Group Project: SWOT Analysis Presentation

3-4 slides that explains the SWOT Analysis process, SWOT Analysis Matrix that the Group
developed with Reference: 

1.Opportunities (how can the proposed solution help PEP achieve their strategic
goals?)
2. Threats (what are potential threats PEP is facing in meeting their strategic goals?

Cloud computing

Please discuss the following topics

  list four (4) topics and discuss. Use only 50-words per topic to discuss and present your answer.   The discussion questions this week are from Chapter 8   (Jamsa, 2013). Chapter 8 topics: 

  • List the pros and cons of virtualization.
  • List reasons why companies should virtualize.
  • List the benefits of blade servers.
  • Define and describe the hypervisor.

You are required to use at least two sources (besides your textbook) to answer the above questions.

wk 6 dis

  1. Discuss the key components of human resource management.  Pick at least four concepts from chapter nine and describe how these concepts interrelate to individual performance on a team.
  2. Review table 9.2 and select one of the dimensions listed, note why it was chosen and how you relate to this behavior.  If you have a personal experience, please share.
  3. How do leaders select the best talent? What are some tools they can use to select the best-talent?

Exp19_Excel_Ch08_CapAssessment_Employee_Satisfaction

  Project Description:

You work as a data analyst for Camino Marketing, a U.S.-based web marketing company. You have been asked to conduct an employee satisfaction survey. As part of the survey, you will collect sample data to help provide insight into employee salaries, productivity within the three national offices, and to predict the growth of the New York office’s client base by 2025.

     

1

Start Excel. Download and open   the file named Exp19_Excel_Ch08_CapAssessment_EmployeeSatisfaction.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

2

Ensure the Employee Satisfaction   worksheet is active, then use the FREQUENCY function to calculate the   frequency distribution of job satisfaction in column D. Place your results in   the range G5:G9.

 

3

Enter a function in cell G12 to   calculate the standard deviation of column c.

 

4

Enter a function in cell G13 to   calculate the variance between salaries. 

 

5

Enter a function in cell G14 to   calculate the Covariance of the salaries and job satisfaction in the data   set. Note this is a sample of data not a population.

 

6

Enter a function in cell F17 to   calculate the correlation coefficient between employee salary and job   satisfaction.

 

7

Ensure the Data Analysis ToolPak   add-in is active. Use the Data Analysis ToolPak to create a histogram based   on the salaries in column C. Use the range I4:I9 as the Bin Range. Ensure   that Cumulative percentage, column labels, and chart output are included in   the results. Place the results in cell K4. Edit the result text in cell K4 to   display   Salary, if   necessary.

 

8

Ensure the Office_Data worksheet   is active. Use the Data Analysis ToolPak to perform a single factor ANOVA on   the range C3:E35. Place the results starting in cell G3. Be sure to include   column labels. Resize columns G:M as needed.

 

9

Create a Forecast Sheet that   depicts year over year growth in customer growth. Set the Forecast end year   as 2025 and place the results on a new worksheet named 2025Forecast.

 

10

Ensure the Customers worksheet   is active then create a scatter plot chart that places the Years on the X   axis and the Clients on the Y axis. Add a linear trendline to the chart that   also shows the Equation and the R-square. Add the title Customer   Growth.

 

11

Enter a function in cell E4 to   calculate the intercept of the linear trendline created in the prior step.

 

12

Enter a function in cell F4 to   calculate the Slope of the linear trendline.

 

13

Enter a function in cell G4 to   calculate the R-square of the linear trendline.

 

14

Enter a function in cell H4 to   calculate the Standard Error. 

 

15

Use the FORECAST.LINEAR function   in cell E7 to the total number of customers by the end of 2021. 

 

16

Complete your analysis by added   formulas in the range F7:G7 to calculate the high and low thresholds of the   forecast.

 

17

Save and close Exp19_Excel_Ch08_CapAssessment_EmployeeSatisfaction.xlsx.   Exit Excel. Submit the file as directed.

Computer Systems Architecture Assignment

 The article you chosen in your discussion should summarize the article in such a way that it can justify any arguments you may present in your assignment and should be different from the abstract.

This article summary should not be the only article researched for your assignment. You may (and should) have several other articles researched in order to fully answer your assignment. 

Chosen Article: Context-Aware Systems Architecture (CaSA)

References: 

Augusto, J. C., Quinde, M. J., Oguego, C. L., & Giménez Manuel, J. (2021). Context-aware systems architecture (CaSa). Cybernetics and Systems, 1-27. https://www.tandfonline.com/doi/abs/10.1080/01969722.2021.1985226?casa_token=003HURAgTjQAAAAA:GpZ6w1o8EfipsPTh14EQ14lLGn4X_UFASPsvGw116akSaIWxRCtCO4SbtR_ekhAEMnM39e7uIm2EMapX

Note: In addition to your researched peer-reviewed article, You must include an example of the article researched as it is applied by industry (company, business entity, and so forth).

400 words with intext citations and 4 references.

Real time operating systems Programming

There are many web pages, tutorials, and books that provide guidelines for installing
ROS. Here are two useful tutorials. 

https://docs.ros.org/en/foxy/Installation/Ubuntu-Install-Binary.html
Youtube series:
https://www.youtube.com/watch?v=bFDfvKctvV8&list=PLRE44FoOoKf7NzWwxt3W2taZ7Bi
WyfhCp     

https://cse.sc.edu/~jokane/agitr/

research on cyberlaws on social networking sites

Social networking sites are continuously gathering data about users on their sites and selling them to other businesses such as advertisers. Is this ethical? Is this legal? Are current cyberlaws adequately equipped to handle and regulate this practice? 

This assignment should be  300-400 words and in APA format and with references. NO plagiarism please.