How would you contribute to our campus community? For students completing online programs, how do you contribute to your local community?

Originally from Guinea in west Africa. Speak French. Come in the USA as an F-1 student 5 years ago.
Major BS Cybersecurity.
1. Why did you choose SUNY Canton and/or your intended major?
2. Who is a role model for you and why?
3. Tell us about your most meaningful achievement or a time when you displayed leadership.
4. How would you contribute to our campus community? For students completing online programs, how do you contribute to your local community?
5. What are your goals for after graduation?

Responses to these questions should be at least 3 sentences for each question at length. SUNY Canton is a NCAA Division III College. Regulations for this membership prohibit the consideration of athletic ability, athletic participation, or athletic performance in awarding scholarships.  focus your answers on academic influences and education-related content.

https://canton.academicworks.com/

https://www.canton.edu/

Evaluate the user dialog strategies used by a menu-driven interface. Determine why menu-driven interfaces continue to be popular in the modern computing age.

Menu Selection

Despite being a fairly old technology, menu-driven interfaces are very common in user interface design. Menu-driven interfaces consist of a series of screens which are navigated by choosing options from lists.

Write a four- to five-page paper in which you:

Evaluate the user dialog strategies used by a menu-driven interface.
Determine why menu-driven interfaces continue to be popular in the modern computing age.
Suggest at least three strategies for making menu-driven interfaces visually appealing in the modern computing environment.
Suggest alternatives for menu-driven interface design and explain how these alternatives can be designed to eventually replace all menu-driven interfaces.
Use at least three quality resources in this assignment.

To what extent do you support the proposed K-12 Cybersecurity Standards? If you were assigned to extend the Cybersecurity standards to college students , what do you like to propose for the 13-16 Cybersecurity Standards?

Proposition for the 13-16 Cybersecurity Standards

The New York State Education Department is in the process of developing Computer Science and Digital Fluency Learning Standards that will prepare all New York State students to live and work in our dynamic, technology-driven 21st-century world. You can get more information from the official site located at
http://www.nysed.gov/curriculum-instruction/computer-science-and-digital-fluency

The PDF file attached, is the Cybersecurity section in the draft of the New York State K-12 Computer Science and Digital Fluency Learning Standards . Your final project is to provide an efficient/professional narrated presentation to cover the following:

Illustrate the strengths associated with the proposed K-12 Cybersecurity Standards.
Illustrate the weaknesses associated with the proposed K-12 Cybersecurity Standards.
Illustrate the opportunities associated with the proposed K-12 Cybersecurity Standards.
Illustrate the threats associated with the proposed K-12 Cybersecurity Standards.
To what extent do you support the proposed K-12 Cybersecurity Standards?
If you were assigned to extend the Cybersecurity standards to college students , what do you like to propose for the 13-16 Cybersecurity Standards?

Propose the design and implement system for replicating logical replication slots across physical replicas.

Letter of Recommendation

PROFESSIONAL EXPERIENCE
1. “Senior Software Architect” in Enterprise DB from Jan 2011 till now.
Primary job responsibilities:
a) Supporting main architecture design decisions.
b) Implementation of different software modules.
c) Provide support to development team members.
Major Projects:
EDB Replicate
Replicate is a multi-master logical replication solution for PostgreSQL.
Propose the design and implement system for replicating logical replication slots across physical replicas.
Propose and do POCs for ways to reduce un-necessary network traffic to
increase performance.
Propose ways to detect, log and handle UPDATE-UPDATE conflicts

Create a management plan containing eight to ten stages for proper design of such a system. Explain each stage of the management plan and justify your rationale.

Case Study – Design Process

You have recently started your own software design company. You discover that your local Department of Motor Vehicles is looking to build a system that will allow receptionists to check in customers quickly. They would like for the system to allow customers to self-check-in during busy times, but have receptionists check customers in the rest of the time. Your company puts a bid in for the project and wins. Read the article, “Factors Affecting Development Process in Small Software Companies.”

Write a four- to five-page paper in which you:

Suggest the prototyping technique you would use for this system and support your rationale.
Create a management plan containing eight to ten stages for proper design of such a system.
Explain each stage of the management plan and justify your rationale.
Estimate the length of time it will take to complete each stage of the management plan.
Compare and contrast the self-check-in interface with the interface a receptionist would use.
Use Microsoft Vision or an open source alternative, Dia, to create a total of two graphical representations of your proposed interfaces, one for the self-check-in and one for the receptionist. Note: The graphically depicted solution is not included in the required page length.
Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources

Examine the practicality of building multiple interface options for diverse populations, rather than building one interface that meets the needs of the majority of end users.

Accessibility

Write a four- to five-page paper in which you:

Assess at least five best practices for developing a universally usable interface.
Evaluate how Section 508 affects developing user interfaces and assess this compliancy standard’s impact on users.
Give three examples of available tools for verifying that your interfaces meet universal design guidelines and the advantages and disadvantages of each.
Examine the practicality of building multiple interface options for diverse populations, rather than building one interface that meets the needs of the majority of end users.

How do we tackle the issue of phishing?What are the impacts of phishing on American businesses?

THE PROBLEM OF PHISHING AND ITS IMPACT ON AMERICAN BUSINESSES

Today, phishing is considered the most common and vicious cyber crime. The subsequent effects of phishing include the severe loss of personal information and loss of data by companies and government institutions.
This report was developed to discuss and analyze the phishing problem and its impact on American businesses. The report seeks to focus on the following questions
⦁ What is phishing?
⦁ What are some real-world phishing examples?
⦁ How do we tackle the issue of phishing?
⦁ What is the prevalence of phishing?
⦁ What are the impacts of phishing on American businesses?
⦁ How do you deal with phishing?