Lab B – Computer and Network Discovery

QUESTION

Lab B – Computer and Network Discovery

Lab Goals

  • Use command line tools to discover information about your computer and network.

Lab Purpose

This lab will help to familiarize you with command line tools in Windows and Linux environments to gather information about your computer and network settings.

Lab Instructions

Follow these steps closely and take screenshots when prompted. You will need these screenshots for your lab report.

Prerequisites:

  • A Windows 10/11 system (physical or virtual machine).
  • A Linux machine, such as Ubuntu 22.04 or newer (physical or virtual).

Note:

  • The commands provided below are examples and may vary slightly depending on the specific version of the operating system.
  • Screenshot extensions in the examples described below are .png, but you can also use .jpg or .jpeg.

Part 1 – Windows Command Line Tools

  1. System Information
    1. Open the command prompt (CMD) or PowerShell on your Windows system.
    2. Enter the command: systeminfo
      1. What this does: This command displays detailed information about the computer’s hardware, operating system, and software configuration.
    3. Enter the command: echo “<Your First Name> <Your Last Name>”
    4. Capture Screenshot:
      1. Take a screenshot of the command prompt or PowerShell window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part1_Task1.extension (e.g., JohnDoe_LabB_Part1_Task1.png).
  2. Disk Space
    1. Enter the command: wmic logicaldisk get caption, freespace
      1. What this does: This command displays the available free space on each logical disk of your computer.
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the command prompt or PowerShell window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part1_Task2.extension (e.g., JohnDoe_LabB_Part1_Task2.png).
  3. Network Information
    1. Enter the command: ipconfig
      1. What this does: This command displays the IP configuration for all network interfaces on your Windows system.
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the command prompt or PowerShell window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part1_Task3.extension (e.g., JohnDoe_LabB_Part1_Task3.png).
  4. Network Connectivity
    1. Enter the command: ping google.com
      1. What this does: This command sends ICMP Echo Request packets to the specified destination (google.com) to test network connectivity.
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the command prompt or PowerShell window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part1_Task4.extension (e.g., JohnDoe_LabB_Part1_Task4.png).
  5. Tracing Network Routes
    1. Enter the command: tracert google.com
      1. What this does: This command traces the network route taken by packets from your computer to the specified destination (google.com).
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the command prompt or PowerShell window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part1_Task5.extension (e.g., JohnDoe_LabB_Part1_Task5.png).
  6. DNS Lookup
    1. Enter the command: nslookup www.google.com
      1. What this does: This command performs a DNS lookup for the specified hostname (www.google.com) and displays its associated IP address(es).
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the command prompt or PowerShell window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part1_Task6.extension (e.g., JohnDoe_LabB_Part1_Task6.png).

Part 2 – Linux Command Line Tools

  1. System Information
    1. Open the terminal on your Ubuntu Linux machine.
    2. Enter the command: uname -a
      1. What this does: This command displays detailed information about the Linux kernel version, architecture, and other system details.
    3. Enter the command: echo “<Your First Name> <Your Last Name>”
    4. Capture Screenshot:
      1. Take a screenshot of the terminal window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part2_Task1.extension (e.g., JohnDoe_LabB_Part2_Task1.png).
  2. CPU Information
    1. Enter the command: lscpu
      1. What this does: This command displays detailed information about the CPU architecture and configuration of your Linux system.
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the terminal window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part2_Task2.extension (e.g., JohnDoe_LabB_Part2_Task2.png).
  3. Disk Space
    1. Enter the command: df -h
      1. What this does: This command displays the disk usage and available free space on all mounted filesystems in a human-readable format.
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the terminal window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part2_Task3.extension (e.g., JohnDoe_LabB_Part2_Task3.png).
  4. Network Information
    1. Enter the command: ifconfig
      1. What this does: This command displays the IP configuration for all network interfaces on your Linux system.
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the terminal window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part2_Task4.extension (e.g., JohnDoe_LabB_Part2_Task4.png).
  5. Network Connectivity
    1. Enter the command: ping google.com
      1. What this does: This command sends ICMP Echo Request packets to the specified destination (google.com) to test network connectivity.
      2. You will notice that it keeps pinging, more than four times like it did on the Windows system. Hit Ctrl+C to stop the ping.
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the terminal window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part2_Task5.extension (e.g., JohnDoe_LabB_Part2_Task5.png).
  6. Tracing Network Routes
    1. Enter the command: traceroute google.com
      1. What this does: This command traces the network route taken by packets from your Linux machine to the specified destination (google.com).
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the terminal window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part2_Task6.extension (e.g., JohnDoe_LabB_Part2_Task6.png).
  7. DNS Lookup
    1. Enter the command: nslookup www.google.com
      1. What this does: This command performs a DNS lookup for the specified hostname (www.google.com) and displays its associated IP address(es).
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the terminal window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part2_Task7.extension (e.g., JohnDoe_LabB_Part2_Task7.png).

Part 3 – Build and Submit Lab Report

  1. Create a lab report in your word processing application (Word, Google Docs, etc.).
    1. Your lab should be organized as follows:
      1. Title page or page heading with your name, course number, assignment name, professor’s name, and date.
      2. Create a section heading for Part 1 and Part 2.
      3. Insert your screenshots from parts 1 and 2 under the corresponding section header. You must put them in sequential order and you must label them above each screenshot. Labeling them means it should look like this:

Title Page

New Page

Part 1

Task 1

<Task 1 screenshot goes here>

Task 2

<Task 2 screenshot goes here>

and so on…

Part 2

Task 1

<Task 1 screenshot goes here>

Task 2

<Task 2 screenshot goes here>

and so on…

  1. Verify that you have inserted all screenshots and have the report formatted correctly.
  2. Submit the completed Word document to this area before the deadline. You may also save/convert it as a PDF before submitting it. This must be submitted as an attachment, not a link.

Lab Complete!

SAM Project 1a Access Module 09 Administering a Database System

QUESTION

Shelly Cashman Access 365/2021 | Module 9: SAM Project 1a

Personal Insurance, Inc.

Administering a Database System

GETTING STARTED

  • Save the file SC_AC365_2021_9a_FirstLastName_1.accdb as SC_AC365_2021_9a_FirstLastName_2.accdb
    • Edit the file name by changing “1” to “2”.
    • If you do not see the .accdb file extension, do not type it. The file extension will be added for you automatically.
  • To complete this Project, you will also need the following files:
    • Support_AC365_2021_9a_ClaimTypes.accdb
  • With the file SC_AC365_2021_9a_FirstLastName_2.accdb open, ensure that your first and last name is displayed as the first record in the _GradingInfoTable table.
    • If the table does not display your name, delete the file and download a new copy.

