mobile -6

Question 1:

Read the given paper on Doodle Health: Games as Cultural Probes and answer the following questions

Why it is needed to provide better health information communicating tool for medical

discharge information or instructions for at-home care?

How Cultural Probes would be effective to provide solution for this case.?  

What is Doodle Health?

Question 2: Consider the online learning environment in  elementary school  (ages 6–11).

Due to Covid 19, so many students  from different cultural backgrounds are engaging with remote learning. 

How Cultural Probes would be effective to provide better learning environment for this student age group ?

What would you do if you were tasked to develop a Mobile app to improve remote learning for this age group?

Cultural_Probes.pdf 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Reflect on the technology-minded “ten commandments” and the key elements of computer ethics you learned about in your module reading.

Reflect on the technology-minded “ten commandments” and the key elements of computer ethics you learned about in your module reading. Considering what you have learned in your own personal experiences and complete the following discussion activity. Research an Internet source that addresses computer ethics in the workplace. Summarize the main points of the source. Choose just two to three of the main ideas here. Identify what aspect of computer ethics the source relates to and comment on why this topic is of significance. Share any experiences you may have had with these or related topics. Be sure to display relevant visuals that help you reinforce the content of your presentation. Provide the link to your Internet source in your post. 1 Page. No Formatting needed.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

For this case study response, you need to analyze and study the subject presented below and compose an essay response

For this case study response, you need to analyze and study the subject presented below and compose an essay response answering the Case Study Questions below. Your writing should concentrate on the development of specific events, issues, or conditions of the subject and their relationships. The topic addresses how products are manufactured as well as the disposal of our technology devices and gadgets. How companies address these issues may impact your purchasing decisions. Case Study Questions. – Define the e-waste problem. – What is happening and why is this an issue? – What can manufacturers do to improve the situation (raw materials, by-products, hazardous materials, health, recycling, refuse, etc.)? Formatting and content: Save this APA Example Template (DOCX) Download APA Example Template (DOCX)to your computer and use it for your essay. The length of the response should be 4-5 paragraphs (about 400 words or up to 1.5 pages maximum). Do not write more than 1.5 pages of text. Use 1″ margins. Use Times New Roman, 12 pt. font. Double line space. Indent the first line of each new paragraph by .5″. One space follows the closing punctuation of each sentence. Cite a minimum of two references in the body of the essay using the APA Style: When we refer to ideas or use quotes from the sources, it is necessary to cite the source. Basically, this involves providing the author’s last name and date at the end of the sentence. See APA formatting (ERAU).Links to an external site. Not sure if you need to cite a source? Refer to the Plagiarism Infographic in Module 3. Longer quotes need to be avoided in this short 1.5-page paper. Use your words to make your points. Strongly recommended: Before turning in your essay, double-check your paper for originality and citation infringement. Your file submission will be screened for originality and plagiarism. Listing references: When you cite a reference, it must be listed on your references page, which is a new page added after the last page of the essay. Also, all listed references need to have at least one in-text citation in the body of the paper. Follow current APA formatting (ERAU).Links to an external site. Citation Machine -Links to an external site. is an online resource generator.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Search the Web or NSU’s database for a recent article related to supply chain security. Step 2: After reading

Search the Web or NSU’s database for a recent article related to supply chain security.

Step 2: After reading the article, provide a 300 to 500-word post describing some of the issues you identified (e.g., outsourcing of hardware and/or software development and/or integration). Explain what implications these issues have on project management and the project manager. At the end of your post, provide the full reference for the source in APA format. Label this post as Part 1.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Analytics Model for Preventing the Spread of COVID-19 During Hajj using the Proposed Smart Hajj Application

