Archive for the ‘Computer Science’ Category

role of ict disaster and emergency management and response

a definition of the topico at least four impacts (positive or negative) of the ICT being investigated withinthe scope you identifiedPage 2 of 3o a factor that could have negatively impacted / influenced the extent of (using)the ICTs within the environment/scope you identified a recommendation for the factor identified above in to order to remedy […]

Usability evaluation of E-learning website in Saudi Arabia

references:1- https://airccj.org/CSCP/vol7/csit77001.pdf 2- file:///C:/Users/SONY/AppData/Local/Temp/Usability_Evaluation_of_an_Educational_Website_in_.pdf 3- K.  Orfanou,  N.  Tselios,  and  C.  Katsanos,  “Perceived  usability  evaluation  of  learning  management systems: Empirical evaluation of the System Usability  Scale,” The International  Review  of Research in Open and Distributed Learning, vol. 16, 2015. 4- M.  Alshammari,  R.  Anane,  and  R.  J.  Hendley,  “Design  and  Usability  Evaluation  of  Adaptive  e-learning […]

Discussion

What routing and switching protocols would you choose for your small office/home office (SOHO) network?What if you had to work in a small company? Explain your thought processes.What transmission medium would you use in a larger company that had multiple campuses?

Management Information Systems – Post Response

Instruction: Evaluate this Post and express your agreement or disagreement or improve, clarify or express a clearer idea about outsourcing or multi-sourcing. POST:In my understanding, outsourcing is limited to hiring someone who’s providing a service or providing a product, somewhat only produced for you. By this definition, buying off the shelf software, like an operating […]

Management Information Systems – Post Response

Instruction: Answer the following question: Coordination as being important when a company has many vendors and consider the three vendors Alpha, Beta and Gamma in the Adidas case: How might Adidas manage competition and collaboration among the three vendors at the same time?

NIST Cybersecurity Framework is used by many thousands of businesses to organize and evaluate their cybersecurity preparedness.

Paper should include a discussion of the following: Brief history of NIST and the NIST CSFPurpose of the NIST CSFPossible applications of the NIST CSFA plan to conduct a risk assessment of a company using the NIST CSFConclusion

Get Ready Application

The writer should have a health informatics technology experience.you should follow the Rubrics for both the report and the presentation. The aim is not to focus on so much content but the application itself (Get Ready) from IT point of view. attached are the rubrics, the user survey satisfaction for patients and physicians, the improved […]

Securing the Cloud: Data Security

Week 6 Readings and Media Please review the following for this week:     Vic (J.R.) Winkler, Securing the Cloud, Cloud Computer Security Techniques and Tactics, 2011, Chapter 6.    NIST Special Publication 800-53 Revision 3, Recommended Security Controls for Federal Information Systems and Organizations; 2009.    NIST Federal Information Processing Standards Publication 199 (Links to an external […]

How to regulate Artificial Intelligence?

Your work should contain two aspects. Firstly, find at least one legal case concerning AI that impose liability on owner / provider / user of the AI. Discuss it at length focusing on facts of the case and the legal outcome, including a source of liability. Secondly, Use the EU resources as well as any […]

1) Discuss the requirements of FERPA, CIPA, and COPPA in granting rights to an individual under the First Amendment. Explain why you think these laws should outweigh the special rights related to free speech, keeping the good of society in mind. 2) Als

1) Discuss the requirements of FERPA, CIPA, and COPPA in granting rights to an individual under the First Amendment. Explain why you think these laws should outweigh the special rights related to free speech, keeping the good of society in mind. 2) Also, you are pretending to be the systems administrator for a for-profit educational […]

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes