you will be asked to submit a term paper that includes at least 10 pages and at least 5 scholarly research, government white papers, or reputable industry reports. This term paper will ask you to survey the ways in which Big Data has been utilized across a range of business activities that include the following aspects: product development, predictive maintenance, customer experience, fraud and compliance, machine learning, operational efficiency, and drive innovation. Further details defining the scope of each of these business activities is included below for clarification.
Activity 2
You are a member of the senior management staff at XYZ Corporation. You have historically been using a functional structure set up with five departments: finance, human resources, marketing, production, and engineering.
- Create a drawing of your simplified functional structure, identifying the five departments.
- Assume you have decided to move to a project structure. What might be some of the environmental pressures that would contribute to your belief that it is necessary to alter the structure?
- With the project structure, you have four projects currently ongoing: stereo equipment, instrumentation and testing equipment, optical scanners, and defense communications.
- Draw the new structure that creates these four projects as part of the organizational chart.
Text
Title: Project Management
ISBN: 9780134730332
Authors: Pinto
Publisher: Pearson
Edition: 5TH 19
Java Programming
Submit copies of any Java source code files you created or modified:
- PizzaOrder.java
- DiceSimulation.java
Submit the word processing document that contains the screen shots showing you have successfully executed the DiceSimulation.java program for the three cases: once where you used a while loop, a second time where you used a do-while loop, and a third time where you used a for loop.Name the word processing document containing the screen shots that demonstrate successful execution of the DiceSimulation.java program in a file named ” XYLab2.docx“, where ” X” and ” Y” are your first and last initials.Include a comment containing your full name in all Java source code files that you create or modify.
Summary of Article
Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.
What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.
Specialization
Journal Reflection on Topic Ideas
Share your topic idea(s) here. Here are some things to consider:
- Identify a topic in your specialization. (For IT students, Information Technology is not a topic, however, Millennial’s perceptions of smart phone technology could be a topic. These are examples).
- What is the cited problem? The problem you want to address has to come from the literature, and be cited, who are saying there are problems.
- What is the population you would like to address?
- What methodology are you planning on using? (If you are unsure, do you plan on a quantitative or qualitative study? You will determine your methodology in 839).
- Locate at least one article related to your topic. What was the research question in the study? Who were the participants in the study? What findings were reported?
500 words APA format needed
Discussion( Professional Writing and Proposal Development) DSRT
Overview: To avoid issues with self-plagiarism, you will focus on a “mock” dissertation topic to guide your work in professional writing. This “mock” dissertation topic CANNOT be used as your exact dissertation topic. However, it should be viewed as your practice round of setting up a study and learning the steps involved in building a high-quality dissertation. In the discussion this week, you will indicate the topic you have chosen, the research question(s) you will use to explore the topic, and provide coaching to other classmates on their research questions.
As a reminder, here are the choices for your “mock” dissertation topic.
Students must choose from the listed topics of their school/program:
- IT Students:
- Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning
- Using Data Science Techniques To Enhance Data Security
Directions:
- A brief discussion of the “mock” dissertation topic you chose and why.
- The research question(s) you will use to employ to explore the topic.
- A brief discussion of how you plan to design your study to answer the research questions from #3.
At least 500 words******
No Plagiarism***************
References******
APA Format *********
Create an activity diagram
Create an activity diagram and a set of detail use-case descriptions for a health club membership system. When members join the health club, they pay a fee for a certain length of time. Most memberships are for one year, but memberships as short as two months are available. Throughout the year, the health club offers a variety of discounts on their regular membership prices (e.g., two memberships for the price of one for Valentine’s day). It is common for members to pay different amounts for the same length of membership. The club wants to mail out reminder letters to members asking them to renew their memberships one month before their memberships expire. Some members have become angry when asked to renew at a much higher rate than their original membership contract, so the club wants to track the prices paid so that the manager can override the regular prices with special prices when members are asked to renew. The system must track these new prices so that renewals can be processed accurately. One of the problems in the health club industry is the high turnover rate of members. Although some members remain active for many years, about half of the members do not renew their memberships. This is a major problem, because the health club spends a lot in advertising to attract each new member. The manager wants the system to track each time a member comes into the club. The system will then identify the heavy users and generate a report so the manager can ask them to renew their memberships early, perhaps offering them a reduced rate for early renewal. Likewise, the system should identify members who have not visited the club in more than a month, so the manager can call them and attempt to reinterest them in the club.
Draw a use-case diagram for the system in exercise N
Project – 4 to 6 Pages
There are many ideas that come from error or accidents. Complete the following:
- Research 1–2 game-changing ideas that came from an error or accident. Do something different from well-known accidental inventions such as sticky notes.
- Write a paper of at least 4–6 pages about what you learned.
- If it is simple situation where you may only be able to get a page of material from it, choose 2 accidents or errors and continue.
- Talk about the forces that supported it.
- This should be a paper in APA format with a cover page and references.
- Turn in the Word document with your paper.
- Post your work to your blog.
Policy
Scenario
After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.
Consider the following questions for collecting and handling evidence:
1. What are the main concerns when collecting evidence?
2. What precautions are necessary to preserve evidence state?
3. How do you ensure evidence remains in its initial state?
4. What information and procedures are necessary to ensure evidence is admissible in court?
Tasks
Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.
Address the following in your policy:
§ Description of information required for items of evidence
§ Documentation required in addition to item details (personnel, description of circumstances, and so on)
§ Description of measures required to preserve initial evidence integrity
§ Description of measures required to preserve ongoing evidence integrity
§ Controls necessary to maintain evidence integrity in storage
§ Documentation required to demonstrate evidence integrity
1000 words
APA format with references needed
LIT101 week and 8a
Discussion 8A: Interpreting Poetry
No unread replies.No replies.
This week we will be practicing interpreting poetry. There are 100s of outstanding poets in history, so it is difficult to narrow down which ones for me to choose this week! Please review the bios and a selection of poems from the following five poets:
Rumi
Bio: https://www.poets.org/poetsorg/poet/jalal-al-din-rumi (Links to an external site.)
Poems: https://www.khamush.com/poems.html (Links to an external site.)
Langston Hughes
Bio: https://www.poets.org/poetsorg/poet/langston-hughes (Links to an external site.)
Poems: https://www.poets.org/poetsorg/poems/44733 (Links to an external site.)
Basho
Bio: https://www.poetryfoundation.org/poets/basho (Links to an external site.)
Poems: https://www.poemhunter.com/matsuo-basho/ (Links to an external site.)
Shakespeare
Pablo Neruda
Bio: https://www.poetryfoundation.org/poets/pablo-neruda (Links to an external site.)
Poems: https://www.poemhunter.com/pablo-neruda/ (Links to an external site.)
Initial Post
Choose one poem from the above listed poems. Then complete the following:
1. Paste and cite the poem.
2. Discuss in your own words what you think the underlying meaning is in the poem.
3. Discuss the literary elements used in the poem that helped you interpret the meaning of the poem.
Responses to Others
Respond to at least two other posts. Discuss the similarities and differences of the literary elements the authors used. Also, is your interpretation of their poem the same of different from what they identified? Explain.
