700 word discussion: There were five sections identified in the chapter case study and they walked us through each one explaining what happened in each. Identify and name them, and provide a brief statement about each section

Chapter 17 – According to Trutnev, Vidyasova, and Chugunov (2015), informational and analytical activities and forecasting for the process of socio-economic development should be an important element of all levels of governmental administration.  The development of methods and tools to support government decision-making on the basis of the analysis of information has a long history and their use has traditionally been included as a component of national development programs to include the development of the information society in Russia, and its regions, particularly – Saint Petersburg. 

Q1: There were five sections identified in the chapter case study and they walked us through each one explaining what happened in each.  Identify and name them, separate them  and provide a brief narrative for each sector by keeping the proper headings for each section.

Discussion Topic III- Facebook Dilemma

Discussion Topic III- Facebook Dilemma

Requirements: watch the two-part Facebook Dilemma video: (cut & paste link)

Part 1

https://www.pbs.org/video/the-facebook-dilemma-part-one-s43cuc/

Part 2

https://www.pbs.org/video/the-facebook-dilemma-part-two-iev1xh/

Then, write a 1-2 page paper that includes answers to the following two questions (remember to cite sources):

1) In today’s technological immersive environment, do you think even a big tech company can get in over it’s head?

2) Is Facebook part of the problem or part of the solution? Find examples where they have succeeded or failed.

Remember to cite your sources in a bibliography. 

You will post your paper on Blackboard, under “Facebook Dilemma – Submit Discussion Paper ” link.

Just write one essay

2 pages 

MLA  styles

Syncsession

 

Write a 4-5 page paper (deliverable length does not include the title and reference pages)

  • Why must companies place an increased emphasis on the use of high-quality software in business systems, industrial process-control systems, and consumer products?
  • What potential ethical issues do software manufacturers face in making trade-offs between project schedules, project costs, and software quality?
  • What are the four most common types of software product liability claims?

Spr1.3

Assignment 1

Kirk (2016) tells us that all requirements and restrictions of a project must be identified. Select 1 key factor below and discuss why Kirk (2016) states it will impact your critical thinking and shape your ambitions:

· People: stakeholders, audience.

· Constraints: pressures, rules.

· Consumption: frequency, setting.

· Deliverables: quantity, format.

· Resources: skills, technology

Textbook is attached, “Andy Kirk – Data Visualisation_ A Handbook For Data Driven Design-Sage Publications (2019)”.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. 

· Include at least two citations (APA) from academic resources

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

  

Assignment 2

Project Part 3.

Refer to the “Project Part 3-Malware Protection Procedure Guide” word document for tasks and instructions. 

Requirement: 

· ****Separate word document for each assignment****

· Minimum 3 pages. Cover sheet, abstract, graphs, and references do not count.

· Strictly follow APA style.

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $10 max. Please bid if you agree.

Rewrite the programming example in chapter 4. (Cable company BILLING.)

1. Write a pseudo code before starting your program (you may not use SWITCH, replace it with IF structures)

1.1 Draw a flow chart for your program based on your pseudo code 
2. Identify your constants
3. Your input will come from the text file of a least 15 customers
3.1 Input file format – customerType accountNumber premiumChannels
 (I.e residential example: R12345 5, business example B12345 16 8)
 residential customers 
RaccountNumber numOfPremChannels
 
Business customers
BaccountNumber numOfBasicServConn numOfpremChannels
4. Precision should be two decimal places
5. Calculate the running average for residential and business customer spending 
6. Print all customer’s bill to a single file and the end of the file you should have the average summary for each customer type.
6.1 pay attention to details when you formatting your output

project 2

  

Discussion topics

Prepare two slides each with presenting note too

  1. Discuss the limitations of memory management schemes in early systems. What were the most problematic aspects of these schemes?      Why were they sufficient for the first three generations of computers?
  2. Discuss the compaction process. How often should it occur and what are its advantages and disadvantages?

Projects 2

Two page paper for each question  

  1. Submit a report that discusses the differences between the next-fit and worst-fit algorithms.

2. List the steps involved in program relocation, including loop sequences, decision sequences, branching sequences, and data references. 

  

Additional Resources
  1. Beginner’s      Guide to Memory Management:

http://www.memorymanagement.org/mmref/begin.html

  1. Windows      Memory Management: https://msdn.microsoft.com/en-us/library/aa366779(VS.85).aspx
  2. IBM:      Inside Memory Management:

http://www.ibm.com/developerworks/linux/library/l-memory/

5. Ravenbrook – The Memory Management Reference:

http://www.memorymanagement.org/

Discussion

This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility’s SCADA system. It occurs during the fall after a dry summer in Fringe City. The water utility’s Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator’s familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city. Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber attack from occurring.