Follow the instructions from attached
IT345 9B
Summarize what you have learned over the last 9 weeks. Has it changed your opinion about technology? Do you believe technology will continue to evolve? What businesses should concerned about being “phased” out due to new technology?
Course
Impact of IT on Individuals, Organizations, and Society
250 words
WEEK 9
Write a fully developed paper in which you:
- Assess the two distinct networking functions.
- Analyze the issues Choice is likely to experience as it expands its network to full global reach. Provide a rationale for your answer.
- Critique Choice implementing free high-speed Internet access for all guests in its Clarion Hotels and Comfort Suites from the security point of view.
- Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
Oraganization leadership
Question
How do leaders seek to change or manage the culture of an organization?
Req:
- Your answer must be substantive, which usually requires 300 or more words
- Your answer must be well written and well organized
- Your answer must include one properly formatted APA in-text citation to a scholarly reference other than the assigned course reading. The full reference must be provided at the end of your answer with a link if one is available.
- Post two replies
DBMS project
I need someone to work on a database project. project include making entities, relationship schema, populate the database with the data, write SQL query for 10 questions (any).
OPERATING SYSTEM
- Explain the purpose of an operating system for a personal computer.
- Give a brief description of the hardware components of a computer that the OS interfaces with. Motherboard, CPU, RAM, hard drive, sound controller, power supply, input and output devices, etc.
Research project on OAuth
Research about “OAuth” and provide the following. It must consist of:
1. 5 sources annotated bibliography
2. slide presentation with 12 or more slides
3. Summary or Abstract containing at least 750 words.
security architecture and design
Provide a reflection of at least 500 words (or 2 pages double-spaced) of how the knowledge, skills, or theories of this course (security architecture and design) have been applied, or could be applied, in a practical manner to your current work environment. If you are not current working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
java
Please read the following requirements carefully and then implement your own customized Array class:
provide the following features:
Two constructors. One takes the input of the initialized capacity (int) and create the underlying array with that capacity; the other takes no input and creates an array that can hold a single element by default (that is, init capacity == 1);
Getters and setters and basic methods we discussed during the class including: getCapacity(), getSize(), set(int index), get(int index), isEmpty();
CRUD operations we discussed during the class including: add(int index), addLast(), addFirst(), remove(int index), removeLast(), removeFirst(), removeElement(int target), removeAll(int target);
Supports generic types;
Mutable, that is when add element exceeding its capacity, it can resize to accommodate the change.
Implement a (private or public) swap(int a, int b) method that swaps the two elements in the index a and b if a and b are both admissible; also a public reverse() method that reverses the order of stored elements in-place (means, no additional spaces are allocated).
A public void sort() method sorts the stored elements in ascending order inO(nlog(n)) time.
[hint]: Quicksort or Merge sort