capstone

 

  1. Discuss the broad ethics that you have garnered from reviewing the American Computing and Machinery (ACM) Ethics (Links to an external site.)  
  2. Research ethics in the field you’ve chosen, (cyber security)then discuss what you’ve found.
  3. Apply the concepts learned in your reading and through research on the Internet to discuss security issues that are unique to the chosen scenario.
  4. Support what you discuss with specific examples.
  5. Don’t forget to cite your resources. APA formatting is required.

Problem 13- org behavior

1. Mario owns a boutique furniture store for which Clinton is a long time supplier of pillows and decorative items. Because of repeated years of negotiations over prices, delivery dates, and products, Mario and Clinton have formed a mutually beneficial relationship. Please discuss some other outcomes of repeated negotiations.

at least 2 – 3 pages in length, Times New Roman 12-pt font, double-spaced, 1 inch margins and utilizing at least one outside scholarly or professional source related to organizational behavior. This does not mean blogs or websites. This source should be a published article in a scholarly journal. This source should provide substance and not just be mentioned briefly to fulfill this criteria. The textbook should also be utilized. Do not use quotes. Do not insert excess line spacing. APA formatting and citation should be used.

Capstone Project: Literature Review Assignment

  PLEASE DONT USE PLAGARISM

Capstone Project: Literature Review Assignment Instructions

Overview

Title – Ultihub a new design of a hybrid Cloud architecture using key cloud technologies and Shared Security Responsibility Model, DevOps, and Zero Trust Architecture Using AI Based Techniques

The objective of the final capstone thesis project is to evaluate you on your ability to apply the program learning outcomes to a final, all-encompassing information systems (IS) or information technology (IT) thesis project. Successful capstones will follow an objective research methodology to collect or generate data that informs the analysis and design of a new computing system related to the primary domains identified by the Association for Computing Machinery (ACM): cloud architecture and/or computing, cybersecurity systems, databases and/or data analytics systems, enterprise architecture, information systems, integrated systems, internet of things systems, networks, platform systems, software development, user interfaces, virtual systems, and/or web and mobile applications.

You will have 3 separate Thesis Capstone projects to complete but for now just complete Phase 1

Subject Title for Capstone is Ultihub – a new design of a hybrid Cloud Architecture

Phase 1 – Capstone Project: Literature Review Assignment

Phase 2 – Capstone Project: Methods Assignment

Phase 3 – Capstone Project: Final Results Assignment

NOTE: Phase 2 and Phase 3 will be on my next assignment

Instructions

Phase I of the project consists of the following main headings at the minimum: 

Introduction,  375 words & 5 ref  Combined with Conclusions

Problem Statement,  250 words & 5 ref  Combined with Research questions

Research Question(s), with  

Literature Review, 1500 words 7 ref …….

Literature Review Findings and Gaps 400 words 2 ref

Conclusion

References and appendixes are also necessary. 

2500 words total & 20 ref total 

A primary goal is to develop new knowledge and contribute this knowledge to the computing field. A subsequent goal is to work toward a Master’s thesis that could one day be published in a respectable industry or academic publication to share this new knowledge with others.

The capstone project will be based upon a feasible gap and problem in scholarly literature that can be addressed in the timeframe of the capstone course. You must be familiar enough with the problem that you are able to perform a comprehensive research design and novel prototype design to solve the problem. Thus, it should be a specific computing domain where you consider yourself to have the most expertise. You must also have access to the applications, servers, systems, networks, and/or data necessary for data collection, programming, design prototyping, and/or configuration.

