Flowchart Illustration

  • Review the attachments then create a FLOWCHART and pseudo code for the problem below!

Use the information below to solve the problem using flowchart symbols to illustrate how you would complete your program. You may use Microsoft PowerPoint® for your flowchart Make sure that you understand the requirements below. We are going to use this assignment as a starting point, and we are going to add to it in the next weeks.

  • You are going to shop in the supermarket near you. You need to calculate the total expenses (what you purchased from the supermarket plus commuting expenses).

This week you are going to purchase ONE item only.

  • Build a flowchart to calculate total expenses, given/input the shopper name, shopping date supermarket name, item name, item price, quantity (The formula to calculate the total is Total = Item price * Quantity.) Display/output shopper name, shopping date, supermarket name, item name, price, and total. (Do not add any features such as taxes, discount, … )
  • Add commute expense and type such as taxi fee, bus, your own car, and so on.
  • Use your own values to test the flow. The values should not be part of the flowchart. The flowchart is a blueprint for any programming language and for a wide range of input values. Use variable names that are related to the task.

CIS 415 Unit 1 BMW Case Study

Your paper will be at least 3 double-spaced, APA formatted pages not including title and reference pages.

Follow PDF and these are the question also i will send you a link to the book ch 1 

1. Other than selling more cars, what potential benefits do connected-car technologies offer auto makers such as BMW in terms of enhancing long-term customer relationships?

2. What responsibilities does BMW have to its customers regarding the data it captures via the various con- nected car technologies that it builds into its cars?

3. Visit a BMW showroom and spend time with one of the “product geniuses” to learn more about the latest BMW technological innovations. Write a brief para- graph or two providing your critique of these innovations.

cyber security threats in a Ghanaian small-scale organisation. The primary focus is to develop a cybersecurity culture framework and evaluate its impact on Ghanaian small-scale organisations.

Analysis of landscape threats can be described as analytic data originating from the collection of historical cyber security attacks, trends, and vulnerabilities identified when technology continues to advance as well as cyber-attack methods. Because new technology is being used to develop better methods for dealing with cyberspace threats, attackers are also developing new strategies for breaking into company computers and organizational systems via the internet. As a result, as cybercriminals gain more knowledge, changes in technology and vectors of cyberspace attacks occur.

Tech Brief on Current Alerts

 

Assignment Objectives:  Choose an Alert closely related to the weekly topic and write a concise summary using the template.

Assignment Directions: 

  1.  The US Government Cybersecurity & Infrastructure Security Agency (CISA) provides timely notification to critical infrastructure owners and operators concerning threats to critical infrastructure networks. Each week, review the National Cyber Awareness System website.   
  2.  Choose a topic closely related to our weekly material and write a concise summary using the organizational template and example

    Organizational Template.docx 

Big Data Analytics

 Answer Below two questions with APA format, In-Text Citations, 3 + latest References, plagiarism-free., 300 + Words. 

What are the common business problems addressed by Big Data analytics? In the era of Big Data, are we about to witness the end of data warehousing? Why? 

Activity 4A- Project Process

Part 1

Describe a complex project that could be completed using a Hybrid Model.  Describe the hybrid model? Why do you feel that this model is better for this type of project? What would be the impact of completing the project using a different approach? 

Part 2

Case Study Link:Going with the Flow: Agile Development at Dell | Harvard Business Publishing EducationCase Study Overview: In February 2017 the Team Project Manager and Flow Project Coordinator for Dell Technologies-Limerick (Ireland), is preparing for a review with Dell’s Systems and Processes Improvement board, early in a transition from the use of one agile software development method (Scrum) to another (Flow, which applies lean manufacturing techniques to software engineering). The new manager has been on board for less than six months. With ten years’ prior software development experience in Brazil, he moved to Ireland when hired by Dell. Dell is midway through its attempts to transform from a manufacturing-heavy strategy to an IT-supported service-heavy strategy; its recent acquisition of EMC is an important step in that direction, and executives expect Flow will help globally-distributed software developers produce higher quality code, faster, in follow-the-sun mode. The Flow coordinator/champion recognizes Flow is a complex innovation; it will take time and focus for busy software developers (who only recently mastered Scrum techniques) to master new Flow techniques. The champion is also concerned that needed digital Kanban functionality (essential for supporting globally distributed teams using Flow) has not yet been approved or provided by the Dell IT organization in Texas; this and other obstacles are impeding the developers’ transition to Flow. Keen to demonstrate his commitment to help Dell achieve these aims, he worries that some executives expect performance improvements sooner than teams can realistically deliver. He seeks to persuade executives to be both patient and helpful. As he plans his 20-minute presentation for the next day’s meeting, he is told to keep his remarks to executives simple: highlight no more than three messages.Questions:

  1. What should Ferreira do next to accelerate Flow Adoption? 
  2. What three points should Ferreira make at the 7 Feb 2017 SPI Board Review?
  3. Review the seven lean manufacturing principles and demonstrate how Ferreira used them when implementing Flow. 

