Category Archives: Research Papers

Research Plan Assignment

In this assignment, you will make note of the company that you are interested in writing your Academic Report about and then will identify several specific types of information that you could use in the Report as evidence.

There are different types of information available to you and your job is to identify each of the following that you could pursue:

 A book

 An academic journal article

 A magazine article

 A website article (something that only appears online, such as a news website, tech blog, etc.)

 A social media account (for example, the Instagram account company that you are writing about)

 A specific person that you could interview (someone who works there, an author who has written about the company, etc. – you do not need to know this person but it cannot be vague; it must be a real and specific person)

 An audio/video resource (a podcast, news video, etc.)

 Information from the company itself (press release, quarterly report, content on its website, etc.)

To clarify, you are not required to use all of these diverse types of information for your Academic Report. However, I need to see your ability to locate a variety of different sources of information that you could potential use.

To complete this assignment, include the following:

 Specific information about each of the eight listed types of information above. Include a full description of the source and a brief description of the type of information and how it could be useful to you. You do not need to format each one in APA/MLA but you must include enough information for me to know what it is (title of the book, title of the article, name of the academic journal, name of the podcast, etc.)

SAMPLE ASSIGNMENT

CHEM 2242 organic chemistry

CHEM 2242

1. Provide the IUPAC name for the following molecules.

How many possible stereoisomers could the following molecule have?

1. Label the Acid, Base, Conjugate Acid and Conjugate Base in the Acid/Base reaction
2. Determine the pKeq and draw the appropriate arrows between the reactants and products.
3. Draw the arrow pushing mechanism for each reaction.

4. Rank the following molecules based on acidity. #1 is most acidic and #3 is least acidic.
Explain your reasoning.

5. Rank the following molecules in order of increasing acidity.
Which of the following has the weakest conjugate base and explain why?

6. Rank the following molecules in order of increasing acidity
Which molecule has the least stable conjugate base explain why.

7. Rank the following molecules in order of increasing acidity?
Which one has the most stable conjugate base and why?

8. Rank the following molecules in order of increasing acidity. Which conjugate base is the
strongest? Explain why.

DETAILED ASSIGNMENT

20201013204852homework_3_chapters_4_5_and_6

Threats mitigation

Threats to applications or software require mitigation. Mitigation can be accomplished in four ways: redesign to eliminate vulnerability, apply a standard mitigation, invent a new mitigation, or accept the vulnerability.

  • Compare and contrast each of the four mitigation options, highlighting the advantages and disadvantages of each. Additionally, indicate where in the SDLC process mitigation techniques should be applied for maximum effectiveness.

SAMPLE ASSIGNMENT

Journal writing

  1. Research Community Needs Assessment Resources in M7 Readings and select one or two that you think would be most helpful to help guide your group project work. Explain your reasons. NOTE: You are not limited to those listed in the Resources section so feel free to do your own research!

RESOURCES FROM THE M7 READING:

https://ctb.ku.edu/en/table-of-contents/assessment…

http://ncwatershednetwork.org/wp-content/uploads/2…

http://maryland-cap.org/resources/MCAP-CNA-Toolkit…

https://ananlcc.org/wp-content/uploads/2019/01/1_C…

2. After reviewing what a Community Needs Assessment consists of, what areas do you need more instruction or guidance on? (e.g. interviews, survey development, etc.)

SAMPLE ASSIGNMENT

Incident Report

1. Read about Incident Reports, their purpose, intended audience, the ethical considerations as well as the tone of the language and the memo format required. See textbook p. 324 -328 for all of this information.

2.Incident Report prompt: Make up an incident (note incident reports are also sometimes called Trouble Reports or Accident Reports) that has occurred either at a health care facility where you work or at a financial services company where you work. Choose the one that would be most applicable or relevant to your intended future career so that this feels like a useful exercise. Even though this is a fabricated incident, it should sound quite possible and realistic and you should invent the names and roles of the various people involved.

As a supervisor, it is your responsibility to write up the report documenting exactly what happened, when, to whom, what was done at the time and what recommendations you are making to avoid this type of problem in the future. Look at the link to the wikipedia page on Incident Reports for ideas. https://en.wikipedia.org/wiki/Incident_report

SAMPLE ASSIGNMENT

Unit 3 business class

Describe a situation either positively or negatively that you experienced shopping with a company. For “Feel the Customer’s Pain: Empathize”, which of the steps did the company do in the situation and for “Do All You Can to Resolve the Problem” what was the offered solution. Find the company’s policy on complaints and report if your situation follows their customer complaint policy. Were you satisfied with the resolution of the situation?