The comments as following:
1. The essence of the manuscriipt should be more meaningful. Abstract is a summary of the research work. What, how
and why are the main parameters of abstract. What has been discovered as a researcher? How was research
discovered? Why has this research been discovered? The abstract should be of minimum 250 words and maximum of
450 words.
2. A proposed algorithm/methodology is a procedure or set of rules to be followed in computation or other problemsolving
tasks. It should be written in proper way with comments which help in understanding. Overall, it may be
covered step-by-step in this manuscriipt.
3. A literature review/related work is a text of a scholarly article, which includes current knowledge including anecdotal
findings, as well as theoretical and methodological contributions to a particular topic. A section where researchers
write in detail about remotely similar ideas and briefly mention or recall the closest ones. This section also provides a
platform to take a shot at your research opponent. Literature reviews/literature surveys/related work use secondary
sources, and do not report new or original experimental work. This paper may include literature surveys/traditional
works/related works. Overall, literature reviews/current work may be included in this manuscriipt.
4. There is a lack of citations for references.
5. The block diagram of the invention may be included/improved for this manuscriipt. No research work can be started
without a block diagram. It is a diagram showing the general arrangement of parts or components of a complex
system or process in a schematic form, such as an industrial device or an electronic circuit. There should be a
proposed block diagram that connects and defines all the modules of the research work.
6. You didn’t include the Result part in your paper. Please include the Result part in your paper.
7. Some of the content in the Introduction of the manuscriipt has been plagiarized. Therefore, replace/remove
plagiarized contents from the Introduction of the manuscriipt. For more details, please read carefully the plagiarism
report which is attached in this email.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Histogram programming assignment due in 10 hours please help me

Instructions: The big limitation of the histogram we implemented last week is that it could only maintain one histogram at a time, due to the reliance on static variables. In this exercise, we will use object-oriented principles to create a class that can be instantiated multiple times, to maintain and draw multiple histograms. You can see this in action in the main method of the Runner class, which reads through a file containing (fictitious) student grades, and plots separate histograms for each subject as well as a histogram that combines all subjects. It would be impossible to manage these multiple histograms simultaneously with the static version of the Histogram from last week. You have three tasks for this exercise: Task 1: Decide what should or should not be declared as static. For every field and method in this class, replace the static_or_not placeholder with either static (if you think it should be static) or nothing (if not). When making your decisions, try to think about what values and methods should be shared across all instances of a Histogram vs. which should be seperate for each Histogram. Try to make the methods and fields static as much as possible, unless there is a clear reason to make them not static. Hint: there is at least one field and a couple of methods that should be declared as static. Marking will fail unless you choose the correct fields and methods to be static. Task 2: Decide what should be declared as public or private. For every field and method in this class, replace the public_or_private placeholder with either public or private. When making your decisions about each field or method, try to think about whether code that is external to the Histogram class would need to know about that field or method, or whether that field or method could be treated as an internal detail that only the Histogram class needs to know about. Try to make the methods and fields private as much as possible, unless there is a clear reason to make them public. For example, take a look at the Runner class. This class needs to be able to create histograms, add values to it, and print the histogram. So these are things that need to be public. What other parts of Histogram do external classes like Runner need access to? What parts are instead internal details that they don’t really need to know/care about? Hint: there are multiple fields and methods that should be declared as private. Again, marking will fail unless you choose the correct fields and methods to be private. Task 3: Fill in the gaps There are some methods that are incomplete. These are the same gaps that were present in the exercise from last week, so if you completed that one this task should be trivial.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

This is the third in a series of five sequential assignments (the course project) in which you continue to act as the Chief Technology Officer (CTO) of a hypothetical e-commerce start-up company of your design. (SEE ATTACHED PAPERS)

You have been working on delivering an information technology project plan in anticipation of the company relocating to a new facility. In the first course project deliverable, you created a project plan inception document and supporting Gantt chart. In the second course project deliverable, you developed the business requirements to be incorporated into the information systems design you are creating. You also updated your original supporting Gantt chart based on major and minor tasks identified in the business requirements document. In this third course project deliverable, you will create an infrastructure design that considers the key elements of software, hardware, security, and business process flow for your e-commerce startup company. You will also use graphical tools to create a supporting data flow diagram (DFD) for your infrastructure design. The infrastructure design provides an opportunity to visualize the key elements and how they are connected for maximum effectiveness. You will create an 8–10-page infrastructure design document to include key technical elements for your hypothetical e-commerce company’s information systems infrastructure USING THE ATTACHED PAPERS AS A GUIDE AND SWS FOR FORMATTING AND CITATION STANDARDS.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

and Protection of Personal Information The protection of personal and confidential information is tremendously important to U.S. citizens and organizations. The security of a private citizen’s information and personal effects is specifically addressed in the Constitution and in the Bill of Rights. In modern times, the Internet has provided a venue where information about individual users is gathered, stored, analyzed, and reported. This information is sometimes used by organizations to make better tactical and strategic business decisions. Considering the large amounts of data collected by the government and private industries, there are huge gaps in existing protection laws.

