Course book exercises

  • Chapter 7 – study questions 1-10, Exercise 2
  • Chapter 8- study questions 1-10, Exercise 2

Precise answers to all questions and exercises in different words from text book. If copying from text book, add reference in APA format.

Textbook link – Information Systems for Business and Beyond 

https://bus206.pressbooks.com/

Research Assignment

Throughout the course, you will be studying a variety of technology topics that are relevant in enterprise settings. Some of you are students exclusively while others of you work in corporate America. Regardless of your situation, the advances of modern technologies are disrupting the way people work, live, and learn. The goal of this research assignment is to conduct a deep dive analysis on one of the following topic areas. When conducting your research, you need to identify how digital transformation in business is a disruptor to the specific topic area selected. Topic areas to consider include:

  • Cloud Computing
  • Mobile Computing
  • Internet of Things
  • Wearable Computing
  • Artificial Intelligence/Cognitive Systems/Machine Learning
  • Security & Privacy
  • Social / Collaborative Platforms
  • 3-D Printing
  • Online Learning & Andragogy

The final paper includes an exhaustive research study using the outline below to substantially support your findings. Using the following paper structure format:

  • You are to write a 10-12 page page research paper.
  • The paper should be, double-spaced following APA format using a Times New Roman 12-point font.
  • Page counts do NOT include cover pages, references, or abstract.

Treat this as if you had an opportunity to publish in a peer-reviewed business or technology journal. 

The paper structure should be as follows:

  • Abstract
  • Introduction
  • Problem Statement
  • Research Analysis
  • General Findings
  • Strength Identification relative to disruption
  • Weakness Identification relative to disruption
  • Why is this an opportunity?
  • Why is it a threat?
  • How does this disruption solve problem X?
  • Further areas of research to consider
  • Conclusion
  • References

The grading rubric evaluates the content based on five areas:

  • Content, Technical Depth, Business Analysis, Grammar/Spelling, and Citations. 

short answer

 

When the World Wide Web was new, and HTML was in its earliest stages, developing a Website was relatively straightforward. Some of the biggest concerns were the sizes of desktop monitors (15” vs. 17”) and the quality of the graphics card (part of why Web Safe Colors were so important back then.) Ever since Apple released the iPhone in 2007, the way we access the Web has changed. In today’s world we must wonder if our sites will be viewed on a desktop, a tablet, or a Smartphone. It is now a much trickier job to create sites that are scalable and responsive to any device.

Thinking about your own project, discuss the following ways you could approach developing your site for multiple devices:

  • Fixed or fluid layout
  • How you would test for various devices
  • Would your site benefit from two different sites? (one for desktop and another for mobile access)

Share your .css rules for your site to support your responses.

digital forensics tools and techniques

 NO PLAGARISM

Using Chapter 10 as a reference, eExplain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.

Writing assignment

Write at least 500 words on fractional ownership and it’s relation to cloud computing. Use at least one example from another industry.    

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Do not double space.

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Discussion Emerging threats

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Make an argument concerning the topic.

At least two scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources Use proper citations and references in your post.

Consider a set of 5 tasks with the following characteristics Period Task number Worst-case execution time 1 30 2 10 3 20 4 80

CPU Utilization,Overloads

 

  1. Transient Overloads: One drawback of RM algorithm is that task priorities are defined by their periods. Sometimes, we must change the task priorities to ensure that all critical tasks get completed. With average execution times, all the critical and non-critical tasks may be RM-schedulable. But, if we consider worst-case execution time we wish to schedule so that all critical tasks meet the deadline and the non-critical task may miss the dead line. The solution is to boost the priority of some critical tasks higher than the non-critical tasks. This is done by altering the “Period” of some critical tasks so that their priorities increase. For example: If we reduce the period of a task by k and have k number of tasks each small sub task will have period divided by K, and execution time divided by k. When the period is smaller, the tasks automatically get higher priority. We can also lengthen the period of non-critical tasks and make it larger than the largest critical task and increase the non-critical task’s execution time also.Carry out a period transformation for this task set to ensure that all the critical tasks will meet the dead line even with worst case execution timing.
    Draw for your modified table of tasks, timing diagram to show schedulability for average execution time and another diagram to show for worst-case execution time. Identify if any tasks miss the dead line.
  2. Give explanation of your period transformations and solution.
  3. What is CPU Utilization for average and worst-case execution times.
  4. Considering Context switch time to be 1 ms, redraw the execution time line for this system for both average and worst case timing.
  5. What is the system time-loading (CPU utilization) factor with the context switching included?Consider a set of 5 tasks with the following characteristics Period Task number Worst-case execution time 1 30 2 10 3 20 4 80

Discusssion

Read chapters 1 and 2 describe and discuss ways, if any, we can safely share security data.Are there precautions we can take, technical solutions we can use, e.g., like using the CIA triad, or should we just not share these kinds of data? Feel free to argue for and against, just make sure to back up your statements with scholarly support.

At least one scholarly source should be used in the initial discussion thread.