Unit 2 DB: Responsive Website vs Native/Hybrid Mobile Applications

Once you are comfortable with the concepts of responsive design, share a link to a website that you believe has utilized responsive design, and explain how you confirmed the responsive design of this website.

  • Did you confirm it by looking at the source code?
  • Did you confirm it by testing the website on various devices and in various browsers?
  • How does this responsive website compare to native mobile applications or hybrid applications?
  • What features were lacking from the responsive website that could be implemented in a native or hybrid mobile application?

Research Paper Topic Proposal and outline

 

Instructions

Database Security Research Paper and Outline

In this course, each student is required to conduct research and write a paper that covers an approved topic area of database security.  Present your choice of topic for the Database Security Research Paper.  Your topic proposal should be at least one paragraph in length with citations to at least two references (besides the book) that help support the topic you wish to research.  A brief summary of these references should be included.  In addition, you must provide a one (1) page, high-level outline of your paper.  Draft and final versions of the research paper are due by the end of Weeks 5 and 7, respectively.  Although this is not a graded assignment, the quality of the research paper proposal and outline will factor into the overall research paper grade.  Topics for the Database Security Research Paper 

Below are examples of the topics students may choose from, or one can be suggested by the student for approval by the instructor.

Anonymization/Pseudonymization, Data Hiding, Metadata and Security, XML Security, Authorization and Access Control, Data Integrity, Privacy Preserving Data Mining, Statistical Database Security, Control of Data Disclosure, Private Information Retrieval, Secure Stream Processing, Secure Auditing, Data Retention, Search on Encrypted Data, Digital and Enterprise Rights Management, Multimedia Security and Privacy, Private Authentication, Identity Management, Privacy Enhancing Technologies, Security and Semantic Web, Security and Privacy in Ubiquitous Computing, Security and Privacy of Health Data, Web Service Security, Trust Management, Policy Management, Applied Cryptography

Assignment

The discussion questions this week are from Chapter’s 8 & 9  (Jamsa, 2013).Chapter 8 topics:

  • Define and describe virtualization.
  • Describe the various types of virtualization.
  • Define and describe the hypervisor.
  • Define and describe green computing.
  • List the security advantages of cloud-based solutions.
  • Define and discuss the data wiping process.
  • Define and discuss hyperjacking attacks.
  • Define and discuss guest-hopping attacks.

Programming with C++

NEED THIS FINISHED IN 10 HOURS 

Builders Inc. wants a program that allows its sales clerks to enter the diameter of a circle and the price of railing material per foot. The program should calculate and display the total price of the railing material. Use 3.1416 as the value of pi. First,  create an IPO chart for this problem, and then desk-check the algorithm twice. For the first desk-check, use 35 feet as the diameter and $2 as the price per foot. For the second desk-check, use 15.5 and $3.50. After desk-checking the algorithm, list the input,  processing, and output items in a chart similar to the one shown in Figure 3-25, and then enter the appropriate C++ declaration statements 

 Save your document( AS A CPP FILE) with the name material followed by your initials. 

Example material-rf.cpp 

Discussions and reflection : ITS-833: Information Governance

Discussion1: Cloud Computing

Word count: 300+

Chapter 15 – Information Governance for Cloud Computing

Chapter 16 – Leveraging and Governing Emerging Technologies

According to your readings, cloud computing represents one of the most significant paradigms shifts in information technology (IT) history, due to an extension of sharing an application-hosting provider that has been around for many years, and was common in highly regulated vertical industries like banks and health care institutions.  The author’s knowledge from their research continues to assert that, the impetus behind cloud computing lies in the idea that it provides economies of scale by spreading costs across many client organizations and pooling computing resources while matching client computing needs to consumption in a flexible, real-time version. 

Identify the issues and risks that pose a concern to organizations storing data in the cloud –  briefly support your discussion. 

Remember to cite your sources. Share an applicable personal experience
. Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
*  At least one scholarly source should be used in the discussion. Be sure to use information from your readings. Use proper citations and references in your post.

Discussion 2: Mobile Computing

Word count: 300+

Chapter 15 – Information Governance for Cloud Computing

Chapter 16 – Leveraging and Governing Emerging Technologies

We learn from our readings that the use of mobile devices in our society today has indeed become ubiquitous.  In addition, CTIA asserted that over 326 million mobile devices were in use within The United States as of December 2012 – an estimated growth of more than 100 percent penetration rate with users carrying more than one device with notable continues growth.  From this research, it’s evident that mobile computing has vastly accelerated in popularity over the last decade due to several factors noted by the authors in our chapter reading. In consideration of this revelation, identify and name these factors, and provide a brief discussion about them.

Remember to cite your sources. Share an applicable personal experience
. Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
. At least one scholarly source should be used in the discussion. Be sure to use information from your readings. Use proper citations and references in your post.

Reflection: Practical Connection Assignment:

It is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. Assignment:
Provide a reflection of at least 2 pages double spaced of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. Requirements:

  • Provide a 2 pages minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment.