The outcome of the research should contribute to a new artifact and/or statistical result. It should not be based upon and/or replicate in any form an existing contribution in industry or literature. It also should not repeat well known solutions. For example, designing a new enterprise resource planning (ERP) module for finance is not an acceptable project given thousands of these ERP modules already exist. Examples of new contributions in the final rubric accepted include either new code as an artifact and testing this in some form or a statistical analysis:

· New code/script/or configuration

o New application and/or software and testing its performance, security, etc

o Development of a new algorithm, database, protocol, etc and testing its efficiency, memory usage, security, etc

o Programming a new network, security, storage, and/or system script that solves an original problem and testing its level of automation, performance, etc

· Statistical analysis

o Note, please assure you understand Institutional Review Board (IRB) requirements if performing this type of capstone

o Statistical analysis using descriptive, correlational, quasi-experimental and/or experimental designs

o Big data analytics and/or predictive analytics using clustering, classification, and/or regression trees

How do you know your thesis problem is novel and original? By performing a comprehensive literature review and investigating what exists in related industry! 

Within the capstone, a comprehensive literature review of related and relevant concepts, theories, and research results should exist.  This involves study of relevant articles pertaining to the research question within top ranked peer reviewed information systems and/or IT journals. Thorough review and comprehension of this research will lead to the identification of gaps in the literature that exist and/or future recommendations, which require further research efforts and contributions to advance the topical area of study. The research question(s) is supported by the associated gaps found in literature, indicating a solution is needed to a problem that does not yet have a solution.

A research question that is too wide in scope will overwhelm your efforts. Yet, a research question that is too narrow will not meet the minimum requirements and quality expected of a Master’s capstone project. The research question is your anchor and guide. It provides a clear objective of what your Master’s thesis project will accomplish. 

Refer to the grading rubric in order to ensure successful completion of the capstone. The minimum proposal in Phase I will include:

I. Cover Page, Table of Contents, References, and Appendixes

a. Cover page includes your title/position and “in partial completion of an MSIS”

b. Appendixes will include screenshots of all diagrams and benchmark data

II. Research from optimal and relevant journal articles

a. Each section of the capstone must be well supported with scholarly peer reviewed journal articles

b. Although they do not count toward the minimum journal articles, industry whitepapers are also often relevant to elements like the prototype design as they provide best practices for the new software or system

c. Top ranked journals can be searched through the university library by going to electronic databases.

d. Not all journals are equal or relevant to the capstone. Journal articles that identify well-supported gaps in research are often performing new research. These articles will include testing new theory, hypotheses, and/or frameworks with a parallel research design that collects data for the test. Because they are generating new information, they are great sources to find areas where new research is needed. Journal articles that perform Meta studies or large literature reviews can also be helpful in identifying where new research is necessary.

e. Whereas scholarly journal articles often focus on theory that is not yet implemented in industry, industry whitepapers will assist with elements like standards and frameworks helpful in guiding the design of new systems. Both have their place in the capstone as a result but for different reasons.

III. Introduction & Conclusion

a. An introduction and conclusion of the primary objectives and outcomes of the master’s thesis project is necessary.

b. The introduction provides the roadmap for the capstone.

c. The conclusion is the last section of the project and provides a comprehensive overview of how the study was preformed and the primary outcomes of the results.

i. This also involves synthesizing and analyzing existing results in the domain of knowledge that the project has contributed.

IV. Statement of the Problem

a. Must be in one of the ACM domains identified for software or a system

b. What is an information systems or IT problem that needs resolution?

i. An unmet IT problem is succinctly and accurately defined.

ii. It is supported by a gap in scholarly literature not previously addressed.

c. The problem can feasibly be addressed in the timeframe of this course.

d. Sufficient data can be collected or generated to address the problem.

V. Research Questions (RQs)

a. Between 1–2 research questions must be given that detail what your thesis will achieve.

b. The research question(s) must:

i. Address all capstone objectives.

ii. Test new programming code/scripting/system configurations and/or perform some type of statistical analysis through data generation or collection.

iii. Solve a problem without an existing solution per a gap in literature.

iv. Include a minimum of one measure.

v. Include a population/sample.

vi. Include the ability to address reliability and validity of the results.

vii. Have accessible data or metrics to test the RQ measure such as a log file with comparable metrics (e.g. memory usage) or a public data set.

c. RQ Example

i. Is there a difference in the CPU performance (measurement) between an ICT-based KMS feature programmed using the XYZ framework (prototype or new artifact you create/code) and an ICT-based KMS feature programmed using the ABC framework in a Southeastern U.S. College (sample).

