AU Computer Science Discussion

Description

Businesses often face significant challenges when it comes to ensuring that projects align with organizational strategy. In order to overcome this challenge, a certain level of project management maturity is needed. Read the article “How Can the Trade Off Between Corporate Business Strategy and Project Risk Be Optimized?” (Sheykh, Azizi, Sobhiyah, 2013) located in the University of Arizona Global Campus Library. Then, write a paper discussing the following:

  • Explain how project and portfolio management relate to organizational strategy and risk management.
  • Explain the rationale behind an organization keeping a diverse project portfolio.
  • Discuss the project management maturity level an organization would likely have to achieve in order to successfully build a project portfolio that would align with organizational strategy, while managing risk.

The Organizational Strategy, Project Risk, and Project Management Maturity assignment

  • Must be 900-1200 words in length (not including title and references pages) and formatted according to APA style as outlined in the Writing Center (Links to an external site.).
  • Must include a separate title page with the following:
    • Title of paper
    • Student’s name
    • Course name and number
    • Instructor’s name
    • Date submitted
  • Must use at least two scholarly sources in addition to the course text.
  • Must document all sources in APA style as outlined in the Writing Center.
  • Must include a separate references page that is formatted according to APA style as outlined in the Writing Center.

SJSU Machine Learning Algorithms Summary

Description

Introduction

Need a draft for How Machine Learning (ML) algorithms  is used in organizations and protecting the internet and network for digital devices and information from illegal access and modification ( Minimum 150 words)

Kothari, S. (2021). use of machine learning algorithms in cyber security. information technology in industry, 9(2), 1214–1219. https://doi.org/10.17762/itii.v9i2.475

Participants and Research Setting

80 participants are from IT professionals need draft from below reference only (Minimum 150 words)

Armstrong, Jones, K. S., Namin, A. S., & Newton, D. C. (2020). Knowledge, Skills, and Abilities for Specialized Curricula in Cyber Defense: Results from Interviews with Cyber Professionals. ACM Transactions on Computing Education, 20(4), 1–25. https://doi.org/10.1145/3421254

Analyses of Research Questions

1.Need a draft to answer the research questions(Machine learning algorithms for cyber threats), the UTAUT variables were measured (Minimum 150 words)

Venkatesh, V. (2021). Adoption and use of AI Tools: A research agenda grounded in Utaut. 

Annals of Operations Research, 308(1-2), 641–652. https://doi.org/10.1007/s10479-020-03918-9

2. Perceived Enjoyment (PE), Social Influence (SI), Effort Expectancy (EE), and facilitating conditions (FC) are the four components of the model . These elements are crucial in gaining a better understanding of the relationship between age, gender, and experience and technology adoption.(Minimum 150 words)

Alyoussef, I. Y. (2021). Factors influencing students’ acceptance of M-learning in higher education: An application and extension of the UTAUT model. Electronics, 10(24), 3171. https://doi.org/10.3390/electronics10243171

Supplementary Findings

1.Need draft How the G* power used for sample size and analysis for ANOVA (Minimum 150 words)

Kang. (2021). Sample size determination and power analysis using the GPower software. Journal of 

Educational Evaluation for Health Professions, 18(0), 18, 17–17. 

https://doi.org/10.3352/jeehp.2021.18.17 

2.Need draft how ANOVA test to examine and t-test, P-value . (Minimum 150 words)

Faulkenberry, Ly, A., & Wagenmakers, E.-J. (2020). Bayesian Inference in Numerical 

Cognition: A Tutorial Using JASP. Journal of Numerical Cognition, 6(2), 231–259. https://doi.org/10.5964/jnc.v6i2.288

Computer Science Discussion

Description

PART 1: Log in to zyBooks and complete the listed readings and practice activities for Chapters 7 and 8 in the zyBooks resource, as noted in the Readings and Resources section.

This material focuses on the use of loops as a coding structure that allows for iteration through the use of conditionals.

The zyBooks readings and activities in this module should take you approximately 1 hour and 30 minutes to complete.

part 2:

5-2 Stepping Stone Lab Four: LoopsAssignmentTask: Submit to complete this assignmentIn Module Five, you have studied how to code for iteration through the use of loops. In Stepping Stone Lab Four, you will develop a simple program with a loop structure. Then, you will reflect on how loops may be used to help structure the program you have worked with throughout the stepping stones.

Go to the Start Here page and download the Stepping Stone code .zip for the starter code for this assignment.

To complete this assignment, review the following documents:

Stepping Stone Lab Four Guidelines PDF

Stepping Stone Labs Two Through Six Rubric PDF

part 3

  • 5-3 Final Project Milestone One: Ingredient ClassAssignmentTask: Submit to complete this assignmentYou will create a complete class based on Stepping Stone Labs Two and Three and provide it the basic attributes with the appropriate data types. Additionally, you will add code to validate the data type of the user input.

    This class will be modified for the submission of your final project application; however, it should be functional code that accepts user input for each variable.

