final paper dsdba

 

The Final Project has two parts: Limitations of Blockchain and Emerging Concepts.

Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems.  Several challenges have already been associated with the use of this technology.  Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.  

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.

Conclude your paper with a detailed conclusion section which discusses both limitations and emerging concepts. 

The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Business Ethics : 6 Case study and Journal Article Analysis

JAA 6

 Pick one of the following terms for your research: Whistle-blowing, motivation, decentralization, group norms, or needs 

 

Journal Article Analysis : find one peer-reviewed academic journal article (within the past 3 years) that closely relates to the concept. 

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement. 

SUMMARY: Summarize the article in your own words- this should be in the 150 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term. 

DISCUSSION: Using 300 words, write a brief discussion, in your own words of how the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment

Case Study 6

 Read The Case of Plant Relocation and complete the questions at the end of the case study. 

Organ decision

Discussion:  Read this article and Provide 2 examples of what to say and 2 examples of what not to say. Think like a leader is the objective of this discussion.

Be creative on how you deliver your response (i.e. new letter, flyer, other innovative tools)

Assignment:  Read the IT Investment at North American Financial Case Study on pages 165-168 in the textbook. Answer Discussion Question# 2 A comprehensive and holistic governance of IT spending and benefits delivery at all levels. 

Dissertation Literature Outline

 

A literature review should be structured like any other essay: it should have an introduction, a middle or main body, and a conclusion/summary. 

Introduction

The introduction should:

  • define your topic and provide an appropriate context for reviewing the literature;
  • establish your reasons – i.e. point of view – for
  • reviewing the literature;
  • explain the organization – i.e. sequence – of the review;
  • state the scope of the review – i.e. what is included and what isn’t included. For example, if you were reviewing the literature on obesity in children you might say something like: There are a large number of studies of obesity trends in the general population. However, since the focus of this research is on obesity in children, these will not be reviewed in detail and will only be referred to as appropriate.
Subsections based on a deductive approach

This areas should:

  • organize the literature according to common themes (subsections);
  • provide insight into the relationship between your research topic and the wider subject area (example: how blockchain it to global financial security)
  • move from a general, wider view of the literature being reviewed to the specific focus of your research. Think of it has a funnel start at the top of the funnel then get specific. If your topic was first denied because you were told to be more specific or that it was to generic and you honed in to specify your topic, then your initial topic is likely part of the top of your funnel or wider view.
Summary

The summary should:

  • summarize the important aspects of the existing body of literature;
  • evaluate the current state of the literature reviewed;
  • identify significant flaws or gaps in existing knowledge;
  • outline areas for future study;
  • link your research to existing knowledge.

Robotic Controls

Explain the following and give relevant applications:

PRM (Probabilistic Roadmap), EST (Expansive Search Tree) or RRT (Rapidly-exploring Random Tree).

PowerPoint presentation

     

Review the guidelines on the attached file then prepare a PowerPoint presentation on one of the topics below. Use the material located in the GO! with Computer Concepts textbook as well as searching online for information. Save your file as Your Name Midterm Exam.

1. Cloud Computing or One Drive: Either provide an overview of cloud computing or provide steps illustrating how to use your campus-provided OneDrive account.

2. Microsoft Sway.

3. Web versus Internet: Explain the difference between the World Wide Web and the Internet.

4. Computer technology jobs: Provide an overview of the types of career opportunities available within the field of computer technology.

5. Explain some of the basic concepts associated with building a Website.

6. The history of computers.

7. The evolution of smartphone technology.

8. Present the main features and concepts associated with a Windows 10 operating system.

9. Differentiate between a server and a client in a network setting.

10. Explain how a computer’s various hardware components work, both independently and together.

11. Digital security risks associated with viruses and other malware.

12. How society uses technology in education, government, health care, publishing, manufacturing, or business (choose 1).

