Research-Brief

 The focus of this assignment is on understanding the need for a brief as part of the data visualization workflow.

a. Briefly describe a data visualization project (either real or fictional) that might be needed in your workplace. (If you are currently not working, feel free to create a fictional, business-based example.)

b. Consider that there is a preference by leadership in the organization to skip the creation of a brief and begin working on acquiring and preparing the data, then moving directly to creating visualizations.

c. Construct an essay that acknowledges the perspective of the organization in skipping the brief, but supports the necessity for preparing the brief before working with the data. Use reference-based content to support the argument. 

  • Minimum count – 1000
  • Minimum references – 3
  • APA alignment required

Objective summary

Assignment Content

  1. At this point, you have found a research article exploring your approved research question and you have learned how to find your 6 ‘ingredients’ during class .

    For this assignment:  You will use your research article from Week 4’s HW to write your first objective summary. 
    Requirements:

    • 15 pts, Cover/Title Page 
    • 70 pts, Objective Summary: W(5) H(1) — YOU MUST PUT THIS IN YOUR OWN WORDS 
    • 15 pts, References Page (you will only have one reference listed — the research article you are using.) 
    • Resources to help you:
    • Re-watch the class recording
    • See pp. 17-22 to read about objective summaries
    • See pp. 23-28 to read more about avoiding plagiarism

Week 14 Executive Practical Connection Assignment

 

Week 14 Executive Practical Connection Assignment

Course:  

  1. Cloud Computing (ITS-532-M21) 

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.
• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.Requirements:The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements. 

Training Guide

 Instructions

You’ve won the business! Faster Computing has agreed to the project. As the final stage of pre-implementation, you have been asked to produce a training guide that will demonstrate how to install Linux and provide an overview of several common commands, as follows:

(11.1.3: Install the software.) 

  • Use a hypervisor of your choice to install Linux. Many hypervisors are available, such as Oracle’s VirtualBox, which is a free download. In addition, as part of UMGC’s agreement with VMware, you can download VMware Workstation for free. See below for specific screenshot requirements. You should include at least 3 screenshots (e.g., disk partitioning, timezone selection, creating the default account). Each screenshot should be accompanied by a brief explanation of what you did.
    NOTE: It is not necessary to include screenshots of installing the hypervisor software.

(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)

  • Demonstrate command-line operations that will provide the following information:
    • A listing of files in a directory and common file attributes
    • The current directory (hint: also known as the present working directory)
    • Create a file, then copy it to a different directory
    • Create a second file and move it to a different directory
    • Remove the first file, as well as the copy you created
    • The manual page for a given command
    • Create a text file, then use an editor to modify the content. Then display the content of the modified file

(1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.)

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., ls, cp, mv, rm) in your documentation as well as in your screenshots. 

(11.2.1: Configure technology according to stakeholder specifications and requirements.)

  • Show running processes on the system. Demonstrate how to search for a specific process
  • Forcibly stop a running process

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., top, kill, -9, ps) in your documentation as well as in your screenshots. 

(13.1.1: Create documentation appropriate to the stakeholder.)

The deliverable for the final phase of the project is a written paper with screenshots. There is no minimum or maximum page requirement, but all of the requirements must be met.  Use the Training Guide Template to record your work. This section will be graded upon the overall usefulness of the training guide to the organization.

(11.3.1: Add and update systems as required.) 

This portion of the training guide helps determine your submission is unique.

Important Requirement

On the final screenshot, you need to open a command line and type in the following commands (without the quotes):

“date”

“echo CMIT391”

“echo ” (Replace your name here with your name)

The recommended format is to provide screenshots incorporated within the written narrative. The screenshots must all be your own. Screenshots from external sources are not permitted. You must include the specific screenshot listed above or your project will not be accepted.

(1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.)

The training guide must have a cover page, an introduction, summary, and at least 3-5 references.

(1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.)

Employ proper spelling and grammar. All Linux commands must be lower case.

(2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.)

