I need to get this done - Computer Science
The goal of this project is to demonstrate your ability to use common applications to communicate and store information. You will use your IoT design and plan for this assignment. Now that you have learned how to use email, web browsers, and productivity software, you can start to apply those skills. First, you will use Microsoft Word to create a professional proposal document that is intended for some potential investors of your idea. It will need to be a comprehensive report using various formatting and styles. It should have clearly defined sections, images, and supporting tables and charts with data (fictional but realistic) regarding cost and other considerations. Apply as many of the concepts you learned in the tutorials as are reasonable to make this proposal look and feel professional. Next, you will use Microsoft Excel to continue the proposal by created spreadsheets with formulas and formatting to enhance the proposal. Whatever data you wish to invent and provide, there must be actual formulas used to calculate in the spreadsheet. You must also have both absolute and relative cell references, and at least one function. You will need to be sure to reference the spreadsheet in your proposal as an attachment or appendix. Remember this is part of a professional package that is intended for your investors! Make it look polished! Then, you will create a Microsoft PowerPoint presentation that gives a solid overview of your proposal and spreadsheets. There should be charts and tables derived from your Excel spreadsheet data, as well as information and images relating to your Word document inserted into the presentation. You must also apply themes, animations, and transitions to your work. Once your three artifacts are complete, reviewed, and polished, you will create a single folder in your OneDrive titled Module 3 Artifacts to store these items and upload them there. Create a shared link to this folder.  Your link MUST be accessible.  The permissions must be set to anyone with a link can view.  This is one-third of your score for this assignment. Draft an email to your investors (me). In a professional, business-like tone, you will ask them to review your documents via the link consider your proposal in so many words. DO NOT COPY the previous sentence and assume that is enough for the body of the email.  Your email must contain the link to your files! Attach a copy of your three artifacts and the email in the project submission link above. Edgardo J. Rodriguez Morales Module 2 Homework COSC1301-TD001 Scenario 1 A company’s employee uses their work computer to test some software that their friend bought. It only takes a few minutes, and they uninstall it after they are done. According with Ten Commandments of Computer Ethics by the Computer Ethics Institute, he has violated number 7. thou shalt not use other peoples computer resources without authorization or proper compensation, in this scenario is clear that the employee is knowingly doing something that is not authorize by his company and not ethical. Taking the risk of installing an unauthorize software to his job computer a lot of things might go wrong on the scenario does not say but what if that computer has a piece of software that is design to lock the computer until an administrator authorized the software? Or what if the friend did not say his real intentions and the software is a malicious software? There are many assumptions, but the best decision will simply not to installed on the computer. However, assuming he did and nothing happen the company computers at minimum I feel like he should be suspended for until an investigation is complete, and came back with confirmation that no critical information was put at risk. Scenario 3 A company’s employee was curious as to what the “higher-ups” pay looks like.They break the passcodes and take a quick peek at the salaries. I understand the curiosity but the fact that he has break in the system to look at the higher ups salaries is a straight up violation of privacy data and the 3rd computer ethic principle Thou shalt not snoop around in other peoples computer files. Breaking into the company system to access the information he wanted to look for is to me consider like looking into other people files. I believe that the incident should be investigated and the employee should be given a warning. Scenario 4 A bank teller transfers money from a customer account into their account to pay a bill that is overdue. Three days later, the bank teller gets paid and transfers the money back. In the scenario mentioned above there is not signs of an accident this is a criminal offense right a away by just taking to money and transferring over to his account this is essentially stealing, the employee is violating the law and the 4th principle of computer ethics which is Thou shalt not use a computer to steal. Not to mention the employee also has violated these bank client trust. I feel the employee should be fire and charge with criminal charges for stealing costumer money this conduct should not be tolerated by any financial institution. Edgardo J. Rodriguez Module 1 Practical Assessment COSC1301-TD001 The Eco System I had Created was the Care First with the goal in mind of taking care of older adults by monitory their health and security on the daily basis, by utilizing a set of devices and the IOT to take care of them. The system Included a central hub, smart mirror, smartwatch, smart toilet, back-up system, security system, and an application for phones. Care First, is more than just a monitoring system is also created to be your assistant, make reminder notes, make orders online, and a security system as well. Facilitating care of older adults to families that are busy and won’t have the time or the resources to take care full time of their own. After a careful analysis taking in consideration if the IOT concept and devices I have created go against any of the ten commandments of IOT the direct answer is no, and the reason and the reason why is because the nature of taking care of other is embedded in the system. Care First was created to take to care not to disrupt, attack, delay or destroy other people information, data, or files in any way or shape. The system is to take care and monitors others health on the daily basis, as per how a system that is made to take care of others can be used to irrupt, I don’t see how, however a data breach could happen as we know many big corporations are target data breaches and here where the system and the cloud will need to be protected. Protecting data servers from data breaches and hackers, is the only weakness I see in the chain, and imperative to take care of those weaknesses by utilizing complex security software, antivirus, and a actively updating security will be the priority to avoid the data of the users to end up in the hands of