13. Describe the relationship among the web, webpages, websites, and web servers.

14. Differentiate between an operating system and applications.

                           You must adhere to the following criteria:

· Review the attached Do’s and Don’ts file

· The presentation must contain a minimum of eight slides to include a title slide, at least six content slides, and a summary slide at the end

· Create an appropriate title on the title slide for the presentation, include your name, course title, and midterm exam

· Apply an appropriate theme to the presentation

· Use slide layouts that will effectively present the content

· Keep in mind the 7 x 7 rule: use a maximum of seven lines of text per slide and not more than seven words per line

· Modify text alignment and line spacing as necessary

· Include at least two pictures/clip art in the presentation; apply a picture style or picture effect to each picture

· Apply a picture to one slide background OR make another format background change to the one slide

· Include at least one shape object; apply styles

· Include WordArt on at least one slide

· Include a SmartArt Graphic on at least one slide

· Animate text or object on at least one slide

· Add a footer to all slides except for the title slide that includes page numbers and your first and last name

· Apply a slide transition to all slides

· Save the presentation as “Your Name Midterm Exam.” 

· Upload the file via the link in Blackboard for grading.

assignment work(Planning the project)

  

Earned-value analysis. A project budget calls for the following expenditures:

  

Task

Date

Budgeted Amount

 

Build forms

April 1

$10,000

 

Pour foundation

April 1

$50,000

 

May 1

$100,000

 

Frame walls

May 1

$30,000

 

June 1

$30,000

 

Remaining tasks

July 1 and beyond

$500,000

Define each term in your own words, calculate these values for the above project, and show your work:

  1. Budgeted cost baseline (make a graph illustrating this one)
  2. Budget at completion (BAC)
  3. Planned value (PV) as of May 1
  4. Earned value (EV) as of May 1 if the foundation work is only      two-thirds complete. Everything else is on schedule.
  5. SV as of May 1.
  6. Actual cost as of May 1 is $160,000. Calculate the cost      variance (CV) as of May 1.
  7. Schedule performance index (SPI)
  8. Cost performance index (CPI)
  9. Estimate to complete (ETC), assuming that the previous cost      variances will not affect future costs
  10. Estimate at completion (EAC)

Java HW help

 

Q1: Treasure Cave

Imagine you find a hidden cave filled with with N different types of metal bars
(gold, silver, platinum, steel, etc.) Each type of metal bar has some value
vi, and there are xi bars of that metal in the cave
(for i = 0, 1, 2, 3, … N-1). You want to bring back as many bars as of the
treasure as you can, but your bag can only fit W bars. How do you choose how
many bars of each metal to bring home to maximize the total value?

For example, if your bag can store 7 bars and you have gold, silver, platinum,
and steel in these quantities:

[4, 10, 2, 4] // 4 bars of gold, 10 silver, 2 platinum, 4 steel

and these values

[3, 1, 5, 2]  // gold worth 3 per bar, silver worth 1, platinum 5, steel 2

Then you would want to take this much of each metal

[4, 0, 2, 1]  // all the gold, no silver, all the platinum, 1 steel bar

             // for a total value of 24 (4*3 + 2*5 + 1*2)

Write bestValue() which takes in an integer W, an array of counts, and an
array of values. It should return the best value you can earn by picking the
bars optimally. Your code should run in O(nlogn).

  • Hint #1: This can be done using a Greedy approach.
  • Hint #2: Consider sorting with a custom Comparator

 

Q2. Treasure Cave with Fused Bars–Value

Now assume that for each type of metal, all of the bars are fused together so
that you’re forced to all the bars of a certain type, or none of them.

This means that you sometimes should not take the metal that has the highest
value, because it either will not fit all in your bag (since you have to take
all the bars), or other metals of lesser will be worth more overall value when
combined together.

Write bestValueForFused, which takes in the arguments from above, and returns
the value of the best picks possible.

bestValueForFused(4, [], []) // 0 (the cave is empty)

bestValueForFused(4, [4, 10, 2], [3, 1, 5]) // 12 (take metal 0, even though metal 2 is worth more per bar)

bestValueForFused(4, [4, 2, 2], [3, 2, 5]) // 14 (take metal 1 and metal 2)

bestValueForFused(6, [4, 2, 1], [3, 3, 5]) // 18 (take metal 0 and metal 1)
  • Hint #1: Greedy won’t work here.
  • Hint #2: Start by computing the total value of each metal (i.e. the number
    of bars * value per bar).
  • Hint #3: For each metal, you can either take it or not. If you take it, your
    bag capacity decreases by the corresponding amount. How could you translate this
    idea into a recursive subproblem?

