1.Who are these public servants? 2. In consideration of the constructionist’s views regarding the quality of social simulation as an example of research-based and policy modeling approach, what happens when the possibility of validating a simulation?

Question Description

After reading through the Chapters, its reasonable to state that, Koliba and Zia (2015) observed that advancements in high-speed computing, digitization of data and improved collaboration across informatics project platforms create the need for quality simulation modeling education for two types of public servants.

Q1 – Who are these public servants?

  • identify and name these two types of public servants,
  • provide a short narrative of why it’s important for these servants to receive this education,

******************************************************************************************************************************************************************************************************************

According to Chalmers et al. (1995, p. 173), validation of a simulation against empirical data is not about comparing “the real world” and the simulation output; but it is a comparison of what is observed as the real world with what is observed as the output. In this scenario, both are constructions of observers and their views concerning relevant agents and their attributes (Chalmers et al., 1995). Constructing reality and simulation are just two-way of an observer seeing the world. The issue of objective, formation is not normally considered by computer scientists relying on the standard view: datais “organized” by a human programmer who appropriately fits them into the chosen representational structure. In most cases, researchers apply their prior knowledge of the nature of the problem to hand-code a representation of the data into a near-optimal form.

Q2 – In consideration of the constructionist’s views regarding the quality of social simulation as an example of research-based and policy modeling approach, what happens when the possibility of validating a simulation by comparing it with empirical data from the “real world” is questioned?

  • provide a short and clear narrative with an explanation of what happens,

need each 200 words answers with 2 references in APA formate.

read the file

Question Description

Requirement: Your implementation (.cpp) file must be named raq.cpp.

Requirement: The following modifications may be made to raq.h: addition of private class variables to the RAQ and BlockRAQ classes; addition of a copy constructor, destructor, and assignment operator to either class, if necessary; addition of private helper function declarations. No other changes are permitted. In particular, you must not change the declaration of the required public functions (constructor, query, and dump).

Requirement: RAQ must correctly implement the Dynamic Programming solution. Your code will be tested for correct running times, and the TAs will visually inspect your implementation.

Requirement: BlockRAQ must correctly implement the Block Decomposition soution. Your code will be tested for correct running times, and the TAs will visually inspect your implementation.

Reqirement: For BlockRAQ, the blocksize should be n.n. This can be computed in C++ with (int) sqrt((float) n).

Requirement: Assignments and copy constructors must function correctly for both classes. You may need to implement a copy constructor, destructor, and assignment operator, depending on your choice of class variable types.

Requirement: For both classes, the query function must throw a domain_error exception if the values of i or j is out-of-bounds or if j is less than i. The allowed values for the indices are 0ijn1.0ijn1.

Requirement: Your code should not have any memory leaks or memory errors.

Requirement: Follow all codin

Try to answer the questions that are post in below in page 138 or the end of the chapter

Question Description

Answer the following questions (which can be found on page 138 or at the end of Chapter 4)

Complete the assignment in 2-3 pages and ensure that you identify each question being answered.

  1. How would you go about evaluating the design of this book?
  2. A company is developing a new app that will allow customers to track the progress of their orders. The website developers charge $10,000 for every development week and it is estimated that the design will take 10 weeks from the start of the design project to the launch of the website. Once launched, it is estimated that the new site will attract extra business that will generate profits of $5,000 per week. However, if the website is delayed by more than five weeks, the extra profit generated would reduce to $2,000 per week. How will a delay of five weeks affect the time when the design will break even in terms of cash flow?
  3. How can the concept of modularization be applied to package holidays sold through an online travel agent?
  4. One product where a very wide range of product types is valued by customers is that of domestic paint. Most people like to express their creativity in the choice of paints and other home decorating products that they use in their homes. Clearly, offering a wide range of paint must have serious cost implications for the companies which manufacture, distribute and sell the product. Visit a store which sells paint and get an idea of the range of products available on the market. How do you think paint manufacturers and retailers manage to design their services and products so as to maintain high variety but keep costs under control?

ISSC481 term paper

Question Description

You will be required to write one term paper this semester. The specifications are as follows:

  1. You must write a 4-6 page term paper on a topic of your choice related to IT Security: Planning and Policy (ALL TOPICS MUST BE APPROVED). Some examples would include, BYOD Policies, Remote Access Policies, DRP, BCP or Privacy Policies. Please write the term paper in a Word document and then upload it for grading.
  2. Your term paper outline is due at the end of Week 2.
  3. Your term paper is due at the end of Week 7.
  4. In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.
  5. Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name. You must have a minimum of 3-5 outside sources.
  6. Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
  7. Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
  8. Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
  9. When submitting the paper, it will automatically run through Turnitin for review. PAPERS WITH AN ORIGINALITY REPORT FROM TURNITIN OVER 15% OR OVER 2% FROM A SINGLE SOURCE WILL RESULT IN A ZERO GRADE.
  10. PER THE STUDENT HANDBOOK, YOU CANNOT SUBMIT A PAPER THAT HAS BEEN SUBMITTED IN ANOTHER COURSE.

