Computer Science
[SOLVED] Emerging Technologies
Description of the CareersCybersecurity specialists are professionals tasked with overseeing everyday operations in the technological sector to ensure the optimal technical and data systems’ optimal function. Their duties include detecting and preventing any security risks that may emerge during operations and avert any other possible susceptibilities threatening the system (. The professional undertakes investigative research and test the available technological appliances to decipher any potential threats and mitigate them. They also monitor day-to-day operations to resolve security and data-related issues and install necessary security measures and protocols (Cybersecurity Career Paths and Progression, 2019). The professionals may also coach staff members on security measures and investigate ways of eradicating the risks with which technological systems grapple.Individuals interested in the career have to successfully go through a degree program in computer science or a similar educational path. (Cybersecurity Career Paths and Progression, 2019). They should also have advanced IT skills and apply critical thinking skills while carrying out their tasks. The professionals’ average salary is between $60,000 and $110 000, depending on their level of experience and positions in organizations. The average wages for cybersecurity specialists also differ in different states. In Maryland, the professional’s net pay is $102, 000 while in Virginia, itis$99,000.https://niccs.cisa.gov/sites/default/files/documents/pdf/cybersecurity. On the other hand, those in Washington D. C receive a higher income of up to $108,500.A pharmacist is a medical professional tasked with preparing prescribed medicines and disseminating useful information about using them correctly. They identify any errors in the prescribed medications, such as wrong dosages or incompatibilities, and make the necessary corrections (Reed et al., 2019). Also, they perform the tasks required in preparing medications, including compounding the needed ingredients, packing them appropriately, and ensuring they are fully labeled for easy use. The necessary qualifications for an individual to become a pharmacist include acquiring a degree program in the course and receiving accreditation from the presiding board, ACPE. The average salary of a pharmacist varies from one state to another. In Washington, it is over $127,000. On the other hand, in Virginia, professionals are paid up to $115,000 (Reed et al., 2019). Those in Maryland are also well paid, with the medical experts’ average net pay quoted to be at least 121,000.Emerging Technologies Used to Improve Production or Workflow in the IndustriesThe emerging technologies that can help in enhancing workflow in information technology include the use of automation. Automation refers to technological designs that enable work processes such as collecting and distributing data to be carried out automatically using sophisticated devices and computing programs doi.org/10.2308/jeta-52653. The system can be applied in different sectors, including management of sales and organizational supply chain. It increases the speed and efficiency with which tasks are carried out in the workplace. Subsequently, the cloud is another crucial IT tool that can be used in organizations to improve workflow. It alludes to the encapsulation of the internet into the workplace to enable an easy flow of communication. It facilitates a seamless flow of information between different stakeholders, including the vendors, management, and employees (Xu et al., 2018). Therefore, the tool is critical in increasing workflow in various departments like supply chain and human resources.The emerging technologies that aid pharmacists in performing their tasks include pharmacist management systems that assist in compiling factual data about patients and controlling the department’s inventories (Baines et al., 2018). They also use electronic prescription services to release two automated systems to dispense medications to patients quickly and accurately effectively. Further, they utilize telecare to follow up on patient progress and reminding clients about refilling medications.Ethical Issues in the IndustriesThe ethical issues that are commonly experienced in information technology include the infiltration of personal privacy. While utilizing technological tools, it is possible to access and compromise individuals’ confidential content (Huda, 2019). Subsequently, another critical ethical issue that affects the industry is the violation of copyrights. Copyright alludes to the exclusive right to something. Individuals’ can illegally access and incorporate such programs or software, leading to legal ramifications. Further, engagement in cybercrimes is another significant ethical issue in the industry (Huda, 2019). People may use the platform to create fake identities and use them to engage in illegalities or hack other individuals’ systems leading to data comprise and loss.
[SOLVED] Practical Connection
Assignment:Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of Access Control have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.Requirements:Provide a 500 word (or 2 pages double spaced) minimum reflection.Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.Share a personal connection that identifies specific knowledge and theories from this course.Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace
[SOLVED] Project Plan
QUESTIONSEach group submits a full project plan that includes:A table that shows team member roles and responsibilities for the project as well as an estimate of how many hours that will be spent on each part of the plan (this is hypothetical, the team resources you WOULD NEED to actually implement the project).Other anticipated resources (equipment, facilities, monetary investments, etc.)A schedule of internal deadlines that your team plans to complete the project.An analysis of any risks the team perceives in accomplishing the project planning.A bibliography of any literature used to inform decisions.Submit a comprehensive final project plan, including narrative text, describing the project, scope of work, plans, financials, and conclusions, with appropriate MS Excel worksheets and Project scheduling files attached as one professional report for grading. The assignment should be submitted in the project leaders assignment folder.
[SOLVED] Java Programming
Develop an application involving simulation and gaming Casino Simulation. The goal is to have you apply the knowledge, techniques and problem-solving skills you have learned in this class.The two game simulations that you will be developing are: Slot Machine and Blackjack.Here are some suggestions for the games design:1. Ask the player to enter his/her name.2. Display a personalized welcome message.3. Ask the player to make an initial deposit, the required minimum amount is $20 and the max is $1000. Your program needs to keep track of the players account balance through the entire game.4. Display a game menu containing the two games offered (Slot Machine, Blackjack) and prompt the player to choose a game he or she wants to play: 1=Slot Machine, 2= Blackjack and the amount the player would like to bet on the chosen game.5. After a game selection is made, check the players account balance. If the balance is insufficient, prompt the user to deposit more money, else the game chosen by the player starts.6. At the end of each game run, show the following messages: the players total deposit, the winning or losing amount and the account balance.7. Ask the player whether he or she wishes to continue to play a game. Your program performs the tasks indicated by the player.
