Entries by Peter

Prepare a Job description

   Bachelor Courses: · Object Oriented Programming language (JAVA) · C programming & Data Structures · Computer Organization · Network Analysis Master’s Courses: · Analysis, modelling and design · Systems development and implement · Applied Programming · Database Development and Admin Provide Job duties or responsibilities for Mainframe Developer with 4 years of experience relating […]

Discussion

1Q)   Using Social Media and Networking  After reviewing the assigned reading materials, complete the following activities: 1.  Develop a product service idea. A. Describe the product/service including the benefits of using the product/service B. Discuss the potential customers for this product/service 2.  Based on the nature of the product/service, recommend at least 3 possible social media to use […]

short paper

Network Architecture Paper:Compare the TCP/IP protocol suite and the OSI model and list their differences and similarities. The paper must use APA 6th ed., 7th printing formatting and contain a title page, 2 pages of content, and a minimum of two peer-reviewed references. Please access the Purdue Owl Online Writing Lab as an APA resource.  Your assignment will be graded […]

Discussion

1q)    Search “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion. I need 250 […]

For Madam Propesa

Cultural Competency Organizational Assessment and Solutions Scenario: Cross, Bazron, Dennis and Isaacs (1989) defined cultural competence as “a set of congruent behaviors, attitudes and policies that come together as a system, that system, agency or those professionals to work effectively in cross-cultural situations”. Cultural Competency is vital to sustainability of a health care organization and the […]

Information Systems 2

Assignment 1: Models for Competitive Dynamics Competition has, since the 90s, led to wider gaps between industry leaders and laggards. There are more “winner-take-all” environments and greater churns among industry sector rivals. We have witnessed sharp increases in quality and quantity of IT (Information Technology) investments. We’ve seen striking competitive dynamics, particularly in sectors that […]

Data Analysis (Cluster Analysis) APA format, no plagiarism 3-4 pages

Attached Files:  Week 4 Cluster Data.xlsx (8.977 KB) Included with this assignment is an Excel spreadsheet that contains data with two dimension values. The purpose of this assignment is to demonstrate steps performed in a K-Means Cluster analysis. Review the “k-MEANS CLUSTERING ALGORITHM” section in Chapter 4 of the Sharda et. al. textbook for additional background. Use Excel to […]

week 7 case study

Draft Term Paper: Project Managers and Ethics, Leadership, and Technology Due Week 7 and worth 75 points Project managers do a lot more than calculations and reporting; they must keep the team on track, ensure ethical decisions are made, deal with conflict, and, depending on the type of organization, they may perform employee evaluations, issue […]

Discussion Thread Assignment: How Research Benefits the Criminal Justice System

Criminal justice research benefits society, the practitioner, and you as a student in many ways. The research provides a base of learning competencies regarding various criminal justice research methods and statistics related to criminology and crime, crime control, justice, and policy-making decisions. As a student of criminal justice, you will be exposed to various practical […]

MISS PROFESSOR ONLY

  Case Study 2: Forced Decryption Ruled Unconstitutional   Due Week 7 and worth 60 points       Read the article titled, “U.S. Courts Rule For–and Against–Protecting a Suspect’s Hard Drives” located at the following IEEE Spectrum link: http://spectrum.ieee.org/riskfactor/computing/it/us-courts-rule-for-and-against-protecting-a-suspects-hard-drives       Write a three to four (3-4) page paper in which you:   […]