Week 2 Discussion Due TONIGHT

 For  this discussion, you will need to address all the tasks below and be  sure to participate fully by responding to your classmates as well.  Citations should be used to support your analysis and references should  be included in APA format. Before you begin, be sure to review the Discussion Question Guidelines!  

Now that you have been introduced to some advanced features in  Microsoft Word, you will teach the class an advanced skill in it. In  this discussion, select at least one advanced feature of Microsoft Word  and, using your own words (no copying and pasting) and examples, teach  your classmates this skill. Check the posts on the discussion board to  choose something no one else has shared yet!

In your discussions with your classmates, see if you can follow their directions or offer any help to problems they had.

You can also offer any help with challenges your classmates have shared.

By Thursday, December 10, 2020, make your initial  post to the Discussion Area. After you post your initial submission, be  sure to respond to at least two of your classmates, and to the professor  when appropriate, by Monday, December 14,2020, on at least two different days of the week.  /content/enforced/71846-17093625/Week_Two_Discussion_Question1.pptx  

Physical Security: Door and Window Lock Assessment

 Topic: Based on this weeks lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.

Instructions: Please download the Assignment 3 Door and Window Lock Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit to the appropriate assignment folder. Also review any additional files attached for more information.

short answer

 

“Heuristics and Analytics”  Please respond to the following:

  • The ideal method of evaluation products involves volunteers. However, sometimes this is not feasible (i.e., product time constraint, too expensive, etc). This where experts who are knowledgeable about interaction design, needs, and typical behavior of users come into the picture. Choose a random product that you use daily and speculate on how a heuristic evaluation would be performed on that product. Provide a rationale for your response.
  • Social media websites, such as Facebook, Twitter, and e-Commerce giant Amazon, use some form of Web analytics. Speculate on the Web analytic tool that you believe is most commonly used. Justify your response.

Written Assignment 3

 

  • Who uses extended support features?
  • Why is it important to keep backups of your SQL software?
  • What did you learn about SQL after watching Brent Ozar’s video?
  • How can you keep your skills aggressively current?
  • Be specific and provide examples.

Click the link above to submit your completed assignment.Requirements:

  • A minimum of 350 words. 
  • Use APA format. 
    • Times New Roman 12 pt font, double spaced with 1″ margins.

procedure doc

 

Write a procedure document for CSI that documents how to change a password in a platform of your choosing.

The document should be detailed enough, and yet understandable enough, for a reasonable, non-technical, non-IT person to follow the directions and successfully change the operating system password without the need to call for support in all but the most extreme cases.  (In the real world, there will always be the the ‘outlying’ cases that defy logic and defy documentation.)

Text should be as understandable as possible and as non-technical as practical.  Remember in a previous lecture that the standard reading level for a wide audience tends to be 8th or 9th grade.  Include a glossary where needed.

Visual aids should be included.  Screen captures or photographs are very helpful to the technically challenged.

For this assignment an Adobe PDF or Microsoft Word or Microsoft PowerPoint (or equivalent application) document will be acceptable.

Tips

This is usually an easy assignment because changing the password in most operating systems is very simple. You just need to describe the steps in getting there.

Most students tend to get caught up in the editing process.  Getting a prototype document put together, including screen captures, is usually pretty fast.  Editing can be a time black hole so be mindful of that.

Ask a non-technical person to read one of your drafts.  If they understand it, and can follow it, you have succeeded.

D6:350 words

 

Knowledge Management

Carefully review and use either of the book options below as a reference for various aspects of knowledge management.

  • Sharda, R., Delen, D., & Turban, E. (2015) Business intelligence and analytics: Systems for decision support (10th ed.). Boston: Pearson. Print: ISBN-13: 978-0-13-305090-5
  • Sharda, R., Delen, D., & Turban, E. (2020) Analytics, data science, & artificial intelligence: Systems for decision support (11th ed.). Boston: Pearson. Print: ISBN-13: 978-0-13-519201-6
  • Important Note:  All students are welcome to use outside research in aspects of knowledge management.

After reading and analyzing content from book references and or from outside research, consider respond to the task and case below.

Make a list of all the knowledge management methods you use during your day (work and personal). Which are the most effective? Which are the least effective? What kinds of work or activities does each knowledge management method enable?

Now think about methods to communicate this knowledge using various methods of communications in major work environments and investigate the impact of turning off every communication system in a firm (i.e., telephone, fax, television, radio, all computer systems). How effective and efficient would the following types of firms be: airline, bank, insurance company, travel agency, department store, grocery store? What would happen? Do customers expect 100 percent uptime? (When was the last time a major airline’s reservation system was down?) How long would it be before each type of firm would not be functioning at all? Investigate what organizations are doing to prevent this situation from occurring.

Week 8 Discussion – Cyber Law

Describe an instance of plagiarism or other use of another’s intellectual property with which you are familiar. Please give one argument condemning this conduct and one argument defending it. 

Response should be in 450 words. Please add references in APA fomrat.

D7

What are the common challenges with which sentiment analysis deals? What are the most popular application areas for sentiment analysis? Why?

300 words and 3 reference in APA

Assignment 2

 

Paper Section 1: Reflection and Literature Review

Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research based on what you have learned from chatpers 5 and 6.  This section of the paper should be a minimum of two pages. 

Paper Section 2:  Applied Learning Exercises

In this section of the professional paper, apply what you have learned from chapters 5 and 6 to descriptively address and answer the problems below.  Important Note:  Dot not type the actual written problems within the paper itself.

  1. Examine how new data-capture devices such as radio-frequency identification (RFID) tags help organizations accurately identify and segment their customers for activities such as targeted marketing. Many of these applications involve data mining. Scan the literature and the Web and then propose five potential new data mining applications that can use the data created with RFID technology. What issues could arise if a country’s laws required such devices to be embedded in everyone’s body for a national identification system?
  2. Survey and compare some data mining tools and vendors. Start with fairisaac.com and egain.com. Consult dmreview.com and identify some data mining products and service providers that are not mentioned in this chapter. One of my favorites to explore is RapidMiner found at https://rapidminer.com/ and an educational license option can be found at:  https://rapidminer.com/educational-program/
  3. Explore the Web sites of several neural network vendors, such as California Scientific Software (calsci.com), NeuralWare (neuralware.com), and Ward Systems Group (wardsystems.com), and review some of their products. Download at least two demos and install, run, and compare them.
  4. Important Note:  With limited time for a college class, perfection is not expected but effort to be exposed to various tools with attempts to learn about them is critical when considering a career in information technology associated disciplines.

Important Note:  There is no specific page requirement for this section of the paper but make sure any content provided fully addresses each problem.

Paper Section 3:  Conclusions

After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward.  This customized and original flow process flow or flow diagram can be created using the “Smart Art” tools in Microsoft Word.

Paper Section 4:  APA Reference Page

The three or more sources of research used to support this overall paper should be included in proper APA format in the final section of the paper.

Paper Review and Preparation to submit for Grading

Please make sure to proof read your post prior to submission. This professional paper should be well written and free of grammatical or typographical errors. Also remember not to plagiarize