5. How has information technology supported the development of facial recognition software and the current issues related to its use?
Basic power point
Hello, I am currently working on a power point slide show, but I am having problems , with what is ask of me. If more pics are needed or information, I can provide.
Thank you very much
Qu
1. 250 words: Meals on Wheels Organization
write a one-page paper discussing the challenges the organization (Meals on Wheels) had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges. This paper should be written in third-person. The third-person point of view belongs to the person (or people) being talked about. The third-person pronouns include he, him, his, himself, she, her, hers, herself, it, its, itself, they, them, their, theirs, and themselves (Not I, we, us, our).
The paper must adhere to APA guidelines including Title and Reference pages. The Title and Reference pages do not count towards the page count requirement. There should be at least one scholarly source listed on the reference page. Each reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in text. APA requirements for this class include:
- A title page
- 12-point Time New Roman font
- Your paper should be typed and double-spaced with 1″ margins on all sides
- The first sentence of each paragraph should be indented one tab space
- All papers should contain the page number, flush right, in the header of every page. Use the automatic page-numbering function of your word-processing program to insert page numbers in the top right corner; do not type page numbers manually.
- APA 7th edition in-text citations
- Reference page
2: 250 words:
What are FOUR (4) differences between descriptive and Predictive categories of Data Mining. Provide your response in no less than 250 words. Each difference discussed must be clearly stated before describing them in the proceeding paragraph.
Requirement
Your response must be written in no less than 250 word, using properly formatted APA in-text citation and scholarly reference support all your assumptions and or quotations
3. 250 words:
Using different scholarly or peer-review articles involving data mining, describe THREE (3) note worthy application or usage of “data mining” in the real world. Support each usage with examples for each use. All response must be in your own words and citation provided to support your response. Use proper grammar and in-text citation.
Cloud Computing Discussion 5
Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC.
Use at least three sources. Do not Use Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Stand alone quotes will not count toward the 3 required quotes.
AWS
500 words on AWS(S3 Bucket) with references
Project with 4 papers
For this final part of the project, you will be identifying the research and design approach that is suitable for the extension study. In this section describe the approach as thoroughly as possible including the following:
- Research Approach (Exploratory vs Hypothesis-Based)
- Research Design (Qualitative vs Quantitative vs Mixed Methods)
- Research Methods utilized
Include a discussion of considerations such as internal or external validity. Also include a discussion that provides justification for the choices you have made with respect to the proposed approach.
Reflection 5
Submit a 5 page paper (APA style) describing the issue of Blockchain transaction speed: how can speed be increased and how will loyalty programs becomes more innovative?
Reflection Five (R5) is an essay assignment.
Read:
- Can Blockchain Tech Change AdTech? https://www.martechadvisor.com/articles/ads/can-blockchain-tech-change-adtech/
- Blockchain Scalability: When, Where, How? https://blockgeeks.com/guides/blockchain-scalability/
- Blockchain Will Transform Customer Loyalty Programs https://hbr.org/2017/03/blockchain-will-transform-customer-loyalty-programs
Watch:
- YouTube: Blockchain + AI = Decentralized Artificial Intelligence
- YouTube: How Blockchain-based Loyalty Programs will give you more flexibility and New Opportunities
- YouTube: Increase visibility and speed and cross-border transactions with IBM Blockchain
Computer science
Briefly describe the following
1.profession (15 marks)
2.professional(15 marks)
3.code of conduct (15 marks)
4.Ethics(15 marks)
5 contracts(15 marks)
6.policies(15 marks)
7.practices(15 marks)
basic computer science class
text me to send you the file
Application Maintenance
In MindTap, review the Appliance Warehouse Case, and do the following:
· Read the Before You Begin Message and the Module 12 Appliance Warehouse Webmail Client Emails. Read the messages to help determine the tasks you must complete.
· Review and analyze the weekly Appliance Warehouse case study content and resources.
Create a 3- to 4-page document (to submit in Blackboard) that includes the following:
· Summary: Explain your overall approach to analyzing and addressing the needs of the new Appliance Warehouse Service Department. How did you ensure you met the implementation, integration, and maintenance needs of the new Appliance Warehouse Service Department business case?
· Work Breakdown Structure (WBS): Design a WBS for the project of planning and implementing the new Service Department. Identify each task needed in order to implement the new Services Department. Include duration times. Refer to the Week 2 Discussion.
· System Maintenance Plan: Include measures to implement corrective, adaptive, perfective, and preventive maintenance. Include recommendation to maintain the system either using in-house resources or to outsources it. Include pros and cons of both maintenance types.
· Security Risks: Identify and explain potential security risks for the Service Department business case. Consider physical, network,application, file, user, and procedural types of security risks. Include the backup system method to be used.
Your supervisor, Carlie Davis, needs to present management with the total cost of your in-house developed SIM system. While developing this budget, you will account for maintenance costs, backup and recovery, and the system’s total cost of ownership (TCO). Furthermore, you will outline the security risks for this system. To complete these tasks, you will use the emails, libraries, and your own research.
Hi Kevin,
Now that we have isolated the necessary features for an in-house built system, we need figure out if it will be economically feasible to build this software. Mae Roth has asked for the bottom-line numbers for this project. Not only do we need to tell her how much the system will cost to build, but she wants to know what the total cost of ownership would be if we use this system for the next 5 years. You will need give her the numbers in net present value. Since our IT team is unionized, their contract states that they will get a $3/hour raise each year for the next 5 years.
Assume that we will need 2 servers initially for this project. Also assume that we will have to replace these servers every two years.
In the spreadsheet that you create, show the initial build cost and the cost for years 2-5 of maintenance. Finally, give the NPV for the entire project.
After the cost feasibility is complete, Mae will finally decide between the pre-packaged software and an in-house build. Thanks for all your incredible work on this project!
Carlie
Hi Kevin,
As you well know, maintenance on any system is essential to fix mistakes, add enhancements, or maintain security. I was wondering what you were thinking for SIM’s ongoing maintenance plan. We are hoping that this system will last for the next 5 years. We will have to assume responsibility for maintenance if we build this system in-house. Do you think we should hire enough IT staff to maintain this system in-house or should we outsource it?
To help the company think this decision through, please make two lists for pros and cons of in-house maintenance vs. outsourced maintenance. Could you get this to me today?
Thanks!
Carlie
Hi Kevin,
Our system administrator was asking me about the security for SIM. You and I have not discussed this topic in depth. We need to do a risk assessment and look at all types of security issues: physical, network, application, file, user, and procedural.
Make a list of the security risks for all six security levels. We need to make sure that we don’t leave our new system vulnerable to attacks.
Also, what is the backup method to be used for SIM? Please explain why you’ve chosen this method.
Hope you had a great weekend!
Carlie