Database and Knowledge Management Domain Research Proposal

Database and Knowledge Management Domain Research Proposal Your proposal must focus on a topic within the database and knowledge management domain. Your proposal must be in APA format, contain at least ten scholarly peer-reviewed resources academic references, and be of the quality expected of doctoral-level work.

Database and Knowledge Management Domain Research Proposal
Database and Knowledge Management Domain Research Proposal

The proposal may be an extension of a previous submission in the course. This proposal should intrigue your audience and be research worthy. It could include a completely new topic derived from the readings and research. If in doubt, please share your idea with your professor and request feedback. Write a ten-page research proposal (not including the title page, table of contents, and reference list) that contains the elements listed below:
Title Page
Title: The title of your work should be concise and describe what your research will entail.
Student Name
Course Name and ID
University
Date
Table of Contents
Background
This section should provide enough information so that the reader understands the general context, settings, and basis for the proposed research. A non-expert may read the proposal, so ensure there is sufficient framing and discussion of the underlying concepts.

Database and Knowledge Management Domain Research Proposal Problem Statement

This section should focus on the presentation of a literature-supported open research question or problem that must be addressed. Additional areas should include detailed discussions of its scope, nature, what the problem is, how it developed or evolved into a problem, why it is a problem, and a brief discussion as to the other works that establish it as a problem within the literature.
Goal
This section provides a concise definition of the goal of the study, what it will accomplish, and how it will be measured. That is, how you will define success and failure of the study (if applicable)?
Relevance and Significance
This section provides additional support for the problem statement and goal by discussing why the problem exists, who is affected by it, and the impact of the problem. Additionally, discuss the study’s significance and how its outcomes will address the stated problem.

Database and Knowledge Management Domain Research Proposal Literature Review

This section will focus on clearly identifying the major areas that the research will focus on to establish a foundation of the study within the body of knowledge. The presentation of literature is an expansion of an annotated bibliography that justifies the problem, hypothesis, impact, and significance of the study.
Approach
A detailed explanation of how the study will be undertaken and how the goal will be achieved. This should take the form of a discussion of the methodology used, each step and milestone, with an explanation of each. Ensure that the approach is supported by the literature, as it cannot be based solely on opinion or experience.
References
Support your paper with scholarly and industry resources. In addition to these specified resources, other appropriate scholarly resources, including seminal articles, may be included. There should be a total of at least ten external scholarly references.
Length: 10 pages, not including title, table of contents, and reference pages
Resources: A minimum of 10 scholarly resources.

SW Development Methodologies Assignment

SW Development Methodologies Assignment Software development can be chaotic and complex in the absence of a structured process.

SW Development Methodologies Assignment
SW Development Methodologies Assignment

Overtime, several methodologies have been proposed to guide software development. At a high level, software development methodologies can be classified into three groups: structured methodologies, object-oriented methodologies, and agile methodologies.

SW Development Methodologies Assignment Background Questions

Within this background, answer following two questions:
1. What is Software Development Life Cycle (SDLC)? Draw a diagram to illustrate the generic SDLC. (Max 1 page)
2. Choose and discuss three methodologies, one from each section (max 3 pages)
a. Structured methodologies: Waterfall, Rapid Application Development (RAD)
Model, prototyping, spiral model.
b. Object-oriented methodologies: Rational Unified Process (RUP), Enterprise unified process (EUP), Object Process Methodology (OPM), Catalysis
c. Agile methodologies: Scrum, eXtreme Programming (XP), Adaptive software development (ASD), Crystal
Submission Instructions
1. Submit your assignment in a word documents (.doc) on blackboard using 12 point font with 1.5 line spacing.
2. Run your report through plagiarism checker software freely available online.
3. Cite the sources refer

Linux Operating System Literature Review

Linux Operating System Literature Review Literature review
Start with a research paper related to OS
Choose some aspect of it
Find related papers

Linux Operating System Literature Review
Linux Operating System Literature Review

Write a report that tells me about how they all connect make sure to cite papers properly (bibliography and inline citations)
Literature reviews will be graded on the quality of writing, technical quality, and quality of references
Resources you may find helpful: Google Scholar, OSDI 2018, SOSP, Past USENIX conferences
To help you write a literature review, read the following:
Harvey, “What Is a Literature Review?” (DOC) (PPT)
Taylor, “The Literature Review: A Few Tips on Conducting It”

Virtualization and the Cloud Computing World

Virtualization and the Cloud Computing World Describe at least three items that an organization’s IT / IS department should consider when an organization’s strategy calls for the use of SaaS, PaaS, or IaaS.