ii. New code will be developed for an ICT-based KMS feature that has not already been programmed (new prototype or artifact).

iii. The new software can then be benchmarked against framework ABC and XYZ (hypothetical frameworks).

iv. A measure exists with data that can be collected, CPU performance from a monitoring tool that is monitoring both applications in use (e.g. automated simulations of the software instead of actual users is acceptable for testing). The CPU measure can determine which framework results in a faster system. 

v. Reliability and validity is possible. The test can be run on the exact same system, in the same environment, with the same benchmarks.

vi. A sample exists, a Southeastern U.S. College, where the CPU performance data will be collected during the automated simulations on the new code created by the student.

VI. Literature Review

a. Review of related literature in one of the ACM domains defined.

b. What literature attempts to resolve your problem and research question(s)?

c. Within relevant literature, how does it address the following:

i. What has literature not resolved in regards to your defined problem?

ii. What are the primary research problems, questions, and hypotheses in these relevant articles?

iii. How does this relate to other relevant articles and your research problem?

iv. What was the population and sample? 

v. What research methods were used?

vi. What were the results of the research?

vii. What were the limitations? 

viii. What were the recommendations for future research?

d. Peer reviewed research must lead to an appropriate IT solution that has not yet been solved.

e. This should be exhaustive in the specific domain you are studying. 

i. If it is going to be too lengthy, it is likely that your defined problem and/or research question(s) are not sufficiently narrow. 

ii. If there are not sufficient articles to review in the specific domain you are studying it is very likely that your problem statement and/or research question(s) are not feasible. 

iii. If either is the case, you need to revise your problem statement and research question(s).

VII. Literature review findings and gaps

a. What were the primary findings from the literature review?

b. What gaps existed in the literatures that have not been solved by prior research?

c. How will the author address these gaps in the literature?

i. Performing a sufficient review of literature on your specific master’s project topic should identify where gaps in literature exist which need resolution, the literature must justify a feasible problem statement and the development of an appropriate research question(s).

ii. The master’s thesis project should solve an IT problem that does not already have a solution in industry or existing research.

iii. The exhaustiveness of the literature review is therefore critical and will determine whether an appropriate and feasible problem exists to solve.

The assignment submission must have over 4,000 original and unique words of original student authorship that directly relate to a feasible IT problem and research question and balanced properly between the required sections that show excellent mastery and knowledge of the content and be written in compliance with the current APA format. The student must utilize the support from over 20 unique scholarly peer-reviewed journal articles from well-respected and top ranked IT journals that directly relate to a feasible IT problem and research question with at least 5 being published in the last 3 years.

Note: Your assignment will be checked for originality via Turnitin plagiarism tool.

Lit101 week 6 B

Discussion 6B: Accents and Dialects Around the World

No unread replies.No replies.

Since we have a wonderfully diverse group of students, I thought it would be interesting to discuss the use of accents and dialects in your own contexts. 

Initial Response

In your initial response, please respond to the following prompts

  • Remind the class of your home country
  • Discuss the different accents and dialects in your home country. How different, for example, are dialects across different regions?
  • Finally, discuss how accents and dialects may affect communication in professional settings. 

Responses to Others

Discussion 4

What statistics will you use to analyze your research questions? State your research question and associated statistics. Are you having any challenges with analyzing your data? 

Your initial posting is to be a detailed, well-organized response to the posed question.

Topic : 

 Applications of Business Intelligence in Financial Technology (FinTech)

WD&D -bonus

 Create a use case diagram that would illustrate the use cases for the following online university registration system: The system should enable the staff members of each academic department to examine the courses offered by their department, add and remove courses, and change the information about courses (e.g., the maximum number of students permitted). It should permit students to examine currently available courses, add and drop courses to and from their schedules, and examine the courses for which they are enrolled. Department staff should be able to print a variety of reports about the courses and the students enrolled in them. The system should ensure that no student takes too many courses and that students who have any unpaid fees are not permitted to register. (Assume that a fees data store is maintained by the university’s financial office, which the registration system accesses but does not change.) 

