PowerPoint 2nd part
bi13
1. Some people say that chatbots are inferior for chatting.Others disagree. Discuss.
2. Discuss the financial benefits of chatbots.
3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.
4. Compare the chatbots of Facebook and WeChat. Which has more functionalities?
5. Research the role of chatbots in helping patients with dementia
6. Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done.
APA format with 2 references.
2 pages
431A3
CHECK ATTACHMENT!!!
BI_Assignment_1
Complete the following assignment in one MS word document:
Chapter 1 –discussion question #1 & exercises 9 and 15 (limit to one page of analysis for question 15)
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
Discussion question #1:
Survey the literature from the past six months to find one application each for DSS, BI, and analytics. Summarize the applications on one page, and submit it with the exact sources
Exercise 9:
Go to microstrategy.com Find information on the five styles of BI. Prepare a summary table for each style.
Exercise 15:
Visit the Million Song Dataset(http://millionsondataset.com/), search the collection, and download a few titles. How are the songs indexed, and how would you download the entire database?
HR 7
minimum 500 words
Discuss the following questions: 1. Discuss Blockchain’s potential application in compensation systems (base wages, incentives, rewards). 2. How can a token economy affect employee compensation? 3. Based on your readings, do worldwide executives believe Blockchain has the potential to radical change the future of organizations? Use the following headings to organize your paper: Introduction, Question 1, Question 2, Question 3, Conclusion, References.
Follow the following writing requirements for all of your discussion prompt responses (note that these writing requirements DO NOT apply to your responses to other students):
Writing Requirements for All Assignments:
- References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
- Always include a cover page and reference page with all submissions
- Your paper must have headings in it. For discussion posts Introduction, Prompt/Question, and Conclusion will suffice as headings.
- Provide the EXACT web link for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources
- No abbreviations, no contractions – write formally
- Write in the third person formal voice (no first or second person pronouns)
- Write MORE than the minimum requirement of the word count assigned
- As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
- Indent the first line of each new paragraph five spaces
- Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a power is provided under the information tab that addresses APA format.
- Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.
five points on impacts of IT to society
five points on impacts of IT to society
Business Intelligence – End-of-Chapter questions
Chapter 1 – Discussion question #1 &
Exercise #5, #7, & #15
Chapter 2 – Discussion question #1 &
Exercises #4, #5, and #15
– Each answer must be at least 125 words
– 2 references apa format
– no plagiarism
discussion-3
Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.
Identify one cryptographic attack and how you can protect against it.
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
- Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Cyber Law
Current laws that govern cyberspace are inadequate to handle advances in the Internet and computing technologies. In your opinion, is this an accurate statement? Support your position or answer with a few examples.
Your submission should be:
- 300 words
- in-text citations and references using the APA style
- single spaced
OR_Discussion_2
- Discuss what power in the context of leadership is and how it relates to bullying within organizations. Also note how this impacts productivity.
- Discuss what organizational culture is and how it impacts work productivity. Also, note how organizational culture impacts the success of innovation implementation.
- How does culture impact leadership? Can culture be seen as a constraint on leadership?
At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread. Please ensure to use information from your readings and other sources from the UC Library. Use APA references and in-text citations.