Home work

 Write a 3-page Journal Article Review of a scholarly peer-reviewed journal article that describes Negotiation Strategy and how it should be used effectively in negotiations. 

DEFINITION: a brief definition of Negotiation Strategy followed by the APA reference for the term; this
does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200-word
range. Be sure to note the article’s author, note their credentials and why we should put any
weight behind his/her opinions, research or findings regarding the key term. Name the title of
the article and the author(s).

ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article
relates to the selected Key Term. Provide your personal critique of the article and the author(s).
See the tips posted in Moodle as a guide. A Journal Article Review analysis is not rehashing
what was already stated in the article, but the opportunity for you to add value by sharing your
experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format. 

Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as requir

 

HUGE HINT for Journal Article Review Analysis Sections. READ THIS NOW! 

You should incorporate these topics into your analysis section. If you do, then the chances of earning a high grade are GREATLY increased, in fact, this is the FIRST thing I look for when grading your papers. 

1. Explain why you selected this particular article among all the articles you could have chosen on your selected term.

2. Explain why you agree or disagree with the author’s key positions in the article. 

3. Explain how the article was easy or difficult to understand and why? 

4. What did the author do well in your opinion? Explain.

5. Describe what you believe the author could have done better in your opinion?

6. What else should the author have included in the article and would the article benefit from a different perspective (such as from a different nationality or different industry or experience perspective). Explain. 

7. What other sources or methods could the author have used to improve the research in the article?  (Hint: look up the types of qualitative and types of quantitative research methods). 

8. What information / in-depth study / or further research should the author focus on as a follow up to this article and why? 

9. Explain what audience would gain the most benefit from your selected article and how they could apply it in their professional lives. 

10. What did you personally gain from this article and how has it shaped your thinking on the topic?  

11. What are the conflicting or alternative viewpoints of the author’s position? Or  What additional research backs up and confirms or adds to the author’s position?  (Hint: this will require you to find another peer-reviewed article that challenges, confirms, or adds to, or provides a different perspective to your chosen article.)

Next,  I look for the summary, writing quality, and formatting. 

I am typically very lenient on the writing because I am more focused on your content, but I will also point out how the paper could be better written. I only heavily penalize poorly written papers when there are excessive writing problems.

Why do I grade papers in this class this way?  

One of the key differences in a Bachelor’s vs Master’s level is critical thinking. Bachelor’s level basically challenges direct knowledge and recall of information. The Master’s level is more about analysis and critical thinking and defending your position in a scholarly way. The analysis section of these papers is your opportunity to exercise critical thinking (that’s why I call this portion of your papers critiques). 

Recalling or simply explaining the journal articles is a bachelor’s level task. When I see this in your papers I give the paper an automatic C. If the paper is poorly written it also gets an F. 

To get a B or an A – you must provide a critique of the paper and the author and how well the author did and what you think of the article. The questions listed above do this properly.  

I do not want to read your version of the journal article. I may as well read the journal article for myself.  Just briefly describe the article in your summary section  – but the analysis section is where you put in your personal critique – in other words, address the questions listed above and even add in additional thoughts based on your own creativity. 

I hope this helps! 

Apache Pig Hadoop Assignment1.2

Do online research and find out one case study where Apache Pig was used to solve a particular problem.

Expecting 4 page write-up including diagrams. Please provide as much technical details as possible about solution through Apache Pig.

Must:

1)Atleast 2 Technical diagrams to explain the solution. own diagrams please, not from internet.

2) Maximum one page for business problem and 3 pages of technical solution.

3) No plagiarism.

4)Deadline 24 July 4PM, only respond if you can complete it in 1 day. i had enough with some fools and they wasted a week with no work. 

Data Analytics and Data Mining

 There is much discussion regarding Data Analytics and Data Mining.  Sometimes these terms are used synonymously but there is a difference.  What is the difference between Data Analytics vs Data Mining? Please provide an example of how each is used. 

Advanced Operating System

 Write a C or C++ program to run on a Unix platform. This program will take three arguments. The first argument will be the pathname of a directory on the system. The second argument will be a character string. The third argument is the maximum number of output lines, N. Your program should display at most N entries in the directory tree in a text file.

 You need to implement three system calls: Open, Read, and Stat

Details of the system calls are given below. You can also use man command pages to learn more about these system calls. 

1. Open system call: DIR *opendir (const char *dirname) Opendir system call opens a directory and returns a pointer to a struct DIR. DIR represents a directory stream, which is an ordered sequence of all directory entries in a particular directory. 

2. Read system call: struct dirent *readdir (DIR *dirp) Once the directory has been opened, you can read the directory with readdir system call. Each time you call readdir system call, it returns another entry in the directory. 

3. Stat system call: int stat (const char *path, struct stat *sb) Once you have the name of an entry, you can use the stat system call to get more information about it. stat function takes two arguments, the first is a path name and second is a pointer to struct stat, which contains information about the file.

 Guidelines and Requirements 

 1. You can use either C or C++ for this programming assignment. 

2. Your program should run on a UNIX platform 

3. Add comments (about the function/variable/class) to your code as much as possible 

4. Zip your project including source file(s) and input text data files (if any) 

Wireless Wide Area Networks Response

Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline. 

