Why Microsoft Excel is important. List three (3) ways that you can use MS Excel as part of your daily life. How could you use a spreadsheet in your daily life to simplify a task or solve a problem?

Intro to Computers

1. How to use HTML, CSS, and JavaScript. Would any of these web development tools help you personally or on your job? 2.Discuss common types of digital communication. Discuss types of blogs, social networks, and wikis.

3. Discuss some of the positive and negative effects of social media.

4. How Cloud Services Are Used in the Workplace? and how a Cloud Service Could Benefit You. Identify ways people use Artifical Intelligence in daily life.

5.Why Microsoft Excel is important. List three (3) ways that you can use MS Excel as part of your daily life. How could you use a spreadsheet in your daily life to simplify a task or solve a problem?

Providing examples of HCI now. What do you predict will be the state of HCI in 10 years? Why? What is contributing to your prediction?

Outsourcing strategy and HCI

As part of your organization’s IT department, the IT Strategy Committee has asked you to prepare a presentation to the Committee members, on the pros and cons of outsourcing as a systems development approach/option or strategy.

Tasks:

Prepare a well-developed presentation (in MS Word) to the Committee on the pros and cons of using outsourcing as a systems development strategy/option.

Your presentation MUST address…

  • The overall concept of outsourcing…e.g., what is it?
  • Why the organization might consider this systems development approach.
  • Under what conditions would outsourcing be beneficial to the organization and when it would not.
  • Identify FIVE (5) reasons that would support approving outsourcing as a development strategy/option.
  • Identify FIVE (5) reasons that would support rejecting outsourcing as a development strategy/option.

Part 2:

Gary and Judith Olson, in their article “Human-Computer Interaction: Psychological Aspects of the Human Use of Computing,” appearing in the Annual Review of Psychology [www.annualreviews.org/doi/10.1146/annurev.psych.54.101601.145044], state that human-computer interaction (HCI) is a multidisciplinary field in which psychology and other social sciences unite with computer science and related technical fields with the goal of making computing systems that are both useful and usable. It is a blend of applied and basic research, both drawing from psychological research and contributing new ideas to it. New technologies continuously challenge HCI researchers with new options, as do the demands of new audiences and uses.Diane Hickey [https://seedfund.nsf.gov/topics/human-computer-interaction] further states that HCI is an intersection of multiple disciplines, including computer science, behavioral sciences, human-centered design, media studies, and several other fields of study.Virtual Reality; Augmented Reality, Tactile Technologies, Wearable Computing…oh my.Tasks:Using information from this chapter, certainly your own thoughts and ideas, and of course the vast repository that is the Internet, write and submit a well-thought-out, graduate-level paper, of NO LESS THAN four (4) pages answering the question…Where will technology and HCI be in 2032? A mere 10 years from now.Your response should address such areas as but, not be limited to ….

    • Defining human computer interaction.
    • Discussing the evolution of computer and human interface.
    • Issues, problems, struggles, etc., in an attempt to interface computers and humans.
    • Operational/technical, political, ethical issues involving closing the gap between carbon-based humans and silicon-based machines.
    • Providing examples of HCI now.
    • What do you predict will be the state of HCI in 10 years? Why? What is contributing to your prediction?

How is risk management appropriately applied to the systems development life cycle (SDLC)? When is risk management most appropriately integrated into the SDLC?

System development

Consideration of security in the System Development Life Cycle is essential to implementing and integrating a comprehensive strategy for managing risk for all information technology assets in an organization.

Security activities should be physically and logically integrated into an organization’s SDLC policy and guidelines versus maintaining them in a separate, complementary document or security life cycle

The most effective way to accomplish the integration of security within the system development life cycle is to plan and implement a comprehensive risk management program.

Tasks:

Research and develop a well thought-out, graduate-level paper, of NO LESS than three (3) pages, which addresses the following:

  1. What is risk management? (more than a simple one-paragraph definition)
  2. How is risk management appropriately applied to the systems development life cycle (SDLC)?
  3. When is risk management most appropriately integrated into the SDLC?
  4. Identify three (3) risks that a systems analyst should be aware of or on the lookout for during the SDLC.
  5. Provide a recommendation for each of the three risks that you have identified, in step 4, designed to mitigate that risk effecting the organization’s SDLC

Part 2: Senior management has been working for weeks to determine the best system changeover approach to use for the current salesforce management system under development. Time to implement the new system is drawing close and senior management has asked for your assistance.Tasks:Senior management has asked you to develop a presentation (please use MS Word and not PowerPoint) that presents the risks, rewards, pros and cons, benefits, upsides, downsides, costs, etc., of using the following changeover approaches, which are being considered:

  • Direct cutover
  • Parallel operation
  • Pilot Operation
  • Phased Operation

Your presentation (MS Word document) should provide ample detail and discussion of each changeover approach, at a level that will allow senior management to select the most appropriate approach for the soon-to-be-implemented salesforce management system.Once again, a paper that does not appropriately address the deliverable requirements, will not receive full-credit consideration.

