IT 206 Design and analysis of algorithm

Read chapter 10 sections 10.1-10.5.

Solve this problem:

Write an algorithm for the situation below for 1 soldier. Then rewrite it for 2 soldiers.

Ferrying soldiers
A detachment of n soldiers must cross a wide and deep river with no bridge in sight. They notice two 12-year-old boys playing in a rowboat by the shore. The boat is so tiny, however, that it can only hold two boys or one soldier. How can the soldiers get across the river and leave the boys in joint possession of the boat? How many times need the boat pass from shore to shore?

book details 

Title: Data Structures and Algorithms Made Easy: Data Structures and Algorithmic Puzzles

Author: Narasimha Karumanchi

Publication info: Career Monk Publications, 5THEdition, 2016

ISBNs: 819324527X. 978-8193245279

IT345 week 6B

 Find a recent article that relates to either employee monitoring that is conceived as too invasive or a recent incident of where employee data has been breached. Summarize the article and discuss how you believe this will impact the company, and application (if applicable). Also, was the data exploited through an application or storage location that is not necessarily needed to run a business? Is it a nice to have? Example: a social media type application. 

300 words and citation

Adopt a pet” web application

They are three assignments and they are all related to each other. The topic I want it to be about is “Adopt a pet” web application. The application is about being able to adopt a pet using a web application. The requirements of the assignments are attached below. and each assignment I have in a folder and with it will be documents you reference from according to the requirement to the question itself. And also there is a folder called templates and this folder has templates that you can use for the assignments. 

BSW 11

In 250-300 words

 

You are the web master of a college website. You share a server with other school departments such as accounting and HR. create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.

Discussion-II

 

Name the three essential elements of a basic structured cabling network? How are they installed and what are the components that are involved with them? 

Search the peer-reviewed literature to identify its potential impact on networking and what measures can be put in place to minimize the effect. 

MIS Assignments

 1) What are your overall impressions?
2) Describe what is meant by ERP systems.
3) Describe how the video relates to specific topics in the textbook.
4) Do you agree with what Dr. Word is proposing?
5) Could a possible minor in MIS be of benefit in your career?

Here is the video (copy and paste into your browser):

https://uhdmediasite.uhd.edu/Mediasite/Play/70bd29f9d1d14c0ca444cfa9c6bb36581d 

MAKE SURE there is no more than 25% plagiarism 

Week Seven Discussion Topic Question:

  

Chapter 7 in the textbook discusses the different approaches of communication in change management. After reading the chapter, refer to the contingency approach features in communication. Offer a summary of the feature and discuss its role in organizational change. How can this change communication approach can aid in facilitating a change effort?

Course book exercises

  • Chapter 7 – study questions 1-10, Exercise 2
  • Chapter 8- study questions 1-10, Exercise 2

Precise answers to all questions and exercises in different words from text book. If copying from text book, add reference in APA format.

Textbook link – Information Systems for Business and Beyond 

https://bus206.pressbooks.com/

Project management

Find any example of a real project with a real project manager. Feel free to use projects in the media (such as the Olympics, television shows, or movies) or a project from your work, if applicable.

Write a two page paper describing the project in terms of its scope, time, and cost goals.

Also describe other impacts on a project, such as quality, resources, and risks.

Discuss what went right and wrong on the project and the role of the project manager and sponsor.

Be sure to describe whether the project was a success, and why.

Include at least one reference and cite it on the last page. 500 words 

Company Privacy Policy – Operations Security

For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed. 

– 1 Page, 3-4 paragraphs required

– NO Plagiarism 

– References required