mod 3

 

Module 03 Content

  1. For this part of your course project, you will need to update the Risk Register you completed in Module 01 and complete the Risk Evaluation columns 2a-2c for each operational risk that was identified. Column 2d will populate automatically with the RPN (Risk Prioritization Number). You will also fill out column 2e with a remark explaining your reasoning in determining the likelihood and severity of each risk.

    Please incorporate any feedback from your submissions in previous modules.

    Note: Make sure to refer to your Risk Management Plan and work on the relevant areas. This is a good week to address the Risk Management Approach section in your Risk Management Plan.

    Submit your completed assignments by following the directions linked below. Please check the Course Calendar for specific due dates.

Professor Higgins has asked you to

  

Professor Higgins has asked you to design the logic that will be used to calculate final class averages and grades for his students. His grading algorithm is as follows:
 

Exam average: 50%
Quiz average:30%
Lab average: 20%
 

Professor Higgins has 30 students in his class. For each student, Professor Higgins will enter the value for each of the averages (exam, quiz, and lab). Then, using the weighting above, the program will calculate the final student class average and store each student’s final average into an array. The program will then determine the letter grade for each student using the following criteria:
 

90 – 100:A
80 – 89:B
70 – 79C
60 – 69D
Less than 59F
 

When the student’s final grade is determined, the final grade will be stored in a second “grade” array.
 

After the array has loaded, the program will perform the following:
 

Display the scores and grades for all the students
Total class average (total of all individual student averages / number in class)
 

Design a program using structured pseudocode as demonstrated in the lectures and, ensuring all variables are declared, prompt the user for the appropriate input and display a meaningful output message. If an average score is entered that is less than 0, set the average score to 0. If an average score is greater than 100, set the average score to 100. Provide a program introduction message that tells the user how to use the program.

sync4

prepare a short PowerPoint presentation (6-10 slides) that describes and summarizes the published study. Ensure that the following items are covered in the presentation:

  • Problem addressed by the study
  • Research question(s) guiding the study
  • Conceptual model of the study relationships
  • Research approach (Exploratory vs Hypothesis-Based)
  • Research design (Qualitative vs Quantitative vs Mixed Methods)
  • Research methods utilized
  • Extension opportunity

Design a modulo

  

Design a modulo-6*. D Type, Asynchronous down counter in which gated outputs reset the bistables after the appropriate count is achieved. Test the design on PSpice (downloaded programme) Show designs working give screen shots of appropriate wave forms (*modulo-6 5, 4, 3, 2, 1, 0, 5, 4, 3, 2, 1, 0, ……5, 4,

Open source technology cybersecurity (Critical Thinking )

  

Open source technology is a rapidly growing phenomenon. Many programmers and users are passionate about open source software and believe that all software programs (and source code) should be freely available. For this assignment, address the following items:

· Compare and contrast the practicality for all software to be distributed in this manner.

· Discuss the effects on commercial software and commercial developers if all software were to become open source.

· Include your opinions on whether or not innovation would be enhanced or restricted if there was no financial incentive to create software.

Requirements:

– Paper should be five to six pages in length, not including the title and reference pages.

– You must include a minimum of three peer-reviewed, scholarly sources. 

– Paper must follow 7th APA style guidelines.

– References must be from 2017 and above. 

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them 

Research Paper Blockchain

 Throughout the course, you will be studying a variety of technology topics that are relevant in enterprise settings. Some of you are students exclusively while others of you work in corporate America. Regardless of your situation, the advances of modern technologies are disrupting the way people work, live, and learn. The goal of this research assignment is to conduct a deep-dive analysis on one of the following topic areas. When conducting your research, you need to identify how digital transformation in business is a disruptor to the specific topic area selected. Topic areas to consider include:

  • Cloud Computing
  • Mobile Computing
  • Internet of Things
  • Wearable Computing
  • Artificial Intelligence/Cognitive Systems/Machine Learning
  • Security & Privacy
  • Social / Collaborative Platforms
  • 3-D Printing
  • Online Learning & Andragogy
  • Blockchain

The final paper includes an exhaustive research study using the outline below to substantially support your findings. Using the following paper structure format:

  • You are to write a 10-12 page research paper.
  • The paper should be, double-spaced following APA format using a Times New Roman 10 to 12-point font.
  • Page counts do NOT include cover pages, references, or abstract.
  • Treat this as if you had an opportunity to publish in a peer-reviewed business or technology journal. 

The paper structure should be as follows:

  • Abstract
  • Introduction
  • Problem Statement
  • Research Analysis
  • General Findings
  • Strength Identification relative to disruption
  • Weakness Identification relative to disruption
  • Why is this an opportunity?
  • Why is it a threat?
  • How does this disruption solve problem X?
  • Further areas of research to consider
  • Conclusion
  • References

power point

 You are a health care administrator of your local medical facility, and you have been asked to give a presentation showing the importance of the census in the hospital setting.Develop a PowerPoint presentation that outlines the information listed below.

  • How your hospital uses the census on a daily basis (when the information is collected and how is it used).
  • How inpatient service days (IPSD) and the daily inpatient census (DIPC) are used and affect the financial well-being of the organization (include the roles that admitted and discharged (A&D) play in the calculation of the each).
  • How the census is used by the hospital and how it can help the hospital identify health care trends.

Your PowerPoint presentation should be a minimum of seven slides in length, not counting the title and reference slides. You are required to use at least your textbook as an outside source. Additionally, be sure to include an introduction and conclusion.If you would like to learn PowerPoint best practices, consider viewing the Success Center’s 

Write a pseudo code that that

  

Write a pseudo code that that does all of the following (steps a through e).
a. Prompt the user to enter a numeric score.
b. Read the score. Note that fractional inputs (like 95.7) are possible
c. If the score entered is not valid, print an error message, do not assign a grade, and do not output a grade
d. Otherwise, assign a letter grade to a variable based on the grading criteria below
e. Output the letter grade
 

Score Grade
90-100 A
80 up to but less than 90 B
70 up to but less than 80 C
60 up to but less than 70 D
less than 60 F
less than 0 or greater than 100 invalid score
 

Include flowchart and analysis

Week 2 Discussion – Telecom

Create a discussion thread and answer the following question:

Compare and contrast the difference of network security within an on-premise environment and a cloud environment. Give some examples of areas that are common and areas that are different.

Note: The first post should be made by Wednesday 11:59ET and you should post at least two more times throughout the week to your classmates. Please engage early and often.

Your initial post should be 250-300 words. There must be at least two APA formatted reference (and APA in-text citation) to support your thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.