Government and Policies

here is a relationship between policy evaluation and production identification, policy evaluation and policy implement, and policy evaluation and policy formulation. Can you explain this relationship and why they are important?Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:Ask an interesting, thoughtful question pertaining to the topicAnswer a question (in detail) posted by another student or the instructorProvide extensive additional information on the topicExplain, define, or analyze the topic in detailShare an applicable personal experienceProvide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)Make an argument concerning the topic.At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Read more

Data Visualization Workflow

Choose a publicly available data visualization. (be sure to provide the link, cite, and reference).Analyze the visualization within the context of the data visualization workflow.Create a proposal of enhancements to create a better user/viewer experience.Use the data visualization workflow as a framework for both your analysis and your proposal.Consider the various roles of the project team as specified by Kirk’s concept of “hats”.APA compliance required.References and In-text citations required.Minimum word count = 1500.

Read more

Cloud Computing Portfolio

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Read more

Mobile Security

Assignment ContentMobile devices are always in the workplace and being used for both personal and company business. You have been asked to create an informative poster to display throughout the office that highlights ways to secure mobile devices and safety precautions. This poster will be seen by the entire company in hopes of empowering employees to protect themselves and the company from mobile breaches.Create a visual poster or infographic to display in the company’s break room.Include the following information:At least 2 mobile device threatsList of ideal mobile security settings to defend against threatsBrief instructions for setting up at least 2 security settingsAn explanation on what happens when mobile devices are not secured from these threatsAppropriate images and graphics2 resources for more information on mobile security with appropriate citationsFormat your assignment according to APA guidelines.

Read more

Industries and Locations

What is your definition of AI? Please explain.What is your opinion of AI, is the technology currently available? Why or why not?Please note at least four AI technologies, explain if they are truly AI or something else. Thoroughly explain your answer.How is AI perceived as different in various industries and locations? Please explain.

Read more

Memory Management

Discussion of memory management and scoping features.10Specification and rationale for major language features in terms of: – Simplicity,- Orthogonality,- Data types,- Syntax design,- Support for abstraction,- Expressivity,- Type checki- Exception handling, and – Restricted aliasing. 45[5 marks per item]

Read more

Emerging Cybersecurity Threats

The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet19 Mirai Botnet Authors Avoid Jail TimeYou have been asked to provide a short presentation for Business Leaders Round Table meeting in your community. The topic of the meeting is Emerging Cybersecurity Threats and What Businesses Need to Know. Your presentation will be part of a series of talks about the risks associated with unsecured cyber-physical systems. The organizers have asked you to begin by presenting an overview of the Mirai Botnet attacks followed by a discussion of threats and vulnerabilities which have been found in cyber-physical systems used to manage buildings and utilities.For this briefing, you will need to find and use three additional authoritative sources that provide information about threats, attacks, and vulnerabilities affecting cyber-physical systems.Format your presentation as a background paper to be shared with attendees. The target length as specified by the meeting organizers is 5 to 7 paragraphs in length.

Read more

Systems Engineering

Mathematical and Computational Modeling in Systems EngineeringCoursework 10Your model has three input variables that you use: (A, B, and C). Currently you use (0.5, 6, 3). You believe that actual values of these input variables follow a uniform distribution. The bounds for A are 0 and 1; B are 3 and 9; and C are 0 and 10.You intend to do ten runs for your sensitivity analysis. Create a Latin Hypercube sampling scheme for this sensitivity analysis. CLEARLY Describe the steps you choose and provide an example input scheme.I suggest that do this in Microsoft Excel. You will need to use the RAND function. You might also require the “paste special” function.

Read more

Computer Information Systems

Intro to Computer Info Systems Dr. Simon LinProject Assignment 2 (PA2)CIS101 Project Assignment 2 (PA2)Please do the WORD’s Challenge Yourself 4.3, which is on page WD-158-160 of WORD section in the book “ Microsoft Office – A Skills Approach 2016 ”.The document file “WD2016-ChallengeYourself-4-3.docx” (for step 1) must be downloaded from the Files folder by the name of “CIS101-PA2-WD2016-ChallengeYourself-4-3.docx”.Special Notes for this project that you must follow:(1) You must google/search to find a colored picture of a landscaped garden for step 3.(2) You must google/search to find a colored logo image as greenscapes_logo for step 8.(3) The table on the last page must be clearly formatted with the proper colors.After you have completed this project as instructed by page WD-158-160 of WORD, you must then do the following two additional steps:(1) Insert Header to the document, and put your full name and student ID on the middle of the header.(2) Insert Page Number to the document, select Bottom of Page , and select Page 1 of 1 on the middle of the footer. For example, this document is using this kind of page numbering style.How to submit your work?You must submit your work by uploading your final result file (for example: CIS101-PA2- WD2016-ChallengeYourself-4-3.YourName.docx).

Read more

Web Pages

Design Two Differents Web Pages For A News Company. One Page Is Targeted For Their Younger Millennial/Gen Z Audience. The Other Is Targeted For Seniors 65+. Explain You Different Design Decisions For These Different User Groups

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information