short answer

 

As addressed in the readings, technology has the potential to both solve global social problems and make them worse. For example, technological devices that can interact with the environment have the potential to reduce world hunger by helping to increase food production in developing countries. However, some technological advancements—such as weapons of war and automated assembly lines—can threaten life through armed conflict, and pollution of the environment can increase poverty by eliminating jobs.

  • Do advancements in technology pose any direct and/or indirect threats to the global environment? Choose one advancement and provide two examples of direct or indirect threats in your explanation.

EH week 13

 

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication.

Prof writing & proposal Devel(DSRT) new question

 

Do a little bit of research on grant writing versus academic (scholarly) writing. 

Then…

1) Write a one sentence statement that describes the difference in grant writing vs. scholarly writing.

2)  Copy and paste this link in your browser https://walmart.org/how-we-give/local-community-grants and read about local community grants from Wal-Mart. Type up your grant application using the link, copy  the online application and paste it in the discussion forum (screenshots are okay). The amount of the award ranges from $250 – $5,000 and the application is very short.  Please apply for this grant for your school or organization if you can. 

3) Research a need in your community and write a 300 word needs section in an academic writing style, citing your references in APA format. Copy and paste into the discussion forum. 

4) Write One paragraph describing the mock dissertation topic (see list of topics below) that you will write about in this class and include your research question. Use academic writing style and standard. There is no word limit. 

  • Note: Topics chosen in this course cannot be used in your actual dissertation that you will complete in the future.
  • Students must choose from the listed topics of their school/program:
    • Business Students:
      • How Corporate Policies And Practices Enhance Company Competitiveness
      • Corporate Social Responsibility (CSR) and how it Affects Customer Loyalty
    • IT Students:
      • Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning
      • Using Data Science Techniques To Enhance Data Security
    • Leadership / Educational Leadership Students:
      • Leadership Impact on Organizational Performance
      • The Influence of Visionary Leadership on Change Management and Implementation

5)  Reply to two other student’s posts. 

Cloud Computing week 4

Discussion Topic:  

Define and describe both SSO and IDaaS(Identity as a service).

Paper:  

For week 4, you will write a paper on SAML and FIDM. The following are the items to discuss in the paper:

  • Define SAML and describe its purpose.
  • Define and describe provisioning.
  • Define and describe FIDM.
  • List factors that make mobile ID management difficult.

Paper requirements:

  • Minimum 900 words (excluding title page, table of contents, and references pages)
  • Minimum of 3 references
  • Format your paper consistent with APA guidelines
  • When submitting the assignment, please ensure you are submitted as an attached MS Word document.

 

Required Reading

1. Jamsa – Chapter 5

2. Erl – Chapter 10 (Sections 10.5 through 10.8 Only)

References:

Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing: concepts, technology, & architecture. Upper Saddle River, NJ: Prentice Hall.

Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning.

Options Menu: Forum

Information Governance week 5-2

 Discussion Week 5 – The Role of Blockchain in Information Governance Options Menu: Forum

While blockchain is successful with cryptocurrencies, it is also beneficial for information governance in businesses. After reading this article  (https://www.everteam.com/en/role-of-blockchain-in-information-governance/), discuss at least two ways you foresee blockchain transforming information governance in businesses. Be sure to utilize sources and provide at least one detailed example of your findings.

— 600 words

Presentaion 7

 

Class Discussion Topics
  1. What are the different types of direct access storage devices?
  2. Which type of DASD do you prefer for storing records and why?  
  3. Discuss the different types of device handler seek strategies. Which strategy do you think is the best? Why?   

prepare the PowerPoint slide with few diagram and explain on the note with the link that is used

2 page each 

flash card program python

the aim of this first assignment is to implement a Linked List that is able to hold and operate on more complex data (than just one number, string, etc.). 

Specifically, the task is to create a set of flash cards. The “deck” of flash cards can be thought of as a linked list. Each flash card should have a hint (e.g. “an ADT that typically has push and pop operations”), and then will prompt for an answer from the user. The program should go through the deck of flash cards (i.e. traverse the linked list). 

See the video here for a short demonstration of what the program should look like when it is run:

What to hand in?

A single *.py file should be submitted here on Canvas. Do *not* put your name anywhere in the *.py file since this will be anonymously reviewed. 

The example of how the ouput should is the first screen shot i’ve added. the next 2 screen shots are how the assignment is graded.

Additional requirements/specs:

  • the program should have at least 3 flash cards
  • you should choose hints and answers other than those that are shown in the demonstration video
  • your cards (the hints and answers) should be hard-coded inside of your program (you do not want to have to input the cards in your program each time it is run, and, when someone else runs your program they will be able to see new flash cards that they have not seen before)

Hints/Tips:

The flow of the program is that we iterate through the deck of flash cards (i.e. the linked list), and remove a card (i.e. node) when it has been answered correctly twice. Thus, iterating over the linked list, keeping track of correct answers, and stopping when the list is empty, is 90% of the task here. Try to push as much functionality into your flash cards (nodes), and deck (list) as possible. That way the main part of your program can be very short and simple. 

The python function, “input()” will be helpful. Here is how it could be used in this program:

answer = input("ENTER 'S' FOR STACK, 'Q' FOR QUEUE', OR 'L' FOR LIST")

answer the question by reading articles.

Stage 1: Your initial post should contain the following information:

  • What did you learn from the two readings provided in this module? Summarize your answer in no more than 6 sentences. (5 points)
  • Identify two posts from FlowingData.com (Links to an external site.). which topics are related to business management. Provide the title of the post and the direct URL to the post. (5 points)
  • What are the business problems the two posts trying to address? (10 points)
  • Explain how visualization helps you to understand the two problems. (10 points)

All stage 1 initial post must be submitted during the first week after this module is open by Sunday, in order for your classmates to read and provide feedback in the following week. 

Stage 2: Respond to TWO peer posts  starting During the second week of this module. (10 points)

  • You should provide comments on or share your thoughts about peer students’ understandings of BA and visualization.