Discipline: Technology

WEEK 3 DISCUSSION POST – RESPOND TO CLASSMATE’S POST- Two)- KYMBRIANNA TELLIS – 12.14.24WEEK 3 DISCUSSION POST – RESPOND TO CLASSMATE’S POST- Two)- KYMBRIANNA TELLIS – 12.14.24

By Day 6 Respond to at least two of your colleagues in the following way: Decide whether or not you feel that their form tag choices appropriately match the data they are collecting and explain your answers. For each response, suggest at least two additional kinds of data the form might collect, and choose the […]

WEEK 3 DISCUSSION POST – RESPOND TO CLASSMATE’S POST- (One)- Cassandra Lott – 12.14.24WEEK 3 DISCUSSION POST – RESPOND TO CLASSMATE’S POST- (One)- Cassandra Lott – 12.14.24

By Day 6 Respond to at least two of your colleagues in the following way: Decide whether or not you feel that their form tag choices appropriately match the data they are collecting and explain your answers. For each response, suggest at least two additional kinds of data the form might collect, and choose the […]

EA_Term Paper Do You Need to Understand the Inner Workings of a Computer to Use It Effectively?EA_Term Paper Do You Need to Understand the Inner Workings of a Computer to Use It Effectively?

Overview: In today’s technology-driven world, many of us use computers, smartphones, and various other devices daily. However, just like driving a car without understanding the mechanics under the hood, we often use technology without knowing how it all works. This assignment invites you to explore the pros and cons of understanding the inner workings of […]

Week 7 Assignment – Sex Crimes, Victimization, and Obscenity on the World Wide WebWeek 7 Assignment – Sex Crimes, Victimization, and Obscenity on the World Wide Web

You work as an information security specialist for a large financial company and your Chief Information Security Officer (CISO) has asked you to investigate recent online attacks that have occurred against certain individuals within your organization. The CISO wants to ensure that the company is well protected against these types of attacks. Look into victims, […]

Week 10 Assignment – Developing Cybercrime Legislation, Enforcement, and InvestigationWeek 10 Assignment – Developing Cybercrime Legislation, Enforcement, and Investigation

Overview You have been called back by the CISO to report your findings and pursue the next steps of your investigation. During your investigation it was discovered that the estranged husband of the CEO’s executive staff assistant had compromised her system’s account, which allowed him to access confidential documents including other employees’ personally identifiable information. […]

Decolonial Ethics in Maritime Heritage Preservation: The Case of TMT in HawaiʻiDecolonial Ethics in Maritime Heritage Preservation: The Case of TMT in Hawaiʻi

See attached document: Choose 1 of the questions below. Special Feature: Decolonial Ethics in Maritime Heritage Preservation: The Case of TMT in Hawaiʻi For marginalized communities in which the ocean represents the colonial imaginaries of slavery, dispossession and displacement, Karin Ingersoll (2016) contrasts sinking and keeping afloat to articulate the complex layer of navigation shrouded […]

What metrics and methodologies can organizations adopt to accurately measure the return on investment (ROI) for IT initiatives in both short and long-term contexts?What metrics and methodologies can organizations adopt to accurately measure the return on investment (ROI) for IT initiatives in both short and long-term contexts?

1. Research Presentation Students are required to create a PowerPoint presentation summarizing their individual research papers. Please use your research paper to create the presentation slides. If you have any questions or need clarification, feel free to ask. 2. Speaker Notes In addition to the PowerPoint slides, please include speaker notes beside each slide. These […]

Discuss how money center banks are using blockchain technology currently to process payments.Discuss how money center banks are using blockchain technology currently to process payments.

Discuss how money center banks are using blockchain technology currently to process payments. For grading expectations please view the rubric.  Rubric COB Undergraduate Writing Assignment Rubric COB Undergraduate Writing Assignment Rubric Criteria Ratings Pts This criterion is linked to a Learning OutcomeContent 20 to >18.4 pts Distinguished Reveals a solid understanding of the proposed topic as evidenced […]

Enhancing User Experience in Smart Home Interfaces: Designing for Accessibility, Intergenerational Use, and PrivacyEnhancing User Experience in Smart Home Interfaces: Designing for Accessibility, Intergenerational Use, and Privacy

The report should be formatted like a research paper, include full description of data collection, full analysis, implications for future work, and limitations of work. Below it the previous work that I’ve done. Preliminary Research Plan Practicum Topic: Enhancing User Experience in Smart Home Interfaces: Designing for Accessibility, Intergenerational Use, and Privacy Preliminary Research Questions: […]

Describe the three different technical mechanisms that enable blockchain to work.Describe the three different technical mechanisms that enable blockchain to work.

The book to reference is Thue Future of Finance by  by Henri Arslanian; Fabrice Fischer COB Undergraduate Writing Assignment Rubric COB Undergraduate Writing Assignment Rubric Criteria Ratings Pts This criterion is linked to a Learning OutcomeContent 20 to >18.4 pts Distinguished Reveals a solid understanding of the proposed topic as evidenced by preliminary research and knowledge. 18.4 to >16.6 pts […]