chicago china town

planning and software management of 

  

Chicago Chinatown Free Clinic Services and Computer Networks Upgrade Project Plan

week 7

Read the article titled, “The Secret History of the FBI’s Battle Against Apple Reveals the Bureau’s Mistake” located at  http://fortune.com/2018/03/27/fbi-apple-iphone-encryption-san-bernardino/

Write a report in which you discuss:

  1. Based on this article or other topic research, explain whether you agree with the FBI or you agree with Apple. Justify your stance with supporting information. 
  2. Describe a possible compromise to the solution for future cases that would allow the investigation to continue. 
  3. Take a position on whether you believe technology is moving too fast for the judicial system. Suggest at least two improvements that the courts can make in order to catch up and / or keep up with the advancements in technology issues and crimes.
  4. Use at least two quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. 
  5. Your assignment must follow these formatting requirements:
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. 

Discussion forum on Article readings

Required Text: Stair, R. M., & Reynolds, G. W. (2018). Principles of information systems. Boston, MA: Cengage Learning. 

Discussion:

After reading articles(given below) on Information System Success and Satisfaction. How do you believe an organization should measure information system success and satisfaction in the enterprise?

Article-1

Doll, W., & Torkzadeh, G. (1988). The Measurement of End-User Computing Satisfaction. MIS Quarterly, 12(2), 259–274. https://doi.org/10.2307/248851

Article-2

Davis, F. (1993). User acceptance of information technology: system characteristics, user perceptions and behavioral impacts. International journal of man-machine studies, 38(3), 475-487.  doi:10.1006/imms.1993.1022

Article-3

DeLone, W. H., & McLean, E. R. (1992). Information systems success: The quest for the dependent variable. Information systems research, 3(1), 60-95.

Write two pages APA format paper

IT 206 Design and analysis of algorithm

Read chapter 10 sections 10.1-10.5.

Solve this problem:

Write an algorithm for the situation below for 1 soldier. Then rewrite it for 2 soldiers.

Ferrying soldiers
A detachment of n soldiers must cross a wide and deep river with no bridge in sight. They notice two 12-year-old boys playing in a rowboat by the shore. The boat is so tiny, however, that it can only hold two boys or one soldier. How can the soldiers get across the river and leave the boys in joint possession of the boat? How many times need the boat pass from shore to shore?

book details 

Title: Data Structures and Algorithms Made Easy: Data Structures and Algorithmic Puzzles

Author: Narasimha Karumanchi

Publication info: Career Monk Publications, 5THEdition, 2016

ISBNs: 819324527X. 978-8193245279

research paper

  

Watch the Youtube video Deming at Pontiac. Research W. Edwards Deming and the Total Quality Movement (TQM). 

Read the article Netflix vs Blockbuster – 3 Key Takeaways https://www.drift.com/blog/netflix-vs-blockbuster/ and

A Blockbuster Failure: How an Outdated Business Model Destroyed a Giant

https://trace.tennessee.edu/cgi/viewcontent.cgi?article=1010&context=utk_studlawbankruptcy

Research Blockbuster versus Netflix. Consider the effect that cloud computing has had on Netflix’s business model. Consider also how Deming and TQM would have dealt with (or avoided) the problems that occurred at Blockbuster. What does a TQM initiative look like in an IT department? How would IT support Total Quality at your company?

The paper must be at least 5 pages plus the cover and reference pages and be in APA format.

Each paper must have at least 3 academic sources. Academic sources do not include wikis, message boards, support forums, etc. Do not copy and paste large blocks of text from your sources! 

As with any research project, make sure to take a position, defend with works cited, and conclude.

Access Control discussion 2

Explain  the difference between a threat and a vulnerability and how business need to protect against each type.

500 words
no plaigarism

need APA format

properly cite the references and no grammar mistakes

I need help in completing my task

 Chapter 13- discussion question #1-4 & exercise 3 & 4 & 6 

 

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Imoprtance of strategic planning 3

Discussion:

 The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience

At least two scholarly sources should be used in the initial discussion thread. 

Note: Answer should be a minimum of 300 words