Discussion: The Future of Offices

q1) Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? 

q2) Will offices as we think of them today exist in the next ten years? Why or why not? 

note:1. the whole discussion should be Minimum 250-300 words. 

2. Use at least one scholarly article.

Discussion Post

 

 

Be sure to use PROPER APA format as I have just completed above. Failure to cite an article in PROPER APA format will result in a grade that is not desired.

week4

 

This week’s journal article was focused on how information and  communication innovation drives change in educational settings. The key  focus of the article was how technology-based leadership has driven the  digital age. Also, that the role of technology leadership incorporates  with the Technology Acceptance Model (TAM).

In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

Google Scholar  is also a great source for research. Please be sure that journal  articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

· 3-5 pages in length (not including title page or references)

· APA guidelines must be followed. The paper must include a cover  page, an introduction, a body with fully developed content, and a  conclusion.

· A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to  transition thoughts. Don’t forget that the grade also includes the  quality of writing

Preview the document

discussion q for swarm

1. Find out what Swarm (Links to an external site.) is.

2. Choose several case studies included in the Resources -> Prediction Highlights (Links to an external site.) and Resources -> Case Studies (Links to an external site.).

Pay attention to the question and possible answers described in the case studies.

3. Propose a question that you think Swarm can help you finding the answer.

Submission instructions:

Click on the Discussions -> “Q for Swarm” and create a new thread. You need to include the following information in your post:

  • What is question you want to ask and what are the possible answers (10 points);
  • What category does this question belong to. Category can be one of the following: politics, business, healthcare, and education (2 points);
  • Why do you think it is an important question to ask (3 points);
  • Why do you think collective intelligence can help finding the answer to your question (5 points).

QNO.2. Read the attached Ethics-IV.pdfPreview the document which continues the discussion on how software engineers can actually live up to ethical standards and what is the end goal of an ethical life in software engineering.

Then proceed to answer the questions inside the reading:

  • Questions 6.1 and 6.2
  • Question 7.1

Because for many ethics questions there is no absolutely right or wrong answers as such, your responses will be graded based on completeness and thoughtfulness as opposed to rote or perfunctory ones. There are three grade levels for this assignment based on your responses to all the questions: 20 (no reasoning in responses), 35 (minimal to little reasoning), and 50 (sufficient reasoning and consideration).

Write your answers in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides.

Save your file as Ethics_4_FL where FL is your first and last name initial and Submit.

testing

Topic: Discuss the advantages and disadvantages of each type of testing. When is each type of testing appropriate? Are there situations that preclude the use of a particular type of testing?[600 words]

Presentation Computer Science

Summarize the following subjects  of Chapter 3 

  • Different types of network circuits and media
  • Digital transmission of digital data
  • Analog transmission of digital data
  • Digital transmission of analog data
  • Analog and digital modems
  • Multiplexing

Discuss & Present TWO of the following subjects:

5- space-based global Internet service
https://www.youtube.com/watch?v=hXa3bTcIGPU
https://www.blueorigin.com/news/blue-origin-to-launch-telesats-advanced-global-leo-satellite-constellation
https://www.starlink.com/
https://www.oneweb.world/
 

6- Select and present a Network topic from IEEE Spectrum
https://spectrum.ieee.org/computing/networks

Week1 Assignment-Organ Leadership

 

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World. Complexity is increasing as new technologies are emerging every day. This complexity impacts human experiences. Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that are emerging as noted in the article. Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

Note: This written assignment is a REQUIRED ASSIGNMENT it is worth one-hundred (100) points. You are required to answer the questions as stated in the assignment question in order to obtain credit for the assignment by the due date. If you do not complete the assignment by the due date, you will receive a zero (0) for this assignment. There is a grading criterion associated with this assignment. Your work will be compared to other’s work, using SafeAssign for plagiarism, so please note that copying other people’s responses will not be tolerated.

Journals:

  Chapter 1 Journal articles

law enforcement

Topic: When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihood that the incident will become known publicly. Do you think these issues play a significant part in the decision to involve law enforcement? Why or why not? Can you name some situations in which you believe that large organizations have decided not to involve law enforcement?

Assignment should follow all APA rules and include a min. of (1) citation/reference.[500 words 

Assignment 5:

  1. Refer back to homework assignment 2, in week 3.  Homework assignment 2 asked you to find a data set and perform some manipulations using R.  For this assignment, you can use that same dataset, or select a new one of your choosing and use Tableau to create a visualization.  The assignment requirements are:

    • Go to Tableau.com and download a free trial version of Tableau
    • Use Tableau to create an appropriate visualization for the dataset you selected for homework assignment 2, or another dataset of your choosing.
    • Provide screenshots showing your steps in Tableau (at least 3)
    • Explain how your visualization meets the criteria of being Trustworthy, Accessible, and Elegant (1-3 paragraphs)
    • Explain the story that your visualization should be telling to the viewer (1-3 paragraphs)
    • Compare and contrast your experiences using R versus Tableau.  Which one is more user friendly?  Are there limitations to one versus the other?  (1-3 paragraphs) 

Term Paper on 'Rockwell Automation – Factory Talk (SCADA)'

  It is a term paper.The topic is  ‘Rockwell Automation – Factory Talk (SCADA)’ The paper shall be at least five (5) and no more than ten (10) pages in length excluding figures, tables, and references. The paper shall be formatted using an 11-point font of either Arial, Helvetica, or Times Roman type using 1″ margins on the sides and double-spacing between lines with 0.5″ indentation on first line of paragraphs. The paper shall be written using the APA style guide seventh edition published in October 2019. Online guidance can be viewed at https://apastyle.apa.org.All tables and figures shall be captioned and specifically referenced in the body of the document. All references shall be stated and included as endnotes in this paper. Citations must meet the following requirements:

  • No more than two (2) citations shall be from Wikipedia
  • At least two (2) references shall be from United States government sites (e.g. CISA, NIST)
  • At least two (2) references from vendor web (html) or printed (pdf) material
  • At least two (2) references shall be from independent sources including but not limited to
    • News Media Outlets (e.g. Reuters, Washington Post, Wired, CSOOnline)
    • Industry Publications (e.g. Automation, ISSSource, Control)
    • Trade Sources (e.g. Oil and Gas Journal, ChemWeek, PharmaTimes)
    • Security Solution Providers (e.g. McAfee, Trend Micro, Dragos, Claroty) to name several.

    The section titles (paper) and slide titles (presentation) in the templates are for reference only.Your paper and presentation shall address and develop each of the following items:

  1. System overview (textual) and architecture (graphical) covering devices and network topology explaining the function of each of the key assets
  2. Communication protocols used by the system
  3. Industry sectors that use the system
  4. Vulnerabilities publicly disclosed for the system and the publication of any exploitation packages
  5. Potential or actual impact of the vulnerabilities discovered to the industry sectors served
  6. Cyber security measures taken by the vendor to secure the system
  7. Additional cyber security measures that could be taken by the end-user user if the vendor recommendations are not feasible (e.g. an upgrade could not be performed in a timely manner)

Must have the following categories

INTRODUCTION

System Overview and Architecture

Market Analysis and Typical Use Case(s)

Major Vulnerability Disclosures

Impact Analysis

Risk Reduction Recommendations

Conclusion