Algorithms and Applications

Please read and respond with 150 words or more. Be sure to provide references.

  

Share with the class your experience with this module—what is easy, and which topics/concepts you are struggling with. 

In our daily lives, we use sorting a lot. Please describe at  least two real-world examples of using sorting. How does the sorting  make your work or daily life easier? 

Security Awareness Training

 

Scenario

You have been in your role as the CIO for Premier University for almost one year. In that time, you have managed to hire a chief information security officer (CISO) to oversee Premier University’s information security program. The CISO is working to address the university’s GLBA data safeguarding requirements that you previously provided to the Premier University president.The CISO notes that guidance from the Department of Education Office of Federal Student Aid in 2016 recommends that higher education institutions use NIST SP 800-171 to protect the confidentiality of the student financial aid data that the institution uses and stores.You recently notified the university’s president that information security awareness and training is a gap in the institution’s written information security program. Even though a high percentage of higher education institutions require mandatory information security awareness training for faculty and staff, the university president remains unconvinced that Premier University should require information security training.

Tasks

Using your knowledge of the circumstances of the data breach that the institution experienced over a year ago, guidance from the Department of Education Office of Federal Student Aid, as well as other sources you researched, write a persuasive memo to the Premier University president that argues that the institution should implement mandatory information security awareness training for all faculty and staff.For this part of the project:

  • Read the Department of Education Office of Federal Student Aid at https://ifap.ed.gov/dear-colleague-letters/07-01-2016-gen-16-12-subject-protecting-student-information.
  • Research the need for security awareness training for faculty and staff at public universities, such as the latest EDUCAUSE Information Security Almanac
  • Write a persuasive, professional memo that addresses the need for security awareness training.
  • In the memo, include any sources you consulted.

DSRT topic

Information technology in the workflow of business processes is the topic

In a minimum 5-pages, develop an introduction where you clearly explain the overall research topic, literature gathering process, and the scope and organization of the literature review. The introduction should conclude with a paragraph that describes the sequence of the literature you will include and the literature analysis process. After the introduction, you should incorporate possible headings/subheadings that you plan to cover and include at least 20 scholarly references.

Deadline is in 3hrs

everything should be in apa format

and can i have turnitin report

Leveraging Search Technologi

  Leveraging Search Technologi

Google is the world’s premier search engine with more than 60,000 searches made every second, which equates to between five and six billion searches on any given day. As a result, the company is highly profitable earning around $100 billion in advertising revenue each year.

Research an organization located in the Kingdom Saudi Arabia and discuss the following:

· What type of search engine technology is the company using?

· Discuss the benefits the company is gaining from using that technology?

· What sort of metrics does the company use to measure the success of the utilized search engine technology?

· What other metrics might the company consider using to measure the success of the utilized search engine technology? Why?

Required:

1. Chapter 6 in Information Technology for Management: On-Demand Strategies for Performance, Growth, and Sustainability

2. Wei, L., & Na, C. (2020). Personalized recommendation algorithm based on improved trustworthiness. 2020 International Conference on Robots & Intelligent System (ICRIS), 526–528.

3. Drivas, I. C., Sakas, D. P., Giannakopoulos, G. A., & Kyriaki-Manessi, D. (2020). Big Data Analytics for Search Engine Optimization. Big Data and Cognitive Computing, 4(5), 5.

Recommended: 

Chapter 6 PowerPoint slides

 requirements:

  • Be 4-5 pages in length
  • Use APA (7th ed) style guideline
  • Support work with course material concepts, principles, and theories from the textbook and at least seven scholarly, peer-reviewed journal articles

Startup Project

Guided Project: E-Commerce Business Plan (Part 1)

*********Startup Idea is “Local Dog Treats Delivery Service”******

Link: https://www.ecommerceceo.com/ecommerce-business-plan/

  • Select a startup (“Local Dog Treats Delivery Service”). You must decide if you are marketing/selling a product(s)/services(s).
  • Develop and submit a 1-1.5 page draft  business plan document addressing the topic “Your Value Proposition” for your startup. 
  • Your document should be written such that anyone reading your business plan is able to  understand how you considered/evaluated/addressed and accounted for and incorporated this weeks element. Your submission  must address the element identified above and only that element.  