    To complete this assignment, review the Milestone One Guidelines and Rubric PDF document.

BIS 460 IWU Business Systems Analysis and Design Paper

Description

Upon successful completion of this assignment, you will be able to:

Understand the roles and perspectives of key stakeholders in each phase of the systems development lifecycle.

Identify the different stakeholders.

Differentiate between external and internal stakeholders.

  • Classify the role of each stakeholder in defining system requirements.
  • Describe different techniques used to gather information and requirements from stakeholders and users.
  • Explain how to extract useful information gathered during an interview session.
  • Identify the different stakeholders.
  • Discuss tools available for users and stakeholders to expand communication.
  • Examine the role of leadership in project management.
  • Background Information
  • Planning is important in ensuring that a project is started out correctly. During the planning process, you will want to gather as much information as to help you develop the project. Part of that planning process is determining who will be involved in the project (project stakeholders) and their involvement in the project.

Some of the stakeholders will work directly with the final project, so you would conduct a fact-finding interview with those involved in a procedure that is used in the business or organization.

  1. The list of stakeholders should include the following:
    1. Identify each stakeholder’s role as it pertains to the company and to the project.
    2. Point out if the stakeholder is an internal or external stakeholder.
    3. Determine and defend which part(s) of the project each stakeholder will be involved in, planning, development, or deployment.
  2. Compose a list of questions that you would ask during your mock interview.
    1. Indicate which stakeholder(s) each question is directed towards.
    2. You will ask questions that will help you gain a better understanding of the procedure thoroughly.
  3. Assume the role(s) of each interviewee and answer each question.
    1. Include the question and identify who is answering the question.
    2. Be sure to support your answers with as much information as possible.
    3. Your answers should be given in complete sentences.
       

UOP Network Architecture and External Communication Paper

Description

This week you continue your work on the Yates Community HIT and HIE Network Upgrade Project by considering the network requirements that will enable communication between Yates Community with state, regional, and national systems. In addition, you will be selecting an appropriate architecture model and diagraming system component designs.

Part 1

Select an architectural model for the Yates Community HIT network that will support both the internal functioning of the network and the communication between your system and the RHIO.

Create the following two diagrams that will enable developers of different system components to build and test the design.

  • HIT System Overview
  • Revise the diagram you completed in the Week Three Individual Assignment, “Yates Community Network: Internal EHR Optimization” and include:
  • Revisions that reflect instructor feedback
  • Design elements that reflect your selected architecture model
  • Annotations denoting where communication will occur between the Yates Community network and the RHIO
  • Annotations showing where HIE and security standards are incorporated within the Yates Community network and at various points of communication to enable communication with the RHIO.
  • EHR System Detail
  • Create an EHR system diagram in which developers can use to build and test this component. Include:
  • Information exchange standards
  • Industry and government security requirements
  • Intersystem communication requirements, including any instructor feedback you received on your “EHR Requirements and Action Summary” from your Week Three Individual Assignment titled, “Yates Community Network: Internal EHR Optimization”
Part 2:

Write a 3-page HIT network Model and Design Justification, in Microsoft® Word, you could submit to your IT director.

Include the following:

  • Reasons for your selected architecture model
  • Reasons you did not select other common architecture models
  • The design elements you included to maximize interoperable exchange of healthcare data

Compress the two diagram files and the Model Design and Justification document into a ZIP file.

ARTH 334 UMUC Understanding Movies Essay

Description

Second Paper Assignment: Film Two

This is essentially the same assignment as Paper One BUT about a film produced between 1970 and 2000.

Part 1: View a feature film made between 1970 – 2000 you have not seen before (or will see later in this class) by a great director or featuring a great actor or actress.

Just as you did in the first paper, comment on the specific film you saw. Pay particular attention to the screenplay, camerawork (cinematography) the editing (montage) and the sound (including music). for this paper, also address special effects. Again, as you did in the first paper, talk about what you like and what you dislike? Why do you like the things you like, and why do you dislike the things you dislike? Is the film a good film, or is it not?

Part 2: Now that you have commented on the specific film you viewed, see if you can draw some general conclusions about the work of the director and one of the main actors or actresses. Be sure to comment on the overall impression you had of the film, including how you see it as an example of the its genre and time period. Remember, this is film review based on your opinions and insights: do not repeat what you have learned by reading up on the film or the filmmaker.

Part 3: Go back to the “My Criteria for Quality in Film” page. Based on your viewing of this week’s film, add four new general conclusions. These statements should be numbered (5) through (8). Be sure to include all of the criteria you created for Paper One.

UMGC Technology Concepts to Business Professionals Presentation

Description

Congratulations!  This week, your internship rotation takes you to the company’s IT Department where you’ve been asked to help prepare a short presentation for one of the company’s Brown Bag Lunch training events. This training event will be attended primarily by business professionals who have familiarity with information technology but at a very high level; the attendees use IT to perform their jobs on a daily basis.