SAMPLE ASSIGNMENT

CMN 588 Analyzing Institutional Interaction – TRANSCRIPTION EXERCISE

CMN 588 Analyzing Institutional Interaction

TRANSCRIPTION EXERCISE

Your job is to hear what the participants actually say as accurately as you can, and then transcribe that as precisely as you can. This means that you are transcribing what you hear them say, and not what you expect them to say or what you think they should have said.

CMN 588 Analyzing Institutional Interaction

Your work will be evaluated by assessing the degree to which your transcript displays: – an adequate grasp of the level of detail it is appropriate to capture,

– a substantial grasp of what the symbols are used to represent, and
– your own, individual best effort to hear and represent this stretch of talk (do not use anyone else’s transcript to inform your own).

DETAILED ASSIGNMENT

20201013204717transcribing_instructionsf20

MGT101 Principles of Management

MGT101 Principles of Management

  1. What is the underlying problem in this case from Edward Lampert’s perspective? (2marks)

  2. What are the key causes of Sears’ decline? (1.5 marks)

  3. To what extent did sears use a total Quality Management perspective in running the business? (1.5 marks)

DETAILED ASSIGNMENT

20201013204311mgt101_41_42_1st_assignment_1

CSci 430: Introduction to Operating Systems – Resource Allocation Denial Simulation (Bankers Algorithm)

CSci 430: Introduction to Operating Systems

Resource Allocation Denial Simulation (Bankers Algorithm)

• How do deadlock avoidance schemes work in practice to keep deadlocks from occurring in a computing system?
• How can we programatically implement an algorithm to test whether a resource request would be safe to grant
or not?
• What information is needed about processes needs and requests in order to define their state and determine if
new resource requests are safe to grant or not?

CSci 430: Introduction to Operating Systems

Resource Allocation Denial Simulation (Bankers Algorithm)

1. You should start by implementing the needsAreMet() member function. This member function takes a process id/index as its first parameter, and an array of integers represent the current number of resources available of each resource type. This function returns a boolean result of true if the process needs are met by the currentAvailable resources, and false if they are not. Basically, in the State object there is a matrix called need, which holds the (C – A) information. Each row of this matrix is the information for a particular process. For the needsAreMet() function, you need to check each of the resource needs for the indicated process, and see if the are all <= to the indicated currentAvailable resource. If all of the needs are less than or equal to the currently available, then the process can have its needs met, and the function should return true. But if any need is greater than a current available resource, then the answer should be false from this function.
2. The next test case tests the findCandidateProcess() member function. This function should use the previous needsAreMet() function to perform its work. This function takes an array of boolean flags as its first parameter,
and an array of currentAvailable resources, the same as used by needsAreMet(). The boolean array are a set of flags that indicate whether a particular process has completed its work yet or not. When determining if a state is safe, we start by assuming all processes are still running, so all process start off with completed as false. When a process can run, we mark its completed as true. For the findCandidateProcess() function, you need to search through all of the processes in the system. The first process you find that is not yet completed, but whose needs can be met by the currentAvailable resources should be returned as the candidate process. As mentioned, you should use the needsAreMet() function to determine whether or not a particular process can have its needs met and is thus a candidate to be run to completion.
3. The next test case tests the releaseAllocatedResources() member function. This funciton will be called after a process is selected to run to completion, to return its currently allocated resources back to the currentAvailable resources. This funciton takes a process id/index as its first parameter, and the same currentAvailable array as its second parameter. The allocation array of the State class contains the current allocations of resources for each process. In this funciton you basically need to add the allocations of the indicated process to the currentAvailable vector of resources, which simulates the resources being released and returned back to the system to be used by other processes. This function is a void function, so it doesn’t return anything explicitly, but of course it does change the currentAvailable vector to update it with the released resources.
4. The final test case is for the main isSafe() member method. This method will implement the actual Banker’s algorithm to determine if the State is a safe or unsafe. This function doesn’t take any input, it uses the current state defined by the matrices and vectors of the State object to perform its task. The function does return a boolean value of true if the state is safe, or false if the state is unsafe.

DETAILED ASSIGNMENT

20201013200026assg03

Ethics in Information Technology

Answer the following questions from Case Study #2, China’s Great Firewall in Chapter 5 of Ethics in Information Technology Book:

  1. Describe an internet-sovereignty model that may be acceptable to countries controlling internet flow yet allow freedom of expression.

  2. What ethical and economic factors should a technology company consider regarding entering in the Chinese market?

  3. (Controlling access to information on the internet) and (Fake news) are two barriers to freedom of expression that are acceptable and implementable, talk about them.

SAMPLE ASSIGNMENT
Powered by WordPress