paper

 

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Complexity of Information Systems Research in the Digital World

 Please find the below attachment for the  journal article  on the Complexity of Information Systems Research in the Digital World. 

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

flash card program python

the aim of this first assignment is to implement a Linked List that is able to hold and operate on more complex data (than just one number, string, etc.). 

Specifically, the task is to create a set of flash cards. The “deck” of flash cards can be thought of as a linked list. Each flash card should have a hint (e.g. “an ADT that typically has push and pop operations”), and then will prompt for an answer from the user. The program should go through the deck of flash cards (i.e. traverse the linked list). 

See the video here for a short demonstration of what the program should look like when it is run:

What to hand in?

A single *.py file should be submitted here on Canvas. Do *not* put your name anywhere in the *.py file since this will be anonymously reviewed. 

The example of how the ouput should is the first screen shot i’ve added. the next 2 screen shots are how the assignment is graded.

Additional requirements/specs:

  • the program should have at least 3 flash cards
  • you should choose hints and answers other than those that are shown in the demonstration video
  • your cards (the hints and answers) should be hard-coded inside of your program (you do not want to have to input the cards in your program each time it is run, and, when someone else runs your program they will be able to see new flash cards that they have not seen before)

Hints/Tips:

The flow of the program is that we iterate through the deck of flash cards (i.e. the linked list), and remove a card (i.e. node) when it has been answered correctly twice. Thus, iterating over the linked list, keeping track of correct answers, and stopping when the list is empty, is 90% of the task here. Try to push as much functionality into your flash cards (nodes), and deck (list) as possible. That way the main part of your program can be very short and simple. 

The python function, “input()” will be helpful. Here is how it could be used in this program:

answer = input("ENTER 'S' FOR STACK, 'Q' FOR QUEUE', OR 'L' FOR LIST")

Security Architecture and Design solution as a diagram or diagrams with annotations

Length: Minimum of 900 words

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Your work over the next 8 weeks will lead-up to your ability to represent an enterprise security architecture solution as a diagram or diagrams with annotations. The project involves depicting a Security Architecture for one of the following businesses: 

· Financial (Bank, brokerage, Insurer, etc.) 

· Hospital/Medical Services 

· Pharmaceutical/Chemical 

· Social Media Company 

· Energy Company (Electrical Utility, Oil Company, Solar, Wind, etc.) 

· Manufacturer (Automobile, Computer, Consumer Electronics, etc.) 

Respond to the following:

· Identify the business type you have selected for your paper.

· Provide a brief overview of the business

· Provide the goals and approach to the project

· Architectural diagrams and annotations 

Submission

Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. 

Check your work and correct any spelling or grammatical errors. 

Include at least two APA most recent references.

Facial Expression Recognition

Write a final paper on Facial Expression Recognition with including these topics.

Introduction

History

Types of comparisons in Facial Recognition

Components of Face Recognition

How Face Recognition Works

Face Recognition Techniques

Popular Face Recognition Algorithms

Databases

Advantages and Disadvantages

Sample of Devices

Conclusions

discussion_week5

Excel is probably the most popular spreadsheet software for PCs. Why? What can we do with this package that makes it so attractive for modeling efforts?

What are the common business problems addressed by Big Data analytics?  In the era of Big Data, are we about to witness the end of data warehousing? Why?

wireless communication

Topic: modern day attacks against wireless networks

Prepare a report on your  topic from Week 2 with a minimum of 2000 words, 

References (10 minimum). You may use resources from the APUS Online Library, any library, government library, or any peer-reviewed reference (Wikipedia and any other publicly-reviewed source are not accepted).

Practical connection assignment

Subject : Business Intelligence

 Job : Software Developer (java)

it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:
Provide a reflection of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

 

Requirements:
Provide a 500 word (or 2 pages double spaced) minimum reflection.
If supporting evidence from outside resources is used, they must be properly referenced and cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

databases for organizational security

 Considering the importance of data in organization, it is absolutely  essential to secure the data present in the database. What are the  strategic and technical security measures for good database security? Be  sure to discuss at least one security model to properly develop  databases for organizational security. Create a diagram of a security  model for your research paper.

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at  least two scholarly journal articles to support your positions, claims,  and observations, in addition to your textbook. The UC Library is a  great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.