Fire Fighter

$2.00

given a limited budget (meaning – cost effective and cost efficient) what type(s) of technology should fire departments consider to help make the fire ground safer? Base your answer on your reading and outside internet research. Some examples include: integrated personal alarm locators into a self contained breathing apparatus (SCBA), incident mapping technology, and digital fire ground accountability programs.

Consider technology, innovation and implementation and how it impacts the fire service – think of the fiscal

Payment Council Industry Data Security Standards

$4.00

The security benefits associated with maintaining PCI compliance are vital to the long-term success of all merchants who process card payments. This includes continual identification of threats and vulnerabilities that could potentially impact the organization. Most organizations never fully recover from data breaches because the loss is greater than the data itself.” — Quick Service Restaurant (QSR) Magazine

Primary Task Response:

Following the Payment Council Industry Data Security Standards (PCI DSS) is just good business. Such standards help ensure healthy and trustworthy payment card transactions for the hundreds of millions of people worldwide that use their cards every day.

Please define and describe the PCI DSS

What are potential liabilities from not following PCI DSS?

personal comment

$2.00

read the 3 topics about (Cyber Ethics, Leveraging Social Media for Consumer Engagement, CLOUD SECURITY ) and write a short personal comment on each

New computer system in an organization

$11.00

You are a project manager assigned to implementing a new computer system in an organization:

Why is it important to understand usability, configurability, and interoperability? Should these concepts outweigh the underlining cost of the new system? Which system do you recommend and why?
During phase one, you are selecting a team. What characteristics are important to consider when selecting a team?
During phase two the following principle was discussed, “lead with culture, determining where the resistance is,” and then, engage all levels of employees (Sipes, 2019, p. 161). What does this principle mean to you and how can you implement this principle?
How will you handle physician and other key professionals’ resistance to change and using the new system?
Discuss possible pitfalls during the implementation phase and how you can avoid them?
Describe your personal experience with automation and new information systems.

Be sure to include a title slide, objective slide, content slides, reference slide in APA format.

Student’s college success

$2.00

What challenges might present themselves when taking an online test? List four challenges and four strategies for working through them.

Critical Thinking Guidelines (in addition to the ones listed below):

1. Please divide into 4 paragraphs – one for each challenge and the solution for that challenge.

2. Remember to cite from where you obtain your information. It is unlikely you can develop 4 challenges, and suggestions to overcome, without outside help. This needs to be cited in the text AND at the end

Cloud-based software

$4.00

This is very true when you look outside the US. I want you all to pick another search engine that is popular outside the US and document your experience using it. You can use this article (Links to an external site.)as a starting point for finding other search engines.

Cloud Failover

$2.00

In 500 words or more, compare DNS failover and cloud failover.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list

Concepts in C# first level programming

$4.00

Write to a relative explaining Application development , types of variables and variable scope and lifetime, handling inputs and other concepts you learned in c#

2 page doubled space

One way of evaluating one’s knowledge is to be able to explain that to someone. Let’s assume you have a favorite relative who is not very computer savvy or well versed with programming and who is very interested in what you are doing in this course. In this reflection, you need to write a letter to your relative explaining 3 key concepts that you have learned in this course. You will need to write it in plain English. Do NOT copy from your book or include code samples in your letter.

Your letter should be about one to two pages long. If need be, you can include pictures to illustrate your points.

Some of the key concepts we have covered are:

functional and non-functional

$6.00

Prepare a software requirements specifications document for the desired system in which is clearly state the problem you are working on. The document should also functional and non-functional requirements, which should be derived from the problem statement. Also include models illustrating how behavioral and functional aspects of the desired system will work. You should provide detailed descriptions of your models so that a reader is able to understand your design decisions.

The report should have a cover page, table of contents, introduction/purpose, system requirements, conclusion.

The project reports must be at least 1000 words to fulfill the university’s writing intensive requirement and this excludes the cover page and table of contents.

Fast-food chain

$12.00

Scenario

A large fast-food chain unveiled a new touch screen register for its franchises. Each cashier was assigned a user ID and password combination to log in to the register. The system allowed the incorrect password to be entered four times before the register would lock and require a manager to unlock it with a key card. To prevent unauthorized access, the registers would lock after three minutes if the screen was not touched. When the register locked, only the cashier who was logged in prior to it locking could unlock it without a system restart.

After a few days in operation, restaurant managers started complaining about the amount of time they were spending unlocking the registers. Some cashiers were forgetting their user ID and password, so other cashiers would log in for them. It also seemed that the button layout made it easy for the cashiers to key in the incorrect password. The managers also complained that cashiers would leave for a break or end their shift and forget to log out of the locked register. The managers would have to reboot the system, a three- to five-minute process in order for the next cashier to log in. Additionally, managers noticed that grease was building up on the touch screens, making them less responsive.

Instructions

Scroll to Top