easy and own words, Minimum Plagerism, need quick—–Resources provided

 

Compare and contrast  cat. 6 unshielded twisted pair (UTP), coaxial, and single mode fiber  optic cabling types. Describe one or two of the advantages and/or  disadvantages associated with using each cable type for a business’s  network infrastructure.  Consider the (a) cost per foot or meter; (b)  termination/installation cost; (c) bandwidth; (d) cable  length/transmission distance; (e) end point devices (i.e., workstation,  wireless access point, switch, router, server, SAN, etc.); (f) use –  in-building horizontal or vertical; and (g) conversion or interface  equipment.  Be sure to support your information with the appropriate  citation(s).

The paper must use APA 6th ed., 7th printing formatting and contain a  title page, 3 to 5 pages of content, and a minimum of three  peer-reviewed references. 

Assignment Resource(s):

SE week 4 assignment

300 words and use the following link and citations 

Why is project scope management so challenging in IT projects? And What suggestions do you have for preventing scope creep in projects? Go to following PMI site  and review top 5 causes of Scope Creep for more information.

https://www.pmi.org/learning/library/top-five-causes-scope-creep-6675

Hands On Assignment 6

 

Instructions

Install Docker on a Linux VM. You don’t want to install it on your computer, because it will interfere with other functions on that computer. Open a Linux VM, set the network configuration to be NAT. Download and install Docker inside the Linux VM as an admin. The remaining exercises are to be performed inside the Linux VM. Open a terminal inside the Linux VM. The following exercises won’t run on Windows VM.

A few useful Docker sites: https://docker-curriculum.com/

(Q1): From the terminal, type in the following commands and take snapshots after running each command.

To validate the installation is correct, type

$ docker run hello-world 

(Q2): Run a Busybox container. The pull command fetches the busybox image from the Docker registry and saves it to the VM. 

$ docker pull busybox

(Q3): Find available docker images in your VM. 

$ docker images

Check that busybox container is  

(Q4): Run the Docker container busybox.  When you run the Docker image bosybox, Docker loads up the container and then runs a command in the container. When we run “docker run busybox”, there is no command, so Docker did nothing and exited.

$ docker run busybox 

$

If you provide a command after “docker run busybox”, that command will be executed

$ docker run busybox echo “hello world from Carlston”

Replace ‘Carlston’ with your name. That way I knew that you are running Docker by yourself. Take a snapshot.   

(Q5): Run the following command to check what containers are currently running. 

$ docker ps  

It should be no docker running. 

Run the following command to see a list of all containers that we ran. Notice the STATUS column shows that these containers exited a few minutes ago. Take a snapshot. 

$ docker ps –a  

Run the following local host command to see the difference with and without Docker. 

$ ps -a 

(Q6): Compare a Virtual Machine (VM), a Container, and a Sandbox based on the features shown in the following table.  

FeaturesTypes 

VM 

Container 

Sandbox 

Same OS as host OS 

Share data with host 

Data remains when the VM / Container / Sandbox is closed 

Additional OS overhead 

Performance 

Storage space 

Communication among the applications and host 

Security level 

Examples of applications 

Advantages 

Disadvantages 

rs

While this weeks topic highlighted the uncertainty of Big Data, the author identified the following as areas for future research.  Pick one of the following for your Research paper:

  • Additional study must be performed on the interactions between each big data characteristic, as they do not exist separately but naturally interact in the real world.
  • The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined.
  • New techniques and algorithms must be developed in ML and NLP to handle the real-time needs for decisions made based on enormous amounts of data.
  • More work is necessary on how to efficiently model uncertainty in ML and NLP, as well as how to represent uncertainty resulting from big data analytics.
  • Since the CI algorithms are able to find an approximate solution within a reasonable time, they have been used to tackle ML problems and uncertainty challenges in data analytics and process in recent years.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

What is an Information Technology Project?

Q1. The purpose of this assignment is to examine the components of a research article and help you identify guidelines for conducting critical analyses of published works.  Read the following article:

Rumrill, Fitzgerald, S., & Ware, M. (2000). Guidelines for evaluating research articlesWork (Reading, Mass.)14(3), 257–263.

Please use the article to answer the below questions: 

  • What is an Information Technology Project?
  • Identify & explain the major parts of a research paper.
  • Explain the difference(s) between qualitative vs quantitative research methods.
  • Why use Peer Reviewed journals?
  • Why are keywords used during the Literature Review process?
  • Why are project deliverables, limitations & deadlines an important aspect of project development?
  • Why use/apply APA Basic Citation Stiles in your writing assignments/research?
  • Why is Academic Integrity important (see syllabus)?
  • Explain the difference between plagiarism vs self-plagiarism?

Your assignment must follow these formatting requirements: 

  • Use at least three – five (3 – 5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.

There is no specific page limit for this assignment. Just try to justify the answer with reasonable word limit. May be 5-6 pages maximum. 

Q2. Identify and explain a specific business process. How might this process be automated with mobile technologies? How might it be completely redesigned? 2-3 Pages Maximum in APA format. 

Text Book – Title: Mobile App Development for iOS and Android  by Authors: Jakob Iversen and Michael Eierman. 

Read the attached paper carefully and write a research summary

Read the attached paper carefully and write a research summary ,in two sections  Overall summary What you would like to add or change to the conclusion section  This assignment should be in APA format, plagiarism free and have to include at least two references other than the paper. 1000 words minimum

Own words no plagarism

Hi Karen, 

In  the assignment, there are no words to “write down all program”.  I really have no idea what you are attempting to state.  You could benefit from working with the resources we have as it related to written communication.  

However, the course project due was to write and execute the queries listed and provide screen captures.  The work submitted did not include any of the queries listed. 

Query # 1
Write a SQL statement to produce output as follows: Student’s First and Last Name.

Query # 2
Write a SQL statement to produce output as follows: the Major of the STUDENT with no duplications. Do not display student names. 

Query # 3
Write a SQL statement to produce output as follows: First and Last Name of students who live in the Zip code 32828.   

Query # 4
Write a SQL statement to produce output as follows: First and Last Name of students who live in the Zip code 97912 and have the major of CS. 

Query # 5
Write a SQL statement to produce output as follows: First and Last Name of students who live in the Zip code 32826 or 33186. Do not use IN. 

Query # 6
Write a SQL statement to produce output as follows: the First and Last Name of students who have the major of Business or Math. Use IN. 

Query # 7
Write a SQL statement to produce output as follows: the First and Last Name of students who have the Class greater than 1 and less than 5. Use BETWEEN.
 
Query # 8
Write a SQL statement to produce output as follows: First and Last Name of students who have the Last name that starts with an M.
 
Query # 9
Write a SQL statement to produce output as follows: First and Last name of students having an o in the second position in their First Name.
 
Query # 10
Write a SQL expression to produce output as follows: display the Status for, and the number of occurrences that apply to each status. You must use the Count(*) function. You must show the result of the Count(*) function as CountStatus. Group by Status and output the results in ascending order of CountStatus.