Analyze the design features of the home pages

Assignment Help Computer Engineering
Reference no: EM133627466

Assignment: Field Cyber security

Instructions

Address each of the following bullet points:

A. Find a professional article online written for people in your field. Identify the intended reader and purpose. Write description of the article describing the elements in the article that helped you identify the reader and purpose. Be sure to include the URL of the article.

B. Study your school's Web site. Imagine you are a potential transfer student looking for a new school. Analyze the usefulness of the information available and how easy it is to locate information about various majors and directions about applying for admission. Identify 2-3 features of the Web site you would change in some way. Support your answer with citations from the text.

The following bulletin at a large manufacturing company provides guidelines for the plant security supervisors in assigning duties to the plant security guards at five separate plants. Revise and reorganize to make the bulletin easier to read and more useful to the supervisors. All supervisors must be conscious of the need to reduce costs and properly use available security guards in the most effective manner. Consider staggering the start and quit times to ensure a larger force during the peak demand hours. Every effort should be made to eliminate nonsecurity service functions, such as airport pickup, mail runs, drives to banks, drives to medical centers, parcel pickup. The supervisors should regularly review the schedule to be sure the coverage meets the needs of the plant. Guards assigned to gates should advise the shift supervisors whenever they leave their posts, including for lunch break. Nonsecurity service functions should be contracted out if possible. Drives to banks should be performed by the responsible department, but a department may request a security guard escort. Guards assigned to patrols, shipping and receiving docks, and special surveillance should tell the shift supervisors when they leave their assigned task, even for the lunch break. Supervisors should consider combining spot checks with regular duties of guards. For example, if a guard must open a gate and passes the trash center, the guard can spot check the trash pickup on the way to or from opening the gate. Supervisors must know about outside employment of guards. These outside activities should not adversely affect the security arrangements at the plant. In general, security guards should not also work at racetracks or casinos, or any places associated with gambling. Guards also should not be in partnership with co-workers since that relationship could negatively affect plant security. Supervisors need to check attendance records regularly. Frequent illness may indicate the guard cannot do the physical tasks appropriately. Questionable illness reports should be checked. Guards who operate small businesses may resist the normal rotation because it will interfere with their outside employment. Security requires a 7-day operation.

I. Find a real-world letter, memo, bulletin, pamphlet, or report online. Identify specific style problems. Evaluate the style and clarity of the document, and identify specific areas where revision would help readers. Support you answers with citations from the text. Be sure to include a url to the document you are evaluating.

II. Find a Web site you use frequently and analyze how you use it. How easy is it to find the features you want to see? Has the home page changed since you began using it? Can you recall which features were redesigned? How consistent is the placement of navigation links on the pages you use? How informative are the headings and page titles? Are there any distracting elements? Are the graphics helpful or simply decorative? Are there moving graphics or text? If so, do they enhance the usefulness of the site? Write a memo to your instructor, analyzing the design of the Web site. Support your answers with citations from the text. Be sure to include the url.

III. Find the home pages for the following: (i) Ford Motor Company, (ii) Chrysler, and (iii) General Motors. Analyze the design features of these home pages in terms of users who are seniors or have problems making precise movements with the mouse. Report your findings to your instructor in a memo.

IV. Find a review of a computer product online. Using the information in the review, write a task oriented set of instructions from the review. Be sure to include meaningful tasks and graphics. Use your book as a reference. Be sure to include the URL as a reference.

Reference no: EM133627466

Questions Cloud

Evaluating effectiveness of business partnership : Partnership activities, team activities, communication strategy. At least one feedback process for evaluating the effectiveness of the business partnership.
Which action most effectively minimizes the threat : team to take immediate action. Which action most effectively minimizes the threat from the zero-day vulnerability and the potential XSS attacks
What value can exhibition add to meeting or event : What value can an exhibition add to meeting or event? What feature areas could enhance traffic on the exhibition floor?
What does the sudden increase in the logging activity : The company follows a well-documented security protocol. What does the sudden increase in the logging activity indicate
Analyze the design features of the home pages : Analyze the design features of these home pages in terms of users who are seniors or have problems making precise movements with the mouse.
What technique does the threat actor use : What technique does the threat actor use in a Bluetooth network attack to transmit malicious files to a user's device?-of-cycle logging
Evolutions often change both politics and social environment : Evolutions often change both politics and the social environment within a society. Revolutions are often associated with the ideologies that inspire them.
Reviewing the security of its company-issued cell phones : attend a major hacker conference this year. What should he do when connecting to his cellular provider's 4G network while at the conference
Which would you feel is more effective : How are they similar? How are they different? Which would you feel is more effective if you were selecting which one to use in an organization?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Craft a five pages paper on artificial intelligence

craft a 4-5 page paper on Artificial Intelligence with 4 or more new references (that you find). Choose a particular style for your references.

  Generate the tables attach the primary key and foreign key

Generate the tables attach the primary key and foreign key

  Share physical hardware resources with virtual machines

Virtualization is used to share physical hardware resources with virtual machines - List three (3) main resources that a host shares with Virtual Machines.

  Assume monetary benefits of an information system of 40000

assume monetary benefits of an information system of 40000 the first year and increasing benefits of 10000 a year for

  How the products can be used in building the network

Discuss how those products can be used in building the network within an organization with respect to the advantages and disadvantages of each one.

  If you work as a data structure specialist for the amazon

If you work as a Data Structure specialist for the Amazon Australia, then which algorithms are you going to use for searching and sorting of the products

  Identify additional attributes of a software project

Identify additional attributes of a software project that may be important to measure and control. Describe why they are important and how these attributes.

  Conduct project that is technical that fall within computing

Choose to conduct a project that is technical (i.e. practically based e.g. development of a prototype, simulation, design framework etc) that fall within computing and IT curriculum.

  What is a critical business function

What is a critical business function and what are some examples relating to a Business Continuity Plan?

  Application showing sizes of two files and their ratio

Build a file which consists of your favourite movie quote. Make a use of a text editor like Notepad and save file as Quote.txt. Copy contents of the file and paste them into the word-processing program like Word. Save file as Quote.doc. Write down..

  What is the total fertilizer use in honduras

What is the total fertilizer use in Honduras (metric tons) What is the average application per cropped area (100 grams per hectare of arable land) Compare this to fertilizer use per cropped area in the US

  Write a program that displays a numeric keypad

Write a program that displays a numeric keypad that might appear on a phone. Above the keypad buttons, show a label that displays the numbers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd