assignment

Please search and analyze contemporary incidents in the fields of CS, CE, and IT outside the US that has an ethical impact to the society. v

Memo: Team Building and Collaboration

 

Instructions

International Gadgets is a company with offices throughout the United States and in Europe. There has been a history of miscommunication within office departments, between offices, and, most importantly, between the company and its wide customer base. You have been hired as a manager in the newly created communications department. The purpose of your position is to improve these problematic channels of communications.

Mini task

I need to help me to complete the task:

Please see the attached picture 

the doctor draw what he want in the picture

he wants like calculator 

 This is an important question

He wants me to enter two numbers and the output

He wants three math operations

Without a switch

And use php language

this example in youtube: 

https://youtu.be/QXvJleH1Hqo

https://youtu.be/AexbvX_2sOA

if you need more explanation to ask my dr 

please feed me back .. 

Enterprise Risk management – Practical connection assignment

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making and enterprise risk management. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. 

Assignment: 
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  • Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).

Database management system

  

Given the relational model below, using your ADU ID and SQL statements.

List all your courses of the last term [0.5 pt.]

List the instructors’ names of these courses in descending order [0.5 pt.]

List all courses of the last term that have no prerequisite [0.5 pt.]

List all courses of the last term with grade above ‘C’ [0.5 pt.]

Determine the CSIT department of the last term courses [1 pt.]

Define the courses of the last term that have more than one section [1 pt.]

Display the sections of the courses above that are offered in your location (‘Abu Dhabi’ or ‘Al-Ain’) [1 pt.]

Please attach your last semester schedule details for crosschecking. 

Implementing Regulatory Board

The attached article on IRB discusses broad consent under the revised Common Rule. When you are doing any sort of research you are going to need to have your research plan approved by the University’s institutional review board or IRB. If you have never heard of this term before, please take a look online and find a brief summary of what it is about, before you read the article.  

Please answer the following questions in your main post:

  • What are the main issues that the article addresses?
  • What is the Common Rule?
  • How is this issue related to information systems and digital privacy?
  • At least one scholarly source should be used in the initial discussion thread. Use proper citations and references in your post. 

BSWP Week 2

 

In 300 words
 

OWASP( Open Web Application Security Project ) Vulnerabilities.

Please describe the below in 300 words.

  • Broken Authentication – OWASP Vulnerabilities.

discussion 3

Discussion (Chapter 3): Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.\

need 100-300 words before end 12 am EST today 

Database Discussion

Larry Ellison a few years ago arrogantly stated that Jeff Bezos and the team at Amazon will never be able to leave Oracle because the Amazon Database infrastructure could never match that of Oracle’s. We’ve heard similar stories from Teradata, IBM, and even Amazon to others. Why do vendors have such an arrogant position about their technology once an organization invests in a data systems.