Why is this method/approach considered better than the other approaches? Or is it? Who would be the “targeted audience” for this selected UI design? Why?

What is User Interface Design?

According to the folks at Interaction Design Foundation [www.interaction-design.org/literature/topics/ui-design], user interface (UI) design is the process designers use to build interfaces in software or computerized devices, focusing on looks or style. Designers aim to create interfaces which users find easy to use and pleasurable. UI design refers to graphical user interfaces and other forms—e.g., voice-controlled interfaces.

It can be generally accepted that there are five prevalent types of user interface and each has a range of advantages and disadvantages:

  1. Command Line Interface
  2. Menu-driven Interface
  3. Graphical User Interface
  4. Touchscreen Graphical User Interface
  5. Conversational UI

Tasks:

  1. Select ONE (1) of the five prevalent types of user interface (UI) design methods listed above.
  2. Write a graduate-level paper NOT LESS THAN three (3) pages, in which you describe the UI design method that you have selected.

Your paper should provide MUCH more than a basic definition and your paper should aim to address the W’s

  • What is it?
  • Where is it used?
  • When (under what conditions would it be best used/utilized)?
  • Why is this method/approach considered better than the other approaches? Or is it?
  • Who would be the “targeted audience” for this selected UI design? Why?
  • What are the benefits of using this UI design?
  • What are the shortfalls or downside to using this UI design?

Perform lab exercise following the slides no.52-no. 55 in module C power point slides. Write down the lab report with description of procedure and screen shots of setup of the SCADA testbed, and results from performing the hands-on lab exercise.

Computer Science Question

1. Choose a SCADA simulation virtual environment/software to create a SCADA testbed, the simulation software is free of your choice. We recommend SCADABR and OpenPLC.

Tips:

1). Install the human machine interface open-source software: openPLC runtime on windows/linux machine: Reference link: https://openplcproject.com/docs/installing-openplc-runtime-on-windows/

2). Install Cygwin Reference Link: https://git-scm.com/download/win 3). Install ScadaBR Reference Link: https://openplcproject.gitlab.io/reference/scada/installing-scadabr.htmlLinks to an external site. 4). Connecting OpenPLC to an HMI (ScadaBR), example:   https://openplcproject.com/docs/3

  • 1-openplc-editor-overview/
  • 2. Perform lab exercise following the slides no.52-no. 55 in module C power point slides.
  • 3. Write down the lab report with description of procedure and screen shots of setup of the SCADA testbed, and results from performing the hands-on lab exercise.

Create a personal budget spreadsheet consisting of spreadsheet data +2 relevant charts emphasizing different parts of your data.

Personal budget spreadsheet

Create a personal budget spreadsheet consisting of spreadsheet data +2 relevant charts emphasizing different parts of your data.

 

Write an SQL command to create the INVOICE table. Include all attributes, data types, and constraints for that table. Assume the database and all other tables have already been created.

Information Storage and Retrieval Concepts

Consider a dealership that sells both new and used cars. Data requirements are summarized as follow:

  • All cars are identified by a VIN (unique alphanumeric identifier for each car), make, model, year, and color, millage, and state (new or used).
  • A salesperson may sell many cars, but each car is sold by only one salesperson.
  • A salesperson is identified by a unique employee ID, name, and date when started working for the dealership
  • A customer may buy many cars, but each car is bought by only one customer.
  • A customer is identified by a unique email address, name, phone number, and address
  • A salesperson writes an invoice for each car that is sold.
  • A buyer receives an invoice for each car that is bought.
  • An invoice has a unique invoice number, price to which the car was sold, and purchase date.

1. Create an ER diagram to represent the above data requirements.

2. Create a relational data model based on the ER diagram.

3. Write an SQL command to create the INVOICE table. Include all attributes, data types, and constraints for that table. Assume the database and all other tables have already been created.

4. Write an SQL command to set the millage value to 150 for a car with VIN 123VNOP

Describe the buffer overflow application vulnerability and identify what type(s) of applications this vulnerability affects.

Security Applications: Bounds Checking Application Vulnerabilities

Describe the buffer overflow application vulnerability and identify what type(s) of applications this vulnerability affects.

Choose two different models of the Systems Development Life Cycle from Waterfall SDLC, Iterative SDLC, Unified Process Framework, Spiral SDLC, V-Model SDLC, Big Bang SDLC, Agile SDLC, RAD SDLC, and Software Prototype SDLC. Compare and contrast them. Which would you prefer to use and why?

SLDC comparison

For this discussion, complete the following:

1. Choose two different models of the Systems Development Life Cycle from Waterfall SDLC, Iterative SDLC, Unified Process Framework, Spiral SDLC, V-Model SDLC, Big Bang SDLC, Agile SDLC, RAD SDLC, and Software Prototype SDLC.

2. Compare and contrast them. For example consider the number of stages and overlaps, advantages, etc.

3. Which would you prefer to use and why?

Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs?

Physical Security

Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization.

Make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.