Anthropology of Language and Communication

 

The anthropologist Margaret Mead suggested that there should be an international writing system so that people of different cultures and languages could communicate. For example, most of the Western world uses Arabic numbers (1, 2, 3, 4) – even though they are called different things in different languages (e.g. one, uno, un, ein).

In today’s world, can we think of emojis in a similar way? Can we use emojis to communicate a message to those who don’t speak our language or come from a different culture?

For this discussion you will create a two sentence message using emojis.

Go to the website https://emojikeyboard.io/

Create a two-sentence message using any of the emojis available. Along the bottom of the page there are many different categories of emojis to choose from. Once you complete your message on the website, you should then cut and paste it in the discussion board as your initial response. Please don’t write anything else in the discussion that may help your classmates translate your message.

For your first reply to a classmate – select a classmate’s post that has not already had a reply. See if you can translate their emoji message. Please discuss why you translated it the way you did using examples of the symbols they posted. How do you think your culture (or subculture) affected the way you translated the message?  

For your second response – reply back to a person who translated your message. Let them know how close they came to your original message. Discuss what may have gotten lost in translation and why. For example, did they take a symbol literally, when it really has another more common figurative meaning? Using the learning resources this week, what are the cultural reasons that they may have either gotten or missed your message? Discuss how this exercise relates to the issue of language and culture? How do you think culture affects how people may translate symbols, or other types of messages?

**For this discussion, the rubric will be switched. Your replies to classmates will be graded as your initial post since that is where you will be writing most of your discussion this week. Your emoji message will be graded as a reply to a classmate in the rubric.

Provide your initial post by 11:59 pm on Sunday. Your initial post should be at least 200 words in length, excluding the discussion prompt and the references. Please use in-text APA citations within your post as well as full APA references at the end of your post.

Computer Science – use of social media

 

  • Analyze how social media provides a competitive advantage for an organization’s Web strategy, given that many companies have started hiring personnel to handle Facebook and Twitter posts. Explain why a robust Web presence matters to company executives.
  • Imagine that you are the CIO of a well-established company. State three compelling reasons why your company should utilize social media to attain a competitive advantage and explain your answer.

DISCUSSION

 In the course, we are making a special focus on Microsoft Office using MS Word and MS PowerPoint.

It is important or not to study MS Word and MS PowerPoint in the course? Argument your answer. 

How you can use this two application software in your professional future?

 

Discussions: How will be evaluated.

1- The discussion will have a value of 100 points

2- Your opinion about the subject will be graded as 70%

3- Your criteria for another student’s opinion will be 30% (minimum 2)

So, you will need to have a minimum of three posted in the discussion. 

Your arguments will be very important.

Do not copy answers from the Internet. 

The answers should be your own opinions.

Comments : 

 I believe it is important to study these application software. Almost most if not all companies, schools, jobs use these software. It is easier for them to use the software because it can be sent and used anywhere in the world. You are better able to organize and it is always easier to open and change if something is wrong or needs to be edited. It is very important to use because there always more to learn and it is a very good teaching tool to use. In schools Microsoft Office has been used and the quality for presentations has been better and the different tools to use while using MS Word is great. The different designs are awesome to use to spice up the words or the designs on either applications. So in my opinion yes, I think these software are very important. 

 

In the modern days those two tools offer for Microsoft office Microsoft Word and Microsoft Power Point are very important and help full. You can used for personal purpose and business too, in the personal purpose for example with Microsoft Word application you can write a report or redacting a complete investigation for any of your classes, or a resume for job application.

With Microsoft Power Point application is very help full for example in your job, because you can make and organized in slides a presentation of a new project, in administration department a complete and detailed budget month by month of the all company or a specific department.

The fact is that these applications are very helpfully because like I said before can help you a maintaining and organized all your data in same place your computer.

Discussion#5 Week 8-2 – Information Governance

Topic:

 We learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today. In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective. The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

Question:

 With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation? Support with references.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

No Plagiarism***************

Research Standards

 Standards Organizations may be used for reference to complete this assignment. 

Instructions

Write a fully developed paper in which you: 

  1. Select one of the working groups in the IETF or IEEE and briefly summarize what this group is working on.
  2. Justify the need of the IEEE 802 standard used in networking.
  3. Evaluate the three standard organizations including IEEE, ISO, and  ANSI to determine the most important for communication technology.
  4. Take a position on the need for a federal regulating body of standards such as NIST. Include supporting evidence to justify your opinion.
  5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

S1/4 Discussion

  1. Review Chapter 13 in Principles of Information Systems. 
  2. In the discussion linked below, respond to the following prompts:
    1. Discuss the concerns and issues of privacy and compliance with the interconnected world of the internet.
    2. Discuss the various laws and regulations associated with cybercrime. Select two regulations or laws and provide an in-depth description. What are the challenges of enforcing such laws or regulations? Based on your understanding of the law or regulation, how could it be more completely and efficiently enforced?
    3. Do these laws and regulations need to be enhanced (regulation vs. net neutrality)? Explain why or why not.
  3. Your initial post should be a minimum of 300 words 

CMGTCB/555 Competency 2 – Reflection

Analyzing the Quality User Story 

​​​​​​​As a project manager, you are most likely aware that depending on the type of project and the SDLC applied, system requirements may be developed differently. For example, many current projects use the Agile SDLC and build requirements based on user story format. A user story is essentially a use case that describes how a specific user would interact with a system. An example of a user story tied to a customer using an ATM might be, “As a customer of the bank, I need to be able to access my account from an ATM to understand balances across all of my accounts.”

Reflect on the following:

  • What are the attributes that comprise a quality user story, and why are these attributes necessary? Consider the result of poorly written user stories.
  • Provide an example of what you would consider to be a quality user story. This example can be from experience, from a company you know of, or one that you create.

Driving User Adoption of New and Changed System

As a senior systems analyst or project manager, you are most likely aware that implementing a new system, or modifying an existing one, can create organizational change. This change can impact how employees work, how information technology teams support the business, and even how customers interact with the organization. Ensuring users adopt new systems or changes to existing systems is critical, as implementing a system no one will use becomes a wasted investment. User adoption should be considered by the business stakeholders no later than during the design phase. 

question

  1. What are the characteristics of anomaly detection? 
  2. What are the detection problems and methods?
  3. What are the statistical approaches when there is an anomaly found?
  4. Compare and contrast proximity and clustering-based approaches.

12a

Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.