C++

I studied class, iterator, Pointers, Vector, List, and Operator in this course. This is homework about the recursion star battle puzzle. I can’t use getline() in this homework. The output of the program should be exactly the same as the example output file I uploaded. For example, if the example output file name is “out_twonot2_3_one_slow.txt”. There will take “twonot2.txt” as input file and 3 stars. “one” is the output mode mentioned in the hw.pdf. More detail in hw.pdf.

Exp19_Access_App_CapAssessment – Transfer Student Advising 1.2

Exp19_Access_App_CapAssessment – Transfer Student Advising 1.2

  

Project Description:

You were recently hired by your local college to help with registering all transfer students. The college?s Transfer Advising Department is a one-stop location for transfer students to come with questions. They have been working with Excel spreadsheets generated by the Information Technology department, but they are hoping to do more with an Access database. They have had a number of problems, including employees putting information in the wrong fields, putting information in the wrong format, and creating incorrect formulas. They are also hoping for more consistent ways of finding information, as well as being able to generate reports. Your tasks include importing an existing Excel worksheet as a table into your Access database; modifying the table; creating a relationship between two tables; creating queries with calculated fields, functions, and totals; creating a form for input; creating a report; and backing up the database.

     

To start, you have been provided with a database   the Information Technology department created. The database has one table and   one form. You will be importing an Excel spreadsheet into a table and   creating a primary key.
 

  Start Access. Download and open the file named aApp_Cap1_Advising.accdb. Grader has automatically added your   last name to the beginning of the filename.

 

Import   the aApp_Cap1_Transfer.xlsx Excel   workbook into a new table named Transfer Schools.   While importing the data, ensure that StudentID has a data type of Short   Text, and select StudentID as the primary key.

 

Now   that you have imported the data from the spreadsheet, you will modify the   field properties in the Transfer Schools table and demonstrate sorting.
 

  Open the Transfer Schools table in Design view. Set the StudentID field size   to 10. Remove the @ symbol from the   StudentID format property. Change the AdmittingSchool field size to 75. Change the RegistrationFee and   TuitionDue fields to have 0   decimal places.
 

  Switch to Datasheet view, saving the changes that you’ve made. Resize the   AdmittingSchool column by double-clicking on the border between   AdmittingSchool and AdmissionDate. Sort the Transfer Schools table on the   CreditsTransferred field in ascending order. Save and close the table.

 

Now   that the table is imported and modified, you will create a relationship   between the Transfer Schools and Transfer Students tables.
 

  Add the Transfer Schools and Transfer Students tables to the Relationships   window. Create a one-to-one relationship between the StudentID field in the   Transfer Students table and the StudentID field in the Transfer Schools   table. Enforce referential integrity between the two tables and cascade   updates and deletes. Save the changes and close the Relationships window.

 

   You will demonstrate changing information in a form.
 

  Open the Transfer Students Data Entry form. Locate the record for Ellen Sullivan and change her major to   History. Close the form.

 

Adam   McChesney, an adviser in the center, would like your assistance in helping   him find certain information. You will create a query for him and demonstrate   how he can change information.
 

  Create a new query using Design view. This query will access fields from both   the Transfer Schools and Transfer Students tables. From the Transfer Students   table, add the FirstName, LastName, Major, Class, and GPA fields. From the   Transfer Schools table, add the AdmissionDate, TuitionDue, CreditsEarned, and   CreditsTransferred fields.
 

  Save the query as Transfer Credits.   Set the criteria in the AdmissionDate field to 1/1/2021.   Run the query (19 records will display). Enter the TuitionDue for Bianca Bain as $2200 and the GPA for Edgar Conway as 3.65.   Save and close the query.

 

Now   that you have created the query, you will create a second query for Adam that   will calculate the number of credits students lost upon transfer, the tuition   payments for which they will be responsible (assuming four payments per   semester), and the due date of the first payment.
 