D-Final Exam

Question Description

Agile Lean Transformational Leaders – Final Exam

Enterprise Lean is a coordinated state government program directed through the Department of Administration. The Enterprise Lean Program is an ambitious effort to reform and reshape state government operations into those that are nimble, embrace change, and continuously improve. In addition, the Governor, has set forth several specific objectives for the Enterprise Lean effort. They are:

1. Creating “one stop shop” opportunities for easier access to government services;

2. Increasing secure and effective electronic delivery of government services;

3. Streamlining common functions and activities;

4. Saving money through more efficient and effective service delivery.

The programs focus is to improve organizational performance through Lean thinking, concepts, tools, and methods.

You are tasked to lead this effort. You find several examples of waste in state government and you proceed to categorize them as follows:

Types of Waste

Examples

Defects

Incorrect data entry

Overproduction

Preparing extra report; reports not acted upon; multiple copies in data storage

Transportation

Extra Steps in processes – distances traveled

Movement

Extra steps; extra data entry

Waiting

Processing monthly or in batches

Overprocessing

Extra sign-offs and hand-offs of work

Inventory

Transactions not processed

Underutilized Resources

People doing unchallenging work

Using this scenario please answer the following questions:

1. What are three (3) Lean leadership challenges faced by you as the Lean Enterprise Program leader? List and describe each one.

2. How would you overcome each of these challenges? What would you do? Describe your method(s).

3. Select two of the types of waste from the list. What Lean tools (i.e. Kaizen events, 5S, Kanban) would you deploy to address the wastes you have selected? Explain why you selected the particular tool. Describe how you might engage the employees in understanding the use, and importance, of the tool.


I need help with computer assignment

Question Description

Instructions:

For Research Assignment #3 you will be locating various information.

Search 1: Use a search engine and do an Internet search on your name

Q1. What search engine did you use?

Q2. How many hits came up?

Q3. Did any of the hits find you?

Search 2: Use a different a different search engine and do an Internet search on your name

Q1. What search engine did you use?

Q2. How many hits came up?

Q3. Did any of the hits find you?

Search 3: Use a search engine and locate a podcast on a topic that interests you

Q1. What search engine did you use?

Q2. What podcast topic did you use to search?

Q3. What is the name of the podcast you found?

Search 4: Use a search engine and locate a blog on a topic that interests you

Q1. What search engine did you use?

Q2. What blog topic did you use to search?

Q3. What is the name of the blog you found?

Search 5: Use a search engine and locate an article relating to how social networking sites can impact your job opportunities

Q1. What search engine did you use?

Q2. What is the name of the article your found?

Q3. What is the link for the article?

Q4. Summarize the article.

Q5. What are your thoughts about social networking sites impacting job opportunities?

Once you have your results in a Microsoft Word document include the following information:

1). From Search 1 in a paragraph answer the questions asked.

2). From Search 2 in a second paragraph answer the questions asked.

3). From Search 3 in a third paragraph answer the questions asked.

4). From Search 4 in a fourth paragraph answer the questions asked.

5). From Search 5 provide the information asked in the questions.

create a design for an Ethernet network connecting four buildings in an industrial park. Hand in a picture showing your network. There will be a core switch in each building.

Question Description

Chapter 5: Please use Page 152 – 160 as a reference:

ebook: https://drive.google.com/file/d/1iIu8r57PoxlIcYAwR…

You can refer to Chegg, but note that their questions are different.

You will create a design for an Ethernet network connecting four buildings in an industrial park. Hand in a picture showing your network. There will be a core switch in each building.

Building A is the headquarters building.

Building B is 85 meters south and 90 meters east of the headquarters building. A line will run directly from Building A to Building B.

Building C is 150 meters south of the headquarters building. A line will run directly from Building A to Building C.

Building D is 60 meters west of Building C. A line will run directly from Building C to Building D.

Computers in Building A need to communicate with computers in Building B at 600 Mbps.

Computers in Building A need to be able to communicate with computers in Building C at 1 Gbps.

Computers in Building A must communicate with computers in Building D at 500 Mbps.

Computers in Building C must communicate with computers in Building D at 750 Mbps.

a) Draw a picture of the situation.

b) Determine the traffic volume on each transmission line. Explain your answers.