criminals. Ethics in the First Care system are pretty straight forward and don’t involve any violations on the ten commandments of computers ethics, however, is essential to safeguard the user information to have a ethical and legitimate system. In today day and age is complicated to maintain to provided that security to the end but companies need to provide otherwise if they have compromised servers they will be out of business. Edgardo J. Rodriguez Morales Module 2 Practical Project COSC1301-TD001 1.Internet Ethics: Just like computers the Internet also has the same Ten Commandments of Ethics, so the same rules apply to the Internet when it comes to ethics according with (Vogel, 2016). Scenario, a college student is asked to conduct research for a biology class project the student copy and paste most of the information and did not cite any sources. Unfortunately, this is a very common situation that happen to many students in in countless academy institutions, there could be a range of reasons behind why he did it, however there is no excuse for the student to used intellectual material and presented as his. Plagiarism is not something to take lightly, because if later that same student become a scientist, it could do the same at higher levels, so is better to stop it and teach the lesson about ethics before that student become a professional. As what consequences the student should face, the student should be getting a negative grade, a lesson of ethics from the professor or the institution, and the second chance to fix the situation a cite his sources. This way the student will learn a valuable lesson without being reprimanded to the maximum punishment and can have good slap in the wrist. Bottom-line up-front plagiarism is a big part if ethics and doing so also violates the one of the ten Commandments of Ethics 8th Thou shalt not appropriate other peoples intellectual output. 2.Cyber Ethics: Cyber Ethics is the subject covering user behavior and what computers are programmed to do, and how this affects individuals and society according to (Vogel, 2016), Scenario is the Colonial Pipeline Cyber Attack Hackers entered the networks of Colonial Pipeline Co. on April 29 2021 through a virtual private network account, the attack had major effects on gasoline prices and affected the supply for most of the east side of the United States. In this case the U.S citizens pay much higher prices and cause a lot of turmoil in the US east coast. Hacking such an enormous entity brought to light the weakness of our infrastructure however, I consider this is not only unethical but also cyber-terrorism and the responsible behind should pay the maximum punishment. The reason why I say maximum punish should be carry out to the individuals, entity, or country behind it is because millions of Americans with no fault of their own were affected. A completely unethical act by hacking another country infrastructure is almost inciting war and would have the repercussion to their society. Its safe to say that many hackers are unethical by the nature of their behavior. Edgardo J. Rodriguez Morales Module 3 Homework COSC1301-TD001 To: Bobby Hogue From: John Moore Subject: Job? Comment by edgardo rodriguez: Not a way to sent a email inquiring about a job Hey Bob, We talked a couple weeks back at the chamber of commerce event. (I was the one looking for a summer internship and had a zit on my lip that could have passed for a cold soar. Comment by edgardo rodriguez: we Comment by edgardo rodriguez: sore Lol. Whew. It was not. You’re probably like, “uh.. What?” Maybe that helps you recall, maybe not. Not completely important, I suppose. Comment by edgardo rodriguez: this is a business email looking for a job humor should be put aside Comment by edgardo rodriguez: uh. I’d really like to come work for you atyour IT business. You seemed like a cool person to work for, I liked ur striped pants. I’m available to start working on Monday, but I am taking my driver’s test in June and have to study and go an hour and half away to take it at an easier place cause I’m not a great driver so I’ll miss a few days. I am also going to the beach with friends for a week in July. Oh, and my grandmother has bad gas (OMG IT’S TERRIBLE) and sometimes I have to take her to the doctor. Comment by edgardo rodriguez: At your Comment by edgardo rodriguez: your Comment by edgardo rodriguez: hour and a half Comment by edgardo rodriguez: to Comment by edgardo rodriguez: because Comment by edgardo rodriguez: ,so Comment by edgardo rodriguez: OMG, it’s terrible Comment by edgardo rodriguez: I’ve attached my resume, it’s the bomb dot com. Let me know if you have a job opening for me. I can’t wait to play on some computers. If I don’t respond to your email, I’m always on FB, snapchat or insta! Comment by edgardo rodriguez: Need to leave proper POCs, not social media Comment by edgardo rodriguez: Instagram Peace out, Ginny Moore Comment by edgardo rodriguez: Not a formal way of finishing a proper email for a job Comment by edgardo rodriguez: The e-mail jeopardize completely the opportunity for getting a future job. Comment by edgardo rodriguez: From: Heather D CC: Every single human Heather has ever emailed Subject: Fwd: Fwd: Fwd: Fwd: OMG funny pictures of hilariousness OMG this is the best email I’ve seen all day. Comment by edgardo rodriguez: If the email was directed to friends the email is vague and don’t any relevant information. ------------------------------------------------------------------------------------------------- From: Karen Grode To: Anastasia Simoncini Subject: ... Did you see what Comment by edgardo rodriguez: All supposed to be in one sentence Bratney is wearing today? She looks stupid. I mean, that color lipstick? She’s probably trying to get Bryan’s attention. And did you hear her sucking up to the boss. I can’t stand it. Like, we all work hard. AM I RIGHT? Comment by edgardo rodriguez: Comment by edgardo rodriguez: Comment by edgardo rodriguez: Comment by edgardo rodriguez: Overall a terrible way to start problems at work keep it professional. ------------------------------------------------------------------------------------------------- From: Christina Tintle To: Caroline Sherp Subject: Today’s Meeting Comment by edgardo rodriguez: Clean and concise email no corrections need it Hey beautiful! I am looking forward to seeing you today for our meeting. I’ve attached the materials needed for our discussion. Let me know if you have any questions. Regards, Christina Tintle Marketer Extraordinaire [email protected] Christinasmarketing.com (555) 545-5656 “Be so good they can’t ignore you.” –Steve Martin ------------------------------------------------------------------------------------------------- To: Employer From: Ty Keister Subject: I need jobz der Employer, I wud like 2 apply 4 da job in customer service. I saw ur job on FB. I got my resume and added it to da email. I wudappreci8 ur response. -TK Comment by edgardo rodriguez: Dear employer, I would like to apply for a position in the costumer service department. I have attached my resume to this email. I look forward to hearing back from you soon. Very respectfully ------------------------------------------------------------------------------------------------- To: Jimmy Slocum From: Adam Sandler Subject: Presentation Dear Mr. Sandler: Can you send me the presentation from last week? I really enjoyed it! Sincerely, Jimbo
