Description
Hello, I hope you pay attention. I want correct and perfect work. I want all the questions to be solved correctly and completely without plagiarism. I emphasize this important point. Any percentage of plagiarism will lead to the cancellation of the work. I want a correct solution with references and maintaining the file format without any errors. If you are sure of yourself and that you will do the work correctly, accept the work and make sure of it and your capabilities.
Assignment 2
Deadline: Day 25/ 11 /2024 @ 23:59
[Total Mark for this Assignment is 8]
Student Details:
Name: #
ID: ###
CRN: ###
Instructions :
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
•
2 Marks
Learning
Outcome(s)
LO3: Classify
the business
areas to which
computers may
be applied.
Question One
Smart cities put data and digital technology to work to make better decisions and
improve the quality of life. Use your own words to explain how smart cities
improves our life.
Learning
Outcome(s)
LO3: Classify
the business
areas to which
computers may
be applied.
2 Marks
Question Two
What is design thinking? List and explain design thinking process?
2 Marks
Learning
Outcome(s)
LO5: Interpret the
management
challenges faced
by information
systems being
implemented in
organizations
today, and how
they affect
business and
society.
Question three
A. What is the importance of encryption in cybersecurity?
B. Discuss the different types of encryption methods, and provide an example
of their application in real-world.
Learning
Outcome(s)
Learning
Outcome(s)
LO3:
Students
will
be equipped
LO5:
Interpret the
tomanagement
critically
challenges
faced
discuss
risks of
big
by information
data,
including
systems being
issues of privacy,
implemented in
surveillance,
organizations
immutability,
etc.
today, and how
they affect
business and
society.
2 Marks
Question four
In your own words discuss the ethical risks associated with big data
technologies. Provide examples of how we can address these risks
effectively.
Purchase answer to see full
attachment