Project Assignment:

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • Why are organizations interested in fostering good business ethics?
  • What approach can you take to ensure ethical decision making?
  • What trends have increased the risk of using information technology in an unethical manner?

Provide three articles to substantiate the above three questions.

Using the APA format provide a citation for each of the articles you read

Suggestion: Use a search engine (Google) and keywords

Java programming

2018 year sale

 

Jan 4128 4.59 4421 4.79
Feb 4130 4.59 4822 4.79
Mar 4126 4.59 5210 4.79
Apr 4075 4.69 5143 4.79
May 4250 4.69 4538 4.79
Jun 4133 4.69 4458 4.79
Jul 4211 4.79 5135 4.89
Aug 4958 4.79 4620 4.89
Sep 4823 4.79 4714 4.89
Oct 4989 4.89 4689 4.99
Nov 4088 4.89 5163 4.99
Dec 4906 4.89 5314 4.99

2019 year sale

 

Jan 3725 3.79 4005 3.99
Feb 3723 3.79 4415 3.99
Mar 3682 3.79 4612 3.99
Apr 3642 3.89 4725 3.99
May 3812 3.89 4145 3.99
Jun 3742 3.89 4007 3.99
Jul 3457 3.99 4612 4.19
Aug 4237 3.99 4228 4.19
Sep 4123 3.99 4310 4.19
Oct 4218 4.19 4125 4.39
Nov 3654 4.19 4526 4.39
Dec 4226 4.19 4735 4.39

data & file structures

Exercise 1: Write a function template midElement that takes an array A and its dimension N and returns the middle element of the array. In the main function, call the function template midElement to 1) an integer array of integers with 4 elements 2) An array of doubles with 5 elements and 3) an array of characters which dimension is entered by the user

____________________________________________

Exercise 2:

You have a situation in which you have 2 lists List1, and List2 with length L1

and L2 implemented as arrays. Write two member functions MergeEven that

will merge the even elements from both lists into one list EvenList and

MergeOdd that merges the odd elements from both lists into a list OddList. 

Computer Security Assignment

By going through the link mentioned below. create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

Link to go through: https://youtu.be/i-HIXgjWd-E

bharg discussion

 In discussion 5, we looked at networks in general; however, in this discussion we’re looking at wireless networks, mostly focusing on mobile networks.  Mobile networks in a global economy can be a challenge for multiple reasons.  First, governments in other countries control the mobile networks.  Second is the technology.  Mobile networks in other countries might not be as good as the mobile networks within the US.  As a global company, how can we deal with this?  With a big push for 5G, which has speeds well over 2Gbps, how does that change the way you do business?  What are some things you need to think about when it comes to doing business globally, using a wireless mobile network? 

Week 3 Discussion

 

Create one discussion thread and answer the following questions:

Discussion 1 (Chapter 3): There are four types of VPN. Name them and give an example of when I should use that type. Do you think there will be the need for more types of VPN? Why?

Discussion 2 (Chapter 11): How does software defined networking affect the management of a VPN in comparison to traditional VPN management? Does it improve or does it not improve the management of a VPN?

Discussion 3 (Chapter 12): As threats and attacks are a continuing issue, what new technologies/methods do you think should be implemented to protect a VPN?

Note: The first post should be made by Wednesday 11:59ET and you should post at least two more times throughout the week to your classmates. Please engage early and often.

Your initial post should be 250-300 words. There must be at least two APA formatted reference (and APA in-text citation) to support your thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

BI question

Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.
Your response should be 250-300 words.  Respond to two postings provided by your classmates.
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations. 

Data visualization

 

Use the internet to research and find one example of a data visualization each for categorical data, time-series data, and spatial data.

Discuss the data set and the following topics.
How effective is the visualization? Why?

What elements would you modify?

Does the example reveal the tool used ( PowerBI, R, Tableau, Qlikview….?

What problem is the visualization addressing? 

Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date. Please see the grading rubrics for the assessment and the scores you received.