PROJECT STEPS

  • Personal Insurance, Inc. is a national company that insures homeowners and renters. As a regional manager, you need to understand database administration tasks. Open the database in Backstage View, and then click the View and edit database properties link. When the Properties dialog box displays, create a custom property for the database as described below:
  • With the database still open in Backstage View, click the Options tab. Select the Main Menu Navigation Form as the Display Form for the database as shown in Figure 2. (Hint: The Display Form is sometimes referred to as the startup form.)
    Save the changes to the options. (Hint: When the Access dialog box appears and displays the message, “You must close and reopen the current database for the specified option to take effect”, click the OK button.)
  • Open the ClaimsRep table in Design View, and then create a custom input mask for the ClaimRepNumber field as described below:
    • The ClaimRepNumber field must consist of two letters and two numbers.
    • All letters should display in upper case. (Hint: Enter >LL99 as the input mask.)
    • Save the changes to the table but do not close it.
  • With the ClaimsRep table still open in Design View, modify the ClaimsRepName multiple-field index by completing the following tasks:
    • Open the Indexes dialog box.
    • Change the sort order for the LastName field to Descending.

      Save the changes to the ClaimsRep table and then close it.

  • Open the Customers table in Design View, and then create a single-field index on the LastName field. The index should allow duplicate values. Save the changes to the table design but do not close the table.
  • With the Customers table still open in Design View, create a multiple-field index as described below:
    • Use Location as the name of the index. (Hint: Be careful not to include spaces after the index name.)
    • Use the State field, sorted in Descending order, as the first field in the index.
    • Use the City field, sorted in Ascending order, as the second field in the index.

      Save the changes to the Customers table and then close it.

  • Open the Claims table in Design View, and then open the Property Sheet for the table and make the following updates:
    • Create a validation rule for the table requiring that the Paid field value is always less than or equal to the ClaimAmount field value. (Hint: Enter [Paid]<=[ClaimAmount] as the validation rule.
    • Enter Paid cannot exceed ClaimAmount as the validation text.

      Close the Property Sheet, and then save the changes to the table. (Hint: Because there was a change to data integrity rules, the “existing data may not be valid” warning message will appear. Click No and continue saving the table.)

  • With the Claims table still open in Design View, create a multiple-field index as described below:
    • Use ClaimsInformation as the name of the index. (Hint: Be careful not to include spaces after the index name.)
    • Use the CustomerID field, sorted in Ascending order, as the first field in the index.
    • Use the ClaimID field, sorted in Ascending order, as the second field in the index.

      Save the changes to the Claims table, and then close it.

  • Create a Datasheet form for the Umbrella table, and then save the form using UmbrellaForm as the form name. Close the form.
  • Create a blank form based on the 1 Right application part. (Hint: The blank form will appear in the Navigation Pane as a forms object named SingleOneColumnRightLabels and is saved automatically.)
  • Import a table from an encrypted database by completing the following tasks:
    • Open the encrypted database Support_AC365_2021_9a_ClaimTypes.accdb in Exclusive mode, using the password claims when the Password Required dialog box appears. Enable the content.
    • Decrypt the Support_AC365_2021_9a_ClaimTypes.accdb database. (Hint: You will need to use the password claims again in the Unset Database Password dialog box.) Close the database.
    • Open (or return to) the SC_AC365_2021_9a_FirstLastName_2.accdb database.
    • Import the ClaimTypes table from the database Support_AC365_2021_9a_ClaimTypes.accdb into a new table using ClaimTypes as the table name. (Hint: Ensure that the Tables tab is selected in the Import Objects dialog box.)
    • Do not save the Import steps.
  • Use the Table Analyzer to analyze the Customers table for redundancy. Implement the following options when using the Table Analyzer Wizard:
    • Select the Customers table as the table to analyze, and let the wizard decide what fields go in each table.
    • Rename Table 1 as AltCustomers using the Rename table button as shown in Figure 3.
    • Rename Table 2 as AltRegion using the Rename table button as shown in Figure 3.
    • When the wizard displays the next screen with the question, “do the bold fields uniquely identify each record in the proposed table”, make sure the CustomerID field is the primary key of the AltCustomers table as shown in Figure 3. Then, click the Next button.
    • Ensure that the “No, don’t create the query” radio button is selected, then click Finish to close the Table Analyzer Wizard.
    • When the Table Analyzer Wizard dialog box appears with the message, “The command or action TileHorizontally isn’t available now”, click OK. Close the AltCustomers and AltRegion tables.

      Confirm the Navigation Pane matches Figure 4.

  • Switch to viewing database items by the custom category named “Claims Information” in the Navigation Pane. Add the following two forms to the Claims Information Forms group:
    • Claims Master Form
    • ClaimsRep and Claims Form

      Confirm the Claims Information Forms group matches Figure 5.

  • Add a new group to the Claims Information category as described below:
    • Use Claims Reports as the name for the new group.
    • If necessary, move the Claims Reports group so that it appears between the Claims Information Forms and the Unassigned Objects groups.
    • In the Navigation Pane, add the Basic Claims Report to the new group.

      Confirm the Claims Reports group and item in the Navigation Pane match Figure 5.

Figure 1: Custom Properties Tab in the Properties Dialog Box

Figure 2: Access Options Dialog Box

Figure 3: Table Analyzer Wizard

Figure 4: Navigation Pane with Tables Created in Step 12

Figure 5: Navigation Pane Viewed by Claims Information Category

Save and close any open objects in your database. Compact and repair your database, close it, and then exit Access. Follow the directions on the website to submit your completed project.

Formulas and Functions

QUESTION

Summary

A bike rental company has two metropolitan locations, one at the beach and another centrally located near the city park. It has been operating since 2018, and each location summarizes its revenue quarterly. Both locations rent four types of bikes: cruiser, electric, racing, mountain. Rental revenue is maintained separately for the four types of bikes.

You should complete this assignment using the Excel_Exercises_Template.xls file that accompanies these instructions.

The data for this case resides in the file 2019rentalbikes.txt and can be downloaded by clicking on the Assignments tab, then on the data file name. It is a text file (with the file type .txt).

Do not create your own data. You must use the data provided and only the data provided.

Steps

Take Note

Use Print Preview to review how the first worksheet would print.

Open the Excel Exercises template:

Enter your name in Cell B1 of the DataNotes worksheet.

Set Page Layout Orientation to Landscape.

For Excel Exercise 1, disregard the Field Definitions section of Data Notes.

Follow these steps: 

  1. Create new worksheets: Data, Sorted, and Beach.
    Upon completion, there should be Data Notes as well as the three newly created worksheets.

Delete any other worksheets.

  1. Note: The three new worksheets might not have Arial 10-point as the default type so it may be necessary to change the font and point to Arial 10 for the new worksheets.
  2. If necessary, reorder the four worksheets so they are in the following order: Data Notes, Data, Sorted, Beach.
  3. Take Note

For all data (field names, data text, and data numbers), use Arial 10-point.

The field names should be in the top row of the worksheet with the data directly under it in rows. This action may not be necessary as this is part of the Excel table creation process. The data should begin in Column A.

  1. After clicking on the blank cell A1 (to select it) in the Data worksheet, import the text file 2019rentalbikes.txt into the Data worksheet.

    In Excel 2019/365 this is done via the Data tab, Get & Transform Data: Click “From Text/CSV” and follow the prompts.

    If you are using an earlier version of Excel, you can find additional instructions under Additional Tutorials for Excel 2013/2016, Importing a Text File into Excel (Excel 2016 or earlier). The data should begin in Column A. Row 1 should contain the labels for each column.

    It will be necessary to change Revenue data to Currency format ($ and comma (thousands) separators) with NO decimal points, and to change NumBikes data to number format, with NO decimal points, but with the comma (thousands separator). Note: in the Currency format there is NO space between the $ and the first numeric character that follows the $.

    Though the intent is to import the text file into the Data worksheet, sometimes when text data is imported into a worksheet, a new worksheet is created. If this happens, delete the blank Data worksheet. Then change the name of the new worksheet with the imported data as “Data.”

Take Note

  1. Some adjustment may be necessary to column widths to ensure all field names and all data are readable (not truncated or obscured).

In the Data worksheet:

Create an Excel table with the recently imported data. (Office 2019/365 may have automatically created an Excel table when you imported the data).

  1. Pick a style with the styles group to format the table (choose a style that shows banded rows, i.e., rows that alternate between two colors).

The style should highlight the field names in the first row.

Ensure NO blank cells are part of the specified data range.

Ensure the table has headers.

Ensure that Header Row and Banded Rows are selected in the Table Style Options Group Box, but do NOT select a Total row.

In the Data worksheet:

  1. Select the entire table (data and headers) using a mouse.

Copy the table to the Sorted worksheet.

The upper left-hand corner of the header/data in Sorted should be in cell A1.

Adjust column widths if necessary, to ensure all data and field names are readable.

Make sure that all the format requirements for the Data Worksheet are met in the Sorted Worksheet.

Take Note

Ensure the entire table is selected, NOT just the location column.

All data (field names, data text, and data numbers) should be in Arial 10-point.  

  1. In the Sorted worksheet:

Select all the cells with data in the table (including the header row).

Sort the data by location (ascending).

Adjust column widths if necessary, to ensure all data and field names are readable with no truncation.

Take Note

Ensure all cells with data are selected.

All data (field names, data text, and data numbers) should be in Arial 10-point.  

Follow these steps:

Copy the entire table from the Sorted worksheet to the Beach worksheet. In the Beach worksheet, the field names should be in Row 1 and the Year column should be in Column A.

Some column adjustments may be necessary so that the field names as well as the data are all legible.

Make sure that the same format requirements for the Data Worksheet are met in the Beach Worksheet.

Take Note

Delete the rows from the Excel table, NOT just the data.

In the Beach worksheet:

Delete all the rows in the table where the data is for City Park.

  1. The field names should remain at the top of the table.

The remaining data should be for the Beach location. 

Take Note

Ensure that all cells with data have been selected before sorting. This sort is completed in a single step, not three separate steps.

  1. Note: If the sort does not result in sequential row listing of all bikes of the same class, the ranges will be difficult to create as well as to evaluate.
  2. In the Beach worksheet, using a custom sort:
  3. Sort all the data first by BikeType (Ascending).
  4. Then by Year (Ascending).
  5. Then by Quarter (Ascending).

Take Note

The format of the table must be extended to the new column.

  1. Format the table as follows:

Arial 10-point

  1. data values for AvgRev are Currency Format (using the Format Cells option). A typical AvgRev value could be $123.45, for instance with no space between the $ and the 1
  2. Revenue and NumBikes format from Data Worksheet
  3. In the Beach worksheet:
  4. Add a new column heading AvgRev for the column where the average revenue per bike for each row will be calculated and displayed. This column must be the next column to the right of the NumBikes column, the column heading should be in cell G1.
  5. Add a formula to calculate the AvgRev by dividing the contents of the Revenue cell by the contents of the NumBikes cell for each data row in the table

The AvgRev values format is currency (a $ and two decimal points) with no space between the $ and the first number following it. When you are clicking on cells to construct a formula in cell G2, you may expect to see =E2/F2 and what may appear in the cell editor is =[@Revenue]/[@NumBikes] or =[Revenue]/[NumBikes]. These last two formulas are the result of using an Excel table.

Column adjustment may be needed to ensure both the title and the data are visible.

Case Study: Facebook’s “Unfriendly” Privacy Policies

QUESTION

Facebook CEO, Marc Zuckerberg,
couldn’t quite believe all the attention he was getting. Facebook was on
the verge of its initial public offering (IPO), and it seemed that the
media couldn’t get enough of this Cinderella story. Zuckerberg had
created a primitive version of the social media application in his
Harvard dorm room. Thanks to its immediate popularity, he commercialized
this product and founded Facebook, a pioneer in social networking.
There were 1.4 billion active users on Facebook and the company’s
revenue exceeded $12 billion. As Zuckerberg traveled around the country
to promote the IPO, the press followed him everywhere. The Facebook IPO
took place on May 18, 2012, making many of its brash and talented
managers instant millionaires by the end of 2014. Since the IPO,
Facebook’s user base has expanded to 2.7 billion. It has also grown by
making strategic acquisitions including WhatsApp and Instagram

Most
people at the social network company welcomed the publicity and
attention surrounding the IPO. But over the years Facebook has attracted
negative publicity and unwelcome attention for its controversial
privacy policies. Facebook has had to deal with several embarrassing
missteps as it struggles to reconcile user privacy with an open network.
The company’s policies have been the object of scrutiny by the
U.S. Federal Trade Commission, which has investigated a number of
privacy-related complaints. Problems arise from Facebook’s business
model: collect voluminous information about the user base so that
advertisers can target Facebook users with more precision.57 This case
reviews some of Facebook’s most contentious privacy policies and
disputes.

Facebook
first caught the attention of privacy advocates in 2007, when it
implemented a technology known as the “News Feed.” This feature was
designed to display in real time changes a person makes to her user
profile on the home pages of all of her online friends. A Facebook user
like Sally no longer had to visit the pages of all her friends to see
updates since those updates were now automatically shared in a stream of
data appearing on Sally’s homepage. To the surprise of the company,
users initially balked at this innovation and Facebook had to abandon
this default feature, but it has now become the “most valuable billboard
on earth.”

In
that same year, Facebook launched an ill-fated venture known as the
Beacon program, a new way to “socially distribute information.” Thanks
to Beacon, advertisers and web merchants could track user purchases
across the internet. A Facebook user’s purchase on a website (such as
Amazon) was disclosed to his or her network of friends as soon as the
purchase was made. This information was conveyed without the user’s
knowledge or consent. The Facebook community protested the online
tracking along with the immediate disclosure of these aspects of their
personal history. As resistance mounted, Facebook abruptly ended the
program.

In
2010, Facebook once again shocked many of its users by suddenly
changing its privacy settings. In its early years, Facebook shared most
profile fields only with friends and friends of friends. But the policy
was modified so that information that was once private such as one’s
profile picture, name, gender, address, professional networks, and so
forth, became publicly available by default to everyone online. As one
observer noted, Facebook changed the defaults to more efficiently
monetize customer information and because the company “appreciated its
power.” Facebook’s decision to make previously confidential information
“publicly available” was reversed thanks to public protest, and users
now have the capability to control access to most of their personal
information.

Despite
these and other problems, Zuckerberg insisted in 2010 that privacy was
no longer a “social norm.” There was an expectation that people wanted
to be more open about their lives and activities. Zuckerberg and other
Facebook executives remained convinced that the social media company’s
innovations were ahead of the convictions of its user base and not in
opposition to them.

In
order to expand its revenues the corporation decided to open its
platform to outside developers. Programmers could build Facebook games,
develop personality tests, or construct other apps. These programs were
offered to users for free in exchange for information. For a few years
the Facebook developer platform hosted several popular games including
Farmville and Candy Crush. Facebook customers agreed to give these game
developers access to their data in exchange for playing these games.
However, there were no protections for the reuse of these data collected
by the developers. Algorithms were extracting items such as users’
messages and photographs. One game developer used Facebook data to
construct unauthorized profiles of children on its own website. Facebook
had allowed for the sharing of its customer data without a system to
prevent any abuses.

In
2009, Facebook introduced a remarkable innovation which it called the
“Like” button. The famous plug-in was a matter of internal debate among
Facebook executives for some time. But they gradually realized that this
simple button could “transform the platform from a book into a blizzard
of mirrors.” The more things a user liked, the more she revealed about
herself, her preferences, interests, and aspirations. Facebook now knew
what their users “liked” along with their friends and relationships.
This data gold mine allowed advertisers to target those Facebook users
with even greater precision.

Facebook’s
tracking of its users across the internet had begun in 2010 with the
help of the Like button. At first, Facebook denied that it was tracking
users as they surfed the web. But by 2014 internet tracking was an
established corporate policy and part of the contract between Facebook
and its users. Facebook collects data on its users’ internet browsing
even when they are no longer logged into their Facebook accounts. This
happens by means of a small piece of technology known as the “datr”
cookie that Facebook deposits in each user’s web browser (once they log
on to Facebook.com). The datr cookie informs Facebook whenever that
browser visits a website with an active social plug-in, such as the
“like” button. This tracking of website activities and purchases allows
Facebook to build a more detailed profile of their users as the basis
for more personal ads. Users are informed of the tracking (in the dense
terms-of-service agreement), but they do not have the option to opt out
of this practice, which has riled European authorities. They claim that
Facebook has unfairly leveraged its power to collect data on the
activities of Facebook users on those third-party sites that use tools
such as the “like” button.

It
remains to be seen whether Facebook can successfully fend off
regulators in Europe and the United States and live up to the
expectations of its investors, who expect the company to continue
leveraging the commercial value of the information it collects. Facebook
became a social media behemoth by collecting user data when there were
few privacy restrictions. There are now stricter laws in Europe, and if
similar laws minimizing data collection are enacted in other countries,
Facebook may be able to crush would be competitors who want to challenge
Facebook using the same business model that made Zuckerberg’s company
so successful.

Questions:

What
is your opinion Facebook not being transparent about the like button
function to be used as a data collection tool with your information
without your consent? What are your thoughts about the Facebook invading
your privacy and using your information for marketing purposes? Is this
ethical? Should the US overment intervene more like EU has done? Why?
Why not?

DTSC 4050 Section 501 – Statistical Methods for Data Science and Analysis (Spring 2024 1)

QUESTION

Nothing Planned Yet

Monday, March 18

DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1)

Quiz Week 8: Quiz is not marked as done.DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1) QUIZQuiz Week 8: Quiz, due Monday, March 18, 2024 11:59 PM.Week 8: Quiz3 PTSDUE: 11:59 PM

Assignment Week 8: Assignment is not marked as done.DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1) ASSIGNMENTAssignment Week 8: Assignment, due Monday, March 18, 2024 11:59 PM.Week 8: Assignment1 PTSDUE: 11:59 PM

INFO 4709 SECTION 001 – DATA VISUALIZATION (SPRING 2024 1)

Quiz Quiz8-Lecture8 is not marked as done.INFO 4709 SECTION 001 – DATA VISUALIZATION (SPRING 2024 1) QUIZQuiz Quiz8-Lecture8, due Monday, March 18, 2024 11:59 PM.Quiz8-Lecture86 PTSDUE: 11:59 PM

  1. Assignment TableauTutorial6-Lab6 is not marked as done.INFO 4709 SECTION 001 – DATA VISUALIZATION (SPRING 2024 1) ASSIGNMENTAssignment TableauTutorial6-Lab6 , due Monday, March 18, 2024 11:59 PM.TableauTutorial6-Lab610 PTSDUE: 11:59 PM

UNT

Calendar Event Registration opens for Fall is not marked as done.UNT CALENDAR EVENTCalendar Event Registration opens for Fall, all day on March 18, 2024.Registration opens for FallALL DAY

Calendar Event Schedule your advising appointment?for Fall class registration is not marked as done.UNT CALENDAR EVENTCalendar Event Schedule your advising appointment?for Fall class registration, all day on March 18, 2024.Schedule your advising appointment?for Fall class registrationALL DAY

Tuesday, March 19

DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1)

Assignment Week 9: In-Class Activity is not marked as done.DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1) ASSIGNMENTAssignment Week 9: In-Class Activity, due Tuesday, March 19, 2024 8:00 PM.Week 9: In-Class Activity1 PTSDUE: 8:00 PM

March 20 to March 22

Nothing Planned Yet

Saturday, March 23

INFO 4230 SECTION 001 – RECORDS MANAGEMENT OPERATIONS (SPRING 2024 1)

Discussion Module 9 Discussion is not marked as done.INFO 4230 SECTION 001 – RECORDS MANAGEMENT OPERATIONS (SPRING 2024 1) DISCUSSIONDiscussion Module 9 Discussion, due Saturday, March 23, 2024 11:59 PM.Module 9 Discussion100 PTSDUE: 11:59 PM

Sunday, March 24

Nothing Planned Yet

Monday, March 25

DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1)

Quiz Week 9: Quiz is not marked as done.DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1) QUIZQuiz Week 9: Quiz, due Monday, March 25, 2024 11:59 PM.Week 9: Quiz3 PTSDUE: 11:59 PM

  1. Assignment Week 9: Assignment is not marked as done.DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1) ASSIGNMENTAssignment Week 9: Assignment, due Monday, March 25, 2024 11:59 PM.Week 9: Assignment1 PTSDUE: 11:59 PM

INFO 4307 SECTION 001 – KNOWLEDGE MANAGEMENT TOOLS AND TECHNOLOGIES (SPRING 2024 1)

Discussion Segment 6 – Knowledge metadata, ontologies is not marked as done.INFO 4307 SECTION 001 – KNOWLEDGE MANAGEMENT TOOLS AND TECHNOLOGIES (SPRING 2024 1) DISCUSSIONDiscussion Segment 6 – Knowledge metadata, ontologies, due Monday, March 25, 2024 11:59 PM.Segment 6 – Knowledge metadata, ontologies30 PTSDUE: 11:59 PM

INFO 4709 SECTION 001 – DATA VISUALIZATION (SPRING 2024 1)

Assignment Quiz9-Lecture9 is not marked as done.INFO 4709 SECTION 001 – DATA VISUALIZATION (SPRING 2024 1) ASSIGNMENTAssignment Quiz9-Lecture9 , due Monday, March 25, 2024 11:59 PM.Quiz9-Lecture96 PTSDUE: 11:59 PM

Assignment TableauTutorial7-Lab7 is not marked as done.INFO 4709 SECTION 001 – DATA VISUALIZATION (SPRING 2024 1) ASSIGNMENTAssignment TableauTutorial7-Lab7 , due Monday, March 25, 2024 11:59 PM.TableauTutorial7-Lab710 PTSDUE: 11:59 PM

Tuesday, March 26

DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1)

Assignment Week 10: In-Class Activity is not marked as done.DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1) ASSIGNMENTAssignment Week 10: In-Class Activity, due Tuesday, March 26, 2024 8:00 PM.Week 10: In-Class Activity1 PTSDUE: 8:00 PM

March 27 to March 29

Nothing Planned Yet

Saturday, March 30

INFO 4230 SECTION 001 – RECORDS MANAGEMENT OPERATIONS (SPRING 2024 1)

Discussion Module 10 Discussion is not marked as done.INFO 4230 SECTION 001 – RECORDS MANAGEMENT OPERATIONS (SPRING 2024 1) DISCUSSIONDiscussion Module 10 Discussion, due Saturday, March 30, 2024 11:59 PM.Module 10 Discussion100 PTSDUE: 11:59 PM

Sunday, March 31

Nothing Planned Yet

Monday, April 1

DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1)

Quiz Week 10: Quiz is not marked as done.DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1) QUIZQuiz Week 10: Quiz, due Monday, April 1, 2024 11:59 PM.Week 10: Quiz3 PTSDUE: 11:59 PM

  1. Assignment Week 10: Assignment is not marked as done.DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1) ASSIGNMENTAssignment Week 10: Assignment, due Monday, April 1, 2024 11:59 PM.Week 10: Assignment1 PTSDUE: 11:59 PM

INFO 4307 SECTION 001 – KNOWLEDGE MANAGEMENT TOOLS AND TECHNOLOGIES (SPRING 2024 1)

Discussion Segment 7 – Knowledge Portals, Data Governance is not marked as done.INFO 4307 SECTION 001 – KNOWLEDGE MANAGEMENT TOOLS AND TECHNOLOGIES (SPRING 2024 1) DISCUSSIONDiscussion Segment 7 – Knowledge Portals, Data Governance , due Monday, April 1, 2024 11:59 PM.Segment 7 – Knowledge Portals, Data Governance30 PTSDUE: 11:59 PM

INFO 4709 SECTION 001 – DATA VISUALIZATION (SPRING 2024 1)

Quiz Quiz10-Lecture10 is not marked as done.INFO 4709 SECTION 001 – DATA VISUALIZATION (SPRING 2024 1) QUIZQuiz Quiz10-Lecture10, due Monday, April 1, 2024 11:59 PM.Quiz10-Lecture106 PTSDUE: 11:59 PM

Assignment Discussion2: use of visualization techniques in papers is not marked as done.INFO 4709 SECTION 001 – DATA VISUALIZATION (SPRING 2024 1) ASSIGNMENTAssignment Discussion2: use of visualization techniques in papers, due Monday, April 1, 2024 11:59 PM.Discussion2: use of visualization techniques in papers20 PTSDUE: 11:59 PM

Assignment TableauTutorial8-Lab8 is not marked as done.INFO 4709 SECTION 001 – DATA VISUALIZATION (SPRING 2024 1) ASSIGNMENTAssignment TableauTutorial8-Lab8 , due Monday, April 1, 2024 11:59 PM.TableauTutorial8-Lab810 PTSDUE: 11:59 PM

Tuesday, April 2

DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1)

Computer Science Question

QUESTION

Design document:

Follow the instructions in E/DD.08 and record your designs for each of the problems in your Design Document. Make sure to:

List each design in a clearly marked section indicates which question the design belongs to.

For each design make sure to note any details about the question that are relevant to your design, such as the inputs, outputs, any required displays.

Also make sure to detail your tests including all inputs and outputs you’d expect to see.

  • Each problem should have a detailed plan which outlines step-by-step how you get the required outputs from the provided inputs.
  • If you divide any problem into smaller algorithms, make sure to detail all of the information for those designs as well.
  • As a rule of thumb, your designs should include enough detail that anyone else could take your design and implement the same solution without confusion. If you’re questioning if a design is clear enough, ask a TA if they understand your work!
  • Python template
  • # TODO; My functions
    def main():
       # TODO; Test my functions
       pass
    if __name__ == “__main__”:
       main()

banned techniques are 

as follows:

Slicing

Built-In Functions

Member Functions

List Comprehension

Sets and Set Testing

  • Default Parameters
  • Keyword Arguments
  • Nested (Local) Function Definitions
  • While-True or Improper Conditionals
  • Structure Packing/Unpacking
  • Multiple Assignment/Return
  • Out-of-Bounds Indexing
  • Global Scope and Local Overrides
  • Containers and other Data Structures
  • Break, Continue, Yield, Async, Await
  • E/DD.08 
  • Previously, we designed an algorithm that helped us play a hand of blackjack. One of your friends found out and asked you to help them with a problem they have when playing; namely, there seem to be a couple of cheaters that rig the games so they can always win.
  • You’ve offered your help by building the algorithm blackjack_checker.
  • Your friend already started working on this problem, so they have their format describing the cards in a deck. They’ve encoded the cards as two-character strings that describe the suit and face value, respectively. The suit is a single capital letter that is one of the following:
  • C for Clubs,

D for Diamonds,

H for Hearts, and finally,

S for Spades.

The face values are similarly encoded:

1 through 9 for all the number cards,

T for 10 (so we only use one character),

J for Jacks (worth 10 points),

Q for Queens (worth 10 points),

K for Kings (worth 10 points), and finally,

  • A for Aces (worth 11 points).
  • The blackjack game allows someone to choose if an Ace is worth 1 or 11 points, but your friend splits what the players chose by encoding them separately.
  • Your algorithm should take in a list of strings and first check that all the strings follow the rules above. If the string doesn’t follow these rules or there’s nothing to process, print a message describing the issue and return an empty list.
  • Next, your algorithm should take this list of strings and create a 2D list of strings, split into chunks of cards that do not exceed 21. For example, if the inputs were a list of H3, DA, and C4, there would only be one hand as 3+11+4 is only 18, but an input of ST, CJ, DA would be two, the first having ST and CJ, and the second having only DA. This will comprise the first row of your output.

Next, you should also be able to check that there is only one card for any suit and face. Some players have been sneakily adding their cards into the deck to cheat through the game, so your friend needs to know of any cards that appear more than once. For example, if someone were to pull the classic all-cards-are-the-nine-of-hearts maneuver (this is also called the “whoops, all hearts” play), your friend needs to have a list with H9 in it so they can check, indeed, that card appears more than once. Hey, your friend never said they weren’t over-reliant on computers, after all… To help them make sure they don’t miss something, all of the entries in this list must be unique. This provides the second row in your output.

For now, your friend would be immensely grateful for just these two things, so that’s all that is expected to be returned: a multidimensional list where the first row is a list of lists, and the second row is the list of all cards that appear more than once.

  • To help get started, here are two constants that you can use which describe the suit and face values you can expect to see.
  • SUITS = ["C", "D", "H", "S"]
    CARDS = ["1", "2", "3", "4", "5", "6", "7", "8", "9", "T", "J", "Q", "K", "A"]
  • You can also use the following basic test examples to guide overall development, but remember that you’ll need to make your own.
  • Example TestsInputOutput
  • [“D2”, “CT”, “HK”, “D9”, “SK”]
  • [
     [[“D2”, “CT”], [“HK”, “D9”], [“SK”]],
     []
    ]

[“H9”, “H9”, “H9”, “H9”, “H9”]

[
 [[“H9”, “H9”], [“H9”, “H9”], [“H9”]],
 [“H9”]
]

[]

[]

or

[[], []]

Note: For the empty input case, either solution will be accepted.

This problem can be solved in many ways, especially since there’s only one function that is required, but don’t be overwhelmed. Start by splitting the problem into smaller pieces and try to answer each of these questions in isolation:

How can I get the value of a card as an integer?

How can I separate a list into arbitrary chunks to get the first row of inputs?

How can I track how many times I’ve seen a card?

How can I then use that data to create a list of all unique cards I’ve seen more than once?

INFO 4230 Section 001 – Records Management Operations (Spring 2024 1)

QUESTION

DMS Specifications Assignment

In your DRM Environment Report, you described the organization/department that is the focus of your project work in EDRMS. In this assignment, you will consider the requirements of a document management system that would support your DRM environment.

As before, you may need to do some basic research to adequately describe a DMS for your selected environment. Making reasonable assumptions as to system requirements is perfectly fine – many requirements, such as version control, are standard elements. I am focused on how well you understand the principles and components of document management.

Overview

You will list 10 system requirements related to document creation, access, management, destruction, etc. that are applicable to your electronic DRM environment. In a real-world situation, you also would need a policy for managing any physical documents and files, as well.

Focus

This should have been addressed when you created your DRM Environment Report, but be sure the focus of your EDMS design is on document management and that you are using specifications for an electronic system. You are considering the management of documents – not customer service issues, inventory, etc. 

Example How-To

The focus of system specifications is NOT on a particular document type or task. However, that document or task can be what drives the need for the specification(s).

Here’s an example: Say in your environment, patient medical forms are filled out by hand.

Based on this document and task, you could determine specifications like this: The system needs a way to digitize paper, pictures, etc. It also needs a way for the staff to transfer (type in) that information into the patient’s account profile. If the medical office uses a proprietary patient management software, the system would need to interface with that system in order to access and manage those documents.

So, specifications might be:

Scanner capable of scanning in color at 300 dpi and at 11×17 inches.

Interface with both Windows and Mac computers an allow manual input and document creation.

The document management system needs to interface with Patient Management Source system/software.

Boom. There are 3 specifications from just one task/document. I also would strongly suggest including a specification that covers the types of file formats the system needs to be able to manage/create/view, as well. That makes 4 specifications right there. (See other examples in DMS Functionalities below.)