For this 10 minute presentation, you should focus upon meeting the information needs of the attendees from the internal (business) organizations which are supported by the IT department. You should also anticipate questions which your audience might ask during the 10 minute Question & Answer period which follows your presentation. (When you write your peer critiques for this week — ask and then answer at least one question that you believe the audience is likely to ask.)

Choose one of the following articles to present to the attendees.

1. The Cloud Operating Model

2. The Plain English Guide to: Managed IT Services

3. Shadow IT Explained: Risks & Opportunities

After reading the article, prepare a set of slides (talking points) with speaker notes in which you highlight key information about the article and why Padgett-Beale employees should “care” about the topic. Make the presentation relevant for Padgett-Beale by integrating information about its business operations (use the company profile, the weekly descriptions, and other readings in this course). At least one of your slides should address cybersecurity issues and concerns that arise in the context of your chosen article (use the CSCU textbook’s material and other course readings to help you identify these issues and concerns). 

Prototype Techniques for The Proposed System Design Case Study

Description

Case Study – Design Process

You have recently started your own software design company. Youdiscover that your local Department of Motor Vehicles (DMV) is lookingto build a system that will allow receptionists to check in customersquickly. They would like for the system to allow customers toself-check-in during busy times, but have receptionists check customersin the rest of the time. Your company puts a bid in for the project andwins. Read the article, “Factors Affecting Development Process in Small Software Companies.”

Write a five-page paper in which you:

  1. Suggest the prototyping technique you would use for this system and support your rationale.
  2. Create a management plan containing eight to ten stages for proper design of such a system.
  3. Explain each stage of the management plan and justify your rationale.
  4. Estimate the length of time it will take to complete each stage of the management plan.
  5. Compare and contrast the self-check-in interface with the interface a receptionist would use.
  6. Use Microsoft Visio or an open source alternative, Dia, tocreate a total of two graphical representations of your proposedinterfaces, one for the self-check-in and one for the receptionist.Note: The graphically depicted solution is not included in the requiredpage length.
  7. Use at least three quality resources in this assignment. Note:Wikipedia and similar websites do not qualify as quality resources.

This course requires the use of Strayer Writing Standards. Forassistance and information, please refer to the Strayer WritingStandards link in the left-hand menu of your course. Check with yourprofessor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Develop an interface design plan that addresses a business problem.
  • Must be 100% original, any copy of anyone’s work will be a result of expulsion.

OU MOD 6 The Pulses Travel on A Long Fiber in Data Transmission Essay

Description

Research Optical Fiber. Identify two everyday examples of Optical Fiber use. Each of these examples show how Optical Fiber is used and it works. Summarize your findings in a brief paper.

Instructions (from the syllabus):

In these writing assignments, there is not a “right or wrong” answer. Rather, cases provide a vehicle for you to demonstrate your understanding and ability to apply course concepts. You must use at least two appropriate sources (other than your course textbook) that are properly cited; do not solely use the case itself to support your position. You are strongly encouraged to use the following outline so that your analysis is organized appropriately:

Identify both the key issues and the underlying issues. In identifying the issues, you should be able to connect them to the principles which apply to this situation.

Discuss the facts which affect these issues. The case may have too much information. In your discussion, you should filter the information and discuss those facts which are pertinent to the issues identified above.

  • Discuss your proposed solution/recommendation to the problem and include how you would implement it. What actions would you propose to correct the situation, based on the knowledge you have gained in this course? Be sure to support your recommendation by citing references in the text and in the supplementary readings. You should also draw on other references such as business periodicals and journals. Remember that an ANALYSIS is more than simply a SUMMARY of the Writing Assignment.
  • Discuss follow-up and contingency plans (if necessary). How will the organization know that your proposed solution is working? What should they do if it does not work?

Oconee Fall Line How Apple and Google Play Work with Credit Cards Questions

Description

Researching Apps for Mobile Payment Services

iPhone and Android phones both offer some kind of mobile payment service, which allows you to use your smartphone to pay for merchandise or services at a retail checkout counter. iPhone has Apple Pay, and Android uses Google Pay. Mobile payment services rely on NFC (Near Field Communication) technology to exchange financial information between your phone and the reader at the checkout counter. You might want to pay with a credit card stored on your phone or get discounts with a store rewards account reported by your phone as you check out. But how secure is your sensitive financial information?

Research the following topics and answer the following questions:

  1. Research how mobile payment systems use NFC technology. How does NFC work? How can you activate NFC on an Android phone for making a payment with Google Pay? On an iPhone for making a payment with Apple Pay?
  2. Find and read some articles online or watch videos that describe the details of storing financial information for mobile payment systems, accessing the information when needed, and transmitting the information securely. What security measures are in place? Where is the data actually stored? What information is actually transmitted at the point of transaction?
  3. List three third-party mobile payment apps available either in Apple’s App Store or in Google’s Play Store. On which mobile OS versions will the apps work? What are advantages and disadvantages of each app? How much do the apps cost? What security measures do the apps use?
  4. If you were to purchase one of these apps, which one would it be? Why?