final paper

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 scholarly sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (1-2 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 5-8 pages long, including both a title page and a references page (for a total of 7-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

200 words

 

Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a WORD DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

https://www.lifewire.com/learn-how-antivirus-4102748

http://www.sans.org/newsletters/

http://news.cnet.com/security/https://www.onlinesecurity.com/news–publications-pagehttp://www.esecurityplanet.com/viewshttp://netsecurity.about.com

You are asked to develop a replicator (client) that distributes a large job over a number of computers (a server group) on a single switched LAN (our Linux lab).

Description:

You are asked to develop a replicator (client) that distributes a large job over a number of computers (a server group) on a single switched LAN (our Linux lab). In this assignment, a large (simulation) job can be divided into a number of small jobs, each of which can be assigned to one machine from the server group for execution. The execution results of the small jobs can be merged once all of them successfully terminate.
System Architecture:
client server1 server2 server3 …
| | | |
| | | |

LAN

The client and servers are running Network File System (NFS) so that user files are visible at $HOME directory. You may want to set up the following environment:
$HOME/replicate.hosts: a list of (server) hostnames which participate in the simulation. There is no reason why your implementation cannot support up to 10 servers.
$HOME/replicate_out: the directory that stores the small job execution result.
The simulation program ” hyper_link ” (binary) is provided. In this assignment, you don’t need to know or care what “hyper_link” does, and actually it is a computing intensive (CPU demanding) simulator. The command line arguments of “hyper_link” are job# 1000000 999 1 2 2 100, where the job number determines the number of small jobs in your simulation. To allow the client to run a large job, the job# should be given in a tuple: start, end, and step. For example, the command (from the client) “hyper_link 1 100 1 1000000 999 1 2 2 100” yields 100 small jobs with the job# starting from 1 to 100. Each small job produces a screen output (see example below) at the end (if finished successfully). Your code needs to redirect the output to a file and save it in $HOME/replicate_out. For example (on the server side),
./hyper_link 1 1000000 999 1 2 2 100
will produce a screen output looks like (it takes approximately 2 minutes on spirit):
1:1000000:999:2:0.5:1.125193e+00:2.454346e-04:6.251640e-01:2.205078e-04:0.000000e+00:0.000000e+00

You can only use C programming lanuage to complete this project. Your implementation should not rely on any extra library (to compile your code). Your code must compile by using gcc install on the Linux workstations

sdjfbndfnv

  

Bella, an accounting student, started her first day of apprenticeship. Bella will be working in the general accounting section but has been curious about management accounting so she asked Marcus, one of the cost accountant she met while in the lunch room, where in the organization are managerial accountants located. Marcus replied, “we are partner with all of the other functions in the business here.” Bella was confused about Marcus’ reply so she is asking you to explain to her what Marcus meant by it? Let Bella know what is the implication of that response?

What is the relevance of properly classifying costs, and how does the misclassification of raw materials, direct labor, and factory overhead affect responsibility accounting? Provide an example to support your answer

Part B: Policies, Plans, and Risks

Now that you have seen all the elements contributing to the Devil’s Canyon enterprise architecture, Justin wants to move forward with developing privacy policies to ensure videos are not distributed or uploaded to the net without the consent of the people in them. This opens a much larger conversation: Devil’s Canyon is also in need of a complete security plan, as well as risk assessments.

In a 2- to 3-page rationale and table, prepare the following information to present to the Devil’s Canyon team:

  • Explain the relationship between policies and security plans. Identify potential policy needs, noting Justin’s privacy policy, in relation to the Devil’s Canyon enterprise structure.
  • Outline the importance of a security plan in relation to security roles and safeguards.
  • Analyze at least 5 security-related risks/threats that Devil’s Canyon may face.
  • Assess the probability and impact to the Devil’s Canyon if each risk occurs. Based on these two factors, determine the overall risk level. For purposes of this assignment, evaluate and categorize each factor as low, medium, or high, and create a table to illustrate the risks. For example, a      risk/threat with a low likelihood of occurrence and a high impact would represent an overall medium risk.
  • Consider digital elements mentioned in the designing of the enterprise architecture, such as software, hardware, proposed security measures, smart lift tickets, web cam systems, and smartphones.

Note: The title page and reference page do not count toward the assignment length requirement.

MOBILE -5

 

. Download some new app onto your mobile device that you’ve heard about (if you do not have a mobile phone call me and we’ll come up with an alternative), and then you will

2. Write a 2-3 page  in MS-Word about SOME OF (but not ALL OF) these aspects from Chp 1-4 of the text, on this new app you downloaded:

  • Techno-fixation
  • Haptic Interface
  • Multi-Modality
  • Emotional Impact
  • Economical Impact
  • Safety-critical situations
  • Usability
  • User Experience
  • Interaction as Brand
  • Interaction as Package
  • technology acceptance
  • Innovation
  • Building on Past Success
  • Designing the Interaction
  • Platform Design
  • Prototyping

  Include citations. .

Assignment

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. What kind of speech was the First Amendment written to protect?

2. Does the First Amendment apply only to spoken words?

3. What does it mean that laws regulating speech must be content neutral?

4. Why are common carriers prohibited from controlling the content of the material they carry? 

5. How does the Supreme Court determine whether material is obscene?

6. Why have attempts to censor the Internet failed in the US?

7. Why not just ban spam? 

8. Why did Facebook ban Alex Jones and Louis Farrakan?

9. Should websites that show how to 3d print guns be banned? 

10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean?