[CUSTOM SOLUTION] Democracy and Ethics

Watch the Ted Talks regarding Democracy and Ethics in Module 4. Simply discuss the key points from each video and state what you agree with and disagree with.The discussion and original post will occur in groups. All students must respond to one of the other group member’s posting.Each discussion’s original post into the group DB should be a minimum of 300 words in length and the responses to another colleague in the Group DB should approximate 200 words

Read more

[CUSTOM SOLUTION] CIS Web Design

For this assignment, you’re going to begin to work on your site. Based on your storyboard and client feedback (professor’s comments), create three pages of your site that include the following:Navigation links that are consistent on all pagesAt least two folders in your file structureInformation about the site’s purpose on the home page (named index.html)Images on at least two pagesA link to a specific location on one page from a different pageTwo different listsNow that you have begun to write your pages in HTML, please add the following to a comment in the of your work:Name, date, week #, class with section, and campus # (i.e. CIS273001VA016)Always zip your work into a single folder for uploading to Blackboard. You’ll want to keep each week separate so that you can review earlier iterations of your site, in case you want to revert something back based on feedback from your professor.

Read more

[CUSTOM SOLUTION] Java Script

After weeks of intense work your client is excited to view the final Web page:Remember to include:A consistent design and color schemeAn external CSS document to control these aspectsCSS applied to a single pageUse of inline stylesA consistent navigation between parts of your siteA minimum of 5-8 pagesAt least three external hyperlinksAn email link with the subject filled inA form (it does NOT have to connect to a database because that is beyond the scope of this class)Properly placed images on at least three pagesThe use of alert message on one pageJavaScript that adds value to your page. This could be mouseover events for navigation, a photo gallery, form field validation, performing a calculation in a form (such as adding tax or shipping), etc.JavaScript additionsThe preparation of the desktop and mobile versions of your site.Now that you have begun to write your pages in HTML, please add the following to a comment in the of your work:Name, date, week #, class with section, and campus # (i.e. CIS273001VA016)

Read more

[CUSTOM SOLUTION] Information Technology Implementations

· Task-1 Enterprise discussion (1 page with proper inline citations, references, APA format and No plagiarism)Mackita, M., Shin, S.-Y., & Choe, T.-Y. (2019). ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing. Future Internet, 11(9), 195. Retrieved from https://doi.org/10.3390/fi11090195Puchley, T., & Toppi, C. (2018). ERM: Evolving From Risk Assessment to Strategic Risk Management. HFM (Healthcare Financial Management), 1–5.· What are some of the potential risks involved with cloud computing?· Does the research and model in this article propose a viable solution to cloud-based risk management?Task-2Enterprise paper (4 pages with proper citations, references, APA format and No plagiarism)What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?• Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.Task-3Organ Leader discussion: (1 page with proper citations, references, APA format and No plagiarism)KCIL, U., ALTINAY, Z., DAGLI, G., & ALTINAY, F. (2019). The Role of Technology Leadership: Innovation for School Leadership in Digital Age. ELearning & Software for Education, 2, 323. http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=edb&AN=135939718&site=eds-live&custid=s8501869&groupid=main&profile=eds_newAfter completing the reading this week, we reflect on a few key concepts this week:1. Discuss what ethical leadership is and how it impacts the organizational culture.2. What are the various dimensions of ethical leadership?3. Note some failures in ethical leadership, please find an example, explain the failure and note possible solutions to fix the issue with leadership.Task-4 Organ Leader paper: (4 pages with proper citations, references, APA format and No plagiarism)AKCIL, U., ALTINAY, Z., DAGLI, G., & ALTINAY, F. (2019). The Role of Technology Leadership: Innovation for School Leadership in Digital Age. ELearning & Software for Education, 2, 323. http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=edb&AN=135939718&site=eds-live&custid=s8501869&groupid=main&profile=eds_new This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:How do trustworthy and ethical leaders enhance knowledge sharing in organizations? How does this impact the rate of information technology implementations? How does this impact data management within organizations?How does servant leadership assist with transferring knowledge in an organization?When thinking about data analytics, how does transformational leadership assist with building good data structures?

Read more

[CUSTOM SOLUTION] Financial Benefits

Please help with following written assignment, do not give nonsense word salads as answer, be concise:Chapter 12:· Discussion 1: Some people say that chatbots are inferior for chatting. Others disagree. Discuss.· Discussion 2: Discuss the financial benefits of chatbots.· Discussion 3: Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.· Exercise 1: Compare the chatbots of Facebook and WeChat. Which has more functionalities?· Exercise 12: Research the role of chatbots in helping patients with dementia.· Exercise 16: Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done.Chapter 13:· Discussion 1: Some say that analytics in general dehumanize managerial activities, and others say they do not. Discuss arguments for both points of view.· Discussion 2: Diagnosing infections and prescribing pharmaceuticals are the weak points of many practicing physicians. It seems, therefore, that society would be better served if analytics-based diagnostic systems were used by more physicians. Answer the following questions:· Why do you think such systems are used minimally by physicians?· Assume that you are a hospital administrator whose physicians are salaried and report to you. What would you do to persuade them to use an intelligent system?· If the potential benefits to society are so great, can society do something that will increase doctors’ use of such intelligent systems?· Discussion 3: What are some of the major privacy concerns in employing intelligent systems on mobile data?· Discussion 4: Identify some cases of violations of user privacy from current literature and their impact on data science as a profession.· Exercise 3: Investigate the American Bar Association’s Technology Resource Center (americanbar.org/groups/departments_offices/legal_technology_resources.html) and nolo.com. What are the major legal and societal concerns regarding intelligent systems? How are they being dealt with?· Exercise 4: Explore several sites related to healthcare (e.g., WebMD. com, who.int). Find issues related to AI and privacy. Write a report on how these sites suggest improving privacy.Exercise 6: Research the issue of voice assistants and privacy protection. Start by reading Collins (2017) and Huff (2017).Your paper should meet these requirements:· Minimum 5 pages length, not including the required cover page and reference page. Also do not include questions, just number and the answer.· Run your submission on a grammar check before submitting· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations.· References should be relevant and recent (in last 3 years). No bogus and made-up references· If you need to quote from reference, do not exactly quote, rephrase the quote as direct quote increases plagiarism percentage.· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.

