Tracking movement of a car with vuejs

 logistics company is trying to improve it’s tracking page to ensure it’s

effective to their clients while monitoring their deliveries .

1. Assuming you receive the following locations from the partner app after 5

seconds .

-1.298982, 36.776811

-1.297459, 36.776747

-1.296193, 36.776726

-1.296097, 36.779236

-1.296151, 36.777637

-1.296215, 36.776693

-1.294252, 36.776586

-1.294048, 36.776790

-1.293973, 36.779118

-1.292622, 36.779075

-1.291844, 36.779049

Animate the ​ driver A​ movement from the first to last location on the Tracking Page

2. Add an info window above the rider image to show ​ driver’s A name and current

locations (use coordinate values).

3. Consider a scenario where ​ driver A whose at coordinate (-1.300355, 36.773850)

initially confirms a delivery and as from the tracking page the driver icon is seen

based on his current position . ​ Driver A later cancels the order 15 seconds later

after confirmation since the client was unreachable , the icon then disappears (as

from the Tracking Page) . The order is then dispatched and confirmed by ​ driver B

whose coordinate (-1.291879, 36.778389) 10 seconds later after it was cancelled .

Driver’s B​ icon based on the current position now appears on the Tracking Page.

Show this transition on the tracking page .

Consider the following :

The application should be web based .

Driver Image ​ https://images.sendyit.com/web_platform/vendor_type/top/2.svg

Tools :

Use the Vue.js Framework (highly recommended) or any Javascript based Frameworks

5-2 Information Technology Risk Analysis and Cyber Security Policy Assignment, Part 2

 Submit your creation of a cyber-security policy. (Please note: You must use the information that was identified in the risk analysis paper and create an organizational cyber-security policy.) The cyber-security policy will assess how the organization will interpret security issues that occur in the workplace. The cyber-security policy will also distinguish and examine ethical issues in the workplace that pertain to social media, email, and privacy. 

The paper is pertaining to the Twitter data breach that happened earlier this year. No need to go back over the breach but rather a policy to mitigate the security issues within the workplace as identified above.

1 Discussion Case Study Lab Work and Weekly Summary

Discussion 7.1

Complete Chapter 9, C12 conceptual question (page 406 from textbook).

Discussion writing requirements

  • 150 words (Excluding the references)
  • List References and Citations

Case Study 7.1 – Full 3 Pages In length excluding References.

  • Read the Case Study: 9.2 and 9.3
  • Write a summary analysis and answer the questions. 

Case study writing requirements

  • 3 pages in length  (excluding cover page, abstract, and reference list)
  • Follow full APA format
  • List References and Citations

Lab 5

Complete the following problems by Thursday
Chapter 9 – Problem #53 and Problem #54 (page 406 from textbook)

Lab writing requirements

  • The assignment must be an APA formatted paper with embedded excel files and screenshots from excel calculation
  • Follow full APA format
  • List References and Citations

Weekly Summary 7.1

Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.

Writing Requirements

Week 6 Discussion

 

This is a required assignment worth 20 points (20-points/1000-points). Assignment must be submitted by the due date. No late assignments are allowed. Please discuss the following topics and provide substantive comments to at least two other posts.

Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter 7 (Jamsa, 2013).

Chapter 7 topics:

  • Define collaboration.
  • Define and describe the cloud-based collaboration.
  • The CIO of Ace Accounting Services suggests that the company can save considerable money using VoIP for phone calls. Define and describe VoIP. Then present three companies that provide VoIP offerings. Compare and contrast each company’s offering. Also, discuss whether or not you agree with the CIO and justify why.
  • List the questions one should consider when evaluating a cloud-based collaborative solution.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  The initial post is due by Wednesday at 11:59 pm ET.  You must engage on at least three separate days (by Wednesday for the first post and two additional days of peer engagement).  Do not wait until Sunday to engage with peers, this should be an active conversation with your peers.  When replying to peers be sure to engage with substantial posts that add to the conversation.

dba must be aware of when moving to the cloud.

 

Describe in 500 words the shared security responsibility model that a dba must be aware of  when moving to the cloud.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Research Paper

 5. How has information technology supported the development of facial recognition software and the current issues related to its use? 

final project draft and main version

  

Final Project (Interactive Solutions)

Project Description:

Currently, the world is going through a crazy epidemic (COVID-19). I hope all is well and are being safe. There are numerous data available online about COVID-19, such as COVID new cases per state, fatalities per country. As a data scientist, you are in charge of building an interactive chart that depicts numerous angles (at least three).  

Activities:

1. Data Acquisition, Examination, and Transformation.

a. Collect the dataset you are planning to use within your project.

b. Data Examination 

i. Examine the dataset to determine how you want to create an interactivity design and briefly explain your Solution.

c. If needed, perform Data Transformation

i. Perform data transformation techniques such as data cleansing, conversion, creation, and consolidation on the dataset.

ii. Record the transformation activities you performed on your dataset.

2. Data Exploration

a. Decide how you want to present the data.  

b. Decide the tool you would like to create the interactive Solution. The tool could be a developer’s tool or non-developer’s tool.

c. If you are not familiar with the tool, complete a tutorial. The reference below includes links to different types of interactive tools and tutorials.

3. Interactive Solution

a. Design and develop an interactive solution.

b. Explain the challenge you encounter.

c. Explain how to avoid such occurrence when and if you decide to go live/production.

4. Proposed Dynamic Solution

a. Explain how you would modify your solutions that allow the data to change (dynamic) with a database continually. 

Deliverables:

Word file with writing about the following:

· Data Acquisition, Examination, and Transformation [10 points]

· Data Exploration [10 points]

· Interactive Solution [40 points]

· Proposed Dynamic Solution [10 points]

· Screenshots of the different angles of the interactive Solution [4 points]

· APA formatting required. [5 points]

· At least five pages including cover page and reference list [1 point]

Submit a draft copy by 23 November 2020 at 11:59 PM and the final version on or before 30 November 2020. Draft copy submission is available in the week 13 folder while the final submission will be open during week 14

· Draft submission should include at least the Data Acquisition, Examination, and Transformation section [5 points]

· All other sections [75 points]

Resources:

1. https://thenextweb.com/dd/2015/04/21/the-14-best-data-visualization-tools/

2. https://www.d3-graph-gallery.com/index.html

Journal Article Analysis

 Select any one from the below key terms.

Key Terms:

  • Styles of Negotiation
  • Anchoring in Negotiation
  • Mediation
  • Arbitration

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions

Discrete structures

 

Chapter 1

1.1 (1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)

1.2 (1, 2, 3, 4, 5, 8, 9, 10, 11, 12)

1.3 (1, 2, 3, 13, 14)

Chapter 2

2.1 (1, 2, 3, 5, 6, 7, 8, 12, 13, 14, 15, 16, 17, 25, 26)

2.2 (1, 2, 3, 4, 5, 6, 9, 10)

2.3 (1, 2, 3, 4, 5, 6, 7, 8, 12)