+1(316)4441378

+44-141-628-6690

Archive for the ‘Information Systems’ Category

INSY 3303

C3 Cabling

Question 1

You are building a new home. Pick a builder and floorplan. Investigate the types of cabling offered as standard and what are the possible upgrades. Compare the costs vs benefits (speed, MHz, etc.) in a table and explain why you choose what you do in a Word document. Comment on another's post.

Builder & Floorplan URL 15 pts
Cabling comparison & Choice explanation 20 pts
Comment 15 pts


Question 2

Compare the costs of mainframe dumb terminals, network servers, minimally equipped personal computers, and top-of-the-line personal gaming computers

Compare in a Word document table

Wk-5

 

DEVELOPING INTIMACY WITH YOUR DATA

This exercise involves you working with a dataset of your choosing. Visit the website, browse through the options and find a dataset of interest, then follow the simple instructions to download it. With acquisition completed, work through the remaining key steps of examining, transforming and exploring your data to develop a robust familiarisation with its potential offering:

Examination: Thoroughly examine the physical properties (type, size, condition) of your dataset, noting down useful observations or descriptions where relevant.

Transformation: What could you do/would you need to do to clean or modify the existing data to create new values to work with? What other data could you imagine would be valuable to consolidate the existing data?

Exploration: Using a tool of your choice (such as Excel, Tableau, R) to visually explore the dat

CIS 524 Discussion 1 & 2

Discussion 1


"Interaction Devices" Please respond to the following:


Touch screens are becoming extremely popular input devices for phones and tablets. Assess the value of touch screen devices related to human-computer interaction systems. Identify at least two advantages and two disadvantages of having touch screen devices in the workplace. Support your response by citing a quality resource.

Chapter 8 currently has the following subsections, keyboards and keypads, pointing devices, and speech and auditory interfaces. Predict what the subsections may be if this book were written 10 years from now. Justify your predictions.



Discussion 2


"Collaboration and Social Media" Please respond to the following:


While planning for a new project, a young developer mentions that she used Facebook as a collaborative group space for developing her

CIS 518 Discussion 1 & 2

Week 6 Discussion 1


Please respond to the following:


"Data Structures" Please respond to the following:

Imagine you are asked to write a program to print out a yearly calendar. In this program, the user enters the year desired, and the output is a calendar for that year. Determine how the representation of internal data will affect the way in which the program is written.

Produce two examples of data structures that might be used in the scenario above.  (Hint: Are your data structures cumulative or not? How is a leap year handled?)





Week 6 Discussion 2


Please respond to the following:


"Generating Test Cases" Please respond to the following:

From the e-Activity, identify at least two methods used to generate test cases in software development, and explain how they are used to identify and perfo

CIS 515 Discussion

Respond to the following:


In order to ensure optimal database performance, the logical and physical design should consider the user requirements thoroughly. Suppose you have been hired to transform a conceptual model into a logical model for a sales database. Describe the specific steps that you must perform in order to appropriately construct the database model. For each step mentioned, speculate the risks that might present themselves and how you would avoid or mitigate those risks.


Suggest at least three activities that are required in the physical design process of a database to ensure adequate physical storage and data access. Analyze why user, security groups, and role definitions are essential to maintain the integrity of the database

CIS 505 Discussion

Please respond to the following:


If HTTPS is secure and HTTP is just for regular traffic, what do you think users should keep in mind when communicating sensitive information over the Internet? Have you ever taken that s seriously when conducting business online? What implications do you think a business might be concerned with? What would you advise if you were the decision maker for a small company?

BUS 517 Discussion

Discussion: Project Challenge Schedule Change


Your Project Sponsor and customer are impressed with your project schedule, but due to some factors out of their control, youve been told to deliver your project early, roughly 15% earlier than anticipated. Using the information from the readings, explain how you would go about assessing the possibility of delivering your project early. How will that affect scope, costs, and schedule?


Assignment On Security Architecture And Design

 Annotated Bibliography 

 

Search the web (Google Scholar) and find 6 peer-reviewed articles published since 2015 that relate to the topic of security architecture and design and construct an annotated bibliography. If you have never written an annotated bibliography, please use the link below for guidance.  

https://owl.purdue.edu/owl/general_writing/common_writing_assignments/annotated_bibliographies/annotated_bibliography_samples.html

*************************************************************************************

Make sure to follow APA style. Please make sure your submission is a minimum of 600 words in length and meets the minimum APA formatting guidelines:

     12-pt, Times New Roman font

   Double-spaced

   1 margins on all sides

   Please provide a title page including your Name, Course Number, Date of Submission, and Assign

Assignment

In discussing Organizational Excellence, let's start with an analysis of your organization or one with which you are familiar. Take the Organizational Diagnosis Questionnaire that is found above. Provide a detailed analysis of what is working and what is not working. It should be at least 300 words in length and you must extensively cite reliable sources, both as references at the end and as corresponding in-text citations (formatted according to APA standards)

Review The Roles Of Line Management And Social Network And Information Technology Sections.

 Review the Roles of Line Management and Social Network and Information Technology sections.  Note the various roles in the organization and note the similarities and differences within each role.  Also, note how innovation technology management shapes how we communicate amongst coworkers within an organization. (Information Technology and Organizational Learning)