Operational Excellence – Paper

ITS 631 Paper #1 (Chapters 1 – 5 Bourgeois)    Niccole Hyatt, PhD Professor

100 Points Possible  Open Textbook and Resources

Individual Effort Only!

APA format is required. References should be listed immediately after the question that is being answered. Each question lists a minimum number of unique scholarly references; the textbook is considered one unique reference (per question) regardless of how many times it is used. All references should be from the years 2010 to present day.

Review the rubric that will be used to evaluate this paper. All work must be completed individually.

1. Explain the Internet of Things. Use at least three unique references. Length: 4-5 paragraphs. 

2. Identify three security risks of open source software. How can they be overcome? Use at least three unique references. Length: 4-5 paragraphs.

3. What are the advantages of using a data warehouse? What are the disadvantages? Use at least three unique references. Length: 4-5 paragraphs. 

4. Explain VoIP.  Use at least three unique references. Length: 4-5 paragraphs. 

5 Pages 

I need python homework

Modify the Pi Simulation program to improve its appearance, behavior, and/or code in order to meet the quality objectives. You should implement at least 5 modifications.  Be sure to use comments to identify each of your modifications.

this is the generic discussion about week 9's material, which is group communication, summaries and other general questions/comments.

Write a small 1 page write up on week 9 material which is group communication in distributed system

Group Communication and Multicast

What you got out of the week’s material

Any questions on the material or the homework

Any suggestions on how to explain the material better

Any additional examples or the like that may help illustrate the material

Any research ideas that came to mind

Operational Excellence: Information Systems for Business and Beyond Questions.

  

Information Systems for Business and Beyond Questions:

  • Chapter 10 – study questions   
  1. What are the steps in the SDLC methodology?
     
  2. What is RAD software development?
     
  3. What makes the lean methodology unique?
     
  4. What are three differences between second-generation and
    third-generation languages?
     
  5. Why would an organization consider building its own software
    application if it is cheaper to buy one?
     
  6. What is responsive design?
     
  7. What is the relationship between HTML and CSS in website design?
     
  8. What is the difference between the pilot implementation methodology and the parallel implementation methodology?
     
  9. What is change management?
     
  10. What are the four different implementation methodologies?
     
  •    Exercise :

    

  1. Which software-development methodology would be best if an organization needed to develop a software tool for a small group of users in the marketing department? Why? Which implementation methodology should they use? Why?
     

Information Technology and Organizational Learning Assignment:

  • Chapter 8 – Review the Siemens AG      case study.  Note the importance of understanding the      interrelationships amongst all the senior leaders at every location.       Pay special attention to Figure 8.1 and Figure 8.2. Note how the corporate      CIO should engage with each of the regional leaders.  Why is this      important?

Informatics

O
From the moment you wake, you are in fact a data-generation machine. Each use of your phone, every transaction you make using a debit or credit card, even your entrance to your place of work, creates data. It begs the question: How much data do you generate each day? Many studies have been conducted on this, and the numbers are staggering: Estimates suggest that nearly 1 million bytes of data are generated every second for every person on earth.

Final project..

 

For this project, select an organization that has leveraged Data Mining technologies in an attempt to improve profitability or to give them a competitive advantage.

Research the organization to understand the challenges that they faced and how they intended to use Data Mining to overcome their challenges. The paper should include the following sections each called out with a header.

• Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.

• Challenges: Discuss the challenges that limited their profitability and/or competitiveness and how they planned to leverage Data Mining to overcome their challenges.

• Solution: Describe the organization’s Data Mining implementation and the benefits they realized from the implementation. What was the result of implementing Data Mining? Did they meet their objectives for fall short?

• Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

The paper must adhere to APA guidelines including Title and Reference pages.There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due.

Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.

The body of the paper should be 3  pages in length.

The Title and Reference pages do not count towards the page count requirements.

UML diagram

Plot a      Package Diagram for the Online Student Registration System. Use the      Package Diagram class-based syntax.

Social Media

 

This week, you watched the Social Media Revolution 2019 #Socialnomics and read The Beginner’s Guide to Social Media.  https://moz.com/beginners-guide-to-social-media

Discussion:
As you review the multiple statistics that display in Social Media Revolution 2019 #Socialnomics, and reflecting on what you read about social media, assess the impact of social media in your life.
Question #1: 
What role does Social Media play in your life? Are you aware of the social media policies of the organizations where you work, attend school, or volunteer? Have you used social media to resolve problems, participate in a cause you are passionate about, or to learn about UMGC? How does Social Media impact your personal and professional communications?

 

Topic 2: Digital Humanitarianism

This week you also watched Innovations in Humanitarian Relief (PBS online video) https://www.pbs.org/video/innovation-humanitarian-relief-e6xivw/

Discussion:
In the wake of natural disasters and acts of terror, several tech companies are making an effort to improve traditional responses effort in humanitarian relief.

Question #1: 
Do you think that humanitarian aid workers constantly need new ways of thinking, new products and new processes to better respond to disasters? Why or why not?

 

Topic 3: Cyber Psychology

This week you read: Cyber psychology and cyber behavior of adolescents-the need of the contemporary era  https://www.sciencedirect.com/science/article/pii/S1877050917326704

Discussion:

Cyber psychology evaluates how we interact with others using technology, how we can develop technology to best fit our requirements, and how our behavior and psychological states are influenced by technology. Cyber psychology applies psychological theory to explain how individuals interact in cyberspace and how these interactions might affect our offline lives. It offers a new way to define the self and society.

Question #1: 

How does technology impact psychology? List at least three advantages and at least three disadvantages.

Question #2: 

Do you present yourself differently in different online spaces? In what ways are you different and in what ways are you consistent? Why do you think this is?

OPERATING SYSTEM

 

  • Explain the purpose of an operating system for a personal computer.
  • Give a brief description of the hardware components of a computer that the OS interfaces with. Motherboard, CPU, RAM, hard drive, sound controller, power supply, input and output devices, etc.

Discussion: Remote Access Method Evaluation

Learning Objectives and Outcomes

  • Explore and assess different remote access solutions.

Assignment Requirements

Discuss with your peers which of the two remote access solutions, virtual private networks (VPNs) or hypertext transport protocol secure (HTTPS), you will rate as the best. You need to make a choice between the two remote access solutions based on the following features:

  • Identification, authentication, and authorization
  • Cost, scalability, reliability, and interoperability

NOTE: PLEASE ADD ATLEAST 3 REFERENCES. NEED DISCUSSION APA FORMAT.