Virtualization and the Cloud Computing World
Virtualization and the Cloud Computing World

Evaluate the ways that SaaS, PaaS, and IaaS are used to reduce Total Cost of Ownership (TCO) and increase Return on Investment (ROI).
Examine the impact to the IT support personnel when an organization embarks on the strategy stated in Question 1.
Analyze three considerations that the organization’s management should be aware of.
Examine three security issues that could arise from this type of an infrastructure.

Legal Terms in the Context of Computer Security

Legal Terms in the Context of Computer Security A.1- Define the four following key legal terms in the context of computer security. (20 Points)

Legal Terms in the Context of Computer Security
Legal Terms in the Context of Computer Security

Each definition must be at least 100 words long or it will receive no credit.
1. Trade Secrets.
2. Patents.
3. Copyrights.
4. Intellectual Property.
5. Computer crime.
3. What is the distinction between patents and copyrights? (5 points)

Legal Terms in the Context of Computer Security Essay Paper Requirements

This answer must be at least 200 words long or it will receive no credit.
4. What are the growing latest types of threats for Information Systems? (4 Points) This answer must be at least 200 words long or it will receive no credit.
5. Identify three different computer crime and two computer crime laws (10 points)
6. Provide two reasons why is so hard to prosecute computer crime. (5 points)
7. In your own words, provide a definition for each of the CIA triad security properties: Confidentiality, Integrity, and Availability. In addition, list at least two or three types of major damage a company can suffer when each of CIA triad security properties is compromised. Answer the following three questions: (20 points)
–  What types of major damage can a company sustain when the confidentiality of company data or services is manipulated or compromised?
–  What types of major damage can a company sustain when the integrity of company data or services is manipulated or compromised?
–  What types of major damage can a company sustain when the availability of company data or services is manipulated or compromised?
8. Provide a list of four IEEE code of ethics? (5 points)
9. Provide a list and definition of three U.S. copyright laws (6 points)
10. Provide a list of three examples of University data handling policies? (4 Points)
11. What are the Information and Communications Technology Supply chain threat events? (10 Points) This answer must be at least 200 words long or it will receive no credit
12. What are the Information and Communication Technology Supply Chain Risk Management activities in Risk management process? (5 Points)
B.
1. Find the right sentence or word for the questions below. (6 points)
What’s meant by BYOD?
1. The increased focus of the hardware companies on the mass market.
2. The phenomenon that devices are becoming increasingly playful.
3. The use of personal devices and applications for work related purposes.
4. The increase of technology in people’s households.
Which of the following is not considered an Intellectual Property violation?
1. Giving Software licensed to your school or workplace to friends or family members.
2. Downloading pirated movies or music.
3. Making copies of music for your friends.
4. All of the above are considered Intellectual Property violations.
E.
Being _____________, or knowing how to use the computer as a device to gather, store, organize, and process information, can open up myriad sources of information.
1. Technology literate.
2. Digitally divided.
3. Computer literate.
4. Computer illiterate.
2. Define the four following key legal terms in the context of computer security. (20 Points) Each definition must be at least 100 words long or it will receive no credit.
1. Trade Secrets.
2. Patents.
3. Copyrights.
4. Intellectual Property.
5. Computer crime.
3. What is the distinction between patents and copyrights? (5 points)

Legal Terms in the Context of Computer Security Answers

This answer must be at least 200 words long or it will receive no credit.
4. What are the growing latest types of threats for Information Systems? (4 Points) This answer must be at least 200 words long or it will receive no credit.
5. Identify three different computer crime and two computer crime laws (10 points)
6. Provide two reasons why is so hard to prosecute computer crime. (5 points)
7. In your own words, provide a definition for each of the CIA triad security properties: Confidentiality, Integrity, and Availability. In addition, list at least two or three types of major damage a company can suffer when each of CIA triad security properties is compromised. Answer the following three questions: (20 points)
–  What types of major damage can a company sustain when the confidentiality of company data or services is manipulated or compromised?
–  What types of major damage can a company sustain when the integrity of company data or services is manipulated or compromised?
–  What types of major damage can a company sustain when the availability of company data or services is manipulated or compromised?
8. Provide a list of four IEEE codes of ethics? (5 points)
9. Provide a list and definition of three U.S. copyright laws (6 points)
10. Provide a list of three examples of University data handling policies? (4 Points)
11. What are the Information and Communications Technology Supply chain threat events? (10 Points) This answer must be at least 200 words long or it will receive no credit
12. What are the Information and Communication Technology Supply Chain Risk Management activities in Risk management process? (5 Points)

Google Technologies Research and Development

Google Technologies Research and Development In this essay, you will analyze five Google technologies that are current under research and development, including the self-driving automobile and four other technologies of your choice.

Google Technologies Research and Development
Google Technologies Research and Development

The last chapter of your textbook discusses the search and advertising technologies of Google. While Google is best known for their search and advertising technologies, they also have a multi-billion dollar research and development department that works on cutting edge technologies ranging from self-driving automobiles to renewable energy.

Google Technologies Research and Development Final Case Study

For your final case study, you will research 4 technologies (in addition to the self-driving automobile) that Google is currently developing, other than the search, advertising, and Gmail features that we are already familiar with. Please refer back to the Week 7 Forum for additional guidance on choosing your other four technologies.
Before you begin writing, download the attached file, FinalCaseStudy.docx, and very carefully read and follow all instructions contained in the file. Also, make sure you compose your essay in the provided template file, as it is already formatted with the correct margins, fonts, headings and sub-headings, etc.
Your essay will automatically be checked for plagiarism by TurnItIn. You do not have to upload your paper to TurnItIn – it will be automatically submitted to TurnItIn for you when you submit your essay through the Assignments section of the classroom. Green is good.
Name your file “LastFirstFinalCaseStudy.docx” where “Last” is your last name and “First” is your first name. For example, if your name is John Smith, you would name your file SmithJohnFinalCaseStudy.docx
If you have additional questions or need clarification on these instructions, please post your questions to the

Google Technologies Research and Development Discussion

Ask Your Questions thread in the Discussion Forum.
Analysis of Self-Driving Automobile (500-word description & analysis of impacts on society)
15
Analysis of Technology #2 (500-word description & analysis of impacts on society)
15
Analysis of Technology #3 (500-word description & analysis of impacts on society)
15
Analysis of Technology #4 (500-word description & analysis of impacts on society)
15
Analysis of Technology #5 (500-word description & analysis of impacts on society) 15
Conclusion 5
APA In-Text Citations and APA Reference List 10
Grammar and writing style 5
Total Points

Characteristics of the Users of the System

Characteristics of the Users of the System Use Times New Roman font (12 point), double-spaced to include the bibliography. Margins should be set to normal (1 inch on each side).

Characteristics of the Users of the System
Characteristics of the Users of the System

Leave page numbering set to automatically number each page of the body of your essay in the upper-right corner of the page. Notice that the header on the first page is different from all the rest. The body of your essay should be 3-4 pages long (minimum of 1500 words), not including your title page and reference page. Unlike the sample paper a bibliography is not required.
Write free flowing text (allow your writing to automatically wrap around to the next line as you type – do not hit Enter at the end of each line within a paragraph). Organize your essay into paragraphs within each section, but make sure all writing is in prose paragraphs (full sentences and complete paragraphs).
Do not use lists in your essay and do not write in bullet statements. Do not use lists in your essay and do not write in bullet statements. Indentations should be used at the start of each paragraph with hanging indentations used in the bibliography. Do not add additional blank lines between paragraphs and do not put blank lines before or after section headings and sub-headings; the entire paper to include section headers should be double spaced. You may include images or tables in your essay, if you deem them appropriate, but they do not count toward the 3-4 pages of body text that you are required to write, so adjust the length of your essay accordingly to compensate for space taken up by the images and/or tables.

