Computer Science Homework Help

CS2122 KAS Array Indexing Worksheet

 

Array indexing can be generalized to any number of dimensions. With that in mind the

following C function initializes a pointer to an element from a 3-dimensional matrix, Data:

Computer Science Homework Help

‘Macro Design Exercise

 

Computer Science Homework Help

CCC Choosing Between Android and iOS Essay

 

Using the industry where you currently work or have worked before, write a proposal recommending your choice between Android or iOS? From a user and developer’s perspective, which would you recommend to your company and why?Total 600 words; 3 APA refernces please

Computer Science Homework Help

Strayer University Week 7 Denormalization Discussion

 

I’m working on a computer science question and need an explanation and answer to help me learn.

Having an adequate data model to serve specific business needs of an organization is important.

Evaluate the need for denormalization within an organization.

Provide at least three examples that prove denormalization is useful to data consumers.

Computer Science Homework Help

MIS 5030 South University Emerging Technologies Discussion

 

Select and research a topic pertaining to an emerging technology. Possible ideas include but are not limited to the following: 3D printing, artificial intelligence and cognitive systems, augmented reality, business intelligence, cloud computing, energy harvesting and future fuels, the Internet of things, medical nanotechnology, molecular manufacturing, next-generation converged networks, robotics, synthetic biology, telemedicine, and wireless and mobile technologies.

Submit your topic selection to your instructor. On receiving approval, begin to research your topic.

Bibliography

To research your topic, look for scholarly sources from the South University Online Library and from the Internet. Evaluate the resources you find and compile the useful ones into a bibliography.

For each selected resource, the bibliography entry should have the following:

  • The complete citation in APA format
  • A description of the information in the source, the reliability of the source, and how the information may be useful in your project

Topic Introduction

Utilizing the concepts introduced in this week’s readings, address the following questions pertaining to your technology topic of choice:

  • How does your selected technology qualify as an emerging technology? Discuss the possible pitfalls of adopting this emerging technology for an organization. Support your answer with examples.
  • Evaluate the decision to go ahead with this emerging technology under uncertainty. Your evaluation should present scenarios of the technology succeeding or failing and whether the decision posture is aggressive (commitment to create options) or passive (wait and see).
  • Detail a process for technology assessment with four interrelated steps: scoping, searching, evaluating, and committing. Show how an organization can apply this process to its decisions regarding your selected technology.
  • Explain the different types of risks that must be considered in the evaluation of your selected technology. These typically include market risks, technology risks, and organizational risks. For each type of risk, identify and qualify (whether they are relatively high or low) some risks associated with this technological opportunity for an organization. Discuss which types of risks are relatively more dominant and will require more attention, and which ones are relatively more manageable. Specify the underlying assumptions for your assertions.
  • Describe how an organization can achieve foresight regarding the markets and technologies and insight into its capabilities to plan technology deployment. Describe any specific strategies an organization can develop for risk reduction and learning.

Computer Science Homework Help

CIS 498 Strayer University Information Technology Project Plan Paper

 

Week 4 Assignment – Business Requirements

Overview

This is the second of a series of five sequential assignments (the course project) in which you continue to act as the Chief Technology Officer (CTO) of a hypothetical, e-commerce start-up company of your design.

You have been tasked with delivering an information technology project plan in anticipation of the company relocating to a new facility. In the first course deliverable, you created a project plan inception document and supporting Gantt chart. This deliverable spelled out the company’s background information and business and provided an overview of the company’s information system infrastructure.

In this second course project deliverable, you are responsible for developing the business requirements to be incorporated into the information systems design you are creating.

Procuring quality business requirements is a critical step when designing quality information systems. Completing a quality requirements document captures user needs and expectations to facilitate the proper design of the company’s infrastructure and information systems.

This assignment consists of two parts:

Part 1: Business Requirements

You will develop a 5–7-page business requirements document for your hypothetical e-commerce company as part of the overall information systems project plan you are creating. Using the Business Requirements Template [DOCX], you will speculate on the company’s current and future requirements. Your assumptions need to be carefully considered and realistic.

Part 2: Updated Gantt Chart

You will use Microsoft Project to update the supporting project Gantt chart begun in your previous course project deliverable.

  • You are not creating a new Gantt chart, only updating the one you created in the previous assignment.

Note:

  • You are to create or assume all necessary assumptions to successfully complete this assignment.
  • You must submit both parts as separate files to the assignment area. Label each file name according to the appropriate part.

Instructions

Part 1: Business Requirements

Using the Business Requirements Template, you are to write a 5–7-page business requirements document for your hypothetical e-commerce company in which you:

  1. Describe the functional business requirements (scope) and scope control.
  2. Describe non-functional business requirements, such as governance, risk, and compliance.
  3. Describe technical requirements to integrate various e-commerce infrastructure components.
  4. Identify potential risks, constraints, and assumptions.
  5. Use three sources to support your writing.
    • Choose sources that are credible, relevant, and appropriate.
    • Cite each source listed on your source page at least one time within your assignment.
    • Access the library or review library guides for help with research, writing, and citation.
Part 2: Updated Gantt Chart

Use Microsoft Project to update the previously created Gantt chart with the major and minor tasks identified in the business requirements document.

