Reflection2

  

Reflect to the course Technology that transforms.

2 pages 

1. Course Content: Describe the most important aspects of this course for you with respect to the content that was covered or activities in which you participated. Discuss the relevance and value or the practicum assignment with respect to your knowledge acquisition.

2. Application of Course Content: Describe how you applied what you learned in this course at your workplace. Discuss how this course may have impacted your specific job, techniques you used at work, or other relevant aspects that show how what you learned was linked to your job.

3. Job Experience Integration: Describe how your work experiences were used in the classroom and attributed to your performance in the course. Discuss how integrating your work experiences in class activities assisted in understanding topics discussed within the course.

Homework 4 (Individual Work) HIM 6122C: System Analysis and Design

 

Answer the following questions using Microsoft Visio or a suitable software. I use Lucid Charts

  1. Draw a neat diagram (for each model) indicating how the following software development models could be used in developing a decision support system for a clinic.

      a) Waterfall model

      b) Extreme Programming

      c) Rapid prototyping

      d) Iterative and Incremental model (general)

  1. Explain along with a diagram on how Scrum can be used in the synthesis of a medical billing system. Your answer must have at least 250 words and a neat diagram describing the use of scrum for the scenario mentioned. The answer must also identify individual sprints for the overall process.
  2. Explain the use of scenario-based testing for the above scenario. Your answer must provide the scenario and the testing strategy.

SYSC2

  • Why and how are employers increasingly using workplace monitoring?
  • What are the capabilities of advanced surveillance technologies, and what ethical issues do they raise?

computer

 

Post to the discussion board at least one time before Wednesday, then post again on another day. Discuss one of the topics below without repeating what another student posted. You may answer another question, reply to me, or reply to another student for your second post, but you must add useful information. Use at least three sentences but no more than two paragraphs. “I agree” does not count as a sentence. Be sure to use correct grammar and spelling and cite your work. Please see the links in the “Start Here!” folder for the correct procedures to use when citing.

  • Discuss the evolution of the Internet
  • Briefly describe various broadband Internet connections
  • Describe the purpose of an IP address and its relationship to a domain name
  • Describe features of browsers and identify the components of a web address
  • Describe ways to compose effective search text
  • Explain benefits and risks of using online social networks
  • Describe uses of various types of websites: search engines; online social networks; informational and research; media sharing; bookmarking; news, weather, sports, and other mass media; educational; business, governmental, and organizational; blogs; wikis and collaboration; health and fitness; science; entertainment; banking and finance; travel and tourism; mapping; retail and auctions; careers and employment; e-commerce; portals; content aggregation; and website creation and management
  • Explain how the web uses graphics, animation, audio, video, and virtual reality
  • Explain how email, email lists, Internet messaging, chat rooms, online discussions, VoIP, and FTP work. Identify the rules of netiquette 

CMIS102 Homework Assignment 4

  

CMIS102 Homework Assignment 4 

Problem definition: Write a program, using functions, that calculates the area and perimeter of a rectangle whose dimensions (Length and width) are provided by a user. 

A. Problem Analysis – Following the directions in the assignment, clearly write up your problem analysis in this section. 

This program will calculate the area and perimeter of a rectangle, using functions based on the users’ input of the length and width. 

B. Program Design – Following the directions in the assignment, clearly write up your problem design in this section and comment your pseudocode. 

C. Program Comments and Test Data – Following the directions in the assignment, include your test data and expected results in this section.

research assignment

 

The topic should be of graduate level not a survey. Investigate an important question. 

Your Research Project will be a presentation on some aspect of the surveillance state.  Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic.

Problem 2- Org Behavior

1. Discuss whether diversity helps or hinders a group.

Text-

Title: Essentials of Organizational Behavior, Student Value Edition 

ISBN: ISBN-13: 9780135468890 

Authors: Stephen P. Robbins, Timothy A. Judge 

Publisher: Pearson 

Edition: 15TH

digital forensics

 Use the web or other resources to research at least two criminal or civil cases in which  recovered files played a significant role in how the case was resolved. 

Project

Overall Project Scenario

Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs’ services to solve problems involving malware removal, to manage data recovery and network issues, and to install hardware and software.Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff.You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.