Team managment dis 4

 

Communication and Team Decision Making

Part 1: Sharpening the Team Mind: Communication and Collective Intelligence

A.    What are some of the possible biases and points of error that may arise in team communication systems? In addition to those cited in the opening of Chapter 6, what are some other examples of how team communication problems can lead to disaster?

B.      Revisit communication failure examples in Exhibit 6-1. Identify the possible causes of communication or decision-making failure in each example, and, drawing on the information presented in the chapter, discuss  measures that might have prevented problems from arising within each team’s communication system.

Part 2: Team Decision-Making: Pitfalls and Solutions

A.    What are the key symptoms of groupthink? What problems and shortcomings can arise in the decision-making process as a result of groupthink? 

B.    Do you think that individuals or groups are better decision-makers? Justify your choice. In what situations would individuals be more effective decision-makers than groups, and in what situations would groups be better than individuals?

overall process of developing new software

Discussion: This week we discuss the overall process of developing new software.  Please also note the differences between software development and methods.

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

Forensic investigation using Autopsy tool

Conduct a forensics investigation.

Consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

Use Autopsy tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

The paper should provide the following information: 

· Executive Summary of your investigation, including a description of the device or systems and the Autopsy tool used for the forensics analysis.

· Step-by-step description you used to gather data for analysis

· Report on the information that was obtainable from the device

· Graphics evidence that you conducted the forensics data gathering and analysis

The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

 5 pages document with screen shots of the process

Answer all the questions mentioned

APA format and need minimum 5 scholarly references

need plagiarism report with the document and on time

assignment work(Planning the project)

  

Earned-value analysis. A project budget calls for the following expenditures:

  

Task

Date

Budgeted Amount

 

Build forms

April 1

$10,000

 

Pour foundation

April 1

$50,000

 

May 1

$100,000

 

Frame walls

May 1

$30,000

 

June 1

$30,000

 

Remaining tasks

July 1 and beyond

$500,000

Define each term in your own words, calculate these values for the above project, and show your work:

  1. Budgeted cost baseline (make a graph illustrating this one)
  2. Budget at completion (BAC)
  3. Planned value (PV) as of May 1
  4. Earned value (EV) as of May 1 if the foundation work is only      two-thirds complete. Everything else is on schedule.
  5. SV as of May 1.
  6. Actual cost as of May 1 is $160,000. Calculate the cost      variance (CV) as of May 1.
  7. Schedule performance index (SPI)
  8. Cost performance index (CPI)
  9. Estimate to complete (ETC), assuming that the previous cost      variances will not affect future costs
  10. Estimate at completion (EAC)

Homework 1

Please find the attachment of home 1

Total words 600 excluding references and No plagarism

Cookies

 
Explain how cookies can show that a user has visited a site if that user’s history has been deleted. Need in a word document with no less than 250words with references.

Assignment 4- C Programming.

Due in 12 h

You shall implement all functions described in this skeleton code, according to their commented descriptions, in a header file named cs19_c_strings.h.

You may not use any #include directives. Rather, take this opportunity to write pure C++, without the use of any library functions/classes/etc.

Notes:  Note that these functions are wrapped in a namespace named cs19. Namespaces are C++’s broadest non-global scope, and are used as a way of grouping together classes, functions, etc. into a category. When we refer to std::cout, for example, we are accessing a variable named cout within a namespace named std (where all of the C++ standard library items are defined). 

Final_Assignment

1. In CLIQUE, the threshold used to find cluster density remains constant, even as the number of dimensions increases. This is a potential problem since density drops as dimensionality increases; i.e., to find clusters in higher dimensions the threshold has to be set at a level that may well result in the merging of low-dimensional clusters. Comment on whether you feel this is truly a problem and, if so, how you might modify CLIQUE to address this problem.

2. Name at least one situation in which you would not want to use clustering based on SNN similarity or density.

3. Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of connection (interconnectedness) of clusters.

4. We take a sample of adults and measure their heights. If we record the gender of each person, we can calculate the average height and the variance of the height, separately, for men and women. Suppose, however, that this information was not recorded. Would it be possible to still obtain this information? Explain.

5. Explain the difference between likelihood and probability.

6. Traditional K-means has a number of limitations, such as sensitivity to outliers and difficulty in handling clusters of different sizes and densities, or with non-globular shapes. Comment on the ability of fuzzy c-means to handle these situations.

7. Clusters of documents can be summarized by finding the top terms (words) for the documents in the cluster, e.g., by taking the most frequent k terms, where k is a constant, say 10, or by taking all terms that occur more frequently than a specified threshold. Suppose that K-means is used to find clusters of both documents and words for a document data set.

(a) How might a set of term clusters defined by the top terms in a document cluster differ from the word clusters found by clustering the terms with K-means?

(b) How could term clustering be used to define clusters of documents?

8. Suppose we find K clusters using Ward’s method, bisecting K-means, and ordinary K-means. Which of these solutions represents a local or global minimum? Explain.

9. You are given a data set with 100 records and are asked to cluster the data. You use K-means to cluster the data, but for all values of K, 1 ≤ K ≤ 100, the K-means algorithm returns only one non-empty cluster. You then apply an incremental version of K-means, but obtain exactly the same result. How is this possible? How would single link or DBSCAN handle such data?

IT345 7 discussion

 Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources

 

Topics:

  • How well can we predict the consequences of a new technology or application?
  • Who should make the decision for a business on what technology the adopt?
  • What does the term “need for reasonable judgement” mean?
  • Do sites like Wikipedia hold any credibility?

final project

     

11page   paper
use the book too that’s been provided

Scholar   reference

And prepare the PowerPoint slide too of the  paper with a diagram as much as possible 

Instructions

 

Pick one of the below operating systems and present information on the operating systems, and your thoughts comparing the selected operating system with other systems.

small description of all the operating systems listed

why it is best than the rest of all also includes the pros and cons of the chosen one.

good reasoning behind choosing this

what are the future program and aim 

big company that uses this operating system
some diagram to explain in the presentation slide must be included

Also, explain some topics from the book for these operating systems

· Windows 

· Linux 

· Unix

· Android

· iOS