WEB Answer

 

  1. Pitch Deck
    Overview
    You have been hired to create a website. In this assignment, you will begin to gather the necessary information to complete the work and present your ideas to your client.
    Instructions
    You will need to answer the following questions:

    • What kind of domain names will you register (that is .com, .biz, .net, et cetera)? Why do you suggest this kind of domain? (Review the section in Week 1 on domain names.)
    • Will you register the site using multiple domains? Why is or isn’t this necessary?
    • Will you need to secure any portion of your site? Why? (See the section on HTTPS.)
    • Given the nature of Web trends and changes in technology, what steps, if any, do you suggest to keep your site viable for more than one year?
    • What browsers do you anticipate your visitors will be using based on information available today?
    • Does the browser have any impact on your design?
    • Based on what you’ve just learned this week about CSS, how will this help in the development of your site?
    • Requirements
      You may use any one of a variety of formats to create a pitch deck. PowerPoint is highly recommended, with extra points for creating a presentation using a video device or software that you can upload to YouTube or another easily accessible online hosting service. (If you choose this option, you must coordinate ahead of time with your instructor, to ensure that your instructor will be able to access your video.) Note: You’ve already been hired, but remember that you still need to show off how awesome you are.
      This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
      The specific course learning outcome associated with this assignment is:
    • Present information and requirements for a website design to a customer.
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

ET WK 7 Research paper

For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

Address the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately 5 (full)pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

(2) C++

 Trace the C++ program below showing all output in the order that it is displayed. If anything happens that makes it impossible to accomplish an operation or the results of so doingare unpredictable, describe what happens and abort the program at that point. Assume the Stack class is fully defined in an appropriate header and implementation file. The effect of the functions (methods) is as follows: constructor – creates an empty stack empty – returns true if the stack is empty, false otherwise push – adds the specified element to the top of the stack display – displays every stack element on the specified stream, top to bottom order pop – removes the top element of a stack; attempting to pop an element from an empty stack causes an error condition and immediately terminates the program. top – returns the top element of the stack but does not remove it boolalpha – a flag that causes the words true or false to be displayed for a bool variable 

 #include

using namespace std;

#include “Stack.h”

int main(void)

{int jimmy_carter, bill_clinton;

 jimmy_carter=0;

 Stack george_w_bush;

 for (bill_clinton=17; bill_clinton>13; bill_clinton–)

 {george_w_bush.push(bill_clinton%3*2-2);

 jimmy_carter=jimmy_carter+george_w_bush.top();

 george_w_bush.push(george_w_bush.top()+2);

 jimmy_carter=jimmy_carter+george_w_bush.top();

 cout<<"Contents of george_w_bush "<

 george_w_bush.display(cout);

 cout<<"jimmy carter is "<

 }

while (!(george_w_bush.empty()))

 {cout<<"popping "<

 jimmy_carter=jimmy_carter-george_w_bush.top();

 george_w_bush.pop();

 cout<<"popping "<

 george_w_bush.pop();

 cout<<"Contents of george_w_bush: "<

 george_w_bush.display(cout);

 cout<<"jimmy_carter is now "<

 }

cout<<"at end jimmy_carter is "<

cout<

“<

 return 0;

}

Tasks attached

Please find the attached.

Task 1 : –  In 150 words comment on attached two presentations  reflecting on your own experience, challenging assumptions, pointing out something new you learned, and offering suggestions. 

Task2 : –   Write an essay of at least 450 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context. 

This week’s journal articles focus on the digital retail sector and how it is constantly growing each year. The case study/article reviews the top four digital retail company’s financial performance.

 

Required Reading:

Read URBONAVIČIŪTĖ, K., & MAKNICKIENĖ, N. (2019). Investigation of Digital Retail Companies Financial Performance Using Multiple Criteria Decision Analysis. Science: Future of Lithuania, 11, 1–9. https://doi.org/10.3846/mla.2019.9737

http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=a9h&AN=141392864&site=eds-live&custid=s8501869&groupid=main&profile=eds_new

Assignment:

This week’s journal articles focus on the digital retail sector and how it is constantly growing each year. The case study/article reviews the top four digital retail company’s financial performance. After reviewing the reading, please answer the following questions:

  1. Present an overview of the top four digital retail companies.
    1. Note who they are and how they became the top four digital retail companies.
  2. Please review at least two other digital retail companies that are new in the market, note what you think they would have to do to obtain market share based on what you’ve learned this week.
    1. In response specifically list at least three key factors that would influence the success of the digital retail company, please be specific.
    2. Note a specific market that would thrive given the current market conditions and why.
    3. Discuss how innovation technology will influence the success of this new business.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

· 5  pages in length (not including title page or references)

· APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

· A minimum of five peer-reviewed journal articles.

