Big Data 19596933

  Sensors Computer networks Data storage Cluster computer systems Cloud computing facilities Data analysis algorithms

How does these technologies play a role in global computing and big data?

Case Study Appliance Warehouse Application Design

  

continue your work to support the development and implementation of the new Service Department for Appliance Warehouse.

For this week’s assignment, be sure to refer to Appliance Warehouse Resources: Survey results, Pre-packaged software features, as well as, chapter 7 Development Strategies, and chapter 8 User Interface Design.

Directions

In MindTap, review the Appliance Warehouse Case, and do the following:

· Read the Before You Begin Message and the Module 8-10 Appliance Warehouse Webmail Client Emails. Read the messages to help determine the tasks you must complete.

· Review and analyze the weekly Appliance Warehouse case study content and resources.

Create an 8- to 10-slide presentation with speaker notes (to submit in Blackboard) for senior management with the following:

· Service Department Software Design: To build a logical model for the new information system, a system analyst must decide on whether to use a SaaS or use an in-house customized software. For this section, ensure you:

· Research service-based business applications that allow for appointment setting and service provider scheduling.

· Prepare a list of 4 pros and 4 cons for each of the following:

· SaaS

· An in-house customized software

· Recommend SaaS or in-house software and state your reasoning.

· Software Requirements: Identify 7-10 requirements the software must do to support the Services Department.

· Develop a Communication Plan: Explain how stakeholders and managers will be kept informed regarding project process. Your plan should include the form of communication (status reports,meetings, etc.), frequency, and specific project milestones that will aid in determining where the implementation stands.

Before You Begin – Assignment Specific

Going forward with in-house development, Carlie Davis is now requesting that you design SIM’s User-Interface (UI). The way an application looks and its ease of use is critical to its acceptance and success. Consider how to get these items approved by the users. During this stage, you will be designing system pages and reports. It is important to determine which hardware SAM will run on. If the software is going to run on mobile devices, the programmers need to plan the user interface accordingly.

Hi Kevin,

After your presentation last week, the manager thinks an in-house solution is the way to go. Although our programmers have much experience with system integration and development, they have little experience with user design. You’ll have to lay out all the pages of the system. For now, just create a hierarchical drawing of all the pages needed for this system. Think of the menu on the top of the screen and what you’d click on to move to the next screen.

Once you finish the hierarchy, I’ll need you to draw out examples of a few of the screens. For example, show a screen with a menu, another which requests user input, one that has methods to contact us, and the last one as an informational page. The menu screen can be an opening page or even a page to decide on types of reports to run. The user input page can be one for any of the users, such as the appointment setters or technicians. Make sure that you outline all of the required validation rules for this input page. The informational page can either be a static page or results from a search. Make sure that you include navigation buttons on each of these example pages.

I think it would be a nice touch to include our logo on all of these screens.

Carlie

Hi Kevin,

The developers want to know if this new application should run on a mobile platform. If so, they want to know if it should be created with responsive web design? What do you think would be the best and why?

I was wondering if prototyping this system might be more effective. What are the advantages and disadvantages to this approach?

Please give me your thoughts on these items by the end of the day today.

Thanks.

Carlie

Hi Kevin,

Don’t forget that we have a lunch scheduled on Friday at the corner deli. It should be fun!

I know I’ve asked for some other mockups this week but could you also mockup samples of three different report types (detail, exception, and summary)? Mae is having a difficult time visualizing how one of her summary reports would look like. Also, Maddox Farley wants to know what the parts report will look like that he will be using several times a day.

How do you plan on distributing each of these reports when SIM is up and running?

If you could get me these samples soon, I’d appreciate it. I’m meeting with Mae and Maddox first thing on Thursday.

Thanks.

Carlie

Discussion Online 19569639

 

This week I want you to consider the policy choice of  Bring Your Own Device,  BYOD.

Using the 3 paragraph structure described in the announcements, please research and explain what is Bring Your Own Device, explain just 1 reason for allowing a Bring Your Own Device BYOD policy and 1 reason against allowing BYOD in an organization.  

In your own words, no quotations allowed this week.

This is your format. Deviations from this format will result in a failing grade and additional scrutiny for plagiarism.

Wifi Security Wireless Network Encryption

Final Project

Topic – WIFI Security – Wireless Network Encryption

Paper Consists of 5 pages Including Title and reference page

PowerPoint Consists of 10 slides including Title, reference and conclusion. 

Bi W 5 A

 

Complete the following assignment in one MS word document:

Chapter 8 –discussion question #1-4 & exercise 4

Chapter 9- discussion question #1-5 & exercise 3

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source)

The password for Chapter 9 Exercise 3 is Analytics

Short Research Paper For Phd Please Read Below Before Bidding Apa 6th Edition Format 19520531

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure? If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements: Use Microsoft Word to create the document. Do not save your document as a Adobe document. Be approximately 2-4 pages in length, not including the required cover page and reference page. Follow APA the 6th Edition guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion. Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources. Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Linux 19734209

Lab #3-1 Making and Mounting Images

In this lab, you will learn how to make and mount images created using “dcfldd”.  We will go over the image-making procedure using a Linux laptop computer and then we will use another Linux laptop to mount the image like you would mount any file system. Then the students will write a 3 to 4-page paper (not including the title and references pages) describing how the process was carried out in the lab.  The students will then post the report to moodle and print the report out and put it into their lab notebooks. Make sure you use APA format and adhere to the writing rubric.

Writing Requirements 3–4 pages in length  (excluding cover page, abstract, and reference list) Include at least 2-3 peer-reviewed sources that are properly cited APA format, Use the APA template located in the Student Resource Center to complete the assignment. Please use the Case Study Guide as a reference point for writing your case study.
Lab #3-2 Building off Discussion Question 3.3 (Shell Scripting)

In this lab, you will learn how to create shell scripts using the Bourne Shell Scripting language. The student will have to do research on the Bourne Shell Scripting language and then write a script that asks the First Name , Last Name, Age, and Country of origin of the student and then print out these items in a statement Then the students will write a 3 to 4-page paper (not including the title and references pages) describing how the process was carried out in the lab.  The students will then post the report to Moodle and print the report out and put it into their lab notebooks. Make sure you use APA format and adhere to the writing rubric.

Writing Requirements 3–4 pages in length  (excluding cover page, abstract, and reference list) Include at least 2-3 peer-reviewed sources that are properly cited APA format, Use the APA template located in the Student Resource Center to complete the assignment. Please use the Case Study Guide as a reference point for writing your case study.

Cryptography 19585089

 

Question:

Use Sage to solve the following problems. 

For this questions assume that we are using dsa with domain parameters:

p = 7,877,914,592,603,328,881

q = 44449

g = 2,860,021,798,868,462,661

Use these domain parameters to determine if the signatures are valid in parts (a)-(c) public key y = 3798043471854149631, hash value H = 59367, and signature (r,s) = (31019, 4047) public key y = 1829820126190370021, hash value H = 77241, and signature (r,s) = (24646, 43556) public key y = 4519088706115097514, hash value H = 48302, and signature (r,s) = (36283, 32514)

Perform a signing operation for the below parts (a)-(b) private key x = 8146, hash value H = 22655 private key x = 1548, hash value H = 32782

Write A Essay 19528751

Use a search engine to find the names of five different cyber viruses.
Using WORD, write a short paragraph on each.
Use your own words and do not copy  the work of another student.
Attach your WORD document here.

Bi W 3 A

 

Complete the following assignment in one MS word document:

Chapter 5 –discussion question #1-4 & exercise 6 & internet exercise #7

Chapter 6– discussion question #1-5 & exercise 4

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).