In your conclusion of at least a paragraph, summarize why using Linux is beneficial for employees, management, and the organization as a whole.

How Will My Work Be Evaluated?

In this training guide, you will demonstrate how to install Linux and provide an overview of common commands for your client/customer. You’ll be combining your technical skills with effective communication techniques to provide learning resources for the client/customer.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension. 
  • 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal. 
  • 1.2.3: Explain specialized terms or concepts to facilitate audience comprehension. 
  • 1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience. 
  • 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions. 
  • 11.1.3: Install the software. 
  • 11.2.1: Configure technology according to stakeholder specifications and requirements. 
  • 11.3.1: Add and update systems as required. 
  • 13.1.1: Create documentation appropriate to the stakeholder. 

Article concerning “Legal Aspects and Digital Forensics”.

Please use Google Scholar (https://scholar.google.com) to search for an article concerning “Legal Aspects and Digital Forensics”.

Questions:

1. summarize the article and state your opinion of what occurred and what steps could had been done differently if any. 

2. How digital forensics relies on legal aspects in order to become more efficient and unbiased?

Paper requirement:

1. The paper must be in APA format.

2. Number of references should be at least 3. 

3. The length of the paper can be from 3-4 pages (excluding reference page).

4. No cover page needed.

5. Should cite references using APA style. 

Create an order menu as following.

Assignment 2 

Create an order menu as following. 

1. Filet-O-Fish…………………………………$2.00

2. McDouble……………………………………$3.50

3. Big Mac…………………………………….…$3.99

4. Cheeseburger……………………………….$2.99

5. McChicken…………………………………..$3.00

6. Soft Drinks…………………………………..$1.00

7. 1% Milk…………………………………….…$1.50

8. Premium Tea……………………………..…$1.00 

————————————————— 

Prompt a user to choose an item from the order menu, also ask the user how many of

the chosen item he/she wants. Then the program will generate a receipt. 

 

e.g. Filet-O-Fish x 2……………………………..$4.00 (@$2.00) 

       Sub-total………………………………………$4.00 

       HST 13%………………………………………….$0.52 

       Total…………………………………………….$4.52 

         

 

 

 

Computer and Number Systems

  

Computer and Number Systems 

1. (10 pt) You have been hired to develop a website-based sales system for a large international retail firm. List and describe at least four features that are specific to the Web design of your system and customer service important to consider if your system is to be successful at attracting and keeping customers living outside of the US. Include not only characteristics of the user interface, but those issues that must be uniquely addressed to successfully service your non-US customers.

2. (10 pt) ASCII, Unicode, and EBCDIC are, of course, not the only numeric / character codes. The Sophomites from the planet Collegium use the rather strange code shown in the Figure below. There are only thirteen characters in the Sophomite alphabet, and each character uses a 5-bit code. In addition, there are four numeric digits, since the Sophomites use base 4 for their arithmetic. Given the following Sophomite sequence, what is the corresponding binary message being sent by the Sophomites?

4. (10 pt) Define memory cache write-through and write-back techniques and describe the advantages and disadvantages of each.

5. Answer the follow questions about interrupts.

a. (5 pt) Describe in detail the steps that occur when a system receives an interrupt.

b. (5 pt) Describe how these steps differ in the case when a system receives multiple interrupts

6.  Answer the following questions about clusters.

a.(5 pt) Describe how you might use a cluster to provide fault-tolerant computing

b.(5 pt) Describe how you might use a cluster architecture to provide rapid scalability for a Web-based company experiencing rapid growth.

Networks

7.  Answer the following questions about communication protocols.

a.(5 pt) Using the operations of UDP (User Datagram Protocol) and TCP (Transmission Control Protocol) as a basis, carefully explain the difference between connectionless and connection-oriented communication.

b.(5 pt) If you were ordering a number of items from an online seller, such as amazon.com, which Protocol (TCP or UDP) would you recommend and explain why.