Read more

[CUSTOM SOLUTION] Smart Home Devices

Write a discussion post on following three topics. Each one should be in a separate file, each post should have 2 (scholarly) journal citations, min 300 words each, additional requirements also specified below:Discussion 1:Examine Alexa’s skill in ordering drinks from Starbucks.Discussion 2):Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.Please make your posts substantive. A substantive post will do at least two of the following:· Ask an interesting, thoughtful question pertaining to the topic· Answer a question (in detail) posted by another student or the instructor· Provide extensive additional information on the topic· Explain, define, or analyze the topic in detail· Share an applicable personal experience· Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)· Make an argument concerning the topic.Run you submission through grammar check before submitting.At least 2 (scholarly) journal source should be used for each post.Make your references in correct APA 7 format and cite each reference at least once, but as many times as you rely on it. Citations support each sentence relying on a reference, not an entire paragraph. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations. Initial posts need to be 300 words minimum .

Read more

[CUSTOM SOLUTION] Kentucky Evaluation System

Research Question: What impact has Kentucky education reform had on potential teacher burnout?Background or Distantly Related Work: Early Ages· 1957-1958 Frustration with US Department of Education which led to more math and science· 1960-1965 Johnson Reform (inclusion)· 1980’s Regan’s “A Nation at Risk” which began accountability· Early 2000’s No Child Left Behind (Assessment)· 2010+ Race to the TopNarrow Categories that are closer to the work you are doing: Modern days· How did this change education in Kentucky?· What wad its impact on KY Teachers and profession· Did this change how we taught?Specific Categories: Recent Days· KPREP – High Stakes Testing· TPGES – Kentucky Evaluation system for teachersMost Specific and Similar Studies: Burnout· What causes job burnout in general?· What causes teacher burnout?

Read more

[CUSTOM SOLUTION] Selective Browsing

Do not just answer the questions. You should be able to explain the logic behind your answer and point to a credible source to support your position, even if it is just the textbook. You are expected to spend at least 6 hours studying the questions, finding and studying good sources, and understanding the nature of the answers and at least an additional 6 hours answering these questions and polishing your writing, so the answers are compelling. Invest your time wisely, giving more time to the complex answers in order to ensure that you demonstrate that you truly understand the answer. Answer in 350 words or more per question. No short answer questions. Choose your sources carefully. Must be in APA format.1. What is Information overloading and when does it occur?2. How can we implement a Publishing policy?3. What are the procedures to enhance web content?4. What is selective browsing?

Read more

[CUSTOM SOLUTION] Uses of Email Filters

Discuss uses of Email filters, Rerouting ‘spam’ and selective browsing. Answer must be 400 words.

Read more

[CUSTOM SOLUTION] Computer Networks.

Step 2: Identify Examples of Vulnerabilities, Threats, andRisksIn the previous step, you familiarized yourself with the concepts ofvulnerability, threat, and risk. You now understand their relationship toone another and how they relate to security. In this step, you are goingto identify at least two examples of a vulnerability, two examples of athreat, and two examples of a risk in each of the following categories:? technology? people (human factors)? policyIdentify a minimum of 18 examples. This will assist you in conductingthe vulnerability assessment and developing the educational brochure.Review topics such as basic elements of communication and computernetworks.In the next step, you will look more closely at current vulnerabilities andthreats.Step 3: Identify Current Vulnerabilities and ThreatsAfter defining and identifying examples of vulnerabilities, threats, andrisks in the first two steps, you should understand the basic concepts ofvulnerabilities and threats as they apply to general cybersecurity.However, vulnerabilities and threats are dynamic: They can evolve withchanges in technologies, changes in adversary capabilities orintentions, or changes in human behaviors and organizational policies.It is important to understand current vulnerabilities and threats andtheir applicability to the larger community as well as to yourorganization (e.g., critical infrastructure protection), so that you canmake informed recommendations on how/whether to mitigate them.Identify current known vulnerabilities and threats that could affect yourorganization. The vulnerabilities and threats that you identify will benecessary for your final presentation.List a minimum of two current known vulnerabilities and threatsinvolving the following:? people (human factors)? technology? policyWhen complete, move to the next step, where you will take part in asimulation.

Read more
Enjoy affordable prices and lifetime discounts
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Order Now Order in Chat

Ensure originality, uphold integrity, and achieve excellence. Get FREE Turnitin AI Reports with every order.