its531_wk2analysis

4. In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed. (Note: This is a class project.)

5. Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/ watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report.

15. Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recogni-tion product.

Implementing Open Addressing, is ready.

 

Develop an algorithm to search and remove data from a hash table using the open addressing technique.

Aim

Implement a hash table using open addressing with linear probing.

Prerequisites

To solve this activity, you have to implement the following methods in the OpenAddrHashTable.java file:

    public void put(K key, V value) {
        //...
    }
 
    private int searchPosition(K key) {
        //...
    }
 
    public void remove(K key) {
        //...
    }
 
    public Optional get(K key) {
        //...
    }

Steps for Completion

  1. Study the pseudocode shown in Snippet 3.3 and Snippet 3.4 (shown below) and implement them in Java.
  2. The container class OpenAddrPair will hold your key and value in the hash table.
  3. Have a flag on this container to indicate when an item is deleted.
  4. Use this flag in the put operation to overwrite it if it is deleted. You can use this flag to optimize your get method using the filter method.
insert(key, value, array)
    s = length(array)
    hashValue = hash(key, s)
    i = 0
    while (i < s and array[(hashValue + i) mod s] != null)
        i = i + l
    if (i < s) array[(hashValue + i) mod s] = (key, value)

Snippet 3.3: Psuedocode for inserting using linear probing

search(key, array)
    s = length(array)
    hashValue = hash(key, s)
    i = 0
    while (i < s and array[(hashValue + i) mod s] != null and array[(hashValue + i) mod s].key != key)
        i = i + 1
        keyValue = array[(hashValue + i) mod s]
        if (keyValue != null && keyValue.key == key) return keyValue.value
        else return null

Snippet 3.4: Solution pseudocode for searching using linear probing

Grading

Complete each task listed below. Each task contains automated checks which are used to calculate your grade. When you have completed each task by clicking the checkbox, open the task list panel on the left navigation bar and click the “Submit” button.

Tasks

New OpenAddrHashTable objects are empty.

1

Implement the following methods in the OpenAddrHashTable class:

  1. put
  2. searchPosition
  3. get
  4. remove

Practical connection assignment

Assignment:

Subject: InfoTech Import in Strat Plan
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

IISP DISCUSSION-5-dummm

 Read the topics of content in the attached text book and write this assignment how the knowledge from this text book can help you in your workplace if you’re working now or finding employment.

 Improper use of outside sources, including your own prior work, will result in a zero on the activity and a report possibly being filed with Academic Affairs regarding plagiarism (even if self-plagiarism). 

It is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. You should have at least two scholarly sources supporting your write-up.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Improper use of outside sources, including your own prior work, will result in a zero on the activity and a report possibly being filed with Academic Affairs regarding plagiarism (even if self-plagiarism). 

Cybersecurity Planning

1. According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (2-4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. Be sure to use your own words. 

2.)  Many believe that cloud computing can reduce the total cost of computing and enhance “green computing” (environmental friendly). Why do you believe this to be correct? If you disagree, please explain why? 

Information Governance wek-5-1

We learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.  The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation? Support with references

— 600 Words

Case : Discussion Questions

Read the mini-case, Building Shared Services at RR Communications (pp. 156-159).

Submit a Word document in APA format with answers to following questions, 

1. Devise an implementation strategy that would guarantee the support of the 

divisional presidents for the shared customer service center

2. What governance mechanisms need to be put in place to ensure common customer data and a shared customer service center? What metrics might be useful?

Your answer to each question should be about two pages long.

Use APA level one headings to separate your answers to each question.

Have two scholarly sources, not including our textbook.

 

Week 7 Discussion and Assignement

Discussion:
This week we focus on some additional terms for IT users.  This week lets discuss what a community of practice is.   Why are they important and how can they impact the culture within an organization?

Exercise:

1. What privacy concerns could be raised by collaborative technologies such as Waze?

2.  Write up an example of how IoT might provide a business with a competitive advantage.

Chapter 11:
Review the employment challenge in the digital era (as well as the entire chapter).  Reflect on the various challenges are present in the digital era.  Will things get better or more complicated as times goes on?  Explain.  What are some methods to assimilate new generations into the workforce to think about competitive advantage?