Characteristics of the Users of the System APA Style Guide and Formatting

You must also properly label the tables as per the APA Style Guide.
Do not add additional blank lines between paragraphs and do not put blank lines before or after section headings and sub-headings; the entire paper to include section headers should be double spaced. You may include images or tables in your essay, if you deem them appropriate, but they do not count toward the 3-4 pages of body text that you are required to write, so adjust the length of your essay accordingly to compensate for space taken up by the images and/or tables. You must also properly label the tables as per the APA Style Guide.
Do not modify or remove the section sub-headings that appear below, throughout the rest of your essay (i.e., “Characteristics of the Users of the System,” “Features and Usage of the System,” “Impact of the System,” “Conclusion,” and “References”) and do not add additional sub-headings. Leave all the section sub-headings in your document to keep it organized. Everyone is required to write the same sections in their essay. You will analyze your own unique approved information system, filling in each section of this template appropriately.
Write in your own words and remember that your similarity rating must be green Try to paraphrase and explain information you learn from your sources in your own words, rather than quoting from your sources. Your reference page does not count towards your allowable similarity. To check this, after your TurnItIn report is generated, there should be a filter you can click on in the report that will bring up the option to “Exclude Bibliography.” After selecting this option, your adjusted similarity rating needs to be green. I will select “Exclude Bibliography” on all essays before grading them, to adjust the actual similarity rating in your essay and confirm it is green.
Your introductory paragraph(s) should provide an overview of your information system by briefly describing your information system and explaining the purpose of the information system. You can also provide an overview of the primary users of the system, and the primary features and functions of the system. However, try not to be overly redundant in your introduction with what you have written (or will write) in the main sections in the body of your essay. Rather, give the reader an overview and whet their appetite to learn more about your information system. The opening section should not use a section heading like Introduction rather it should simply have the title of your paper centered using normal font.

Characteristics of the Users of the System Server-Side Hardware Requirements

In this section, briefly describe the server-side hardware requirements of the information system. If you do not have access to specific information about the server-side hardware, you may make educated assumptions for this section and describe a typical server-side hardware configuration that you believe would be required to support your information system. What types of hardware servers do you think the system requires? File servers? Web servers? Is the system large enough that a server farm is required? What types of hardware back-up devices might be used at the server end of the system? Is there any other type of hardware that might be required at the server end to support the information system?
Server-Side Software Requirements
In this section, briefly describe the server-side software requirements of the information system. If you do not have access to specific information about the server-side software, you may make educated assumptions for this section and describe typical server-side software that you believe would be required to support your information system. Be sure to identify any operating system software, application software, cloud computing software and/or open source software that your information system is likely to be using at the server end of the system. Does the system require custom software running on the server to manage the system? What type of database software might be used at the server end to store the data input into the system? Is there any other type of software that might be required at the server end to support the information system?

