knowledge management – how KM used in your company and how knowledge transmitted

Document 4 page with 4 references. NO TITLE PAGE:

Describe how knowledge management used in your current company. Is there a Chief Information Officer? How is knowledge transmitted? Is knowledge hoarded or openly shared among workers.

Subject: Knowledge Management Systems and Processes

Reference:

1. “Why Knowledge Management?” by Antoine Tawa. link: https://www.youtube.com/watch?v=QWQp1EZP3eU

2. “Knowledge Management: An organization’s weapon of choice” link: https://www.youtube.com/watch?v=zUVZn44WT_c  

3.  Chapters 1 and 2 from book Knowledge Management Systems and Processes By Irma Becerra-Fernandez, Rajiv Sabherwal 2nd Edition

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

advanced database systems

A.2.2 Transaction Requirements (Sample)

Data entry

Enter the details for a new property and the owner (such as details of property 

number PG4 in Glasgow owned by Tina Murphy).

Enter the details of a new client (such as details of Mike Ritchie).

Enter the details of a client viewing a property (such as client Mike Ritchie viewing 

property number PG4 in Glasgow on the 06-May-12).

Enter the details of a lease between a client and property (such as client Mike 

Ritchie renting out property number PG4 from the 10-May-12 to 9-May-13).

Data update/deletion

Update/delete the details of a property.

Update/delete the details of a property owner.

Update/delete the details of a client.

Update/delete the details of a property viewing by a client.

Update/delete the details of a lease.

Data queries

Examples of queries required by the Staff user views:

(a)  List details of staff supervised by a named Supervisor at the branch.

(b)  List details of all Assistants alphabetically by name at the branch.

(c)  List the details of property (including the rental deposit) available for rent at 

the branch, along with the owner’s details.

(d) List the details of properties managed by a named member of staff at the 

branch.

(e)  List the clients registering at the branch and the names of the members of staff 

who registered the clients.

(f)  Identify properties located in Glasgow with rents no higher than £450.

(g)  Identify the name and telephone number of an owner of a given property.

(h) List the details of comments made by clients viewing a given property.

(i)  Display the names and phone numbers of clients who have viewed a given 

property but not supplied comments.

(j)  Display the details of a lease between a named client and a given property.

(k)  Identify the leases due to expire next month at the branch.

(l)  List the details of properties that have not been rented out for more than three 

months.

(m) Produce a list of clients whose preferences match a particular property

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Scientific Computing I-APPROXIMATIONS AND ROUND-OFF ERRORS

1.Evaluate

e power−5

using two approaches

e power−x=1–x+xpower2/2−xpower3/3!+……

and

epower−x=1/e power x=1/(1+x+(xpower2/2)+(xpower3/3!))+……

and compare with the true value of

6.737947×10power−3.

Use 20 terms to evaluate each series and compute true and approximate relative errors as terms are added.

2.The derivative of f(x)=1/(1-3x power2) is given by

6x/(1=3x power 2)whole power2

Do you expect to have difficulties evaluating this function at x =0.577? Try it using 3- and 4-digit arithmetic with chopping.

3.(a)Evaluate the polynomial

y=xpower 3-5xpower2+6x+0.55

at x =1.37. Use 3-digit arithmetic with chopping. Evaluate thepercent relative error.

(b)Repeat(a) but express y as

y=((x-5)x+6)x=0.55

Evaluate the error and compare with part(a).

 

4.Use 5-digit arithmetic with chopping to determine the roots of the following equation with Eqs. (3.12) and (3.13)

xpower2-5000.002x+10

Compute percent relative errors for your results.

5.The “divide and average” method, an old-time method for approximating the square root of any positive number

a, can be formulated as 

x=(x+(a/x))/2

Write a well-structured function to implement this algorithm basedon the algorithm outlined in Fig. 3.3

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Answer the following 2 questions in 2-3 pages

 

Consider diagram 7-1 from your textbook. Answer the following questions: diagram is in 215th page in the text book which is attached below.

  1. Do presentation layers add an attack surface to the enterprise? How about an e-commerce presence?
  2. The supply chain will interact with an entire business ecosystem of many other organizations. Interactions will probably include both people and automated flows. Are these third parties to be trusted at the same level as the internal systems, such as content management or data analysis?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Assignment

System analysis and Design Assignment – 2 pages

MUST ADD Scholarly Reference only

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Exp19_Word_Intro_Cap_Thinking

  

Exp19_Word_Intro_Cap_Thinking

Project Description:

As a class assignment, you are working with a research report related to decision making. You are finalizing the first draft and will submit it for your instructor’s approval. In so doing, you edit and format text, include a table of contents and a cover page, design a table, and include citations and a Works Cited page.