First, show all of the traffic between pairs of sites:

Second, add up the traffic for each line.

c) Determine what standard to use for each transmission line. Explain your answers.

If the distance is more than 100 meters, use fiber; if it is 100 meters or less, select UTP.

Then, select the lowest-speed standard (including bonding) sufficient to handle the traffic.

Discussion: Mapping Business Challenges to Types of Control

Question Description

Learning Objectives and Outcomes

  • Identify the business impact of several access controls.
  • Identify mitigation techniques for weaknesses of each of the access controls.

Assignment Requirements

Read the worksheet named “Mapping Business Challenges to Types of Control” and address the following:

Using what you have learned about access controls, identify the business impact of the challenge, and identify an access control method that will mitigate the impact to the business.

Respond to your peers with your point of view on their answers. Respond to at least two of your classmates’ original thread posts with between 100 – 150 words for each reply. Make sure your opinion is substantiated with valid reasons and references to the concepts covered in the course. In addition, initiate a discussion with the students who comment on your answer.

Required Resources

  • Worksheet: Mapping Business Challenges to Types of Control (ws_businesschallenges)

Self-Assessment Checklist

Use the following checklist to support your work on the assignment:

  • I have engaged in a discussion of the assigned topics with at least two of my peers.
  • I have raised questions and solicited peer and instructor input on the topics discussed.
  • I have articulated my position clearly and logically.
  • I have supported my argument with data and factual information.
  • I have provided relevant citations and references to support my position on the issue discussed.
  • I have compared and contrasted my position with the perspectives offered by my peers and highlighted the critical similarities and differences.
  • I have solicited peer and instructor feedback on my arguments and propositions.
  • I have offered a substantive and critical evaluation of my peer’s perspective on the issues that is opposite of mine, and supported my critical review with data and information.
  • I have followed the submission requirements.

Discussion: Security Breach Evaluation

Question Description

Learning Objectives and Outcomes

  • Analyze the given case study on security breach.
  • Recommend controls to avoid an enterprise security breach.

Assignment Requirements

Read the text sheet named “Local Breach of Sensitive Online Data” and address the following:

Using what you have learned about security breaches, describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach mentioned in the text sheet.

Respond to your peers with your point of view on their answers. Respond to at least two of your classmates’ original thread posts with between 100 – 150 words for each reply. Make sure your opinion is substantiated with valid reasons and references to the concepts covered in the course. In addition, initiate a discussion with the students who comment on your answer.

Required Resources

  • Text sheet: Local Breach of Sensitive Online Data (ts_localbreach)

Self-Assessment Checklist

Use the following checklist to support your work on the assignment:

  • I have engaged in a discussion of the assigned topics with at least two of my peers.
  • I have raised questions and solicited peer and instructor input on the topics discussed.
  • I have articulated my position clearly and logically.
  • I have supported my argument with data and factual information.
  • I have provided relevant citations and references to support my position on the issue discussed.
  • I have compared and contrasted my position with the perspectives offered by my peers and highlighted the critical similarities and differences.
  • I have solicited peer and instructor feedback on my arguments and propositions.
  • I have offered a substantive and critical evaluation of my peer’s perspective on the issues that is opposite of mine, and supported my critical review with data and information.
  • I have followed the submission requirements.

Need a PPT for physical security

Question Description

For this assignment, you are the information security manager for the county of Islington. The county just elected a new sheriff. He does not have a keen understanding of what is Physical Security. It is your responsibility as the security manager to brief the sheriff on what is physical security and how it can be used to protect critical technological infrastructures throughout the county.

Please provide a PowerPoint Presentation with no less than 15 informative slides. Further, you will use Zoom to record yourself, giving the presentation, and explaining the slides. You do not have to be in the video. The slides must include pictures and other graphics showing the technological infrastructures in the county as well as supporting the presentation. The presentation should address the following.

  • What is physical security?
  • What are the levels of physical security?
    • Detail all five levels on separate slides
  • What is the value of planning as it relates to the levels of physical security?
  • What are physical barriers and how they coincide with physical security?
  • Explain security or master plan and countermeasures
  • Expound on designing security and layout of the site

Requirements

You must have a minimum of 15 slides. This does NOT include your introduction or reference slides. Your presentation should be between 15 to 20 minutes in length. You should have a minimum of 14 DIFFERENT citations with matching a reference list. Please upload your recording (mp4) to your assignment area upon completion. Be sure that your slides show less writing and more graphics; your writing should most be in the speaker notes section of the slides. The plagiarism score should not be more than 30%