discussion

Write an essay of atleast 500 words on what you would like to learn for future study in this course.

Write in essay format, not outline or bulleted.

Use the five paragraph format. Each paragraph must have at least five sentences. You need to refer to 3 sources and include them in the references.

Self Reflection

Role: Java Developer in an IT company

What is your role in your current organization? What are your critical activities at work? Identify and share what you have learned so far in your program to help you manage these critical activities and why. How have you been able to use the lessons learned in the program to address your current role and why? 

Please write 500 words.

Assume the body temperatures of healthy

  

Assume the body temperatures of healthy adults are normally distributed with a mean of 98.20 F and a standard deviation of 0.62F
a) if you have a body temperature of 99.00F, what is you percentile score?
b)Convert 99.00F to a standard score or a z-score
c) Is a body temperature of 99.00F unusual? why or why not?
d) fifty adults are randomly selected. what is the likelihood that the mean of their body temperature is 97.98F or lower?
e) A person’s body temperature os found to be 101.00F is the result unusual why?
f) What body temperature is the 95th percentile?
g) What body temperature os the 5th percentile?
h) a hospital uses 100.6F as the lowest temperature considered to indicate a fever. what percentage of normal and healthy adults would be considered to have a fever? does this percentage suggest that a cutoff of 100.6F is appropriate?

E-Commerce and Micropayments

 

This week your rotation assignment takes you to the Office of the Chief Financial Officer (CFO).

An external audit of the company’s financial operations has just been completed. Last week, an “early look” copy of the audit was sent to the CFO with a request for a formal written response for each of the findings. Some of the problem areas were known to the CFO’s staff and they were already working on the required responses. But, there is one set of findings that came as a complete surprise — Shadow IT — the unauthorized / unapproved use of cashless payment technologies by certain locations and offices within the company. These technologies included:

1. Micro payments using a payment card issued by guest services to hotel guests and via unattended vending machines to visitors. These payment cards are loaded with a cash value deposited to the card’s account via a credit card charge. Guest services also credits some of these payment card accounts with “reward dollars” for guests who belong to the hotel’s affinity program. The payment cards are used at service locations which do not have a cashier station. e.g. game arcade, self-service laundry or sales kiosk, etc. The payments are processed by a third party service provider which then uses an electronic funds transfer to pay the hotel its share of the income.

2. Mobile Payments for services booked through the concierge desk with an authorized but independent provider (not a hotel employee). These services include: private lessons with a tennis or golf pro, childcare, tours and tour guides, interpreters, etc. These payments are made by cell phone either as a mobile payment using a contactless payment system such as Apple Pay or by swiping a credit card through a magnetic stripe reader connected to the provider’s cell phone. The payment accounts which receive the guests’ payments are connected to the hotel’s merchant card accounts. The hotel pays the providers monthly via electronic deposit and issues an IRS Form 1099 to record the income.

The CFO must make a presentation to the IT Governance board about these payment systems as a first step towards either getting approval for continued use or issuing a “cease and desist” directive to force the rogue offices and locations to stop using the unapproved payment systems. The presentation must include information about known or suspected compliance issues for PCI-DSS. The IT Governance board has previously asked project sponsors for information about potential privacy and security issues.

Due to the size and complexity of the problem, the CFO has split the available staff into two teams. Team #1 will focus on the micro payment cards. Team #2 will focus on the mobile payment systems. You have been asked to join one of these two teams and assist with their research. (Note: you *must* pick one and only one of the two technologies to focus on for your discussion paper this week.)

Your team leader has asked you to read the provided background information (see the Week 7 readings) and then put together a 2 page summary of the important points from your readings. You have also been asked to help identify and describe / explain 5 or more privacy and security issues that could arise in conjunction with the use of the technology being studied by your team. Remember to keep your focus on the financial aspects of the technology implementation since you are contributing to the CFO’s effort. (Financial aspects include how payments are made, what types of information are exchanged and with whom, how that information is protected, etc.)

Provide in-text citations and a reference list at the end of your summary paper (APA format recommended).

Satellite Communication 2.0

Some businesses have no alternative but to use satellite communication solutions.

  • Give some examples of when you think this would be appropriate and what considerations you need to take into account when choosing a satellite option.
  • How would this affect your need for ATM or your large business WAN operations?
  • You’ll need to know how to deploy your teams and resources to support these networks. Talk about your first thoughts on how you might do this based on what you’ve learned in class so far.
  • 2000 words 

DQ

interactive design is a combination of many businesses, technical, psychological, educational, artistic, and engineering disciplines. Which of the disciplines presented (see diagram in Preece text for full scope) do you feel is most important to HCI?

Apple vs fbi

Overview

Read the article The Secret History of the FBI’s Battle Against Apple Reveals the Bureau’s Mistake. Use the Strayer University Library to conduct additional research about this issue and this specific case.

Instructions

Write a 3–5 page position paper in which you:

  1. Explain, based on the article and additional research, whether you agree with the FBI or Apple. 
    • Be sure to justify your opinion with supporting information.
  2. Describe a possible compromise to the issue for future cases that would allow the investigation to continue.
  3. Take a position on whether technology is moving too fast for the judicial system. 
    • Include supporting information that justifies your position.
  4. Recommend at least two improvements the courts can make to catch up and/or keep up with the advancements in technology issues and crimes. 
    • Be sure to support your recommendations.
  5. Integrate into the assignment at least three quality professional and/or academic resources, written within the past five years. 
    • Note: Wikipedia and similar websites do not qualify as quality resources.
    • One of your resources may be the provided article.

Formatting

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:

  • The preferred method is for your paper to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  • Include a cover page containing the assignment title, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
  • Include a source list page. Citations and references must follow SWS format. The source list page is not included in the required page length.

Learning Outcomes

The specific course learning outcome associated with this assignment is:

  • Review the rules, laws, policies, and procedures that affect digital forensics.

IT mobile applications vs websites

 From a development team of one to two people to an enterprise-level team with multiple divisions, the topic of mobile development will eventually come up. Write a seven to ten (7 – 10) page paper in which you:

  • 1. Compare & Contrast mobile applications vs websites.
  • 2. Research and discuss the importance of developing a mobile strategy.
  • 3. Discuss different system mobile functionalities.
  • 4. Explain the social aspect of mobile interfaces.
  • 5. Discuss two – three mobile application development myths.
  • 6. Argue the need for adaptive vs dedicated mobile websites.

Your assignment must follow these formatting requirements:

  • Use at least ten – twelve (10 – 12 ) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. 
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment 

The New Plays Repertory Theater would like to computerize

  

The New Plays Repertory Theater would like to computerize its ticket sales. The theater seats 500 people, offers seven plays each year, and sells season tickets and single-night tickets. The season tickets are all for performances at the same time during the week. Each play has 20 performances. The theater keeps a customer list of those people who buy tickets in order to send play information for advertising purposes.
 

The reports they would like to create are:
 

A listing of available seats
A listing of all plays and the actors in the plays
A listing of customers
Labels printed for all customers
A listing of season ticket holders
Plan an RDBMS for this problem. Include the following forms:
 

1. List of Reports
 

2. Report Layout Form
 

3. Schema
 

4. Table Characteristics
 

5. Query Design Form