Your word document should have the following;

  • Title page, with your name, class, date, and assignment identifier
  • Body of the paper, draft submission (1-1.5 pages) double spaced, 12 point font, New Times Roman, 1 inch margins all sides.
  • References, if used,  should be identified/listed on a separate page (last page of submission). All references must follow APA format.

———————————————————————–

Guided Project: E-Commerce Business Plan (Part 2)

*********Startup Idea is “Local Dog Treats Delivery Service”******

  • Access and use the following article…
  •  Link: https://www.ecommerceceo.com/ecommerce-business-plan/
  • Develop and submit a 1-1.5 page draft business plan document addressing the topic “Planning Your Business Model” for your startup that you identified in Week 1. 
  • Your document should be written such that anyone reading your business plan is able to  understand how you considered/evaluated/addressed and accounted for and incorporated this weeks element. Your submission  must address the element identified above and only that element.  

Your word document should have the following;

  • Title page, with your name, class, date, and assignment identifier
  • Body of the paper, draft submission (1-1.5 pages) double spaced, 12 point font, New Times Roman, 1 inch margins all sides.
  • References, if used,  should be identified/listed on a separate page (last page of submission). All references must follow APA format.

—————————————————————————–

Final Project Requirement Overview

  • Develop and submit a 8 -12 page business plan for your startup (Local Dog Treats Delivery Service). Page count does not include title page, table of contents and References page. Your final submission will also include your input for addressing the final topic of “Financial Management” for your business plan.
  • The final business plan submission must account for each of the elements listed below
    • Week 1: Your Value Proposition
    • Week 2: Planning Your Business Model
    • Week 3: Market Analysis
    • Week 4: Marketing and Sales
    • Week 5: Choosing the Right Technology
    • Week 6: Products and Services
    • Week 7: Financial Management 

Instructions

  • Review, Edit and Proof read your draft submissions for each element in building your business plan and finalize them
  • Put your previous business submissions in order
  • Generate a References page “as required,” and place at the end of your document 
  • Generate a title page ensuring you include all the elements identified below.
  • Generate a table of contents for your document
  • Proof read your paper ensuring it meets the formatting guidelines listed below and is free from spelling and grammatical errors. Ensure all references used in your paper are properly cited per APA guidelines.
  • To verify you have addressed all elements and have them in the proper order access and use the following article How to Make a Winning Ecommerce Business Plan for your Startup (Links to an external site.)   by clicking the embedded link or the link below.

Link: https://www.ecommerceceo.com/ecommerce-business-plan/

Read and use this article to help you develop your business plan by considering the following elements:

Your Business Plan (in final form) will be a word document and should meet the following criteria;

  • Double spaced, 12 point font, New Times Roman, 1 inch margins all sides
  • Title page, with your name, class, date, and assignment identifier
  • A table of contents
  • Body of the paper  ( 8-12 pages) 
  • References  should be identified/listed on a separate page (last page of submission). All references must follow APA format.

Project Paper (4 pages)

Project Part 1: Active Directory Recommendations

Scenario

Assume you are an entry-level security administrator working for Always Fresh. You have been asked to evaluate the option of adding Active Directory to the company’s network.

Tasks

Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:

1.  System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users?

2.  How will the procedures for making changes to the user accounts, such as password changes, be different in ActiveDirectory?

3.  What action should administrators take for the existing workgroup user accounts after converting to Active Directory?

4.  How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers [SIDs].)

Required Resources

§  Internet access

§  Course textbook

Submission Requirements

§  Format: Microsoft Word (or compatible)

§  Font: Times New Roman, size 12, double-space

§  Citation Style: APA

§  Length: 2 to 4 pages

Self-Assessment Checklist

§  I addressed all questions required for the summary report.

§  I created a well-developed and formatted report with proper grammar, spelling, and punctuation.

§  I followed the submission guidelines.

