ERM W 13 D

 

The article on IRB this week discusses broad consent under the revised Common Rule. When you are doing any sort of research you are going to need to have your research plan approved by the University’s institutional review board or IRB. If you have never heard of this term before, please take a look online and find a brief summary of what it is about, before you read the article.  

Please answer the following questions in your main post:

  • What are the main issues that the article addresses?
  • What is the Common Rule?
  • How is this issue related to information systems and digital privacy?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Need help in Homework in emerging threats

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper. 

Need 2 papers.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 3

 

Project 3: Support Queue Case Study Instructions For this project, you will apply the CompTIA 6-Step Troubleshooting Process to explain how you would tackle Hudson Fisher Associates Help Desk Tickets. There are three groups of tickets, Level 1, Level 2, and Level 3. You will pick two tickets from each group. As you prepare to analyze and hopefully

Project 3: Support Queue Case Study
Instructions
For this project, you will apply the CompTIA 6-Step Troubleshooting Process to explain how you would tackle Hudson Fisher Associates Help Desk Tickets. There are three groups of tickets, Level 1, Level 2, and Level 3. You will pick two tickets from each group.
As you prepare to analyze and hopefully solve these typical IT help desk tickets, keep in mind that for this course, it is more about the process and less about finding the “correct” answer. You may not always find an exact answer from the information given. The problems are structured to approximate what you will find in the workplace. Use a logical and repeatable process (e.g., the CompTIA 6-Step Troubleshooting Process) and eliminate the improbable as you work your way through each scenario.
CompTIA 6-Step Troubleshooting Process:
1. Identify the problem.
2. Establish a theory of probable cause.
3. Evaluate the theory to determine the actual cause.
4. Establish a plan of action to resolve the problem and implement the solution.
5. Verify full system functionality and if applicable implement preventative measures.
6. Document findings, actions, and outcomes.
How Will My Work Be Evaluated?
As you progress in your information technology and cybersecurity career, you may find yourself making presentations to customers, client audiences, and management. For this assignment, you should articulate your findings from the six support cases.
But the challenge you face is in expressing a technical solution to a nontechnical audience. Avoid jargon and acronyms. Find a way to relay your solution (and challenges) in language that your audience will find easily relatable.
Communicating in this manner will not always be easy. You may struggle to find the right analogy or metaphor. But if you can master the skill of summarizing your results and recommendations to management in an effective presentation, you will demonstrate how you use your technical knowledge to convey your ideas to others in a professional setting. You will also earn the respect and trust of your peers, your supervisor, and upper management as an effective communicator. You will be viewed as an employee ready for advancement.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
• 1.1.1: Articulate the main idea and purpose of a communication.
• 1.1.3: Present ideas in a clear, logical order appropriate to the task.
• 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
• 2.1.1: Identify the issue or problem under consideration.
• 2.3.1: State conclusions or solutions clearly and precisely.
• 12.7.2: Explain the process of analyzing IT incidents.
• 13.1.1: Create documentation appropriate to the stakeholder.
Your deliverable for the project is an annotated PowerPoint Presentation covering the following:
• List of the six tickets you selected (two each from Level 1, Level 2, and Level 3)
• One to two slides for each ticket, in which you:
o State the problem.
o Describe the steps taken to troubleshoot/analyze the problem.
o Propose a brief resolution.
• One summary slide: What did you find challenging or interesting about one or two of the support cases (opinion-based)?
• One reference slide (two to six IEEE references). Include references for materials you consulted in TestOut or on the internet.
If you haven’t already done it last week, download the Support Queue Case Study Presentation Template to get started.
Delete the instructional text from the template before you submit.
When you are finished, click “add a file” to upload your work, then click the Submit button

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion Response

Please respond to the discussion below using 150 words or more 

Good day, all! 

There are certainly a few key differences between static and dynamic data structures!

On the most basic level, as their names suggest, a dynamic data  structure is resizable whereas a static data structure is fixed.  According to geeksforgeeks.com article “Static Data Structure vs Dynamic  Data Structure”, both types of structures can modify their elements,  but a static data structure’s elements can be changed without changing  the space in memory that has been allocated to it (ShivamKD. 2018, Mar  13).

Consequently, overall performance of the code is s typically slower  when dealing with a dynamic data structure. This is because, for  instance, when an array list is utilized, the resize function of the  class must create a brand new copy of the original array and copy it to a  new one. This is much less efficient than a regular array (unless the  regular array itself needs to be resized).

Comparing the three dynamic data structures of array lists, linked  lists, and vectors, there are some notable differences as well. 

Both array lists and vectors are in the family of the List interface.  Linked lists also take part in the List interface but additionally take  part in the Queues interface. This addition adds more available methods  for the user to utilize in their code (Programcreek.com. 2013, Mar 4.  “ArrayList vs. LinkedList vs. Vector”). According to the article,  vectors double in size each time they are utilized, whereas an array  list only grows at a 50% rate. 