Assg

Optional Resources:

 Chapter 3 & 4 Journal articles

Task 1: total 1 page

After completing the reading this week, we reflect on a few key concepts this week:

  1. Discuss what power in the context of leadership is and how it relates to bullying within organizations.  Also, note how this impacts productivity.
  2. Discuss what organizational culture is and how it impacts work productivity.  Also, note how organizational culture impacts the success of innovation implementation.
  3. How does culture impact leadership? Can culture be seen as a constraint on leadership?

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive.  Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources from the UC Library.  Use APA references and in-text citations.

Task 2: total 3 pages

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

Task 3 total 3 pages

https://opentextbook.site/informationsystems2019/

Essay Assignment 1: Review the strategic integration section.  Note what strategic integration is and how it ties to the implementation of technology within an organization.

Essay Assignment 2: Review the information technology roles and responsibilities section.  Note how IT is divided based on operations and why this is important to understand within an organization.

The above assignment should be two pages in length (one page for each question) and adhere to APA formatting standards.

**Remember the page length does not include the APA cover page or any references**

This assignment must be submitted by 11:59 PM on Sunday, September 13, 2020 (No Exceptions).  As per the syllabus, no late assignments will be accepted.

Please understand that Plagiarism will not be tolerated and will result in a zero grade. Please review the Academic Dishonesty Policy outlined in the syllabus and in your student handbook. 

Business Process Redesign

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

• Be approximately 4-6 pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

EH week8 P8

 

Hello,

i need this paper by 10/14 afternoon.

Strictly No plagiarism please use your own words.

Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 3-4 paragraphs, briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Business analytics

  

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Linux Implementation Proposal: Training Guide

 

Linux Implementation Proposal: Training Guide

Hide Assignment InformationTurnitin®Turnitin® enabledThis assignment will be submitted to Turnitin®.Instructions

You’ve won the business! Faster Computing has agreed to the project. As the final stage of pre-implementation, you have been asked to produce a training guide that will demonstrate how to install Linux and provide an overview of several common commands, as follows:

(11.1.3: Install the software.) 

  • Use a hypervisor of your choice to install Linux. Many hypervisors are available, such as Oracle’s VirtualBox, which is a free download. In addition, as part of UMGC’s agreement with VMware, you can download VMware Workstation for free. See below for specific screenshot requirements. You should include at least 3 screenshots (e.g., disk partitioning, timezone selection, creating the default account). Each screenshot should be accompanied by a brief explanation of what you did.
    NOTE: It is not necessary to include screenshots of installing the hypervisor software.

(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)

  • Demonstrate command-line operations that will provide the following information:
    • A listing of files in a directory and common file attributes
    • The current directory (hint: also known as the present working directory)
    • Create a file, then copy it to a different directory
    • Create a second file and move it to a different directory
    • Remove the first file, as well as the copy you created
    • The manual page for a given command
    • Create a text file, then use an editor to modify the content. Then display the content of the modified file

(1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.)

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., ls, cp, mv, rm) in your documentation as well as in your screenshots. 

(11.2.1: Configure technology according to stakeholder specifications and requirements.)

  • Show running processes on the system. Demonstrate how to search for a specific process
  • Forcibly stop a running process

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., top, kill, -9, ps) in your documentation as well as in your screenshots. 

(13.1.1: Create documentation appropriate to the stakeholder.)

The deliverable for the final phase of the project is a written paper with screenshots. There is no minimum or maximum page requirement, but all of the requirements must be met.  Use the Training Guide Template to record your work. This section will be graded upon the overall usefulness of the training guide to the organization.

(11.3.1: Add and update systems as required.) 

This portion of the training guide helps determine your submission is unique.

Important Requirement

On the final screenshot, you need to open a command line and type in the following commands (without the quotes):

“date”

“echo CMIT391”

“echo ” (Replace your name here with your name)

The recommended format is to provide screenshots incorporated within the written narrative. The screenshots must all be your own. Screenshots from external sources are not permitted. You must include the specific screenshot listed above or your project will not be accepted.

(1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.)

The training guide must have a cover page, an introduction, summary, and at least 3-5 references.

(1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.)

Employ proper spelling and grammar. All Linux commands must be lower case.

(2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.)

In your conclusion of at least a paragraph, summarize why using Linux is beneficial for employees, management, and the organization as a whole.

How Will My Work Be Evaluated?

In this training guide, you will demonstrate how to install Linux and provide an overview of common commands for your client/customer. You’ll be combining your technical skills with effective communication techniques to provide learning resources for the client/customer.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension. 
  • 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal. 
  • 1.2.3: Explain specialized terms or concepts to facilitate audience comprehension. 
  • 1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience. 
  • 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions. 
  • 11.1.3: Install the software. 
  • 11.2.1: Configure technology according to stakeholder specifications and requirements. 
  • 11.3.1: Add and update systems as required. 
  • 13.1.1: Create documentation appropriate to the stakeholder.