Computer science

 

Complete Chapter 10 Case Project 4 “Installation Troubleshooting at North Jetty Manufacturing” (page 496 in print text).  Find a PRODUCT to recommend for each scenario.  (For example, taking frequent breaks from the computer might be a good idea if someone is experiencing discomfort, but there are also ergonomic products which might help the situation.  You are to find one or more of those products for each of the six scenarios.)  For each of the problems listed, include not only your product recommendation, but also the URL that directly takes the reader to the product you are recommending on the Web. (Do not include a URL to the home page of the supplier, but rather the complete URL that links directly to the one product you are recommending.) Also include a link to a web site of reviews of that product. (If the reviews are on the same page as the product itself, note that in your memo).

Make CERTAIN that your document is in the form of a memo to Candace Van Camp, as stated in your textbook. (There is a business memo template in Microsoft Word, if you need help with memo format).

Spelling, grammar, correct citations, and content will all influence your project grade.

Apply: Signature Assignment: Internet Systems Technologies Comparison

 

Assignment Content

  1. Imagine this scenario: Pine Valley Furniture wants to use Internet systems to provide value to its customers and staff. There are many software technologies available to Internet systems development teams, including SOAP, HTML, JSON, XML, CSS, ASP.NET, Objective-C, PHP, Java™, Python, Ruby, AJAX, Swift™, AngularJS, Bootstrap, jQuery, and R.

    Choose 1 of the following formats for this assignment:

    • Comparison table (3–4 pages)
    • Tabbed spreadsheet with a supporting narrative
    • Address the following items in your assignment:
    • Compare at least 3 Internet systems developments software technologies for use at Pine Valley Furniture.
    • Analyze how the selected Internet systems developments software technologies support Pine Valley Furniture’s core business processes.
    • Justify why an Internet systems developer might choose a specific type of technology instead of another type of technology for Pine Valley Furniture.
    • Explain how these technologies can bring value to Pine Valley Furniture.
    • Incorporate additional research to support your comparison.
    • Cite references to support your assignment.

      Format your citations according to APA guidelines.

      Submit your assignment.

Case3

 

Read the mini-case, Innovation at international Foods (pp. 234-238).

Submit a Word document with answers to questions one and two on page 238. Your answer to question one should include strategies for overcoming each of the IT related problems and be about two pages long. Your answer to question two should be about two pages long.

Your submission must meet the following criteria: 

  • Use APA level one headings to separate your answers to each question.
  • Comply with the APA and writing standards for this course. Use    Dr. Straw’s APA and writing checklist  for guidance.
  • Have two scholarly sources, not including our textbook.

SafeAssign is designed to detect plagiarism, which is stealing the sentences of others and claiming them to be your sentences. You must not plagiarize. You must write your own sentences and paragraphs. Therefore, you must follow these SafeAssign instructions. Failure to follow these SafeAssign instructions will result in a grade of zero with no opportunity for resubmission and no opportunity for regarding. If your SafeAssign score is above 25% after the paper submission deadline and you do not include the comment in item v below, your paper will receive a zero.

 

  1. Submit your paper to Blackboard.
  2. Look at your SafeAssign score. Your SafeAssign score will be available between 10 minutes and 24 hours after submitting your assignment. You are responsible for managing your time to ensure you have enough time to evaluate your SafeAssign score, make changes to your paper, and resubmit your work by the due date. Plan accordingly.
    1. If your SafeAssign score is 25% or below then you are done. You do not need to do anything else.
    2. Do the following if your SafeAssign score is over 25%. You must do step v below even if the primary reason for your high SafeAssign score is not plagiarism.
      1. Review your SafeAssign Originality Report to understand your score.
      2. You can ignore headings, textbook questions, legitimate quotations with APA citations, and references that are flagged by SafeAssign.
      3. Any other sentences that are flagged by SafeAssign must be rewritten by you in your own words. Do not steal the sentences of others.
      4. Rewrite content, other than the items listed in ii above, and resubmit your paper to Blackboard. You are not required to get your SafeAssign score down to or below 25%. You are required to correct all content, not including items listed in ii above, flagged by SafeAssign. 
      5. In the assignment comments section for your last submission write these words: “I have corrected all content (excluding headings, textbook questions, legitimate quotations with APA citations, and reference) that were flagged by SafeAssign in my previous submission.” 

COmputer, Email and Internet acceptable policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

  1. Computer and email acceptable use policy
  2. Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references.  

Your paper should meet the following requirements:

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Block Chain Development discussion

In chapter 2, the author describes Hyperledger Fabric and its components. choose one of the Hyperledger design principles described in chapter 2, and explain why your chosen design principle is important to a successfully enterprise blockchain implementation. 

Also give three questions you’d like to ask other students and add these to the end of your discussion. The questions should be taken from material you read in Chapter 1 or 2. 

You must do the following:

1) As indicated above, choose one of the Hyperledger design principles described in chapter 2, and explain why your chosen design principle is important to a successfully enterprise blockchain implementation. Then think of three questions you’d like to ask other students and add these to the end of your discussion. The questions should be taken from material you read in Chapter 1 or 2. You’re not trying to test each other, but you are trying to start a discussion.

Discussion

 

This discussion topic is to be reflective and will be using your own words and not a compilation of direct citations from other papers or sources. You can use citations in your posts, but this discussion exercise should be about what you have learned through your viewpoint and not a re-hash of the course  Data Science & Big Data Analysis and any particular article, topic, or the book.

Items to include in the initial thread: 

  • “Interesting Readings” – What reading or readings did you find the most interesting and why? “Interesting Readings”
  • “Perspective” – How has this course changed your perspective? 
  • “Course Feedback” – What topics or activities would you add to the course, or should we focus on some areas more than others?