RESPONSE 1:

A wireless wide area network (WWANs) is “a network that spans a geographical areas as large as an entire country or even the entire world.” (Olenewa, 2013, p. 480) The cellular phone advance technologies offer organizations the ability to establish WWAN for employees to connect and access data. Interestingly, locations, where cellular networks are unavailable satellite technology, provides users an avenue to connect to the internet.

Cellular telephony is a sophisticated wireless communication technology. The two key factors to understand how mobile telephony works are cells and digital transmitters. A cell is the coverage area divided into smaller sections. (Olenewa, 2013, p.360) Cell coverage can range from a thousand feet to ten square miles with a transmitter and receiver in the center. The transmitter connected to the base station communicates to a mobile telecommunication switching office (MTSO). The second key factor is a digital transmitter, while cellular phones operate at a lower power level, which enables cells to not experience interference with another cell. 

How cellular telephony works.

A cellular phone scans frequencies configured to use and listen to for any broadcasts from the nearest base station.

If the phone or subscriber identity module (SIM) matches the broadcast, then the phone will transmit a registration request to the base station to the MTSO uses to track cell phone location.

If the SID request does not match, the phone goes into a roaming status.

A call initiated, the MTSO locates the phone and assigns a frequency for the communication. The MTSO will then notify the control channel, and the telephone and transmitter will algin the frequency, and the connection sealed.

A phone signal strength that decreases due to moving away from a cell, the base stations and MTSO will coordinate with the control channel to provide a more reliable signal to another cell, referred to as a handoff.

The process of phone, transmitter, and frequency changes will occur as required or location. 

RESPONSE 2:

Describe wireless wide area networks (WWANs) and how they are used.

The WWAN (Wireless Wide Area Network) is a communication technology that was designed to cover an entire country or geographically continents of the world. It facilitates connectivity to the Internet with the aid of satellite technology and are used to access corporate networks and to conduct various types of business across the globe or in an entire country such as the United States.

2. Explain how cellular telephony functions.

Cellular Telephony technology are preprogrammed during manufacture with special codes to identify owners, and the carrier (service provider) that provides the SIM (Subscriber Identity module) card and its works are based on two keys. (1). The division of the coverage area into smaller individual sections, called “CELLS” that range from a few thousand feet in diameter to approximately 10 square miles (26 square kilometers). Positioned in the center of each cell are a transmitter and a receiver which the mobile devices near that cell communicate via Radio Frequency (RF) signals. Functions: The transmitters are linked to a base station or stations connected to a Mobile Telecommunications Switching Office (MTSO) – which controls transmitters and serves as the linkage point for cellular phone network and the wired telephone environment. (2). the functionality of cellular telephony technology employs digital transmitters which allows digital cellular phones to operate at a low power level and in the process, enables the confinement of the signal in the cell of a single phone to prevent interference with any other cells. The signal’s frequency level remains within the cell area and could also be used in other cells at the same time; rather than in adjacent zone – known as “frequency reuse.

Discussion

There is much discussion regarding Data Analytics and Data Mining.  Sometimes these terms are used synonymously but there is a difference.  What is the difference between Data Analytics vs Data Mining? Please provide an example of how each is used. Also explain how you may use data analytics and data mining in a future career. Lastly, be sure to utilize at least one scholarly source from either the UC library or Google Scholar. 

Please make your initial post and two response posts substantive. A substantive post will do at least two  of the following:

Ask an interesting, thoughtful question pertaining to the topic

Answer a question (in detail) posted by another student or the instructor

Provide extensive additional information on the topic

Explain, define, or analyze the topic in detail

Share an applicable personal experience

Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Week 4 discussion

Respond to the following in a minimum of 175 words: 

  • Choose one of the control families described in FIPS 200 and describe how a security policy would be written to address that control family. 
  • Discuss the primary components of the security policy with respect to the security requirements described within the control family.

Big Data Visualization tools

Several Big Data Visualization tools have been evaluated in this week’s paper. While the focus was primarily on R and Python with GUI tools, new tools are being introduced every day. Compare and contrast the use of R vs Python and identify the pros and cons of each. Provide an example of both programming languages with coding examples as well as your experience in using one or both programming languages in professional or personal work. If you have no experience with either language, please discuss how you foresee using either/both of these languages in visualizing data when analyzing big data.

Please make your initial post and two response posts substantive. A substantive post will do at least two  of the following:

Explain, define, or analyze the topic in detail

Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)

Qperational. discuss 1

Identify and describe one real or potential security/ethical/social/moral issue that is raised by Information System/Information Technology in your environment (work or home) THAT YOU CAN SAFELY SHARE and address specific ways to address it.
Include or provide a link to an illustrative video (such as from YouTube) to receive full credit.  You don’t have to create a video (unless you really want to!).

LOOKING FOR NATIVE WRITERS

Looking For Native Writers

I am Looking for  *EXPERIENCED* Writers that can be able to handle 10-20 pages a day with, Top notch Grammar. Well constructed Paragraphs with Topic Sentences. They should be familiar with Spss and Data analysis tools will be an advantage

If you know you can’t meet High grammatical standards don’t engage me. 

Email your samples to firstlanedollarshumanresource at g.m.a.i.l c.o.m indicating your name in the subject of your email and phone number

Call 0700152748