Steps to Perform:

   

Step

Instructions

Points    Possible

 

1

Start   Word. Download and open the file named   Exp19_Word_Intro_Cap_Thinking.docx. Grader has automatically added your   last name to the beginning of the filename.

0

 

2

By displaying nonprinting characters, you see such   indicators as page and section breaks, which are helpful when managing   document flow.
 

  Display nonprinting characters. Note that the document includes a blank first   page. Change the document theme to Retrospect and select Colors of Blue Warm.   Select all text in the document and change the font to Times New Roman. Click   the View tab and display the ruler.

4

 

3

Some   phrases, such as full names of people or publications, display more   attractively if they are not divided between lines, as is the case with the   name of the publication referenced in this paper. By including a Nonbreaking   Space, you ensure that the publication name will not be divided between   lines.
 

  Remove the word why from the second   sentence in the first body paragraph on page 2. Remove the space following   the word Cognitive in the last   sentence of the first body paragraph on page 2 and insert a Nonbreaking Space   symbol between Cognitive and Creativity.

5

 

4

Insert check mark bullets on the three single-line   paragraphs in the first body paragraph, beginning with the irrationality of humans and ending with the nature of well-being. Reduce the indent to position bullets at   the left margin and ensure that each bulleted text begins with a capital   letter. Change the left and right margins to 1”.

6

 

5

In   Outline view, you can collapse headings to any level of detail and then   manage sections, perhaps dragging to rearrange them as you do in this step.
 

  Change to Outline View. Change the Show Level setting to Level 2. Drag Stages of Prospect Theory directly   below the heading Prospect Theory   so that it becomes the first sublevel in the Prospect Theory section. Close Outline View. Bold the bulleted   items on page 2.

5

 

6

Select all text in the document and adjust   paragraph spacing before and after to 0 pt. Double-space the document. Add a   first line indent of 0.5″ to the first body paragraph on page 2   (beginning with The study of behavioral   economics). Center the title and subtitle (Cognitive Creativity and An   Analysis). Change the line spacing of the first line, Cognitive Creativity, to 1.0.

5

 

7

Text   that is formatted in a particular style adheres to the design requirements of   the style. To quickly change all text based on a particular style, or to   ensure that text that is typed in that style is formatted appropriately, you   can modify a style. By default, style settings are applied to the open   document only.
 

  Modify document properties to include Parker Adams as the author, removing any   existing author. Modify Heading 1 style to include a font of Times New Roman,   14 pt., Black, Text 1. Modify Heading 2 style to include a font of Times New   Roman, Black, Text 1. Changes in style should apply to the current document   only.

6

 

8

Tabbed text can, in some cases, be formatted and   worked with more easily if it is identified as a table. In this case,   arranging the tabbed text as a table enables you to apply a preset style and   to include an appropriate formula in a future step.
 

  Select the lines of tabbed text near the top of page 3 (beginning with System 1 and ending with 0.39) and convert the selection to a   table, accepting all default settings. Insert a row above the first row of   the new table, merge all cells, and type Systems of Decision Making. (Do not type the period.)   Center text in the first row.

7

 

9

Insert   a row below the first row. Split the cells in the row, adjusting the number   of columns shown in the dialog box to 4 and ensuring that Merge cells before split is selected.   Select the table and choose Distribute Columns on the Table Tools Layout tab   to align all columns.

3

 

10

Type the following text in row 2:
System   Theory Characterized by Percentage Employed Probability Factor

2

 

11

Insert   a row at the end of the table and merge the first three cells on the new row.   Type Average   Probability in   the merged cell on the last row and center the text. In the last cell on the   last row, enter a formula to average the numbers in the column above. You do   not need to select a Number format.

6

 

12

Apply a table style of List Table 3 – Accent 1 (row   3, column 2 under List Tables). Deselect First Column in the Table Style   Options group to remove bold formatting from the first column. Bold text on   the second row. Select the table and change all font to 10 pt. size. Center   all text in rows 2, 3, and 4. Center the numeric value in the last cell on   the last row.

5

 

13

Add a   caption below the table with the text, Table 1: Decision-Making Strategies. (Do not type the period and be   sure to include a hyphen between Decision   and Making.) Change the   probability factor for System 1 (in row 3) to 0.62. Update the field in the last cell on the last row   to reflect the change in probability.

5

 

14

Select rows 2, 3, and 4, click the Table Tools   Design tab and choose a Pen Color of Black, Text 1. Ensure that the line   style is a single line and the line weight is ½ pt. Apply the border   selection to All Borders.

2

 

15

A   footnote provides space for additional clarity or exposition on a statement   included in the document. Use a footnote if you want to provide additional   detail, but do not want to clutter the document text with that information.
 