Characteristics of the Users of the System Client-Side Hardware Requirements

In this section, briefly describe the client-side hardware requirements of the information system. What types of hardware devices can be used to access the information system? Be sure to consider desktop computers, laptop computers, tablets, smartphones, and other handheld computing devices. Are there any other special types of hardware that a user needs? If it is a military system, is a CAC reader required to access the system?
Client-Side Software Requirements
In this section, briefly describe the client-side software requirements of the information system. Be sure to identify any operating system software, application software, cloud computing software and/or open source software that your information system is likely to be using at the client end of the system. Is there special client-side software that needs to be installed on the user’s computer? If it is a web-based information system, is what type(s) of Web browsers can be used to access the system? Is any other special software required to use the system?
Competitive Analysis of the System
Note that this section of your essay is worth 20% of your grade on this essay. Together, the “Competitive Analysis of the System” and the “Recommendations for Improving the System” sections of your essay comprise half of your grade on this essay. So, make sure these two sections of your essay are thorough and well-developed. These two sections together should be the main focus of this essay.
In this section, you will analyze how the information system gives a competitive advantage either to the users of the system or to the company that created and maintains the system. Generally, if you are using a work-related information system, the company using the system is doing so in order to gain a competitive analysis over their rivals. However, if you are using a personal web-based information system, you may instead consider how the information system gives the company that created and maintains the system a competitive advantage. For example, Best Buy has a comprehensive web-based information system that customers can use for shopping online as well as for managing their Best Buy rewards account and/or Best Buy credit card account. If you were analyzing this information system, you would analyze competitive advantage from the viewpoint of Best Buy as a company. You would analyze the ways in which their web-based system gives them a competitive advantage over other electronics stores. With some web-based information systems, you may be able to analyze competitive advantage from the perspective of the company that created and maintains the system, as well as from the perspective of some of the users of the system. For example, the creator of Facebook has managed to maintain a competitive advantage over similar rivals such as MySpace and Google+ through the use of network effects, as well as through advertising revenues, etc. However, Facebook can also provide a competitive advantage to organizations and business who use Facebook to advertise their products and services and to communicate with their clients and customers.
Realize that all organizations (even non-profits, government, and military organizations) are concerned about gaining and/or maintaining a competitive advantage. For example, our military’s rivals could be considered foreign militaries. The importance of our military being competitive with their rivals should be self-evident. Although government exists to serve its constituents, government organizations often need to concern themselves with providing services that are competitive with industry. Otherwise, if government cannot run their business efficiently, politicians and taxpayers may lobby for the work of government to be outsourced to industry. Even non-profits must be concerned about running their organization efficiently and productively. Non-profits often rely on grants or on government funding. If they cannot prove that they are competitive, they could lose their funding. These are just some of the ways in which your organization may be concerned about gaining and maintaining a competitive advantage over their rivals. Describe in your own words why your organization needs to gain and maintain a competitive advantage and explain who their “rivals” are (i.e., who they are competing against).
Once you understand why your organization needs to maintain a competitive advantage, consider how this information system can help your organization gain and maintain a competitive advantage over their rivals. You may want to review Porter’s Five Forces theory and apply this theory to your information system to help determine ways that your system gives your organization (and/or the organization that created and maintains the system) a competitive advantage. In light of the many challenges inherent in the management of data and knowledge in today’s world, consider how the data assets gathered through the information system might be harnessed to provide business intelligence and a resulting competitive advantage to your organization. Consider whether your information system uses social media or Web 2.0 technologies to market or promote the use and benefit of the information system to businesses and/or potential customers. Also consider other concepts you have learned in this course, such as network effects, in relation to how your information system, can be used to gain and maintain a competitive advantage.
If the finding of your analysis is that your information system does not help your organization to gain and maintain a competitive advantage over their rivals, then instead use this section to explain why it does not. If it does not, then consider what shortcomings of your system would need to be addressed for the system to be able to provide a competitive advantage to users of the system. You can then address these shortcomings in the next section, by making specific recommendations to correct these issues.

Characteristics of the Users of the System and Recommendations for Improving the System

Note that this section of your essay is worth 30% of your grade on this essay. Together, the “Competitive Analysis of the System” and the “Recommendations for Improving the System” sections of your essay comprise half of your grade on this essay. So make sure these two sections of your essay are thorough and well-developed. These two sections together should be the main focus of this essay.
In this section, you need to make at least three concrete recommendations for improving or enhancing your information system. Even if you think your information system is the best system you’ve ever used, you cannot simply say, “There is nothing I would recommend changing about this system.” 30% of your grade on this essay is based on your full development of three concrete recommendations for improving your information system, with full details about how you would implement each of the three recommendations for change. If you do not come up with recommendations for improving your information system, then I cannot give you any credit for those 30 points. Fortunately, there are always things that can be improved in any information system. You need to think like an analyst or an entrepreneur and brainstorm for ideas that could make your information system even better. These recommendations need to be your own original ideas.
Think of this section as writing the design specification for new features that you would like the developers of your system to add to the next version of your system that they release. Each recommendation needs to be described thoroughly in its own fully developed paragraph. Your recommendations should not just identify a problem with the system, but should offer a specific, concrete solution to that problem, along with a plan for how you would implement that solution.
The types of recommendations I am looking for are improvements and enhancements to the computer-based information system itself. I am primarily looking for you to suggest new features and menu options that could be added to the system to make it better. What additional functions would you like your information system to be able to do? I am looking for your own original ideas. Other types of technical recommendations you could make include specific ways you would add additional back-up or redundancy capabilities, or specific hardware upgrades that might increase the speed of the system.
Just make sure that each recommendation you make is for a technical improvement to the system itself, and not a recommendation for improving the company’s business practices in relation to the use of the information system. Managerial and organization issues related to the company’s business practices that are not appropriate for this section would be recommendations pertaining to training, use of the system, or issues related to the cost of the system – I cannot give you credit for making recommendations pertaining to how people use the system or how much the system costs. Instead, focus primarily on ideas for enhancing the functionality of the information system by adding new features and menu options to the software itself.
Your recommendations need to involve actual changes to the software and/or hardware of the information system itself. Software changes would involve anything that adds new features, menu options, and functionality to the system, or that changes the user interface, layout, or navigation within the system. Hardware changes could involve addition of backup devices, upgrades to the processor or other components, etc. In any case, you need to justify each recommendation you make by explaining how it will solve an existing problem with the system or enhance the system with new functionality. Be as specific as possible about how you would implement each recommendation. For example, if you recommend that the layout of the system’s graphical user interface be made more user-friendly, then describe exactly what you would change about the layout to improve the usability.

Characteristics of the Users of the System Conclusion

Finally, write your concluding paragraph(s) in this section. Try to write a strong conclusion that both ties your essay together and makes a strong final impact on the reader. Rather than simply re-stating what you have already discussed, try to use this section to take the reader one step further. There are many ways to do this and I will leave it to your creativity to come up with an a

Mark Zuckerberg on Team Dynamics

Mark Zuckerberg on Team Dynamics Watch the video

Mark Zuckerberg on Team Dynamics
Mark Zuckerberg on Team Dynamics

Express whether you agree with Mark Zuckerberg’s opinion on managing team dynamics.
Explain whether you believe the team dynamics Mark Zuckerberg experienced are unique to only Millennials (Generation Y) or to teams working in the technology field. Over the past 10 years, as he was building the largest global social network, Zuck has had a lot of supporters, as well as critics. Whether you love him or you hate him, the fact remains that this college dropout has built something that only a few on the planet had the privilege to build.

Using Tools to Solve a Problem in Net Neutrality

Using Tools to Solve a Problem in Net Neutrality Research a business problem that has occurred either at your organization or in the news: (Net Neutrality)
Provide a short summary of the problem.

Using Tools to Solve a Problem in Net Neutrality
Using Tools to Solve a Problem in Net Neutrality

Identify possible solutions using at least one technique or tool:
If you choose a process, include the names of the steps as you describe the process.
If you choose a tool, include the diagram/map.
Describe the decision-making process you would follow.
Compare your results to the decisions made in the actual scenario.
Analyze which decision-making method and solution you think is most appropriate for the business problem.
Justify your response and analysis by using and citing relevant research.
Assignment Requirements:
Your paper should be 4-5 pages in length, not counting the required title and references pages.
Format your paper according to the APA
Cite a minimum of four scholarly sources (no older than five years and no blogs) to support your positions, claims, and observations, in addition to the textbook, three of which should be academic, peer-reviewed sources. (You may not use the required and recommended readings for this course.)

Computer Essential Discussion and Game Console

Computer Essential Discussion and Game Console Description
Smartphones, tablets, e-readers, and game consoles use operating systems like personal computers.

Computer Essential Discussion and Game Console
Computer Essential Discussion and Game Console

Which operating system is on your phone? What are some of the pros and cons of your smartphone operating system compared to your personal computer operating system (e.g., do you have trouble loading Web pages on your phone)? If you do not use a smartphone, choose another device that uses an operating system for comparison.
Also please reply separately to thanquia post listed below:
I have an iPhone which uses the operating system of iOS . iOS is a scaled down version of macOS and that uses direct manipulation and multi-gesture touch such as swipe, tap, and pinch to control it (Gaskin). Some pros of the iOS operating system is it’s uniform design. iOS is user friendly. iOS updates are fast and is known as the best in today’s market.

Computer Essential Discussion and Game Console Hardware and Software

The hardware and software is controlled by Apple. Apple also offers cloud support where you can back up your information not only from a phone, but tablet and computer as well. iOS can also be open on windows just by downloading a single app. You can also add multiple email accounts from outlook to iCloud Mail, Yahoo, and more. Safari which is the web browser used by Apple supports multiple web pages. I have not had trouble loading web pages on my phone. The con of the iOS system is that it does not support the use of SD cards. You also can not share apps. In order to save documents you have to download other apps is the only thing I dislike about iOS. I like my phone because it is user friendly. I am able to use my phone for business, personal, health and much more.
References
Gaskin, Shelley. GO! All in One, 3rd Edition. Pearson, 20160509. VitalBook file.