Formatting

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:

  • The preferred method is for the business requirements portion of your assignment to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  • Include a cover page containing the assignment title, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
  • Include a source list page. Citations and references must follow SWS format. The source list page is not included in the required page length.

Learning Outcomes

The specific course learning outcome associated with this assignment is:

  • Develop a business requirements document for a project plan.

Computer Science Homework Help

Strayer University Week 6 E Commerce Start Up Company Development Project

 

  1. This is the third in a series of five sequential assignments (the course project) in which you continue to act as the Chief Technology Officer (CTO) of a hypothetical e-commerce start-up company of your design.You have been working on delivering an information technology project plan in anticipation of the company relocating to a new facility.
    • In the first course project deliverable, you created a project plan inception document and supporting Gantt chart.
    • In the second course project deliverable, you developed the business requirements to be incorporated into the information systems design you are creating. You also updated your original supporting Gantt chart based on major and minor tasks identified in the business requirements document.
    • In this third course project deliverable, you will create an infrastructure design that considers the key elements of software, hardware, security, and business process flow for your e-commerce startup company. You will also use graphical tools to create a supporting data flow diagram (DFD) for your infrastructure design. The infrastructure design provides an opportunity to visualize the key elements and how they are connected for maximum effectiveness.This assignment consists of two-parts:Part 1: Infrastructure Design
      You will create an 8–10-page infrastructure design document to include key technical elements for your hypothetical e-commerce company’s information systems infrastructure.Part 2: Updated Gantt Chart
      You will use Microsoft Project to again update the supporting project Gantt chart begun in your first course project deliverable:
    • You are not creating a new Gantt chart, only updating the one you created in the previous assignment with the major and minor tasks uncovered while creating the infrastructure design document.
    • Note:
    • You are to create or assume all necessary assumptions to successfully complete this assignment.
    • You must submit both parts as separate files to the assignment area. Label each file name according to the appropriate part.
    • Instructions
      Part 1: Infrastructure Design
      Create an 8–10-page infrastructure design document in which you:
    1. Identify the major hardware and software components of your hypothetical e-commerce company’s information systems infrastructure.
    2. Design your e-commerce company’s hardware (database and proxy servers, network equipment) and software (analytics, big data, API, content management) from a size, scale, type, and interoperability standards perspective.
    3. Document the potential security vulnerabilities and a security design for your e-commerce company.
    4. Use graphical tools to create a data flow diagram (DFD) for your e-commerce company.
    5. Use three sources to support your writing.
      • Choose sources that are credible, relevant, and appropriate.
      • Cite each source listed on your source page at least one time within your assignment.
      • Access the library or review library guides for help with research, writing, and citation.
    6. Part 2: Updated Gantt Chart
      Use Microsoft Project to update the previously created Gantt chart with the major and minor tasks identified in the infrastructure design document.Formatting
      This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:
    • The preferred method is for the infrastructure design portion of your assignment to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
    • Include a cover page containing the assignment title, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
    • Include a source list page. Citations and references must follow SWS format. The source list page is not included in the required page length.
    • Learning Outcomes
      The specific course learning outcome associated with this assignment is:
    • Propose a design to address hardware, software, and security aspects of an entity’s information systems infrastructure.

Computer Science Homework Help

SU W7 Social Media Initiatives and Information Technology Discussion

 

 

  • Share the link to the resource on social media initiatives and information technology that was most useful to you.
    • Be sure to explain what was most useful to you in this resource.
  • Describe the importance of effective change leadership in relation to an organization’s adoption of social media initiatives.
  • Identify two ethical issues you may encounter when implementing social media initiatives for your course project.
  • Propose a strategy for addressing each ethical issue you identified.
    • Be sure to explain how and why the strategies you propose will address the ethical issues you identified.

In your response to your classmate, consider questions, such as the following:

  • What additional ethical issues do you think your classmate may encounter when implementing social media initiatives for his/her course project?
  • What do you find particularly effective about the strategies your classmate has proposed to address these ethical issue
  • What potential challenges do you anticipate your classmate may encounter when implementing these strategies

please replay to

pamala woolsey 

Week 7 Discussion

Social Media Initiatives and Information Technology

Link: Hugo.Lam, Andy Yeung, Edwin Cheng. (2016). The impact of firms’ social media initiatives on operational efficiency and innovativeness. Retrieved from: https://www.sciencedirect.com/science/article/abs/pii/S0272696316300341 

    – I actually struggled to find a resource that I felt covered both social media initiatives in relation to Information Technology. This one was intriguing because it covered it from an operations management side which seemed the most relevant. Many articles explained why it was good for a certain aspect of business. This link was the must encompassing which is why I found it the most helpful. 

