+1(316)4441378

+44-141-628-6690


Warning: Use of undefined constant woothemes - assumed 'woothemes' (this will throw an Error in a future version of PHP) in /home/admin/web/qualityessayresearch.com/public_html/wp-content/themes/cushy/archive.php on line 47
Archive for the ‘Computer science’
Warning: Use of undefined constant woothemes - assumed 'woothemes' (this will throw an Error in a future version of PHP) in /home/admin/web/qualityessayresearch.com/public_html/wp-content/themes/cushy/archive.php on line 47
Category

Map(s)

Submit the Map(s) portion of the final project. The submission should be a logically intuitive map that accurately represents an aspect of your discipline. The map should limit distortion in area, direction, and shape. It should also utilize intuitive symbology and enhance color contrast and visualization. As you create your map, consider your target audience and how best to transition from a three-dimensional surface to a two-dimensional plane with limited loss of data with respect to the aspect you are representing. Discuss your target audience, the process of creating your map, and any aspects of your map that had to be distorted or are missing.

The format of this milestone will be a presentation. Your presentation should use PowerPoint or another comparable presentation tool, with speech notes. Screenshots of your map may be inserted.

Here a link to point you in the right direction https://giscommons.org/output/
I included some powerpoints from previous sections to

role of ict disaster and emergency management and response

a definition of the topic
o at least four impacts (positive or negative) of the ICT being investigated within
the scope you identified
Page 2 of 3
o a factor that could have negatively impacted / influenced the extent of (using)
the ICTs within the environment/scope you identified
a recommendation for the factor identified above in to order to remedy or
mitigate any similar / related future issue/s
Should reflect relevance, clarity and organization based on research.

Usability evaluation of E-learning website in Saudi Arabia

references:
1- https://airccj.org/CSCP/vol7/csit77001.pdf

2- file:///C:/Users/SONY/AppData/Local/Temp/Usability_Evaluation_of_an_Educational_Website_in_.pdf

3- K.  Orfanou,  N.  Tselios,  and  C.  Katsanos,  "Perceived  usability  evaluation  of  learning  management systems: Empirical evaluation of the System Usability  Scale," The International  Review  of Research in Open and Distributed Learning, vol. 16, 2015.

4- M.  Alshammari,  R.  Anane,  and  R.  J.  Hendley,  "Design  and  Usability  Evaluation  of  Adaptive  e-learning Systems Based on Learner Knowledge and Learning Style," in Human-Computer Interaction, 2015, pp. 584-591.

5- S.  H.  Mustafa  and  L.  F.  Al-Zouabi,  "Usability  of  the  academic  websites  of  Jordan's  universitie

Discussion

What routing and switching protocols would you choose for your small office/home office (SOHO) network?
What if you had to work in a small company? Explain your thought processes.
What transmission medium would you use in a larger company that had multiple campuses?

Management Information Systems – Post Response

Instruction:

Evaluate this Post and express your agreement or disagreement or improve, clarify or express a clearer idea about outsourcing or multi-sourcing.

POST:
In my understanding, outsourcing is limited to hiring someone who's providing a service or providing a product, somewhat only produced for you. By this definition, buying off the shelf software, like an operating system or an accounting product, is not outsourcing. Hiring a service provider to install and configure it for you, instead of using an internal IT team, would be. Along the same line, use a service provided online, if the service is very much the same for all customer, does not constitute outsourcing (Gmail, O365, Salesforce).

A line also needs to be drawn with staff augmentation. Hiring a specialized to perform a specific implementation would be outsourcing. In my opinion, using a staff augmentation business to add non-employees to assist in various tasks, may not always be outsourcing. If,

Management Information Systems – Post Response

Instruction:

Answer the following question:

Coordination as being important when a company has many vendors and consider the three vendors Alpha, Beta and Gamma in the Adidas case:

How might Adidas manage competition and collaboration among the three vendors at the same time?





NIST Cybersecurity Framework is used by many thousands of businesses to organize and evaluate their cybersecurity preparedness.

Paper should include a discussion of the following:

Brief history of NIST and the NIST CSF
Purpose of the NIST CSF
Possible applications of the NIST CSF
A plan to conduct a risk assessment of a company using the NIST CSF
Conclusion

Get Ready Application

The writer should have a health informatics technology experience.
you should follow the Rubrics for both the report and the presentation. The aim is not to focus on so much content but the application itself (Get Ready) from IT point of view. attached are the rubrics, the user survey satisfaction for patients and physicians, the improved outcomes from using the app (pictures) and the content with the overall design of the app.
The report should be 16 pages and the slides 12 slides. The slides must have graphic designs in each slide. If you are not going to follow the exact instructions please don't send an offer.

Securing the Cloud: Data Security

Week 6 Readings and Media

Please review the following for this week:

    Vic (J.R.) Winkler, Securing the Cloud, Cloud Computer Security Techniques and Tactics, 2011, Chapter 6.
    NIST Special Publication 800-53 Revision 3, Recommended Security Controls for Federal Information Systems and Organizations; 2009.
    NIST Federal Information Processing Standards Publication 199 (Links to an external site.) (FIPS Pub-199), Published February 2004. Available at: http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf [accessed 22.03.11].

Media

Cloud Computing Security Overview - Cloud Security Advanced Event
https://www.youtube.com/watch?v=xulMoVYGKZI&fireglass_rsn=true#fireglass_params&tabid=aa5b50ce690510ab&application_server_address=l3harris-e9.prod.fire.glass&popup=true&is_right_side_popup=false&start_with_session_counter=1

-------------------------------------

How to regulate Artificial Intelligence?

Your work should contain two aspects. Firstly, find at least one legal case concerning AI that impose liability on owner / provider / user of the AI. Discuss it at length focusing on facts of the case and the legal outcome, including a source of liability.

Secondly, Use the EU resources as well as any writings on the Internet that you find relevant to propose a solution who should be liable for operation of AI-based products. Focus on the EU resources that discuss the potential of product liability (product liability directive is considered to be the best candidate for regulation of damages resulting from the operation of AI).

It requires careful citations. It is forbidden to copy and paste text in an assignment. Such works will be penalized and disqualified.