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Textbook: 

Title: Information Governance, ISBN: 9781118421017 Authors: Robert F. Smallwood Publisher: John Wiley & Sons Publication Date: 2014-03-28

Note: plagiarism check required, APA7 format, include References, within 8hrsThis post has 3 assignments. Please provide answers in separate documents.

Matlab code

I have matlab code (motion_fusion.m). This is the main file. All the codes are written but need to correct them. 

 I have some helper function as well. (they are .m files, you can find those in main file, motion_fusion.m )  I also have some data to load in main file.  

I am looking for someone to correct the code and run the code. 

3 Assignment 600 words

1)

Ways HR Data May Improve Your Bottom LineTechnology is advancing at a pace that has never been seen before.  With this continuous growth in technology, data analytics is becoming more prevalent and possible in just about every area of business.  Human Resources (HR) has historically been seen as more of a ‘paper pushing’ area of business with payroll, hiring, firing, and compliance being the main areas of the industry.

However, within the last 10 years HR has become more strategic in focus and the use of data analytics in HR is quickly turning into a hot topic.  Many people might find it bizarre to use data analytics in such a people-focused profession; however, there are huge financial savings for companies that choose to do so.  Here are some areas where this can happen:

  1. The Marriage of Big Data and Tax Credits – Many companies have been historically unable to tap into the HR-related tax credits available.  With big data, these credits are more able to be used to financially boost the company.
  2. Managing Benefits and Health Care – The cost of healthcare benefits is a large cost for businesses.  These costs can be reduced by using data to incentivize healthy behaviors and manage healthcare benefits with a financial intelligence in-mind.
  3. Identifying Retention Risks – Replacing employees is an extremely high cost to an organization.  Some employees are more costly to replace than others.  Using HR Data can help curb some of the expenses related to retention.
  4. Employee Engagement – Employees being disengaged in the workplace can take a high toll on productivity and business outcomes.  This high cost can amount to millions or billions of dollars for an organization and using HR Data could reduce some of that cost.

Key Points

  • There are more ways to use HR Data than just those listed in this article.
  • HR Data can be expensive to use but can also have a substantially high ROI.

Discussion Questions

  1. How can a business’s MIS department be most beneficial in using HR Data to reduce costs?
  2. What can a business’s HR department encourage objective decision-making through data?
  3. What might be some of the challenges of using HR Data to make decisions?

ReferencesGordon, J. (2016, April 21). Ways HR data may improve your bottomline. Retrieved from Forbes: https://www.forbes.com/sites/adp/2016/04/21/ways-hr-data-may-improve-your-bottom-line/?sh=64ad206665c5Rubric_ExportFile_40297202204_1657573612540.zip

2)

Read the Case StudyDemir, A. (2017). Management Information Systems: Case Study of Amazon.com. Journal of Research in Business and Management, 4(11), 11-17.  From http://www.questjournals.org/jrbm/papers/vol4-issue11/B4111117.pdfCase study questions

  1. Amazon began as an on-line book retailer. How has it grown to be known as the “everything store”?
  2. What aspects of Amazon’s operations management are based on the increased globalization of world trade?
  3. Amazon’s marketplace focuses on smaller sellers and manufacturers by linking them with a huge customer base and fulfillment program. Can e-commerce ever truly replace the in-person shopping experience?

Case study rubric

3)

Read the case belowCrosby, Michael; et al. (2016). “Blockchain Technology: Beyond Bitcoin” (PDF). Applied Innovation Review (2): 6–19.Case study questions

  1. What are the privacy issues with blockchain?
  2. How does blockchain increase privacy?
  3. Is blockchain the solution for privacy?
  4. How does blockchain provide confidentiality?

Case study rubric

Comp 2

The only real information is your name. However, use the template provided to apply for the job. It is fictional so you have already graduated and had the years experience for this position. So sell yourself. 
Registered Nurse Pre-Op/PACU, BethesdaOutpatient Surgery Center at Bethesda West  FT, 7:00am – 3:30pmBaptist Outpatient Services (Links to an external site.)Requirements:The RN is a licensed professional who delivers patient-family-centered care in a culturally competent manner utilizing evidence-based standards of quality, safety, and service while ensuring the appropriate care for all age groups in the specific population of the unit. The RN demonstrates the following core competencies and behaviors: nursing process, technical skills, communication, critical thinking, interpersonal skills, flexibility, organizational skills, accountability and leadership.
Qualifications: Degrees: Associates Licenses & Certifications: Registered Nurse Pediatric Advanced Life Support Neonatal Resuscitation Program Basic Life Support Advanced Cardiovascular Life Support Additional Qualifications: Associate degree in Nursing or Bachelors degree in Nursing. RNs hired prior to 2/2012 are not required to have a BSN to continue in their non-leadership role as an RN. RNs hired after 2/2012 with an Associate degree will have 5 years from their date of hire to complete the BSN degree. Life Support Certificate (BLS, NRP, PALS, ACLS) as per department standard. RN must complete a preceptor class within six months of hire. Minimum Required Experience: 2 years

history article

you are doing a deep dive into the article, summarizing the paper to analyze the authors argument. what sort of sources does she use to back her argument. how does she use those sources. where do u think she is effective and where do you think she fails.