  Create a copy of the Transfer Credits query. Name the copy Transfer Calculations. Open the new query in Design view.   Remove the criteria from the AdmissionDate field. Create a calculated field   in the first empty field cell of the query named LostCredits   that subtracts CreditsTransferred from CreditsEarned. Create another   calculated field named TuitionPayments   that uses the payment function and determines tuition paid in four   installments. The student’s tuition payment and a 2.5% interest   rate should be used in the function. Use 0   for the future_value and type arguments. Ensure that the payment appears as a   positive number.
 

  Format the TuitionPayments calculated field as Currency. Create another   calculated field named FirstPayment   after the TuitionPayments field. To calculate the due date, add 30 to their AdmissionDate. Run the query   and verify that the three calculated fields have valid data. Add a total row   to the datasheet. Sum the TuitionDue column and average the TuitionPayment column.   Save and close the query.

 

 Cala Hajjar, the   director of the center, needs to summarize information about the transfer   students for the 2020–2021 academic year to present to the   College’s Board of Trustees. You will create   a totals query for her to summarize the number of transfer students, average   number of credits earned and transferred, and total tuition earned by   transfer institution.
 

  Create a new query in Design view. Add the Transfer Schools table. Add the   AdmittingSchool, StudentID, CreditsEarned, CreditsTransferred, and TuitionDue   fields. Sort the query by AdmittingSchool in ascending order.
 

  Show the Total row. Group by AdmittingSchool and show the count of StudentID,   the average of CreditsEarned, the average of CreditsTransferred, and the sum   of TuitionDue. Format both average fields as Standard. Change the caption for   the StudentID field to NumStudents,   the caption for the CreditsEarned average to AvgCreditsEarned,   the caption for the CreditsTransferred average to AvgCreditsTransferred,   and the caption for the sum of TuitionDue to TotalTuition.
 

  Run the query. Save the query as Transfer Summary.   Close the query.

 

Hideo   Sasaki, the department’s administrative assistant, will handle   data entry. He has asked you to simplify the way he inputs information into   the new table. You will create a form based on the new Transfer Schools   table.
 

  Create a Split Form using the Transfer Schools table as the source. Change   the height of the AdmittingSchool field to be approximately half the current   height.Switch to design view and then remove the layout from all the labels   and fields. Shrink each field so it is approximately as large as it needs to   be.
 

  Switch to layout view and then click record 123455 in the bottom half of the split form. Make sure all fields   are still visible in the top half of the form. If not, adjust the controls so   all values are visible. Move the CreditsTransferred field so it is to the   right of the CreditsEarned field on the same row.
  Change the title of the form to Transfer Schools   Overview.   Save the form as Transfer Schools Form.   Save and close the form.

 

Cala   is hoping you can create a more print-friendly version of the query you   created earlier for her to distribute to the Board of Trustees. You will   create a report based on the Transfer Calculations query.
 

  Create a report using the Report Wizard. Add the Major, FirstName, LastName,   Class, GPA, and LostCredits fields from the Transfer Calculations query. Do   not add any grouping or sorting. Ensure that the report is in Landscape   orientation. Save the report as Transfer Students   Report   and view the report in Layout view.

 

Now   that you have included the fields Cala has asked for, you will work to format   the report to make the information more obvious.
 

  Apply the attached Wisp theme. Group the report by the Major field. Sort the   records within each group by LastName then by FirstName, both in ascending   order. Adjust the text boxes so the values for the Major field are completely   visible. Switch to Print Preview mode and verify that the report is only one   page wide (Note: it may be a number of pages long).

 

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

DB unit5 #1

 I need DB Initial post and 2 responses, please see attached doc for my classmates post.

Discussion Overview

Without perimeter controls, there is no organization. Everything in your organization depends on your ability to control the outside world from getting data and infrastructure that they are not authorized to get

Topic 1: Perimeter Control

In two or more paragraphs, explain what, in your opinion, is the most important perimeter control or control system. Support your response and be sure to cite your sources.

IT470 week 8

Week 8 discussion topic APA FORMAT 400 words

what is the internet of things? give an example. please add pictures, videos etc. if it will help explain .

Your response should be at least 400 words and appropriately cites your resources.