  Click after the period that ends the last sentence in the first body   paragraph under System Biases   (ending in economical solutions to   problems). Insert a footnote with the text, For more information on theory-induced   blindness, visit http://cognitivecreativity.com/theory. (Include the period and be sure   to include a hyphen between theory and   induced.) Right-click the footnote   and modify the style to include Times New Roman 12 pt. font.

5

 

16

Shade the first two lines on page 2, Cognitive Creativity and An Analysis in Blue, Accent 2, Lighter   60% (row 3, column 6). Add a ½ pt. Box border, selecting color of Black, Text   1. Insert a DRAFT 1 watermark, colored Red (second column in Standard   Colors).

5

 

17

Click   before the Cognitive Creativity heading   at the top of page 2 (in the shaded area) and insert a page break. Click   before the new page break indicator on the newly inserted page 2 and insert a   table of contents, selecting Automatic Table 1.
 

  Mac users, select the Classic table of contents style.

5

 

18

Because you plan to format the first page   independently of the remaining pages, you insert a continuous section break   before the first page is inserted. Breaking a document into sections enables   you to format each section independently.
 

  Click before the table of contents title and insert a continuous section   break. Click before the page break indicator on the first page and insert   text from the file Cover.docx. Use   settings in the Page Setup dialog box to center the cover page vertically.   Ensure that the settings apply to the current section only.

3.5

 

19

Click   before the fourth blank paragraph below the words An Analysis on the Cover page. Insert Question_Mark.png. Change the picture height to 1.5” and choose   Top and Bottom text wrapping. Apply an artistic effect of Paint Strokes to   the picture (row 2, column 2).

5.5

 

20

Cover pages typically do not include such items as   watermarks, headers, or footers. You ensure that the cover page in this   document is clear of such items.
 

  Add a right-aligned header. Type Parker Adams and include a space following the name. Insert a   page number in the current position, selecting the Plain Number option if   available. Ensure that the header does not show on the first page. The   watermark may be automatically removed from the first page as well. Click   before Submitted by Parker Adams at   the end of the document. Insert a right tab at 5.5”. Press TAB to align the   text at the right tab stop.

4

 

21

Change   the writing style to MLA. Click before the period ending the first sentence   in the paragraph under the Decision   Systems heading on page 3 (ending in   and decisions are made). Insert a citation, using the existing source of Daniel Conner. Edit the citation to   show page 157 and to suppress Author, Year, and Title).

1.5

 

22

Click before the period ending the first sentence   under the System Biases heading   (ending in theory-induced bias).   Insert a citation to a new source as follows, making sure to include a hyphen   between Decision and Making in the Title:
 

  Type: Article in a   Periodical
  Author:   Leo James
  Title: Decision-Making   Strategies
  Periodical Title: Journal of Behavioral Economics
  Year: 2020
  Month: April
  Day: 21
  Pages: 45-52

2

 

23

Insert   a page break at the end of the document. Insert a bibliography, selecting   Insert Bibliography so that a title is not included. Mac users, delete the   title after inserting the bibliography. Click before the first source shown   and press ENTER. Click before the new blank paragraph and include a centered   line with the words Works Cited. (Do not include the period.) Select all text on   the Works Cited page and change the font to Times New Roman 12 pt. Change the   line spacing of the two bibliography sources to Double. Remove any Before or   After paragraph spacing from all text on the Works Cited page.

3

 

24

Select the heading, Decision Systems, on page 3. Insert a comment reading This is often   referred to as Decision Support Strategies. (Include the period.) Check spelling and   grammar, making corrections as necessary. The word spills is correctly used so you should ignore the error. Ignore   any clarity and conciseness concerns.

4.5

 

25

Save   and close Exp19_Word_Intro_Cap_Thinking.docx. Exit Word. Submit the file as   directed.

0

  

Total   Points

100

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Journal work

I need 1 Journal on the topics related to the below.

Data Engineering on relational databases 

Big Data Engineering on Hadoop and cloud platforms 

Data Analytics using Python and  Machine learning

Please write a journal of at least 9000 words.

Sample format of the journal is attached.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Threat Model

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

help me code this project

 

Project 1—UNIX shell

This project consists of designing a C program to serve as a shell interface that accepts user commands and then executes each command in a separate process. Your implementation will support input and output redirection, as well as pipes as a form of IPC between a pair of commands. Completing this project will involve using the UNIX fork(), exec(), wait(), dup2(), and pipe() system calls and can be completed on any Linux, UNIX, or macOS system.

