Computer 10

Seek out the latest presentation by Mary Meeker on “Internet Trends” (if you cannot find it, the video from 2019 is available at https://www.youtube.com/watch?v=G_dwZB5h56E or seek out another source of information on Internet Trends and Emerging Technologies.

Write 1 page describing what the top three trends and/or emerging technologies are, in your opinion and why. 

Are there any ethical dilemmas over those trends and why? (Think about printable like 3D printers and weapons, autonomous vehicles, wearables, findables, etc…).  In your opinion, is this trend good for mankind?

SOCIAL MEDIA POLICY AND EXECUTIVE SUMMARY You have been hired as an HR Specialist the company has asked you to draft a Social Media policy for the employees hi you need to draft a social media policy for the employees. write an executive summary and

 SOCIAL MEDIA POLICY AND EXECUTIVE SUMMARY 
You have been hired as an HR Specialist the company has asked you to draft a Social Media policy for the employees

hi

you need to draft a social media policy for the employees. write an executive summary

and you need to consider these key questions(do not answer) before you draft the policy

A perfect social networking policy to cover these new media could be drafted using only a few words: “Be mature, be ethical, and think before you type.” Ultimately, you may decide that such brevity is what you want for your business. For the sake of completeness, though, here are the seven most important questions to ask yourself when drafting a social networking policy.

  1. How far do you want to reach? Social networking presents two concerns for employers—how employees are spending their time at work, and how employees are portraying your company online when they are not at work. Any social networking policy must address both types of online use.
  2. Do you want to permit social networking at work, at all? It is not realistic to ban all social networking at work. For one thing, you will lose the benefit of business-related networking. Further, a blanket ban is also hard to monitor and enforce.
  3. If you prohibit social networking, how will you monitor it? Turning off Internet access, installing software to block certain sites or monitoring employees’ use and disciplining of offenders are all possibilities, depending on how aggressive you want to be and how much time you want to spend watching what your employees do online.
  4. If you permit employees to social network at work, do you want to limit it to work-related conduct, or permit limited personal use? How you answer this question depends on how you balance productivity versus marketing return.
  5. Do you want employees to identify with your business when networking online? Employees should be made aware that if they post as an employee of your company, the company will hold them responsible for any negative portrayals. Or, you could simply require that employees not affiliate with your business and lose the networking and marketing potential Web 2.0 offers
  6. How do you define “appropriate business behavior?” Employees need to understand that what they post online is public, and they have no privacy rights in what they put out for the world to see. Anything in cyberspace can be used as grounds to discipline an employee, no matter whether the employee wrote it from work or outside of work.
  7. How will social networking intersect with your broader harassment, technology and confidentiality policies? Employment policies do not work in a vacuum. Employees’ online presence—depending on what they are posting—can violate any number of other corporate policies. Drafting a social networking policy is an excellent opportunity to revisit, update and fine-tune other policies

Below are some ideas about he policy in the video https://youtu.be/et9nWEfEZcA
do not use any reference… just make a policy and write an executive summary 

Broadhand-x case

 

Questions:

1. What are the motives that drove Broadband-X to implement ERP software?

2. Do you think custom built ERP software could have been a viable alternative for Broadband-X? What do you think about the way Tumbler selected the ERP system and what could he have done differently?

3. What are the biggest challenges and risks Broadband-X will face during the implementation of the project? How can the challenges be managed?

4. Develop an ERP implementation project plan most fitting to Broadband-X’s situation, accompanied by an implementation strategy (communication, project roles, training, etc.) – Use this question to develop your project planning skills. Use the data in the Project Plan section and in Exhibit 3. As part of your answer, a Gantt chart created using Microsoft Project is required.

Assignment

 

Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC.

Use at least three sources.   Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand alone quotes will not count toward the 3 required quotes.

Discussion 300 words

 Pick one of the many information security standards organizations and describe what they do and what type of standards they are responsible for. 

Short answer Assignment

 Discuss the importance of Information Protection. What are the consequences for not protecting the organizational or personal data and information?  

In your opinion, has the importance or emphasis on information security increased or remained the same in the organization you work for? 

Why do you think this has happened? 

Locating a Missing Child

Below is the assignment/ instructions

You can either write a paper or submit  a powerpoint presentation

Locating a Missing Child: 

A 15-year-old girl left for school in the morning but never returned home. Her mother knows she never left home without her iPhone. She was also wearing her Apple Watch 6. 

Information we know:

  • The girl was present in school that day but did not return home at the usual time.
  • The young girl has a Facebook and an Instagram account and uses them to communicate with her friends daily. 
  • She posts photos and messages frequently in Facebook when she is able and the last photo she posted was two hours ago.
  • The family mobile account is with Verizon.
  • When her parents spoke with the girl’s friends, they were told she had recently ‘friended’ a new boy who had asked her to ‘meet up’.
  • There are video cameras in the school hallways and around the school grounds, and many of the local businesses also have digital cameras

xcode

This is a basic slideshow app to show 10 cat images, attached to this  assignment (Cats.zip). You need design your app following below sketch. You will need to show all ten images automatically or manually. After  last picture, your app should show the first picture in circular way.   User can touch left and right buttons to navigate thru pictures  manually. Play button automatically shows pictures. Stop button stops  the slideshow. The delay between pictures are 3 sec by default. However  user can change delay time by going setting view of the app. This app is similar to MathGame in terms of how to setup the views. Also, you will need to use timer class. Submit your zipped Xcode project file.

c++ Data Structure

 Hashing is a technique that is used to uniquely identify a specific object from a group of similar objects. Can you use one or two real-world example(s) to explain what a “hash” really is? How can a programmer implement it?  (around 350 words)