Week 6_research paper

 

3) Research paper: Class,  If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.  Your paper should meet the following requirements:  • Be approximately 2-4 pages in length, not including the required cover page and reference page.  • Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

WS&F

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 3 – Prepare a two-page paper (double-spaced) that describes the device or system you will investigate and the intended tool you plan to use to conduct your forensics investigation. The interim paper should be in the form of an Executive Summary. Be sure to provide references in APA format. 

reflection

 

n the last week of class, we are going to complete a reflection activity.

 This discussion topic is to be reflective and will be using your own words and not a compilation of direct citations from other papers or sources. You can use citations in your posts, but this discussion exercise should be about what you have learned through your viewpoint and not a re-hash of any particular article, topic, or the boo on Information Governance.

Items to include in your initial thread: 

  • “Interesting Assignments” – What were some of the more interesting assignments to you? 
  • “Interesting Readings” – What reading or readings did you find the most interesting and why? “Interesting Readings”
  • “Perspective” – How has this course changed your perspective? 
  • “Course Feedback” – What topics or activities would you add to the course, or should we focus on some areas more than others? 

Grading Information 

Splitting and Joining Strings

Create an array of ten strings. Write a program to join and split these strings. Feel free to use any whitespace character. Explain how the program works, when to use Python arrays, and when to use tuples, dictionaries, and sets. Explain how the program works and how it can be utilized to support an organization’s requirements.

Requirements:

  • Maximum four to five pages in length is required.
  • You must include program code and results.
  • You must include an explanation about how the program works.
  • You must show your work for full credit.
  • You must include a minimum of three credible sources. Use the Saudi Electronic Digital Library to find your resources.
  • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide

Data Base – Assignment

 

Research on the Internet each of the following topics: 

  1. Explore NoSQL database alternatives.
  • Document
  • Key-Value
  • Object
  • Graph 
  1.  Reporting and analytical databases.
  • Big Data
  • Datamart
  • OLAP vs. OLTP 

Select one topic from the four topics listed for your paper: 

  1. Database models for Big Data
  2. Alternatives to the Relational Database Model (describe at least four)
  3. Relational Database Models and data needs that support their use
  4. Database models for multimedia
  5. You may choose your own database-related topic if you get your instructor’s approval 

Your paper should be 3–5 pages, double-spaced, and in 12-point font. Be sure to provide an introduction and conclusion, and use appropriate section headers. Your paper should be free of spelling and grammar errors, well-written in Standard English, include a reference page and in-text citations, and be formatted in APA.

Policy and legal_2

Discuss in 500 words your opinion whether Edward Snowden is a hero or a criminal. You might consider the First Amendment and/or the public’s right to know as well as national security concerns. 

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Operational Exellence – Research Paper

 

Langer, A. M. (2018). Information Technology and Organizational Learning, Chapter 12- Review the section on the definitions of maturity stages and dimension variables in the CEO Technology Best Practices Arc.  Define each of the maturity stages and performance dimensions.  What are the key concepts from each section? 

  • Assignment should be between 500 and 525 words. (The word count does not include the title and reference page). Deductions will apply if the word count is not observed.
  • A minimum of two references are required using APA 7th edition formatting. Reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in text.
  • APA requirements include, but not limited to:
  • A title page and reference page (See example)
  • 12-point Time New Roman font
  • The paper should be typed, aligned to the left, and double-spaced with 1″ margins on all sides
  • The first sentence of each paragraph should be indented one tab space
  • All papers should contain a page number, flush right, in the header of every page. Use the automatic page-numbering function of your word-processing program to insert page numbers in the top right corner; do not type page numbers manually.
  • When you have completed the assignment, submit in Blackboard by the due date stated in the syllabus.

reflection paper-Cloud computing

Provide a reflection of at least 300 words that summarizes what you feel are the most important or interesting concepts you have learned so far in this cloud computing course. would be good to include an insight as to whether the learning was new to you or reinforced knowledge that you already had

(syllabus till now: understanding cloud comp types, cloud services models, saas, paas, iaas.

Requirements: 

Provide a (1 page with in next 3 hours)

APA format.

BlockChain Development- Discussion post – APA format

In chapter 6, the author describes basic components of a business network. Create a new thread, choose one of the types of participants discussed in chapter 6, and explain how you think the chosen participant type could effectively use assets in an enterprise blockchain environment to impact the organization’s outcomes.

Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 5 or 6. You’re not trying to test each other, but you are trying to start a discussion.

 

You must do the following:

1) Create a new thread. As indicated above, choose one of the types of participants discussed in chapter 6, and explain how you think the chosen participant type could effectively use assets in an enterprise blockchain environment to impact the organization’s outcomes. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 5 or 6. You’re not trying to test each other, but you are trying to start a discussion.

 

2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should answer AT LEAST one of the questions posed in the thread and extend the conversation started with that thread. Make sure that you include the question in your comment so I can see what question you’re answering.

300 words

1. List Outcomes from the  Course – List the outcomes (objectives) as written in the course syllabus from the course.
2. Apply Your Work Experiences to The Course – Correlate your job responsibilities with the  course outcomes listed above.
3. Length of Assignment –350 words, double-spaced using Times New Roman, 12 pt. font.