YBC 7289

MIS437- Module 1: Discussion: What data would be stored for this?

Some of the earliest known examples of recorded information come from Mesopotamia, which roughly corresponds to modern-day Iraq, and date from around the middle of the fourth millennium BC. The writing is called cuneiform, which refers to the fact that marks were made in wet clay with a wedge-shaped stylus.

A particularly famous mathematical example of cuneiform is the clay tablet known as YBC 7289.

This tablet is inscribed with a set of numbers using the Babylonian sexagesimal (base-60) system. In this system, an angled symbol, <, represents the value 10 and a vertical symbol, |, represents the value 1. For example, the value 30 is written (roughly) like this: <<<. This value can be seen along the top-left edge of YBC 7289.

YBC 7289

The markings across the center of YBC 7289 consist of four digits: |, <<||||, <<<<<|, and <. Historians have suggested that these markings represent an estimate of the length of the diagonal of a unit square, which has a true value of  (to eight decimal places). The decimal interpretation of the sexagesimal digits is, which is amazingly close to the true value, considering that YBC 7289 has been dated to around 1600 BC.

What we are going to do with this ancient clay tablet is to treat it as information that needs to be stored electronically

The choice of a clay tablet for recording the information on YBC 7289 was obviously a good one in terms of the durability of the storage medium. Very few electronic media today have an expected lifetime of several thousand years. However, electronic media do have many other advantages.

The most obvious advantage of an electronic medium is that it is very easy to make copies. The curators in charge of YBC 7289 would no doubt love to be able to make identical copies of such a precious artifact, but truly identical copies are only really possible for electronic information.

This leads us to the problem of how we produce an electronic record of the tablet YBC 7289. 

What data would be stored for this?

This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 New Zealand License.

MIS

 All work is to be in your own words. 

 Select one topic below.  Provide at least a 2-paragraph explanation/definition of the emerging technology concept. Be sure to cite your sources (at least two unique sources are required). Definitions may not be copied word for word from any source. All definitions should be in your own words.  

Topic:  VPN – Virtual Private Network  

 Now that you have defined an emerging technology concept, write at least 2 pages discussing the following information. Part of the paper can be the information posted in the discussion forum.

 1. Strengths and weaknesses;

 2. How the concept is being or could be used in a business setting; and  

3.  A product that has evolved from the concept.

Assignment

You are a member of the Human Resource Department of a medium-sized organization that is implementing a new interorganizational system that will impact employees, customers, and suppliers.  Your manager has requested that you work with the system development team to create a communications plan for the project.  He would like to meet with you in two hours to review your thoughts on the KEY OBJECTIVES OF THE COMMUNICATIONS PLAN.  What should those objectives be?

Work

See the attached file and message me for more information or instruction.

Powerpoint Presentation and research paper

Topic: Internet of Things

Outline for Presentation

  • Define your topic and its associated ethical dilemma (ethical values or principles)
  • Identify the facts: Stake holders, activity, actions, laws (or lack of)
  • Briefly outline two or three options / solutions and their consequences (intended and unintended) 
  • Thoughtful discussion questions or prompts to engage the class to discuss the conflict or dilemma 
  • What did you find surprising about this issue or the class discussion???
  • Last word:  Your opinion and justification…any changes from discussion input.


Also write the research paper with the same content

week-4

 

Cryptography is used to protect confidential data in many areas. Chose one type of cryptography attack and briefly explain how it works (examples include: ciphertext-only attack, known-plain-test attack, chosen-plaintext, chosen-ciphertext attack, timing attack, rubber hose attack, adaptive attack).

Discussion 4- Legal

Assigned Readings:Chapter 5. Business and the Constitution.Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Explain the difference in procedural due process and substantive due process, providing examples of each.
  2. Beets R Us, LLC is a medium-sized farm in Iowa that grows beets that are only sold in Iowa.  It does not export its beets outside of Iowa, though sometimes customers from out of state buy its beets while visiting Iowa.  Is Beets R Us, LLC’s business practices subject to federal jurisdiction under Article I, Section 8 of the United States Constitution?  Why or why not?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]

Text

Title: Business 

ISBN: 9780357447642 

Authors: Marianne M. Jennings 

Publication Date: 2021-01-01 

Edition: 12th Edition

Case Study

Case Study

Due: Sunday, End of Module by 11:55 p.m. EST

Case Study 14.3 The Navy Scraps Development of Its Showpiece Warship—Until the Next Bad Idea, Page 500.

Questions:

  1. The U.S. Department of Defense has a long history of sponsoring projects that have questionable usefulness. If you were assigned as a member of a project review team for a defense project, what criteria would you insist such a project has in order to be supported? In other words, what are the bare essentials needed to support such a project?
  2. Why, in your opinion, is there such a long history of defense projects overshooting their budgets or failing some critical performance metrics? (Consider other project cases in this text, including the Expeditionary Fighting Vehicle discussed in Chapter 5.)
  3. “The mystery is not that the Zumwalt was canceled. The mystery is why it took so long for it to be canceled.” Do you agree with this assessment? Why or why not?
  4. Google “criticisms of the Littoral Combat Ship” and identify some of the problems that critics have listed. In light of these problems, why do you think the Navy has pressed ahead with the development of the LCS?

Writing Requirements

  • 5-7 pages in length  (excluding cover page, abstract, and reference list)
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.