Part 3

Case Study Overview:

In conventional business and government megaprojects–such as hydroelectric dams, chemical-processing plants, or big-bang enterprise-resource-planning systems–the standard approach is to build something monolithic and customized. Such projects must be 100% complete before they can deliver benefits: Even when it’s 95% complete, a nuclear reactor is of no use. On the basis of 30 years of research and consulting on megaprojects, the author has found two factors that play a critical role in determining success or failure: replicable modularity in design and speed in iteration. The article examines those factors by looking at well-known megaprojects, both successful ones, and cautionary tales.

Case Study Link

Better Project Management | Harvard Business Publishing Education

Using the megaproject case study  answer the following:Build and describe a complex model that can be used to manage the mega-project described in the case study linked above.  Your model should include the following:

  1. Overview of the process
  2. Pictorial design of the process
  3. Description of each phase
  4. Explanation as to why this process will work when managing megaprojects. 

Text-

Title: Effective Project Management 

ISBN: 9781119562801 

Authors: Robert K. Wysocki 

Publisher: Wiley 

Publication Date: 2019-05-07 

Edition: 8th Edition

I believe

I want a paper that will focus on one of your beliefs or values and discuss how this values has affected your life. 

Quiz for Electronic Document and record Management-IT

1-Information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual

PII.

Paradata.

Metadata.

EDMS.

2-Which of the following items is NOT the component of Open Government?

Transparency.

Privacy.

Public participation.

Collobartion between the public and the government.

3-Process of obscuring or removing sensitive information for release

A-Records management
B-Content management
C-Information redundancy
D-Redaction

4-Agroup of authoritative records from which information is retrieved for a given identifier

PII
Data at rest
System of record
Access control

5-schedule lists the length of time each record will be retained as an active record in the system.

Metadata
Paradata
Retention
Classification

6-Which of the following is an example of PII?

SSN
Driver license
Medical records
All of the above are considered as PII.

7-Which of the following items is NOT regarded as unstructured data?

E-mail
Instant messaging
Web data
Database files

8-In the Amex vs. Vinhnie Case that we discussed in class, what rationale(s) the Judge used to decide that the evidence provided by Amex was not admissible to the court?

Amex failed to provide  adequate information about its computer policy.

Amex  failed to show how changes to the data were recorded or logged

Amex could not corroborate that their backup practices were in place.

All of the above

9-“Big Data” is a term used when there is a large amount of:

Unstructured data
Information transparency
Deduplication
MS Office documents

10-A record that is essential for the functioning and survival of an organization after an emergency:

electronic record
vital record
duplicate record
sensitive record

11-Information about a document, apart from the thing itself

Paradata.
Unstructured data.
Electronic document.
Metadata.

12Prediction of how a third party will behave

Trust.
Transparency.
Data integrity.
Access control.

13-Which of the following aspects is NOT the functionality requirements of EDRMS?

Compliance.
Software testing.
Content Management.
Creation and transfer.

14-The purpose of a digital signature is to:

validate that the message was sent by  the purported sender.

ensure that the message was delivered to the purported receiver.

have an electronic version of the signature.

encrypt the document.

15-Security features that control who can access what type of resources

Intrusion detection system.
Proxy Server.
Access control.
Firewall.

16-Process of developing decision recommendations based on insights derived through the application of statistical models and analysis of the data

E-discovery.
Encryption.
Analytics.
Validation.

17-Refers to all data in computer storage while excluding data that is traversing a network or temporarily residing in computer memory to be read or updated

Transparency.
System dependence.
Data at rest.
Information redundancy.

18-Respecting the desires of individuals as compatible with the aims of the larger community is the definition for:

security.
integrity.
Privacy.
authenticity.

19-BYOD (Bring Your Own Device)was coined to describe business acceptance of the use of personal devices to conduct business.

True.
False.

Pain Job Estimator

  

 Pain Job Estimator
A painting Company has determined that for every 115 square feet of wall space, one gallon of paint, and eight hours of labor work will be required. The company charges $20.00 per hour for labor. Write a program that asks the user to enter the square feet of the wall space to be printed and the price of the paint per gallon. The program should display the following data:
1- the number per gallons of pain required.
2- the hours of labor required
3- the labor charge
4- the total cost of the paint job

Submitted: 5 hours ago.

Category: Programming

Status: AWAITING CUSTOMER ACTION