addition, you can show the results in any suitable form, e.g. tables, various forms of innovative graphs or information overlaid on a map. The final visualisation needs to be published on Tableau Public and include the link and evidences in the paper as Appendixes.Additional InformationReferencing Requirements (Harvard)The Harvard (or author-date) format should be strictly used for all references (including images). Further information on Referencing can be found at Cardiff Met’s Academic Skills website.

Read more

Sensitive Online Data

Local Breach of Sensitive Online DataThe EducationS Review, a fictional company, is hit with a data breach that is making headlines. The Olianas-based educational service and test preparation provider inadvertently exposed files of at least 100,000 students in various parts of the country through its Web site. News of the breach was made public on Tuesday morning by a report in the local newspaper.The files were exposed after the company switched the Internet service providers earlier this year. The sensitive information, which included personal data such as names, birth dates, ethnicities, and learning disabilities, as well as test performance, were easily accessed through a simple Web search and were available for at least seven weeks, according to the report. None of the information was password protected and was intended only to be viewed by EducationS authors.EducationS officials told the local newspaper that access to the information was immediately shut down as soon as the company was informed about the problem. “This brings up two big questions,” said Alex Graham, a senior technology consultant with information technology (IT) security and control firm Lizos. “Are companies doing enough to protect their data? Also, do companies really need to keep all this kind of data?” A competing test preparation firm discovered the flaw. The competitor contacted the local newspaper with the story, according to Alex, who said the play-out points to the high stakes were now involved with a data breach. If companies have not heard this before, it is a huge reminder that security is important not just for the company’s customers, but for the company’s reputation as well.While the publishing of birth dates may not seem like a massive leak, Alex said the information is a good stepping-stone for someone who is attempting to steal an identity. This is the second time in a month a public breach has involved birth dates. A glitch in a test version of social networking site, Facebook, inadvertently exposed the birthdays of its 80 million members last month. Alex discovered the bug while checking Facebook’s new design. He noticed that the birth dates of some of his privacy-obsessed acquaintances were popping up when they should have been hidden. The fact that the people affected by this latest breach were children adds to the general background radiation about security, or lack thereof, of peoples’ data on the Web

Read more

Investigation Methodology

You must write an academic paper that evaluates an investigation methodology.Your paper must contain the following:Evaluation of the methods digital investigators are required to use when performing cyber forensic investigationsDescription of the logical progression of an investigation from initiation through to a decision by a courtEvaluation of the effectiveness of the procedures and any potential risksLength: 6-9 page academic paper (excluding title and reference pages)References: Cite a minimum of 7 scholarly resources, not more than 5 years old in APA 7th editionPlease include a plagiarism report

Read more

CIDR Notation

You have one address, 196.172.128.0 and you want to subnet that address. You want 10 subnets.What class is this address?How many bits do you have to borrow to get 10 subnets? (borrowing 1 bit gives you 2 subnets, 2 bits gives you 4 subnets, etc.)What is the CIDR notation? (hint: network bits PLUS borrowed subnet bits and it’s a / notation)What is the subnet mask?How many host bits are left? (you had 8 to begin with)How many useable hosts does that allow per subnet? (you lose 2 hosts per subnet, one for the network and one for the broadcast)Fill in the chart using the file below

Read more

E-business Strategies

Pt. 1Develop a 750 word analysis responding to the following questions:Referring to the FT (Financial Times) article “It’s Too Early For E-Business To Drop Its “E”, do you think that it is sensible to still speak today of e-business strategies or to drop the “e” from the term “e-business”? Defend your argument.Pt. 2Develop a 1250 word analysis responding to the following questions:Do some web research on Microsoft’s history and associated strategy development. Identify some of the strengths and weaknesses of Microsoft’s strategy as it has evolved over the past decades. Where have they excelled strategically? Where have they faltered in relation to other competitors? What might be some reasons why they may have gotten a late start in certain markets?

Read more

Media Communications

1. Go to IEEE Xplore. Download the following article:S. P. Mohanty, E. Kougianos, and P. Guturu, “SBPG: Secure Better Portable Graphics for Trustworthy Media Communications in the IoT (Invited Paper)”, IEEE Access Journal, Volume 6, 2018, pp. 5939-5953.Write a 2-page summary of the above article in your own words and using your own figures.2. Go to IEEE Xplore. Download the following article:S. Ghosh, J. Goswami, A. Majumder, A. Kumar, S. P. Mohanty, and B. K. Bhattacharyya, “Swing-Pay: One Card Meets All User Payment and Identity Needs”, IEEE Consumer Electronics Magazine (CEM), Volume 6, Issue 1, January 2017, pp. 82–93.

Read more

A Manufacturing Company

Assignment ContentThe CEO of the manufacturing company you are currently consulting for has now asked you to look into implementing a CRM. The company currently uses spreadsheets to track sales calls and a paper address book to keep customer information. The CEO has asked you to research and recommend a CRM that will meet the company’s needs.Research at least three CRM packages.Use Microsoft® Excel® to create a comparison table that compares the pros and cons of each package.Select one product for the manufacturing company.Create a 10- to 12-slide narrated, multimedia-rich Microsoft® PowerPoint® presentation for the customer on why implementing the chosen CRM is prudent. Be sure to address the following:Why the chosen package is most appropriateHow this software will be an improvement over their current methodsHow the chosen CRM package will fit into the overall enterprise of the organizationThe benefits customers can expect as a result of implementing the new softwareNotes:”Multimedia-rich” includes audio and video components. Multi-media aspects of the presentation examples include the following:audioincluding audio within the presentation (Insert > Audio),narration of the slide contents via detailed speaker notes,incorporating an audio component (URL, flash) with relatable content, orincluding an audio file that narrates the slides, which does not have to be in sync with the presentation slide arrangementvideoincluding audio within the presentation (Insert > Video),incorporating an video component (URL, flash) with relatable content, orincluding a video file that narrates one or two slides, which does/do not have to be in sync with the presentation slide arrangementDetailed speaker notes are not required. Speaker notes are encouraged because the essence of a basic presentation is to present a snapshot of information.

Read more

E-commerce Technologies

How have e-commerce technologies changed your own life? Discuss some of the ways in which you believe such technologies may have enriched your life as well as some of the downsides (e.g. inconveniences, poor service, security concerns etc.) you have experienced. Answer should be 400 words and detailed.

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information