Computer Science
Project Management Software
Search the web for four different project management software packages. What are the relative strengths and weaknesses of each packaged software? What advice would you give to someone intending to buy project management soft ware for his or her PC? Why? 2. A project has been defined to contain the following list of activities along with their required times for completion. Activity No. Activity Time (Weeks) Immediate Predecessors 1 Collect Requirements 2 — 2 Analyze processes 3 1 3 Analyze data 3 2 4 Design processes 7 2 5 Design Data 6 2 6 Design screens 1 3,4 7 Design Reports 5 4,5 8 Program 4 6,7 9 Test and document 8 7 10 Install 2 8,9 a. Show the Gantt Chart for the activities. b. Calculate the earliest expected completion time of the project (in weeks). c. What would happen if activity 6 were revised to take six weeks instead of one week (be specific)? You must use MS Project to show the Gantt Chart.
Transaction Processing
Create a PowerPoint presentation which outlines the activities in each phase of Transaction Processing. Discuss the pros and cons of a Transaction processing system.
Commercial Facilities Sector
Answer each of the following questions below. Select three sectors from the following list to use when answering the questions below (use the same three sectors for each question):Transportation Systems SectorEmergency Services SectorCommercial Facilities SectorGovernment Facilities SectorFinancial Services SectorDefense Industrial Base SectorFood and Agriculture SectorHealthcare and Public Health Sector1. Discuss the interdependencies of three of the critical infrastructure sectors listed above.2. How are critical infrastructure assets prioritized in the three sectors you selected?3. What measures do the three sectors you selected take to ensure continuity of operations?4. What special considerations should be made for life and property that result as a consequence to an attack on the three critical infrastructure sectors you selected?Technical RequirementsYour paper must be at a minimum of 8-12 pages, or 2-3 pages per question. No more than 12 pages for the body of your work (the Title and Reference pages do not count towards the minimum limit).Scholarly and credible references should be used. A good rule of thumb is at least 2 scholarly sources per page of content.Type in Times New Roman, 12 point and double space.Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework.Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.
Technical Writing
1. Address the bullets below.Answer question #1 at the end of Chapter 1 in Team Writing (p. 11).Complete the Team Preparation Worksheet in Chapter 3 of Team Writing (p. 30).Find 2-3 collaboration tools applications and another 2-3 web meeting applications.2. In your initial discussion board posting, use your answer to question #1 and the completed team prep worksheet to draft the following sections for the Team Charter (do this individually for now. You will synthesize your work later.)Broad Team GoalsMeasurable Team GoalsOther Concerns3. Find two applications you can collaborate with. such as Zoom and Google Hangouts.4. Then, list and link to each application you found for collaborating with your teammates. Briefly discuss at least one thing you like about each and at least one thing that worries you about using each.Please find samples provided and base your work on it, this should be very simple with the sample provided.
Operational Systems
Do you agree that a typical retail store collects huge volumes of data through its operational systems? Name three types of transaction data likely to be collected by a retail store in large volumes during its daily operations. Be sure to support your response with APA formatted research.
Influenza Infection
Write a memo to your instructor analyzing both websites and their audiences (primary & secondary) and explain the persuasive strategies each website uses to serve its primary audience’s needs.Use these two websites:https://www.nejm.org/doi/full/10.1056/NEJMoa1700153https://www.mayoclinic.org/diseases-conditions/flu/symptoms-causes/syc-20351719ANSWER THESE QUESTIONS:1. What primary audiences do the two websites seem to aim for? What kind of knowledge do the audiences seem to possess about the subject matter? What are their age(s), genders, education level, occupations, and cultural background?2. Who are the secondary audiences of these websites? Who else might use information found on these sites?3. What persuasive strategies do the websites employ to appeal to their primary audiences? Do they use claims? Do they make an effort to connect with the audience? (See pages 48-51 of your textbook for more on persuasion)4. To what extent do the websites use technical language? Do you see any examples of jargon? Give examples5. How long is the average sentence in each website? How long is the average paragraph? Does this tell you anything about the audience?6.How formal/informal are their respective style? Why?7. Is there advertising? If so, what do the ads tell you about the audience?8. Do the website use tables, graphs, figures, illustrations or images? How different are they on the two websites?
Proper Formatting
Mr. Johnson, a recent hire for the Abacas Accounting firm, was tasked with updating an existing Excel spreadsheet by adding the bonuses to the employees who had sales of $500 and more for the first quarter. Proper formatting was required on each Excel spreadsheet (e.g., date, font, color, column height, and column width).Discuss the various formulas, functions, and formatting Mr. Johnson could use to accomplish his task.
Cyber Attack
What are your ideas on how to provide time to intervene and prevent an insider cyber attack?Find information about an insider attack, explain the attack, and did you agree or disagree with the actions? Were they justified?
Social Network Fraud
Summery of social network fraud and the effect on cybersecurity.
Use Promo Code: FIRST15