Format & Length

  • Follow the format below for creating your report. Use the headings provided below.
  • Your report should be single-spaced paragraphs with a blank space between each paragraph. This is the standard Word format, so you should have to do anything to change your settings. Your document basically should look a lot like how this page looks.
  • This report should be about 3 – 4 pages long. It may be longer depending upon how you format it (for example, bullets or paragraphs) and any extra detail you decide to include.

Submit in Word or PDF format. Put only your name in the header and use only the report title on the first page.

Introduction

This should be a brief explanation of what this report is, who it is for (the selected environment), and why you created it for your selected EDM environment.

Document Management System Functionalities

List 10 functions required in your EDMS. You can use bullets or numbers, or you can create each item as its own paragraph/section and leave a blank in between each specification.

For our purposes, these can be rather generic though they should be applicable to your particular organization/department. While security always is an important requirement, remember, too, that EDMS are focused more on streamlining workflow, quick access, maintaining consistency, etc.

Examples might include: scanner integration, search by key word, search by author, support bar code reading, manual input, versioning, scale to 100 concurrent users, spell check, batch processing, phone system integration, types of file formats supported, integrate with existing systems, remote access, etc. If it involves a document, the item’s use, access, storage, or disposal, it has the potential of being a requirement of the system. (Remember that “document” is a catch-all word for any object that is part of the daily functioning of the organization – recorded phone calls, maps, etc. are documents, too.)

NOTE: You can use some of these listed above, but you must include some of your own requirements that are relevant to your particular organization/department.

NOTE: In all cases, provide additional details to flesh out the functionality requirement (e.g., scanner integration to digitize documents and photos in color at up to 13×19 inches).

Conclusion

This should be a brief concluding remark or two that summarizes your plan.

References

Include references as applicable. This reference list is a bit different from an APA list. I want you to include any researched sources you use, but I also want you to include whether you conducted interviews, surveys, etc. I realize most of you will be creating your project based upon researched data as opposed to your own work environment.

DAD 220 SNHU Branches Table Lab Report

Question

Overview 

Table joins are commonly used to return records from multiple tables in a normalized database. This is done to generate reports and perform ad-hoc queries. Since data is not always in one large table in a normalized database, we use joins to get supporting information for the records we are searching for. Joins connect tables by matching values of keys in the tables to retrieve related records, generally using the SELECT and WHERE commands. For example, if customer_ID is used in a customer table and in an order table, the join would use the CUSTOMER-ID to connect the CUSTOMER table and the ORDER table to create a combined record for each key value matched in the two tables.

Directions

The manager of a small marketing firm has hired new employees and has asked you to identify information about them. You’ve already entered some information for the new hires, but you’ll need to enter more. After entering the remaining new information, perform a join that will give you the results requested by the manager. Then, you’ll need to write the query to save the results and write them to a comma-separated values (CSV) file, which is a delimited text file that uses a comma to separate values so they can be archived. Please revisit the instructions from the Module Two Lab Guidelines and Rubric to identify the data you’ll need.

  1. Update the name of the Branches table that you created in the previous lab to say “Department”. 
    1. Use an ALTER statement to successfully RENAME the “Branches” table to “Department”.
    2. Capture these outputs in a screenshot to validate that you’ve successfully completed this step.
  2. Insert fields to the Department table so that you’ll be able to perform joins on them. 
    1. INSERT INTO Department VALUES
      • (1, ‘Accounting’),
      • (2, ‘Human Resources’),
      • (3, ‘Information Systems’),
      • (4, ‘Marketing’);
    2. Write a SELECT statement for this table to prove this step, and validate that it ran correctly with a screenshot.
  3. Now, perform joins between the Department and Employee tables and show results for how many employees work in each one of the four departments. This will only provide information on the records that are already there. 
    1. Department 1 = Accounting 
      1. Command: SELECT First_Name, Last_Name, Department.Department_Name FROM Employee INNER JOIN Department ON Employee.Department_ID = Department.Department_ID WHERE Employee.Department_ID = 1;
    2. Using SELECT statements similar to the one above, perform joins to produce results for the following tables: 
      1. Department 2 = Human Resources
      2. Department 3 = Information Systems
      3. Department 4 = Marketing
    3. Capture the results of these joins and validate your work by providing a screenshot. You should have the same number of records as you do employees.
  4. Populate the Employee table with information for ten new employees. 
    1. Give them unique names and include attributes for all necessary fields. (Note: Please reference attributes from the lab in Module Two. Department ID values must be between 1 and 4.)
  5. Perform a join across the Employee and Department Tables for each of the four departments. New and existing records should be displayed in the results. 
    1. Take a screenshot to capture the updated results that the Employee and Department joins show to validate that they have run correctly. You should have the same number of records as you do employees.
  6. Identify the resultant outputs of the commands that you’ve written: 
    1. How many records are returned for employees in each department?
  7. Create a CSV file that contains only the records of employees in Human Resources and Information Systems. If you run this query multiple times, be sure to use a different file name each time. MySQL will not overwrite an existing file. 
    1. Enter the command listed below. 
      1. Command: select First_Name, Last_Name, Department.Department_Name from Employee inner join Department on Employee.Department_ID = Department.Department_ID where Employee.Department_ID = 3 OR Employee.Department_ID = 2 into outfile’/home/codio/workspace/HRandIS-Employees.csv’ FIELDS TERMINATED BY’,’ LINES TERMINATED BY ‘rn’;
    2. Print the file output to the screen. 
      1. In order to print your screen, start by refreshing your browser.
      2. You’ll need to type the word quit after your MySQL prompt and then press Enter to exit to the Linux shell. Do not exit the virtual lab environment itself.
      3. Next, print the output of your file to the screen by following these steps: 
        1. Type pwd and press Enter, then type ls and press Enter again. This will list your files.
        2. Now, type cat HRandIS-Employees.csv and press Enter.
        3. Capture these outputs in a screenshot to validate that you’ve successfully completed this step.
  8. Reflection: Provide detailed insight on the prompts below by explaining your process along with how and why it ultimately worked. 
    1. Process 
      1. Explain how the joins you used in this assignment worked.
      2. Describe why the commands you used were able to retrieve the Department table when you selected the Department name.
    2. File creation and extraction 
      1. Identify how many records are in the file when you write the records of your query to a CSV file.
      2. Explain, in detail, the process of extracting data to a flat file.

