There have been many books and opinion pieces written about the impact of AI on jobs and ideas for societal responses to address the issues. Two ideas were mentioned in the chapter – UBI and SIS. What are the pros and cons of these ideas? How would these be implemented?
Create an assembly program called “Equation.asm” that calculates the following:
A = B * 3 +6 / (X + D)
where B == 10, X == 4, D == 2
Define all variables as Word
BONUS (10 points) : TAKE USER INPUT FOR B ,X , and D. You will get 10 extra credit if your program works correctly with any user input for those three variables (B, X, D). This is for those of you asking for extra credit 🙂
CIVILITY PRESENTATION Attached Files: Objectives When you have completed this application, you will be able to: (1) Apply the principles of interpersonal communication. (2) Apply the principles of team communication in high-performing teams. (3) Apply b
CIVILITY PRESENTATION
Attached Files:
Objectives
When you have completed this application, you will be able to: (1) Apply the principles of interpersonal communication. (2) Apply the principles of team communication in high-performing teams. (3) Apply business communication skills associated with the use of communication technology.
Planning Tip: In reviewing your reading per the Planning Calendar – Skip chapters and Read Chapter 14 (Planning Presentations) in the course’s textbook. This will help with planning and applying key elements for an effective presentation.
Team Application: Develop a five to ten minute presentation about maintaining civil communications in the workplace OR on an academic virtual team. Describe ONE specific scenario of incivility that has happened OR could happen in the workplace OR on an academic virtual team. *Provide a simple set of recommendations that your audience will find compelling, insightful, and easy to remember.
*Create a five-slide (PowerPoint) presentation:(maximum number of slides)- title slide and four slides- to complete the above Team Application. Make sure to use applicable images and content to describe the specific scenario of incivility and simple set of recommendations. Audience: Internal presentation for business professionals at UHD/MDCOB
1 to 2 Research paper
- Research a cloud testing service. Some examples include:
- SOASTA CloudTest
- Nessus
- LoadStorm
- BlazeMeter
- QualiTest
- SoftSol STiC
- In a Word document, identify the following and write a brief summary of what you learned in your research:
- The type, features, and functionality of the testing service
- Who provides the service and billing/pricing options?
Cloud Computing
- Define collaboration.
- Define and describe cloud-based collaboration.
- The CIO of Ace Accounting Services suggests that the company can save considerable money using VoIP for phone calls. Define and describe VoIP. Then present three companies that provide VoIP offerings. Compare and contrast each company’s offering. Also, discuss whether or not you agree with the CIO and justify why.
- List the questions one should consider when evaluating a cloud-based collaborative solution.
Use 75-words max per topic to discuss and present your answer.
References: Chapter 7
Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning
Feb 17
- Part I:
Review the “7 Steps to Solving a Problem” attachment abovePart II:
Read the story below:You are currently working at a small company of about 100 employees. Your company just lost a very large client and therefore they need to let go of five employees in your department.
The workload of the five employees has been divided up between you and a fellow employee. Your fellow employee is very upset about this because now they must take on more work and not get a pay raise. This employee wants you to join them and fight your boss together for more money. You don’t feel comfortable doing this because you love your job. You would like to make more money, but you do not want to upset anyone and lose your position. On top of this situation, there is a big project that needs to be completed in three days!
How would you solve the above problem?
- Review the “7 Steps to Solving a Problem” attachment. Reflect on, and discuss, how the problem described above can be resolved using the steps.
- Analyze and explain your application of each of the 7 steps in the “7 Steps to Solving a Problem” attachment to solving the problem described in the above story
- Your submission should be a minimum of one page of content in length. Please type the question as well as your answer. Properly cite any source utilized in APA format.
Assignment
You will describe (via an xls) the characteristics of at least four (4) different types of theorized hypothesis indicating the type of variables implicated (dependent, independent, categorical, quantitative, impact of outliners) and their count (i.e. ANOVA, 2 or more categorical IV, 1 dependent quantitative variable, outliners only applicable to IV).
assignment
CSCE 5300 Introduction to Big data and Data Science
ICE-3
Lesson Title: Hadoop MapReduce and Hadoop Distributed File System (HDFS)
Lesson Description: Overview of Hadoop and Map Reduce Paradigm. The Lesson focuses on
map reduce applications with coding exercises by actual implementation
In class exercise
1. Matrix Multiplication in Map Reduce
Suppose we have a i x j matrix M, whose element in row i and column j will be denoted and
a j x k matrix N whose element in row j and column k is donated by then the product P = MN
will be i x k matrix P whose element in row i and column k will be donated by ,
where = .
1. Create a Map-Reduce Program to perform the task of matrix multiplication
Reference:
https://lendap.wordpress.com/2015/02/16/matrix-multiplication-with-mapreduce/
2. Breadth First Search using Map Reduce
3. Depth First Search using Map Reduce
4. Apply Map reduce problem using K-Means Clustering Technique. A view
point of the such algorithms are presented in the screenshot.
Convert this into code and use right dataset to implement this scenario.
Marks will be distributed between logic, implementation and UI
Programming elements:
Hadoop MapReduce and HDFS
Source Code:
Given in canvas.
ICE Submission Guidelines
1. ICE Submission is individual.
2. ICE code has to be properly commented.
3. The documentation should include the screenshots of your code/results with explanation.
4. Provide the explanation of the dataset/exercise as per your understanding.
5. The similarity score for your document should be less than 15%.
6. All you need to do is submit the source code (properly commented) and documentation
(.pdf/.doc) with explanation and screenshot of source code having input logic and output
results.
7. Submission after the deadline is considered as late submission.
computer and network security
Please enter your response to both questions posed below.
Total word count must be 250 to 300 words in your posting. (20 points)
Please also respond to at least two of your classmates with a meaningful reply of 150 words or greater each. (5 points each)
Do not cut and paste, please post original work.
Please provide references for your original postings in APA format.
- What do you think is the best combination of the types of authentication? Is that type of authentication appropriate for all types of access?
- Some have made the argument that using WEP presents more security issues than if all traffic were in the clear. What do you think?
Exp19_Excel_AppCapstone_Intro_Collection
Looking for the excel spreadsheet for:
Exp19 Excel AppCapstone Intro Collection
Raymond’s Art Collection