Effective Change Leadership

    This article did a very good job explaining how and why a company would want to incorporate social media initiatives into their business and project plan models. It would be important to have a leadership team that is willing to apply the effective change mentality because those leadership types are the ones that are open to innovation. Leadership that is stuck with the applications of the past may find that they fall behind the curve it they stall in implementing something like this. My article specifically mentions how the social media initiatives have helped “facilitate infomraiton flow and knowledge sharing within and across organizations”. That communication leads to a large array of other benefits for customer and partner interaction. Even the abstract to this article was insightful. 

Ethical Issues

  1. When taking to a public forum it is important for companies to take caution. Through HIPAA laws there might be certain times of restrictions on what can and cannot be used as initiatives.
  2. Another issue that could have ethical issues in todays world is taking sides. There are always battles being fought between various belief systems. With social media and the “forever” internet, there can be serious damage if a company takes a specific stance on any one topic. 

Addressing These Issues

  1. Being educated on the requirements associated with HIPAA and maybe even the FCC will help any company stay compliant.
  2. Even though it can be very difficult any action taken towards a specific stance on an issue should be well thought out. Remaining neutral might also be a consideration. For example if the issue of controversy does not directly impact your business.  

-Ashley

Brayon delk,

Hello all,

           I found the below link to be quite informative, despite its’ short length.  Straight off the bat, it points out one of the key aspects of my project, that social media platforms are key in the evolution of business marketing.  This does, however, bring a new skill set that should be considered when making the move into social media marketing.  This skill set involves utilizing marketing skills to reach the intended customer base and create synergy within the various platforms around the products and/or services being offered.  But wait, there is more, this skill must also be backed up with strong IT skills as well.  IT members are increasingly being looked at to ensure communication paths are open to allow for multiple social media outlets as well as allowing for the translation of full web site content to mobile formats. 

           Another facet the social media formats bring to the table is the amount of data that can be collected and analyzed for marketing purposes.  From the marketing perspective, this is huge.  Social media can be used very effectively to conduct targeted campaigns on each platform, based on the analyzed data.  The issue is being able to gather, parse and effectively analyze the data from all the various social media outlets.  This is where IT must be able to provide tools capable of synthesizing all those data streams into a cohesive environment that marketing can make use of.

           For the purposes of my project, the inclusion of active social media marketing will be a change.  This is where leadership must take an active role in change management and truly become change agents for the company.  To effectively sell this change to the company as a whole, leadership should focus on the projected revenue generation expected as a result of the change and actively advocate for the change.  An apathetic attitude from leadership will indicate to employees that the change is not important which will stall adoption and impede the entire change process. 

           There are some ethical issues that must be considered when making the move into the social media market.  The first is the protection of customer data, as well as proprietary information.  The company must establish strong privacy policies and procedures to ensure the protection of customer data.  On the IT side, all stored data must follow encryption standards to mitigate the possibility of data compromise in the event a data breach does occur.  Another issue to keep in mind is ensuring the information shared with the public on the various social media sites is both accurate and verifiable before being posted.  Having inaccurate data associated with the company or its products could quickly bring a negative light on the company.  Especially when you consider how quickly information travels on social media sites.  This can best be mitigated through employee training and ensuring each product description is thoroughly vetted following a specific process prior to public release.

https://www.computersciencedegreehub.com/faq/social-media-affect-information-technology-professional/

Additional references

Adventure Web Interactive. (n.d.). 5 Important Ethical Concerns in Social Media Marketing. Retrieved from Adventure Web Interactive: https://www.advp.com/blog/5-important-ethical-conc…

Computer Science Homework Help

SU The Methodology for The Testing Wireless LAN Assessment Discussion

 

One of your continuing clients has engaged you to conduct a wireless assessment and penetration test of their infrastructure. Your client has asked you to brief them on the methodology you will use and the tools you would select to complete this engagement.

Briefly, lay out your proposed methodology with a brief explanation of each step and any tools you would use to support a given step.

answer a classmates

La’Sha May

Hello Professor & Class

Penetration test methodology includes in-depth testing for a variety of well-known as well as more obscure vulnerabilities.

Step 1: Planning and Preparation: Both parties exchange initial information, plan, and prepare for the IT Security Assessment. Identification of contact individuals from both sides. Opening meeting to confirm the scope, approach and methodology. Agreement to specific test cases and privilege escalation paths.

Step 2: Perform A Scan / Assessment: Is a layered approach that includes an actual penetration test.

Develop A Test Plan, Build The Toolkit, Conduct The Assessment Analysis

Step 3: Exploitation and Data Exfiltration: This task will only be performed at the request of the customer and only after having obtained formal authorization. The engineer will review the strength of any authentication systems present on network hosts and on remote terminal sessions by attempting to use easily guessable passwords based on common English dictionary.

Step 4: Reporting, Cleanup, and Destruction of Artifacts: At this point, the specifics should be discussed and countermeasures to safeguard against this issue will be provided.