As far as implementation is concerned, according to the w3spoint.com  website, an array list should be utilized over a linked list if there  are more get/set operations in the code. Otherwise, for add/remove  operations the linked list is preferable (“ArrayList vs Linkedlist vs  Vector in Java”. 2018, Mar 13). There is a very noticeable difference in  their performance when comparing get/set and add/remove methods (as is  demonstrated in the article). As far as vectors go, one key component  associated with them is the fact that one can utilize and manipulate  elements in the vector utilizing index positions. This allows for  iteration over the objects within the vector similar to an array! 

Thanks class and best of wishes on your upcoming assignments!

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

discussion 2

please see discussion below and respond using 150 words or more

 

Hi class,

A data structure is a set of elements that helps one to manipulate  data. The size of a static data structure is set. As the need for  storage grows, a dynamic data structure may expand and contract.

  • ArrayList  This sort of list is implemented as an  array that is dynamically sized, that is if the list’s size needs to be  increased by 50%. If you have a ten-item list, an add operation would  automatically raise the size to fifteen. The ArrayList also allows  elements to be accessed directly using the get () and set () methods, as  well as added and removed using the add () and remove () methods ().  Duplicate elements are not removed by ArrayList.
  • LinkedList The output of the methods add, delete, get, and set is the key difference between LinkedList and ArrayList.
    This  type of list performs better in the add and remove methods than the  ArrayList’s add and remove methods, but its get and set methods perform  worse than the ArrayList’s get and set methods.
  • Vector Vectors are very similar, to the point of  being identical. If you are unfamiliar with the concepts of Vector and  ArrayList, they are used interchangeably. The Vector multiplies by two,  so if you have a complete list of ten elements, the list would expand to  twenty, with ten empty places.

     References:

    Initialize an ArrayList in Java. GeeksforGeeks. (2021, June 28). https://www.geeksforgeeks.org/initialize-an-arrayli

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

discussion reflection

please see discussion below and respond using 150 words or more

  

This  course has proven to be very beneficial in my overall understanding of  Java and programming in general. To explore further in depth a very  important aspect of programming (data structures and their applications)  has truly enlightened me to more possibilities when creating code, and  to think more logically (which is never a bad thing in this field!). 

Learning how to create and manipulate the different data structures  proved to be quite difficult at times, but I also learned a great deal,  and am glad for the work. The assignments made me think critically and  were also enjoyable and thorough in explanation. I know that this course  will prove to be very beneficial in my future with computer  programming.

The professor was always very prompt with response to questions,  provided detailed and helpful feedback for the assignments, and provided  good insight in the discussions. He shared his understanding of the  subject material throughout each module and was always polite and  respectful!

Overall, though I did have some trouble at times, I thoroughly  enjoyed this course and am glad to continue my pursuit of knowledge in  this field.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

sorting and graphs discussion

please see discussion below and respond with 150 words or more.

 

Hello class!

Today ill choose the main two sorting algorithms in the background materials to answer the first question.

Lets discuss how Selection and Quicksort work!

Selection Sort:

In its simplest form, a selection sort algorithm sorts the data by  searching through a list for the smallest element then placing this in  the first index position. Once this is complete, it then repeats itself  moving up in elements until the whole list has been sorted. As others  have noted, the time complexity for this algorithm is O(n2).  Having a time complexity of O(n2) makes it a potentially very slow algorithm, especially if the data set is large (James, 2015).

Quicksort time!

Quicksort will sort an array by dividing it into two parts, it uses a  pivot element to compare and divide the array into higher/lower indexes  of the pivot value. Quicksort is implemented in a recursive manner  until the whole array is sorted. Typically in ascending order. The worst  case performance scenario O(n2), the same as selection sort, but on average will perform at O(n log n) (James,2015).

Graphs!

Graphs are nonlinear data structures that consist of a set number of nodes(vertices) and a set of edges that connect the nodes.

In graphs, a pair (x,y) is called an edge. an edge tells us that the x node connects to the y node.

When viewing a graph, the dots are the vertecies/nodes and the lines are the edges.

When it comes to questions that graphs can solve.

Anything with connected nodes is by definition a part of the graph  theory domain. Any tree or network and more. Social networks, semantic  networks, dependency trees, etc.

These can be used to map out chains of events, and connections. This  can be used to also find the shortest possible route between nodes as  well as determine root causes of issues within  routes/chains/relationships.

– Damion 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

course reflection

please read the discussion below and respond using 150 words or more.

               My hope heading into this course was that I would become  more proficient and better understand coding using different data  structures. I would say that I certainly accomplished that though I am  still far from proficient. The feedback from the professor was at times  helpful at improving my code. I only began programming when I started to  pursue this degree, so I have been at it for hardly any time at all. To  achieve what would be considered satisfactory coding for this course in  the Case Assignments and Session Long Projects, I think someone needs  to have a background in programming. If your code achieves the goal but  is not well polished, you won’t achieve good marks. I learned a lot in  this session, and I am coming away from this class more educated about  the topic. The class achieved its purpose and I understand why it is  part of the degree path. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Infotech in global economy

  

 journal article discussing government planning and/or entrepreneurial innovation.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

challenges of mobile computing in education

 For the Term Paper research, select a topic, then read about it (research paper topics in the folder Project/Research), analyze it, and prepare a summary review, that includes: A description of the problem, the settings, the research process methodology, the results, conclusion and a critique based on your own opinion of the topic selected. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now