cs

 

Purpose

This discussion activity gives you the opportunity to solve a real world scenario. In doing so, you will learn the concepts of a software development cycle.

Directions

Part I: Complete Your Original Response to the Main Topic

You are a software developer for a Retail Point of Sale System Company. A client has made a request to upgrade the current system from command line interface to a graphic user interface. The client concerns on an effect to the current system with the change. The client does not want to lose any current data on the system. Provide recommendations and the change plan including the below requirements to the customer.

Requirements:

  • Create a requirement plan (what need to be done to support this upgrade)
  • Create a development plan (how to implement this upgrade with programming details explanation including technical details on this document)
  • Create testing plan (how to ensure that the new upgrade works without affecting current system and no data lost.)

Posting your recommendations and the change plan

Once you have completed your recommendations and plan. Post it in the discussion forum by clicking the Reply link below.

  • In the first line of your post, your should add your plan title and name.
  • Your posting must include recommendations, a requirement plan, a development plan, and a testing plan.  

PLE week3 p3

 

Hello,

i need this paper by 1/27 afternoon.

Strictly No plagiarism please use your own words.

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 

10. How many public cameras is too many? 

reference link:  https://hackablepodcast.com/episodes/locked-out

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

InfoTech Import in Strat Plan (ITS-831)

Research Paper: Develop a Computer/Internet Security Policy

Word count: 2 to 3 pages

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

Computer and email acceptable use policy

Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

Include at least 3 scholarly references in addition to the course textbook. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

Be approximately 2-4 pages in length, not including the required cover page and reference page.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Reading resources:

1. Chapter 10, “Information Systems Sourcing”

Text book: Managing and Using Information Systems, Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta, John Wiley & Sons

2. Chapter 10, “Information Systems Sourcing” pp. 224-234

Buhrendorf, E. (2019). Outsourcing IT is a money-saving cyber safety net for company data. Fairfield County Business Journal, 55(20), 12. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=b9h&AN=136657455&site=eds-live

plagiarism check required, Good work, APA format, include References, within 8hrs

This week we focus on the various generations. Please note the various generations starting with the 1950s and note the major contributions and concerns from each generation. Do you agree with these generalizations?

Discussion: This week we focus on the various generations.  Please note the various generations starting with the 1950s and note the major contributions and concerns from each generation.  Do you agree with these generalizations?

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

User Training

Topic: What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between being overwhelmed with false positives and the danger of ignoring true incidents?  What effects would false positives have on an organization?  Make sure to cite your sources.[500 words]

Assignment should follow all APA rules and include a min. of (1) citation/reference

cloud computing Final Project

 

Your Research Project is due this week. It must consist of:

1. 5 source annotated bibliography

2. slide presentation with 12 or more slides

3. Summary or Abstract containing at least 750 words.

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use the Research Databases available from the Danforth Library not Google.

discussion

After completion of the week 3 assignment, please briefly describe and explain your recommendations for the manager in the assignment.  What tool or tools did you recommend and why?  In order to receive full credit, you must comment on two other classmates posts.

st lukes

Write a fully developed paper in which you:

  1. Assess the probable difficulties of the St. Luke’s IT executives’ view of wireless networking as a key lever in their quest to increase clinician productivity and improved patient care. 
  2. Analyze how the Mobility XE enables the IT department to centrally manage all wireless devices used by clinicians. 
  3. Critique the Mobility works solution and recommend one change to the solution to provide better productivity and improved patient care. 
  4. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

JA2

Students are required to answer the following questions.

  1. What are some of the drawbacks to greed?
  2. How can you combat greed is your own personal / business life?
  3. Is there a way to help others deal with greed?
  4. Ego, greed, or misguided thinking, which is the toughest to combat in your life? In the workplace?
  5. Can you think of other issues that might lead to unethical behavior?
  6. Does culture really care about greed, ego, or misguided thinking? Does it care about ethical behavior?

Requirements:

  • Answer each question not less than 100 words.
  • Include the list of references used.
  • Avoid Plagiarism.