[SOLVED] Analyzing Data
DQ1Correlation is a common statistic to measure a general linear relationship between two variables. Explain why correlation does not equal causation.DQ2Explain the differences between parametric and nonparametric tests. How do you determine if a parametric or nonparametric test should be used when analyzing data?
[SOLVED] Organ Leadership
This weeks journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:How do trustworthy and ethical leaders enhance knowledge sharing in organizations? How does this impact the rate of information technology implementations? How does this impact data management within organizations?How does servant leadership assist with transferring knowledge in an organization?When thinking about data analytics, how does transformational leadership assist with building good data structures?Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:3-5 pages in length (not including title page or references)APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.A minimum of five peer-reviewed journal articles.
[SOLVED] Data Analysis
Module 4 Data Analysis ExerciseList the problems found with the data (note there may or may not be as many as five). Note that you will need to provide necessary SPSS outputs to justify your conclusions (15 pts for identified problems, 15 pts for provided evidence).1. ________________________________2. ________________________________3. ________________________________4. ________________________________5. ________________________________
[SOLVED] Cyber Law
Current laws that govern cyberspace are inadequate to handle advances in the Internet and computing technologies. In your opinion, is this an accurate statement? Support your position or answer with a few examples.Your submission should be:300 wordsin-text citations and references using the APA stylesingle spaced
[SOLVED] Data Management
Effective and Efficient Business FunctionsPrepared by Dr. Derek Sedlack, South UniversityCopyright © 2015 John Wiley & Sons, Inc. All rights reserved.Learning ObjectivesManufacturing, Production, and Transportation Management SystemsSales and Marketing SystemsAccounting, Finance, and Regulatory SystemsHuman Resource Systems, Compliance, and EthicsSolving Business Challenges at All Management LevelsSolving Business Challenges at All Management LevelsMissionSet of outcomes an enterprise wants to achieve.Strategic PlanA document used to communicate the companys goals and the actions needed to achieve them.Chapter 9Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.Solving Business Challenges at All Management LevelsChapter 9Figure 9.5 Three organizational levels, their concerns, and strategic and tactical questions, planning, and control.Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.Solving Business Challenges at All Management LevelsOrder Fulfillment ProcessMoving products from customer order to the customer, including checking credit, collecting payment, picking shipping departments to pack products, printing mailing labels, preparing for shipment, and notifying departments.Standard Operating ProceduresSet of written instructions on how to preform a function or activity.Chapter 9Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.Solving Business Challenges at All Management LevelsBasic Functional Area SystemsManufacturing and production: materials purchasing, quality control, scheduling, shipping, receiving.Accounting: accounts receivable, accounts payable, general ledger, and budgeting. Accounting systems keep account balances up to date, disburse funds, and post statements.Finance: Finance: cash management, asset management, credit management, financial statement reporting to comply with federal and industry-specific regulations and government agencies.Chapter 9Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.Solving Business Challenges at All Management LevelsBasic Functional Area SystemsIT: cloud computing services, SLA management, software license management, user accounts management, information and network security.Sales and marketing: pricing, social media promotions, market research, demand forecasts, sales campaign management, order tracking, and online and mobile order processing and sales.HR: payroll, recruitment and hiring, succession planning, employee benefits, training, compensation, performance appraisal, compliance with federal and state employment regulations.Chapter 9Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.Solving Business Challenges at All Management LevelsACID TestAtomicity: If all steps in a transaction are not completed, then the entire transaction is cancelled.Consistency: Only operations that meet data validity standards are allowed.Isolation: Transactions must be isolated from each other.Durability: Backups by themselves do not provide durability.Chapter 9Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.Solving Business Challenges at All Management LevelsTransaction ProcessingTransaction processing systems monitor, collect, store, process, and distribute all financial and nonfinancial transactions.Batch: events or transactions are processed during scheduled times.Online (OLTP): events or transactions are processed as soon as they occur.Chapter 9Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.Solving Business Challenges at All Management LevelsChapter 9Figure 9.7 Information flows triggered by a transaction or event.Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.Solving Business Challenges at All Management LevelsExplain the core concerns and time horizons of each level of management.Define what a standard operating procedure (SOP) is and give an example.Explain each component of the ACID test.4Explain the differences between batch and online processing.Describe the flow of information in transaction processing.Chapter 9Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.Suggested Answers:1. There are three levels of Management (Robert Anthonys Management hierarchy): strategic, managerial (tactical, or administrative) and operational.At the strategic level, senior or top level management plan and make decisions that set or impact the long-term direction of the entire organization. They set priorities, focus energy and human and technology resources, strengthen operations, and ensure that employees and business partners work toward common goals. These decisions are visionary and future-oriented.At the managerial level, middle-level managers define business models and make tactical decisions that are shorter range. Middle-level managers design business processes, procedures, and policies to implement strategic plans.At the operational level, managers and supervisors depend on detailed data, in real time or near real time. Decision making is mostly immediate or short-term, because decisions are made to control ongoing activities and operations. Feedback and control are vital to identify deviations from goals as soon as possible in order to take corrective action.2. A SOP is a set of written instructions on how to perform a function or activity. SOPs provide the framework for complex processes to be managed more effectively
[SOLVED] Security Breach
Research a recent security breach (in the last year).You can use https://www.identityforce.com/blog/2020-data-breaches to identify one breach and then use the internet to get more information on that breach.What was the breach about? How many users were affected? Could the breach have been avoided and why?
Use Promo Code: FIRST15