8. In the context of network security, 

a.(3 pt) explain the purpose of non-repudiation. 

b.(3 pt) How does non-repudiation differ from authentication?

c.(4 pt) Create a business scenario that illustrates the importance of each.

11. Answer the following:

a.(5 pt) Use the following four processes that have arrived in the ready queue in the sequence shown below and answer the following about process scheduling:

(i)Both shortest job first and non-preemptive priority queue scheduling algorithms will complete all four processes at the same time, but not in the same order. In which algorithm will Process 1 finish first? Provide the time Process 1 finishes and explain your answer.

(ii)If the round robinscheduling algorithm is used, which process will finish first? At what time will it complete?

Information security policy

  Answer below 

1. Conduct an internet or library search to locate the information security policy for 2 colleges or universities.

2. Identify the first policy you selected and document whether it contains the following elements:
Policy statement, Rationale, who is affected by the policy, Definitions, Roles and responsibilities, Compliance, Related documents, Policy contact

3. Identify the second policy you selected and document whether it contains the following elements: Policy statement, Rationale, Who is affected by the policy, Definitions, Roles and responsibilities, Compliance, Related documents, Policy contact

4. Which policy was more complete or informative? Why?

5. As an end-user, which policy was easier to understand? Why?

6.For the first policy, what are your responsibilities for following the policy?

7.For the second policy, what are your responsibilities for following the policy?

8. You have been hired as an information security analyst at a small company called Astounding Appliances. Your manager asks you to help her create an information security training and awareness policy. The primary goal of the policy is to keep employees from responding to phishing attempts and other internet scams. Any policy that is created will have to be reviewed by legal counsel and other company stakeholders, so it is not important to get the language exactly right for the first draft. What is important, however, is to outline all of the main parts of the policy. Your manager wants you to prepare the first draft of the outline using the common policy elements headings.Create an outline of an information security training and awareness policy.

Paper should follow IEEE format…please look at instructions below

Paper should follow IEEE format…please look at instructions below

Topic Name: Interface rendezvous algorithms in cognitive radio networks 

Instructions:

The term paper it should be of professional quality and be in the format of an IEEE transaction style. 

Figures must be clear and drawn by you. 

Proper citation of references must be embedded in the term paper. All term report should be printed in 8.5x11in format, 10 size, time new roman font, two-column, about 8-9 pages, left, right, top, bottom margin 1 inch, and contain the following:

1. Title page.

2. Abstract (summary of the paper).

3. Introduction (problem motivation, background materials, related work, summary of objectives and methods).

4. (i) Description of existing algorithms/protocols for survey papers; 

   (ii) system model, assumptions, and/or formal problem formulation for research-oriented papers.

5. (i)   Comparison   among   existing   algorithms/protocols   and   discussion   on   possible improvements/enhancements; 

  (ii) project results (derivation, proof, justification, or detailed

design/simulation) in one or more numbered sections for research-oriented papers.

6. Conclusions (evaluation of results, suggestions for improvements, or future work).

7. References must follow IEEE Transactions format (at least 10 references). Proper citation of

references must be embedded in the term paper.

8) please have some diagrams as well…

One of the example is attached for reference….

Refer to Cruisin’ Fusion

The Cruisin’ Fusion taco trucks are gaining popularity, fueling a demand for an order-ahead option on the website. After careful consideration, the team has decided to add shopping cart software to the Cruisin’ Fusion website to meet this demand. 

Research various shopping cart software to determine the best choice for website.

Write a 1- to 2-page blog post to launch this new feature and to reassure your customers that placing online orders is safe. Your blog post should do the following:

  • Introduce the order-ahead option.
  • Explain the differences between ethics, organizational policies, and laws.
  • Analyze how the new shopping cart software upholds ethical trends in consumer privacy.
  • Describe organizational policies that will be implemented to help protect consumer data.
  • Examine ethical considerations for maintaining confidentiality and consumer data.
  • Describe the various privacy laws and regulations upheld with the shopping cart software.

Please add any references used.