Q3. Treasure Cave with Fused Bars–Picks

This question is optional and worth extra credit.
Write bestPicksForFused(), which solves Q2 but returns an array of bools, where
each element in the array describes whether we picked metal i.

bestPicksForFused(4, [], []) // []

bestValueForFused(4, [4, 10, 2], [3, 1, 5]) // [true, false, false]

bestValueForFused(4, [4, 2, 2], [3, 2, 5]) // [false, true, true]

bestValueForFused(6, [4, 2, 1], [3, 3, 5]) // [true, true, false]

DRIVER CODE :::

 

public class HW7 {

public static void main(String[] args) {
// Q1
   System.out.println(bestValue(7, new int[] {}, new int[] {})); // 0
   System.out.println(bestValue(7, new int[] { 4 }, new int[] { 1 })); // 4
   System.out.println(bestValue(7, new int[] { 4, 10, 2, 4 }, new int[] { 3, 1, 5, 2 })); // 24 [5,3,2,1] //24
   System.out.println(bestValue(7, new int[] { 4, 10, 2, 4 }, new int[] { 3, 3, 5, 2 })); // 25
   System.out.println(bestValue(7, new int[] { 4, 10, 2, 4 }, new int[] { 3, 5, 5, 2 })); // 35

// Q2
   System.out.println(bestValueForFused(4, new int[] {}, new int[] {})); // 0
   System.out.println(bestValueForFused(4, new int[] { 4 }, new int[] { 1 })); // 4
   System.out.println(bestValueForFused(4, new int[] { 4, 10, 2 }, new int[] { 3, 1, 5 })); // 12
   System.out.println(bestValueForFused(4, new int[] { 4, 2, 2 }, new int[] { 3, 2, 5 })); // 14
   System.out.println(bestValueForFused(6, new int[] { 4, 2, 1 }, new int[] { 3, 3, 5 })); // 18
   System.out.println(bestValueForFused(6, new int[] { 4, 2, 1 }, new int[] { 3, 2, 9 })); // 21 (3*4+9*1)

// Q3
   System.out.println(Arrays.toString(bestPicksForFused(4, new int[] {}, new int[] {}))); // []    System.out.println(Arrays.toString(bestPicksForFused(4, new int[] { 4 }, new int[] { 1 }))); // [true]    System.out.println(Arrays.toString(bestPicksForFused(4, new int[] { 4, 10, 2 }, new int[] { 3, 1, 5 }))); // [true, false,false]    System.out.println(Arrays.toString(bestPicksForFused(4, new int[] { 4, 2, 2 }, new int[] { 3, 2, 5 }))); // [false, true, true]    System.out.println(Arrays.toString(bestPicksForFused(6, new int[] { 4, 2, 1 }, new int[] { 3, 3, 5 }))); // [true, true, false]    System.out.println(Arrays.toString(bestPicksForFused(6, new int[] { 4, 2, 1 }, new int[] { 3, 2, 9 }))); // [true,false,true]

}

public static int bestValue(int W, int[] counts, int values[]) {
return 0;
}

public static int bestValueForFused(int W, int[] counts, int values[]) {

}

private static int bestValueForFused(int W, int[] counts, int values[], int MetalIndex) {
}

public static boolean[] bestPicksForFused(int W, int[] counts, int values[]) {
return null;
}
}

 

import java.util.*;

public class MetalBar implements Comparable {

private int value;
private int count;

public MetalBar(int value, int count) {
this.value = value;
this.count = count;
}

public int getValue() {
return value;
}

public int getCount() {
return count;
}

public int compareTo(MetalBar otherBar) {
return Integer.compare(otherBar.value, value);
}

public String toString() {
return String.format(“MetalBar(%d, %d)”, value, count);
}

}

OR_Assignment_3

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

   A minimum of five peer-reviewed journal articles.

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

Information Assurance Plan Introduction: Twitter Hack

This assurance plan will be a plan to mitigate those issues that led to the Twitter Hack of 2020 

You will submit your introduction to the information assurance plan. This section of the plan will provide the overview of the current state of the organization. Provide a brief overview of the goals and objectives of your information assurance plan, including the importance of ensuring the confidentiality, integrity, and availability of information. What are the benefits of creating and maintaining an information assurance plan around those key concepts? Are there current protocols and policies the organization has in place? Additionally, what deficiencies exist within the organization’s current information assurance policies? What are the potential barriers to implementation of a new information assurance plan?