Do the following assignment based on the attach document. use jeannese as first name then Evina as last name to execute the commands.
Cloud Computing Portfolio Assignment
For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.
- Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.
- Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
- Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?
- Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.
ADVANCED EXCEL
Run the t test method on the example in slides 9-10 of the ppt posted under Hypothesis testing. Use the t test formula. Use the data analysis t test to find the probability and make a decision about the null hypothesis. Send me the excel file.
logistic regression
Write a fully executed R-Markdown program and submit a pdf/word or Html file performing classification task on the Binary response variable from the Santander Bank Case Study. Make sure to try several permutations of the model before finding the best available model. You are required to clearly display and explain the models that were run for this task.
Write Your Objective Summary ( ponzi scheme)
Assignment Content
- At this point, you have found your research articles exploring your approved research question and you have learned how to find your 6 ‘ingredients’ during class (contact the Graduate Research Center for help if you need it: [email protected] OR the Virtual Library accessed through the Content page).
In Class: You learned about the W(5) H(1) and completed Phase 2 on p. 13a of your Final ‘Mission’ Packet (Found in W. 4’s HW). This will be IMPORTANT for Week 6 so you MUST complete this before our next meeting. These notes will also help you with this assignment. See below:
For this assignment: You will choose ANY ONE of the research articles you submitted for W. 4’s HW and complete the following in a WORD document.
Requirements:- 15 pts, Cover/Title Page
- 70 pts, Objective Summary: W(5) H(1) — YOU MUST PUT THIS IN YOUR OWN WORDS (Check your similarity BEFORE you submit)
- 15 pts, References Page (you will only have one reference listed — the research article you are using. Use the CORRECT references formula in the Foundations text to help you – found in Course Resources folder)
- Resources to help you:
- Re-watch the class recording
- In Foundations Text:
- See pp. 17-22 to read about objective summaries
- See pp. 23-28 to read more about avoiding plagiarism
- See pp. 33-34 for Journal references formula
Project microsoft acces
I need someone to make me a school project on acces
Usability Study – Human–computer interaction
A) Select a portion of a website that you are interested in. – Walmart.com
B) You are to perform a heuristic evaluation of that Website or product. You are required to use Nielsen’s 10 heuristics for this assignment, available online at: https://www.nngroup.com/articles/ten-usability-heuristics/
C) To guide you in your complete analysis of the usability analysis, you are required to identify at least one scenario that reflects how a user is likely to use your website or product in real-life. Try and replicate the user experience as part of the study heuristic evaluation.
D) This can be very general — if you were evaluating a hotel or airline website, for example, you might think about someone trying to cash in all their frequent “traveler” points, or someone trying to trade in their points as part of a transaction. Your goal here is to develop a basic scenario that will guide your heuristic evaluation.
E) Using the scenario, you will then systematically evaluate the interface – screen by screen on a transactional basis of your chosen site or product, checking to see which interface elements you encounter (if any) result in problematic experiences. Once you experience challenging experiences, you will document these areas and identify ways in which these areas can be improved potentially to avoid violating any of Nielsen’s heuristics.
Note: You should work from your scenario, and not work from the heuristics (i.e., don’t take each heuristic one at a time, looking for heuristic violations on the site).
The paper should be 4-6 pages in length. You must cite all sources using APA format. It is strongly encouraged you integrate at least 2-3 screenshots of your user experience to include the outputs of your study. When responding, make sure to answer each of these questions:
Questions
1. Identify the website or product you have been assigned (including a screenshot), and briefly describe the reason you selected the section of the Website evaluated.
2. Describe the scenario you used to focus your evaluation and explain how you approached the site/product with respect to the usability heuristics.
3. Provide a detailed analysis of the usability flaws you found for this site, along with a) the heuristics each flaw violates, and b) an explanation of why this flaw violates those heuristics.
4. Discuss some possible design recommendations that could improve the site, explaining how each recommended change would address the usability flaws you identified above.
Blockchain in supply chain management retail
Using Blockchain technology to Evaluate strategies and risks for cost reduction geologically in Supply chain management.
Deadline: April 6 time 10 PM EST
APA format
No Plagiarism
2000 to 2500 words minimum
In Paper: abstract, introduction, methods, results, discussion, and references.
Methodology: Qualitative
Database Security
(8)
Write at least 450 words discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary? What problems do they solve? How do they benefit companies?
Do not copy without providing proper attribution.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.
Include at least one quote from each of 3 different articles.
(9)
Describe in 450 words the disaster recovery plan and who is responsible at your place of employment. Consider the critical business functions and your recovery point objectives and recovery time objectives.
Use at least three sources.
(10)
Write at least 450 words discussing the Safe Harbor provisions under HIPAA.
Do not copy without providing proper attribution.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.
Include at least one quote from each of 3 different articles.
(11)
In 450 words or more, explain PCI compliance to the database administrator at a large retailer. Consider the consequences for non-compliance.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format.
Practical Connection
Course: InfoTech Import in Strat Plan
At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.
Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Part2: 3 Pages
You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas: