Describe three reasons users are still frustrated with modern applications. Suggest one method for reducing the frustrations for each of the reasons you supplied in Question 1. Describe methods for determining if user frustration is caused by poor system design or from the natural frustration associated with learning a new software product.

User Frustration

The quality of the user experience is very important to the success of an application. In the early days of computing, users often experienced long delays since computing power was poor and networks had comparatively slow throughput. Modern systems have largely eliminated these delays due to increased network and computing power, yet users still report a high level of frustration.

Write a four- to five-page paper in which you:

Describe three reasons users are still frustrated with modern applications.
Suggest one method for reducing the frustrations for each of the reasons you supplied in Question 1.
Describe methods for determining if user frustration is caused by poor system design or from the natural frustration associated with learning a new software product.
Suggest at least three methods to reduce the frustrations among the disabled population and how this population can be better served.
Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources

Simply explain what containers are in general and what the benefits are compared to traditional methods. Explain what docker is, how a docker container works. Explain kubernetes. What it does, the benefits, how you manage a kubernetes cluster, the architecture and how the network inside the cluster is realized.

Kubernetes and docker containers on Azure

Simply explain what containers are in general and what the benefits are compared to traditional methods.
After that explain what docker is, how a docker container works.
Then go and explain kubernetes. What it does, the benefits, how you manage a kubernetes cluster, the architecture and how the network inside the cluster is realized.
In the end what Microsoft Azure is and what you can do with kubernetes on the Azure Cloud.

Identify a VPN for your work organization, which is a retail company selling vehicle accessories. Compare the features, functionality, type of encryption used, and cost of each VPN in your presentation. Which of the three options will work best for your work organization? Why?

Unit III Power Point

Virtual Private Network (VPN) Presentation

You have been tasked with identifying a VPN for your work organization, which is a retail company selling vehicle accessories. A VPN is needed since many of the employees work remotely and sales are conducted with dealerships and conference attendees.
You will present your findings to your company leaders in a PowerPoint presentation at the next board meeting.
Begin your task by researching at least three VPN options. These options should provide protections for employees accessing the internal network and applications. You will need to compare the features, functionality, type of encryption used, and cost of each VPN in your presentation. Which of the three options will work best for your work organization? Why? You will indicate and support your recommendation during the summary.

Your presentation must be a minimum of 10 slides, not counting the title and reference slides. You may use various sources, including your textbook. Be sure to cite and reference all sources using proper APA Style. You must utilize the Notes feature within PowerPoint to include additional context and amplify the information for each slide. Think of the speaker notes as what your script would be if you were actually presenting this information to an audience. The resources below may be helpful as you work on your assignment.

Why did you choose SUNY Canton and/or your intended major? Who is a role model for you and why? Tell us about your most meaningful achievement or a time when you displayed leadership. How would you contribute to our campus community? What are your goals for after graduation?

ESSAY PAPER

1. Why did you choose SUNY Canton and/or your intended major?
2. Who is a role model for you and why?
3. Tell us about your most meaningful achievement or a time when you displayed leadership.
4. How would you contribute to our campus community? For students completing online programs, how do you contribute to your local community?
5. What are your goals for after graduation?

Responses to these questions should be at least 3 sentences for each question at length. SUNY Canton is a NCAA Division III College. Regulations for this membership prohibit the consideration of athletic ability, athletic participation, or athletic performance in awarding scholarships. Focus your answers on academic influences and education-related content.

https://canton.academicworks.com/

https://www.canton.edu/

Why did you choose SUNY Canton and/or your intended major? Who is a role model for you and why? Tell us about your most meaningful achievement or a time when you displayed leadership. How would you contribute to our campus community? For students completing online programs, how do you contribute to your local community? What are your goals for after graduation?

ESSAY PAPER

1. Why did you choose SUNY Canton and/or your intended major?
2. Who is a role model for you and why?
3. Tell us about your most meaningful achievement or a time when you displayed leadership.
4. How would you contribute to our campus community? For students completing online programs, how do you contribute to your local community?
5. What are your goals for after graduation?

Responses to these questions should be at least 3 sentences for each question at length. SUNY Canton is a NCAA Division III College. Regulations for this membership prohibit the consideration of athletic ability, athletic participation, or athletic performance in awarding scholarships. Please focus your answers on academic influences and education-related content.

https://canton.academicworks.com/

https://www.canton.edu/

Analyze the new system and determine the design issues with this new system. Describe how you would correct the design issues with the system to make the restaurant managers happy. Create a design plan that: Lists and explains the tasks associated with improving this interface. Contains at least six tasks. Includes realistic time estimates for each task to be completed. Analyzes the development of the system in your plan. Analyzes the testing of the system in your plan. Analyzes the implementation of the system in your plan.

