Project with 4 papers

 

For this final part of the project, you will be identifying the research and design approach that is suitable for the extension study. In this section describe the approach as thoroughly as possible including the following:

  • Research Approach (Exploratory vs Hypothesis-Based)
  • Research Design (Qualitative vs Quantitative vs Mixed Methods)
  • Research Methods utilized

Include a discussion of considerations such as internal or external validity. Also include a discussion that provides justification for the choices you have made with respect to the proposed approach.

Reflection 5

Submit a 5 page paper (APA style) describing the issue of Blockchain transaction speed: how can speed be increased and how will loyalty programs becomes more innovative?

Reflection Five (R5) is an essay assignment. 

 

Read:

Watch:

  • YouTube: Blockchain + AI = Decentralized Artificial Intelligence
  • YouTube: How Blockchain-based Loyalty Programs will give you more flexibility and New Opportunities
  • YouTube: Increase visibility and speed and cross-border transactions with IBM Blockchain

Computer science

Briefly describe the following

1.profession (15 marks)

2.professional(15 marks)

3.code of conduct (15 marks)

4.Ethics(15 marks)

5 contracts(15 marks)

6.policies(15 marks)

7.practices(15 marks)

Application Maintenance

  

In MindTap, review the Appliance Warehouse Case, and do the following:

· Read the Before You Begin Message and the Module 12 Appliance Warehouse Webmail Client Emails. Read the messages to help determine the tasks you must complete.

· Review and analyze the weekly Appliance Warehouse case study content and resources.

Create a 3- to 4-page document (to submit in Blackboard) that includes the following:

· Summary: Explain your overall approach to analyzing and addressing the needs of the new Appliance Warehouse Service Department. How did you ensure you met the implementation, integration, and maintenance needs of the new Appliance Warehouse Service Department business case?

· Work Breakdown Structure (WBS): Design a WBS for the project of planning and implementing the new Service Department. Identify each task needed in order to implement the new Services Department. Include duration times. Refer to the Week 2 Discussion.

· System Maintenance Plan: Include measures to implement corrective, adaptive, perfective, and preventive maintenance. Include recommendation to maintain the system either using in-house resources or to outsources it. Include pros and cons of both maintenance types.

· Security Risks: Identify and explain potential security risks for the Service Department business case. Consider physical, network,application, file, user, and procedural types of security risks. Include the backup system method to be used.

Your supervisor, Carlie Davis, needs to present management with the total cost of your in-house developed SIM system. While developing this budget, you will account for maintenance costs, backup and recovery, and the system’s total cost of ownership (TCO). Furthermore, you will outline the security risks for this system. To complete these tasks, you will use the emails, libraries, and your own research.

Hi Kevin,

Now that we have isolated the necessary features for an in-house built system, we need figure out if it will be economically feasible to build this software. Mae Roth has asked for the bottom-line numbers for this project. Not only do we need to tell her how much the system will cost to build, but she wants to know what the total cost of ownership would be if we use this system for the next 5 years. You will need give her the numbers in net present value. Since our IT team is unionized, their contract states that they will get a $3/hour raise each year for the next 5 years.

Assume that we will need 2 servers initially for this project. Also assume that we will have to replace these servers every two years.

In the spreadsheet that you create, show the initial build cost and the cost for years 2-5 of maintenance. Finally, give the NPV for the entire project.

After the cost feasibility is complete, Mae will finally decide between the pre-packaged software and an in-house build. Thanks for all your incredible work on this project!

Carlie

Hi Kevin,

As you well know, maintenance on any system is essential to fix mistakes, add enhancements, or maintain security. I was wondering what you were thinking for SIM’s ongoing maintenance plan. We are hoping that this system will last for the next 5 years. We will have to assume responsibility for maintenance if we build this system in-house. Do you think we should hire enough IT staff to maintain this system in-house or should we outsource it?

To help the company think this decision through, please make two lists for pros and cons of in-house maintenance vs. outsourced maintenance. Could you get this to me today?

Thanks!

Carlie

Hi Kevin,

Our system administrator was asking me about the security for SIM. You and I have not discussed this topic in depth. We need to do a risk assessment and look at all types of security issues: physical, network, application, file, user, and procedural.

Make a list of the security risks for all six security levels. We need to make sure that we don’t leave our new system vulnerable to attacks.

Also, what is the backup method to be used for SIM? Please explain why you’ve chosen this method.

Hope you had a great weekend!

Carlie

Essay on Indigenous Literature

you can find the documents below please write an essay on the poem I am home again and also on the uses of indigenous literature please follow every instruction.

 Word Count: 500 words Style and Format: The paper should be formatted according to MLA style guide (https://owl.purdue.edu/owl/research_and_citation/mla_style/mla_formatting_and_style_guide/m la_sample_paper.html ). Please type it in Times New Roman 12 font. Description Focusing on the poem “I am Home Again”, write an essay that highlights how Indigenous poetry play an important role in the construction of an aesthetic identity and culture for the Indigenous communities of Canada in the 21st century. Refer to the essay “The Uses of Indigenous Literature” to illustrate/ elaborate on the social function of Indigenous literature. Add a Works Cited page at the end of your essay and include both the poem and the essay in this list. Writing Hint In the introduction clearly identity the topos (of the poem). You should also have a clear thesis statement in the introduction that addresses the following question: Home does the poem “I’m Home Again” create an aesthetic identity for the Indigenous communities of Canada? This would be the working thesis which should be revised once the first draft has been prepared. The body paragraphs should highlight the specific devices (imagery/refrain/personification/symbolism/metaphor/analogy) addressed in the thesis. Ensure that your topic sentences are clear and specific and each paragraph is developed around the specific topic sentence. Dedicate one body paragraph to discuss how the poem can be read in light of the points discussed in the essay “The Uses of Indigenous Literature”. Your body paragraphs should use quotations from the poem. Try not to use quotations in the introduction or the conclusion. 

ET 4 Week

The paper should be 4 pages double spaced, 12 point times new roman font with 1 inch margins. Title page, restating the instructions, table of contents, and references do not count towards the page count.  Please submit this assignment to the appropriate Assignment Submission Area Dropbox. 

In this paper, please research the topic of Depth.  Please demonstrate a command of the material under investigation and a subject matter expertise in the topic that you choose to write about. You are expected to demonstrate graduate-level writing, critical thinking, critical assessment, critical writing, and advanced research skills.  You are expected to use at least three (3) outside primary source materials that you find using the University Library system in addition to evidence obtained from the course materials, especially the required readings, and additional course resource materials uploaded to the course (e.g., lectures, PPT, webliography, etc.).  This assignment is designed to assess whether you read and understood the material for this module; and whether you can explain, describe, critically assess, and critically analyze the material for this module. This assignment is also designed to assess whether you can conduct advanced research on a topic and advance original analysis on a topic (doctoral-level skill sets that you will need when you write your dissertation).

Please be sure to use complete sentences. Please be sure to demonstrate that you read and understood the material for this module by offering detailed explanations, critical assessments, and analyses of the material that is grounded in cited evidence from the readings, peer reviewed journals, and (whenever possible) real-world examples.

Security Architecture and Design

 

In today’s fast-paced, agile software development environment, how can we make sure security is implemented into the design? What are some of the key strategies?

Use facts and examples to support your answer. Any outside sources should be cited using APA style.