I. Overview

A shell interface gives the user a prompt, after which the next command is entered. The example below illustrates the prompt osh> and the user’s next command: cat prog.c. (This command displays the file prog.c on the terminal using the UNIX cat command.)

osh>cat prog.c

One technique for implementing a shell interface is to have the parent process first read what the user enters on the command line (in this case, cat prog.c) and then create a separate child process that performs the command. Unless otherwise specified, the parent process waits for the child to exit before continuing. This is similar in functionality to the new process creation illustrated in Figure 3.3.3. However, UNIX shells typically also allow the child process to run in the background, or concurrently. To accomplish this, we add an ampersand (&) at the end of the command. Thus, if we rewrite the above command as

osh>cat prog.c &

the parent and child processes will run concurrently.

The separate child process is created using the fork() system call, and the user’s command is executed using one of the system calls in the exec() family (as described in Section Process creation).

A C program that provides the general operations of a command-line shell is supplied in the figure below. The main() function presents the prompt osh-> and outlines the steps to be taken after input from the user has been read. The main() function continually loops as long as should_run equals 1; when the user enters exit at the prompt, your program will set should_run to 0 and terminate.

#include <stdio.h>
#include <unistd.h>

#define MAX_LINE 80  /* The maximum length command */

int main(void)
{
char *args[MAX_LINE/2 + 1]; /* command line arguments */
int should_run = 1; /* flag to determine when to exit program */

while (should_run) {
printf("osh&#x003E;");
fflush(stdout);

/**
* After reading user input, the steps are:
* (1) fork a child process using fork()
* (2) the child process will invoke execvp()
* (3) parent will invoke wait() unless command included &
*/
}
return 0;
}

This project is organized into several parts:

  1. Creating the child process and executing the command in the child
  2. Providing a history feature
  3. Adding support of input and output redirection
  4. Allowing the parent and child processes to communicate via a pipe

II. Executing command in a child process

The first task is to modify the main() function in the figure above so that a child process is forked and executes the command specified by the user. This will require parsing what the user has entered into separate tokens and storing the tokens in an array of character strings (args in the figure above). For example, if the user enters the command ps -ael at the osh> prompt, the values stored in the args array are:

args[0] = "ps"
args[1] = "-ael"
args[2] = NULL

This args array will be passed to the execvp() function, which has the following prototype:

execvp(char *command, char *params[])

Here, command represents the command to be performed and params stores the parameters to this command. For this project, the execvp() function should be invoked as execvp(args[0], args). Be sure to check whether the user included & to determine whether or not the parent process is to wait for the child to exit.

III. Creating a history feature

The next task is to modify the shell interface program so that it provides a history feature to allow a user to execute the most recent command by entering !!. For example, if a user enters the command ls −l, she can then execute that command again by entering !! at the prompt. Any command executed in this fashion should be echoed on the user’s screen, and the command should also be placed in the history buffer as the next command.

Your program should also manage basic error handling. If there is no recent command in the history, entering !! should result in a message “No commands in history.”

IV. Redirecting input and output

Your shell should then be modified to support the ‘>‘ and ‘<‘ redirection operators, where ‘>‘ redirects the output of a command to a file and ‘<‘ redirects the input to a command from a file. For example, if a user enters

osh>ls > out.txt

the output from the ls command will be redirected to the file out.txt. Similarly, input can be redirected as well. For example, if the user enters

osh>sort < in.txt

the file in.txt will serve as input to the sort command.

Managing the redirection of both input and output will involve using the dup2() function, which duplicates an existing file descriptor to another file descriptor. For example, if fd is a file descriptor to the file out.txt, the call

dup2(fd, STDOUT_FILENO);

duplicates fd to standard output (the terminal). This means that any writes to standard output will in fact be sent to the out.txt file.

You can assume that commands will contain either one input or one output redirection and will not contain both. In other words, you do not have to be concerned with command sequences such as sort < in.txt > out.txt.

V. Communication via a pipe

The final modification to your shell is to allow the output of one command to serve as input to another using a pipe. For example, the following command sequence

osh>ls -l | less

has the output of the command ls −l serve as the input to the less command. Both the ls and less commands will run as separate processes and will communicate using the UNIX pipe() function described in Section Pipes. Perhaps the easiest way to create these separate processes is to have the parent process create the child process (which will execute ls −l). This child will also create another child process (which will execute less) and will establish a pipe between itself and the child process it creates. Implementing pipe functionality will also require using the dup2() function as described in the previous section. Finally, although several commands can be chained together using multiple pipes, you can assume that commands will contain only one pipe character and will not be combined with any redirection operators.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

project 2

To complete this assignment, review the prompt and grading rubric in the Project Two Guidelines and Rubric. When you have finished your work, submit the assignment here for grading and instructor feedback. For reference, refer to the CIA Triad and Fundamental Security Design Principles PDF document.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now