Case Study – Security

Scenario
A large fast-food chain unveiled a new touch screen register for its franchises. Each cashier was assigned a user ID and password combination to log in to the register. The system allowed the incorrect password to be entered four times before the register would lock and require a manager to unlock it with a key card. To prevent unauthorized access, the registers would lock after three minutes if the screen was not touched. When the register locked, only the cashier who was logged in prior to it locking could unlock it without a system restart.

After a few days in operation, restaurant managers started complaining about the amount of time they were spending unlocking the registers. Some cashiers were forgetting their user ID and password, so other cashiers would log in for them. It also seemed that the button layout made it easy for the cashiers to key in the incorrect password. The managers also complained that cashiers would leave for a break or end their shift and forget to log out of the locked register. The managers would have to reboot the system, a three- to five-minute process in order for the next cashier to log in. Additionally, managers noticed that grease was building up on the touch screens, making them less responsive.

Instructions
Write a six- to eight-page paper in which you:

Analyze the new system and determine the design issues with this new system.
Describe how you would correct the design issues with the system to make the restaurant managers happy.
Create a design plan that:
Lists and explains the tasks associated with improving this interface.
Contains at least six tasks.
Includes realistic time estimates for each task to be completed.
Analyzes the development of the system in your plan.
Analyzes the testing of the system in your plan.
Analyzes the implementation of the system in your plan.
Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.
Suggest changes that could be made to the security of this system to still meet security objectives but make the system more usable.
Use Microsoft Visio or an open source alternative, Dia, to create a graphical representation of your proposed interface. Note: The graphically depicted solution is not included in the required page length.
Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources

Build an effective/professional Cybersecurity report based on the comparison between “SUNY Canton Computer and Network Use Policy” and “Rochester Institute of Technology Code of Conduct for Computer Use Policy”.

Comparison Report

In this assignment, you will build an effective/professional Cybersecurity report based on the comparison between “SUNY Canton Computer and Network Use Policy” and “Rochester Institute of Technology Code of Conduct for Computer Use Policy”. The requirements are:

The report must be submitted in Microsoft Word format.
Target audience of the report is SUNY Canton Information Services Division.
The report must include image and hyperlink.
The report must have a Title page, an Introduction page, a Conclusion page, and a Bibliography page.
The report should highlight the important common items between the two policies related to Cybersecurity.
The report should also highlight the important different items between the two policies related to Cybersecurity.
The report needs to list suggested revisions to “SUNY Canton Computer and Network Use Policy” related to Cybersecurity.

There will be additional bonus credits awarded for exceptional design and development work of the report.

Link for more details:
https://www.rit.edu/academicaffairs/policiesmanual/c082-code-conduct-computer-use/

https://www.canton.edu/policies/procedures/admin/computer-use-policy/

Build an effective/professional Cybersecurity presentation based on the SUNY Canton Computer and Network Use Policy.

COMPUTER AND NETWORK USER POLICY

(Policy Presentation) In this assignment, you will build an effective/professional Cybersecurity presentation based on the SUNY Canton Computer and Network Use Policy. The requirements are:

The presentation must be submitted in Microsoft PowerPoint format.
Target audience of the presentation is SUNY Canton freshman students. The presentation should be geared to computer layman.
The presentation must be colored.
The presentation must include image and hyperlink.
The presentation must have a Title slide, an Introduction slide, a Conclusion slide, and a Bibliography slide.
The presentation should highlight the important portions of the Policy related to Cybersecurity.
The presentation needs to show examples and counterexamples of violating the Policy related to Cybersecurity.

What is the most interesting information problem you have ever solved? Explain why it was interesting and how you solved it.

Short Answer Essay

The Short Answer Essay should answer the following question in 300 words or less:
What is the most interesting information problem you have ever solved? Explain why it was interesting and how you solved it.

View the video linked above and perform an additional search to find its prevalence and magnitude. Select an eCommerce platform. Research to determine the eCommerce platform’s history of vulnerability to this kind of attack, and what is being done to mitigate this attack type. Prepare a research paper of approximately two to three pages to report your findings. Use the Homework Header. When possible, tie in your understanding of PHP and SQL in your explanation of the attack type.

Cross site scripting

Paper details provided on upload…

Links to sites needed for completion :

https://www.cvedetails.com/vulnerabilities-by-types.php

https://www.ecommerceceo.com/ecommerce-platforms/

Video link per instructions:

View the video linked above and perform an additional search to find its prevalence and magnitude. Select an eCommerce platform. Research to determine the eCommerce platform’s history of vulnerability to this kind of attack, and what is being done (or suggested) to mitigate this attack type. Prepare a research paper of approximately two to three pages (not counting “Works Cited” or the homework header), to report your findings. Use the Homework Header. When possible, tie in your understanding of PHP and SQL in your explanation of the attack type.