DTSC 4050 Section 501 – Statistical Methods for Data Science and Analysis

QUESTION

ay

March 18

DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1)

  1. DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1) ASSIGNMENTAssignment Week 8: Assignment, due Monday, March 18, 2024 11:59 PM.Week 8: Assignment1 PTSDUE: 11:59 PM

New activity for INFO 4709 Section 001 – Data Visualization (Spring 2024 1)

INFO 4709 SECTION 001 – DATA VISUALIZATION (SPRING 2024 1)

    • Graded

UNT

  1. UNT CALENDAR EVENTALL DAY
  2. UNT CALENDAR EVENTALL DAY

Tomorrow, March 19

DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1)

  1. DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1) ASSIGNMENTAssignment Week 9: In-Class Activity, due Tuesday, March 19, 2024 8:00 PM.Week 9: In-Class Activity1 PTSDUE: 8:00 PM

Wednesday, March 20

Nothing Planned Yet

Thursday, March 21

UNT

  1. UNT CALENDAR EVENT2:05 AM to 4:05 AM

Friday, March 22

Nothing Planned Yet

Saturday, March 23

New activity for INFO 4230 Section 001 – Records Management Operations (Spring 2024 1)

INFO 4230 SECTION 001 – RECORDS MANAGEMENT OPERATIONS (SPRING 2024 1)

  1. INFO 4230 SECTION 001 – RECORDS MANAGEMENT OPERATIONS (SPRING 2024 1) DISCUSSIONDiscussion Module 9 Discussion, due Saturday, March 23, 2024 11:59 PM.Module 9 Discussion
    • Replies

    100 PTSDUE: 11:59 PM

Sunday, March 24

Nothing Planned Yet

Monday, March 25

DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1)

  1. DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1) QUIZQuiz Week 9: Quiz, due Monday, March 25, 2024 11:59 PM.Week 9: Quiz3 PTSDUE: 11:59 PM
  2. DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1) ASSIGNMENTAssignment Week 9: Assignment, due Monday, March 25, 2024 11:59 PM.Week 9: Assignment1 PTSDUE: 11:59 PM

INFO 4307 SECTION 001 – KNOWLEDGE MANAGEMENT TOOLS AND TECHNOLOGIES (SPRING 2024 1)

  1. INFO 4307 SECTION 001 – KNOWLEDGE MANAGEMENT TOOLS AND TECHNOLOGIES (SPRING 2024 1) DISCUSSIONDiscussion Segment 6 – Knowledge metadata, ontologies, due Monday, March 25, 2024 11:59 PM.Segment 6 – Knowledge metadata, ontologies30 PTSDUE: 11:59 PM

INFO 4709 SECTION 001 – DATA VISUALIZATION (SPRING 2024 1)

  1. INFO 4709 SECTION 001 – DATA VISUALIZATION (SPRING 2024 1) ASSIGNMENTAssignment Quiz9-Lecture9 , due Monday, March 25, 2024 11:59 PM.Quiz9-Lecture96 PTSDUE: 11:59 PM
  2. INFO 4709 SECTION 001 – DATA VISUALIZATION (SPRING 2024 1) ASSIGNMENTAssignment TableauTutorial7-Lab7 , due Monday, March 25, 2024 11:59 PM.TableauTutorial7-Lab710 PTSDUE: 11:59 PM

Tuesday, March 26

DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1)

  1. DTSC 4050 SECTION 501 – STATISTICAL METHODS FOR DATA SCIENCE AND ANALYSIS (SPRING 2024 1) ASSIGNMENTAssignment Week 10: In-Class Activity, due Tuesday, March 26, 2024 8:00 PM.Week 10: In-Class Activity1 PTSDUE: 8:00 PM

March 27 to March 29

Nothing Planned Yet

Suny Old Westbury online learning discussion

QUESTION

Question(s):

For your response posts, address the following:

  1. Consider both sides of your classmates’ events. Compare and contrast your answers.
    1. What ideas or concepts from this week’s learning materials can be applied or expand your thinking in relation to their posts?

Remember, this assignment is graded on the quality of your initial post and at least two response posts to your classmates. If you do refer to resources, be sure to cite the resource.

PEER POST # 1

One event that I experienced that was directly influenced by technology was the implementation of a new online learning platform at my High school. Prior to the pandemic, my school primarily relied on in-person classes and traditional learning methods. However, when classes were moved online due to COVID-19, the school had to quickly adapt and find a way to continue providing education to its students. The school decided to implement a new online learning platform that would allow students to attend classes, access course materials, and participate in discussions and assignments virtually. As a student, I was skeptical of this new platform and was worried about the effectiveness of online learning. However, as I started using the platform, I realized just how advanced and user-friendly it was. Not only did the platform allow for seamless virtual learning, but it also had features such as canvas, messaging with professors, interactive discussion boards, and even virtual group work. I was impressed by how the platform was able to recreate the classroom experience and make it accessible from anywhere.This experience enhanced my understanding of the role of technology in education. I realized that technology is not just limited to social media or entertainment, but it has the power to revolutionize the way we learn. The online learning platform not only made education accessible during a time of crisis, but it also opened up opportunities for students who may not have been able to attend classes in person. Additionally, this event also highlighted the importance of constantly adapting and evolving with technology. In a world where technology is constantly advancing, it is crucial for institutions, schools and individuals to embrace and utilize it to enhance their lives. The implementation of the online learning platform showed me that technology has the ability to not only solve immediate problems but also improve our overall understanding and experience in various aspects of life.


PEER POST # 2

Our organization recently had a town hall meeting to update the staff on how the organization is doing. In the past, these events took place in person, but now we hold them through Webex. Ever since the start of the COVID-19 pandemic, we have transitioned most of our meetings to remote meetings. There are many players in the field of web conferencing, and the brand is irrelevant as they all do a good job. But they all provide a service that allows us to connect with more people than ever before. We can now participate in meetings with little effort, less travel, and less cost to the organization. Technology played a huge role in allowing us to work remotely and keep these organizations operational during challenging times.

I have been coaching youth basketball for the last 20 years. We now have cameras that capture the game and allow families to watch the game remotely through the internet. This system has been a positive experience for the families so there is less travel, and grandparents can now participate more easily. This system also has AI integration that allows us to capture stats on the game and our players. That means that coaches don’t have to spend time looking through the video to find stats like shooting percentage, time played, and fouls committed. These tools also allow us to view the video of fouls committed by a certain player without having to look through the film to find them.

We now can look at the game plan at a high level with little effort and time and make real changes more quickly. We can see who plays well together on the court as a group and when our stats are the strongest. Having real data to look at versus how we feel things went has been a game changer. Now, we just need to find a way to get the kids to listen all the time!