CATEGORIES
Economics Nursing Applied Sciences Psychology Science Management Computer Science Human Resource Management Accounting Information Systems English Anatomy Operations Management Sociology Literature Education Business & Finance Marketing Engineering Statistics Biology Political Science Reading History Financial markets Philosophy Mathematics Law Criminal Architecture and Design Government Social Science World history Chemistry Humanities Business Finance Writing Programming Telecommunications Engineering Geography Physics Spanish ach e. Embedded Entrepreneurship f. Three Social Entrepreneurship Models g. Social-Founder Identity h. Micros-enterprise Development Outcomes Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada) a. Indigenous Australian Entrepreneurs Exami Calculus (people influence of  others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities  of these three) to reflect and analyze the potential ways these ( American history Pharmacology Ancient history . Also Numerical analysis Environmental science Electrical Engineering Precalculus Physiology Civil Engineering Electronic Engineering ness Horizons Algebra Geology Physical chemistry nt When considering both O lassrooms Civil Probability ions Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years) or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime Chemical Engineering Ecology aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less. INSTRUCTIONS:  To access the FNU Online Library for journals and articles you can go the FNU library link here:  https://www.fnu.edu/library/ In order to n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.  Key outcomes: The approach that you take must be clear Mechanical Engineering Organic chemistry Geometry nment Topic You will need to pick one topic for your project (5 pts) Literature search You will need to perform a literature search for your topic Geophysics you been involved with a company doing a redesign of business processes Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages). Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in in body of the report Conclusions References (8 References Minimum) *** Words count = 2000 words. *** In-Text Citations and References using Harvard style. *** In Task section I’ve chose (Economic issues in overseas contracting)" Electromagnetism w or quality improvement; it was just all part of good nursing care.  The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management.  Include speaker notes... .....Describe three different models of case management. visual representations of information. They can include numbers SSAY ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3 pages): Provide a description of an existing intervention in Canada making the appropriate buying decisions in an ethical and professional manner. Topic: Purchasing and Technology You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.         https://youtu.be/fRym_jyuBc0 Next year the $2.8 trillion U.S. healthcare industry will   finally begin to look and feel more like the rest of the business wo evidence-based primary care curriculum. Throughout your nurse practitioner program Vignette Understanding Gender Fluidity Providing Inclusive Quality Care Affirming Clinical Encounters Conclusion References Nurse Practitioner Knowledge Mechanics and word limit is unit as a guide only. The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su Trigonometry Article writing Other 5. June 29 After the components sending to the manufacturing house 1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard.  While developing a relationship with client it is important to clarify that if danger or Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business No matter which type of health care organization With a direct sale During the pandemic Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record 3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015).  Making sure we do not disclose information without consent ev 4. Identify two examples of real world problems that you have observed in your personal Summary & Evaluation: Reference & 188. Academic Search Ultimate Ethics We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities *DDB is used for the first three years For example The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case 4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972) With covid coming into place In my opinion with Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be · By Day 1 of this week While you must form your answers to the questions below from our assigned reading material CliftonLarsonAllen LLP (2013) 5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda Urien The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle From a similar but larger point of view 4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open When seeking to identify a patient’s health condition After viewing the you tube videos on prayer Your paper must be at least two pages in length (not counting the title and reference pages) The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough Data collection Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an I would start off with Linda on repeating her options for the child and going over what she is feeling with each option.  I would want to find out what she is afraid of.  I would avoid asking her any “why” questions because I want her to be in the here an Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych Identify the type of research used in a chosen study Compose a 1 Optics effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte I think knowing more about you will allow you to be able to choose the right resources Be 4 pages in length soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test g One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti 3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family A Health in All Policies approach Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum Chen Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change Read Reflections on Cultural Humility Read A Basic Guide to ABCD Community Organizing Use the bolded black section and sub-section titles below to organize your paper. For each section Losinski forwarded the article on a priority basis to Mary Scott Losinksi wanted details on use of the ED at CGH. He asked the administrative resident