Writing

Heinrich Koch is a second-year college student. Last semester his best friend had his laptop stolen. The laptop was an old computer that he planned to replace soon, but the greatest loss was his data: he had not performed a backup and all his data was lost. Heinrich himself does not perform data back-ups but knows that he needs to do that on a regular basis. He has decided to use an online backup service that will auto-matically back up his data whenever it changes. Evaluate and compare reviews of online backup services. Consider iDrive, Carbonite, Acronis True Image, BackBlaze, and others you might find in your research. Recommend a service that you consider the best solution for Heinrich. Discuss your reviews and mention speed, security, and features in your recommendation.

Requirements:

  • APA format, 3-4 pages in length (excluding cover page, abstract, and reference list)
  • Minimum of 2-3 peer reviewed resources
  • The paper must be 3-4 pages long. double space, and must have an introduction with a clear thesis statement, a body discussing the three main points and a conclusion
  • Conduct research to find relevant information using reliable sources to support your views; Use at least 2-3 peer review resources
  • Use APA Style for in-text citations, and references

Disuccsion

How would one define business intelligence (BI)? Identify and briefly discuss a real-world application of BI?

250 words in APA format

Pseudocode and Flowchart Solution

Instructions:

Create a PowerPoint that contains a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. Use Microsoft PowerPoint® for Pseudocode and the flowchart.

  • Problem 1: Create a list that contains the months of the year.
  • Problem 2: Create a loop to print the month number and name (do not hard code the month number)

Consider using the attached enumerate method to help!

Strategic Management

Read the attached case study answer the questions at the end of the text in a 2 and a half page paper (excluding title and reference pages) include at least three peer-reviewed sources found.

Note: My assignments will need actual references from EBSCO host, google scholar, and semantic scholar With a website link at the end.  Only use APA 7th edition. 

Java Basics

Have you ever played the game “Mab Libs?” (http://en.wikipedia.org/wiki/Mad_Libs). The general idea was that one player would have a story and ask another player (who doesn’t know the story) for nouns and adjectives, etc. and the end result was that you’d read the pre-written story fitted with their mostly out-of-context words filling in key spots of the story. It usually was pretty funny.
 

Let’s build a Mad Labs game with Javascript … you’ll create a script that contains a list of variables. You can either use an array or individual variables. You should use variables that are integers and text. You’ll then create your story by concatenating the variables into the story. 
 

For example, to create the story you could take a paragraph like this:
 

It is a period of civil war. Rebel spaceships, striking from a hidden base, have won their first victory against the evil Galactic Empire.

You would sub in variables for certain words: 
 

It is a period of . Rebel , striking from a , have won their victory against the evil .

Steps:

1. Come up with three to four sentence paragraph, decide which words you will replace with variables and make a list of corresponding parts of speech. You should ask specifically for “a noun”, “an adjective”, “a number”, corresponding to how many elements you need.

2. In the forum denoted as “Lesson 2 – Mad Libs”, post your list of word needs for a classmate to reply to, which you can plug in for the variables.

depth research on a web browser

 You are to take one of the web browsers from the top 10 (see website below) and provide in depth research on the web browser to include such things as history of the web browser, operating system compatibility, including computer and mobile, security features and weaknesses, location of forensic artifacts, how is data stored, where web browser artifacts are found, chart of statiscal information, articles on attacks/hacking of web browser,and any other forensic data needed for an incident response to understand how an attack on a computer or computer network began and finding the source of compromise. This list is just an example and can include more than this but at a minimum should at least include these items.

Top 10 Internet Browsers – Most Popular Web Browsers of 2019 (Reviewed & Compared) 

https://www.toptenreviews.com/best-internet-browser-software

Computer science

I did this project but I got some wrong steps.  I`m uploading the instructions and what I did too.

This is my teacher comment: Good job! Some points were deducted for formatting errors (margins were not customized, rubric does not all fit onto one page) and multiple spelling/typing errors. Otherwise, nice work! 

Business Intelligence_ week 7

Discussion : Please find the attachment below for question

Paper: Please find the attachment below for question

There are two sections of conclusions mentioned in the question. Please read it carefully and make sure there is at least one logic or flow diagram in the paper.

Homework

Culture is an ongoing negotiation of learned patterns of beliefs, attitudes, values, and behaviors.

List some of your personal, social, and cultural identities.  Are there any of these that are interrelated?  In what way? For your cultural identities, which ones are dominant and which ones are nondominant? How does a person navigate between two cultural identities? 

How does your personal, social, and cultural identities impact you as a communicator and as a listener?