C++

  

· [All concepts covered by previous projects]

· Repetition control structure

o The do.. while/while statements

o The for statement

· Input validation

o Use a repetition control structure for EACH user input

Project Description

The BlueMont chain hotels have 4 different types of room: 

Single room: $60/night

Double room: $75/night

King room: $100/night

Suite room: $150/night

The size of the hotel chains in different locations may be different in terms of the number of floors and the type and the number of rooms on each floor. 

You are required to write a program that calculates the occupancy rate and the total hotel income for one night and displays this information as well as some other information described below. 

The program starts by asking the location where this hotel chain is located and the number of floors in the hotel. The number of floors may not exceed 5. The User then enters the total number of rooms for each floor. The program then asks specifically the number of occupied rooms for each room type on this floor. The total number of rooms on each floor may not exceed 30 and the program should check that the total number of occupied rooms on each floor does not exceed the total of rooms on that floor. 

After the information is entered for each floor, the program calculates the following:

– Hotel income (based on the room type and its rate),

– The total number of occupied rooms,

– Total number of the uncopied rooms,

– The rate of occupancy,

– Floor number with the minimum number of rooms. (Assume no two floors have the same number of rooms).

– A message to improve the occupancy rate for the occupancy rate of less than 60%.

– Programmer’s full name

– Project number

– Project due date

Project Specifications

-Use constant variables to hold room rates, max and min # of floors and rooms. 

-The program should continuously ask for the correct floor number if it is not within the range of 1 and 5.

-The program should continuously ask for the correct number of rooms for each floor if it is not within the range of 1 and 30.

-The program should repeat the process of asking the number of rooms on the floor and number of occupied rooms if the total number of occupied rooms exceeds the total number of rooms on the floor.

Refer to Sample outputs for more clarification.

research paper and ppt on on 5 conference papers-cloud computing in software development

topic – cloud computing in software development

you need to write 5 pages in total on 5 research papers which i will be providing and also make a powerpoint on it(15-20 slides)

need detailed work

  

research paper: The paper should have the following information. 

· Title

· Introduction/Motivation

· Related work with brief overview of design, evaluation, and significant results for each paper.

· Conclusions and future work

· Reference 

Presentation:

The presentation should include the following information related to your selected topic. Each paper has about 3 slides.(total 15-20 slides)

· Introduction/Motivation

· Related work with brief overview of design, evaluation, and significant results for each paper.

· Conclusions and future work

· Reference 

BI wk 3

Understanding that you cannot simply overwrite previously deployed smart contracts, contrast approaches to deploying traditional applications and blockchain apps. Does blockchain make deployments easier or harder? Are there any potential risks when deploying blockchain apps that either don’t exist in traditional environments or aren’t as prominent? What should a development organization do differently to mitigate these risks?

  • Contrast approaches to deploying traditional applications and blockchain apps.
  • Explain whether blockchain make deployments easier or harder.
  • Identify any potential risks when deploying blockchain apps that either don’t exist in traditional environments or aren’t as prominent.
  • Describe what a development organization should do differently to mitigate these risks.

computer architecture chapter 2 jan 14

first video: https://youtu.be/m13Jrk-cUmo

second video: https://youtu.be/eE69LKO4dCQ

Introduction

Before the 1950s, “computers” were human, they were not machines. The first human computers appeared in the mid-1700s when people wanted to solve big, complex problems by approximation and repetitive solutions, such as determine when Halley’s Comet would return. Scientists realized that they could break complicated calculations apart so that a team could work on them. Human computers also adopted Industrial Revolution methods such as specialization, division of labor, and mass production. The field reached its peak during WWII. As electronic computers took over calculation-intensive work, some human computers became programming pioneers.

Answer questions on Human computers 

  • Why are mathematical computations important to human progress? Give examples throughout history and imagine technologies that can benefit from mathematical computations in the future.
  • What was the meaning of the word “computer” in the past and how is it different from the current definition?
  • How did new manufacturing strategies in the Industrial Revolution transform human computing? 
  • What effect did mainframe computers have on human computing?