Review the article: https://www.ecommercetimes.com/story/is-privacy-possible-in-2020-86432.html Write a 3–5 page paper based on the information from the above link with supporting research activities. You may also use the information in the text (without plagiarizing), or other resources. Complete the following: Identify and briefly describe 2–3 laws enacted to protect citizens’ privacy and intellectual property rights. Identify the organizations responsible for enforcement or monitoring compliance with those laws. Discuss 2–3 systems that gather data that citizens fear is being misused. The European Union (EU) designed the General Data Protection Regulation (GDPR) to strengthen the protection of citizens’ data. Discuss the pros and cons of its use in comparison to the protections present in U.S. law or regulations. Provide suggestions or recommendations of mitigations that citizens can use to protect themselves from possible loss or misuse of personal or intellectual information. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. This course requires the use of Strayer Writing Standards. SEE ATTACHED SWS STANDARDS FOR CITATION AND FORMATTING INFORMATION.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

this link below https://www.kaggle.com/tadhgfitzgerald/fifa-international-soccer-mens-ranking-1993now is the data set If you can build an association rule in a rapid minor for this data set would be great Just create an association rule…. for this data presented PLEASE Please write in a few sentences what problem you can define or see… Write a summary of your finding of the problem

In this project, each team will use a publicly available dataset, define a data mining problem, and then use at least three different mining algorithms to mine the dataset, compare and contrast the performance of your chosen models, and interpret your findings. Teams will write a report summarizing their findings. The report is due on May 12th. To look for a dataset, you can go to Kaggle.com or UC Irvine machine learning data repository. There are plenty of data for you to choose from. Make sure you read files that describe the data before you engage in mining. You can use Rapid Miner, Python, Excel, or any tool of your choice – as we discussed in class, the key skill of a data analyst is NOT the tool that he/she uses, but how he/she applies the right model for the problem at hand, and how he/she interprets the results to make a difference. I would STRONGLY recommend that you choose a supervised learning problem, as it is a lot easier to measure the performance of your outcomes. In case you choose a supervised problem, the resulted confusion matrix and performance parameters need to be shown in your report and discussed. Specifically, what are the precision and recall rates? Which one serves as a more important measurement metric to this problem and why? Which algorithm performs best? What parameters were tuned, and how does that make a difference? In your discussion, focus on your findings and their significance, both mathematically and practically. As a team project, I would strongly recommend that you choose ONE dataset to work with. However, each team member should INDIVIDUALLY work on one algorithm and report his/her results. Here is a suggested structure of your final report:

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Hide Assignment Information Instructions This week, you will complete your proof of concept and submit the report. This is

Hide Assignment Information
Instructions
This week, you will complete your proof of concept and submit the report. This is the final report to management before the actual cloud deployment process begins.

Use the Proof-of-Concept Report Template to prepare a report that shows the steps and results for the proof of concept. In the template, you will see specific instructions. Delete the instruction text before you submit the project.

Your report should:

Be between five to seven pages (plus an appendix for screenshots, cover page, and table of contents)
Address the topics listed in the Proof-of-Concept Report Template
Include the following screenshots from the “Build a Virtual Private Cloud and Launch a Web Server” activity:
Start Lab page
AWS Management Console Name with your name visible from user drop-down
Task 1: Create Your VPC
Task 2: Create Additional Subnets
Task 3: Create a VPC Security Group
Task 4: Launch a Web Server Instance
How Will My Work Be Evaluated?

As a cloud professional tasked with developing a proof of concept for the companies cloud adoption, you will prepare a proof of concept report to be submitted to the company owner. By developing a well-structured report of your results and recommendations to management, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express recommendations to decision makers with the right mix of technical detail in an accepted format is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

1.1.3: Present ideas in a clear, logical order appropriate to the task.
1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.
2.1.1: Identify the issue or problem under consideration.
2.1.2: Describe the context surrounding the issue or problem.
2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.
2.3.4: Address alternative viewpoints, perspectives, and methods.
11.1.3: Install software.
11.2.1: Configure technology according to stakeholder specifications and requirements.
13.1.1: Create documentation appropriate to the stakeholder.
When you are finished, click “add a file” to upload your work, then click the Submit button.
Hide Rubrics
Rubric Name: Project 3: Proof of Concept Report
Print Rubric
Criteria
Exceeds Performance Requirements
Meets Performance Requirements
Approaches Performance Requirements
Does Not Meet Performance Requirements
Criterion Score
1.1.3: Present ideas in a clear, logical order appropriate to the task.
5 points
Presents a logical flow of ideas that is easily identifiable and completely appropriate to the task.
4.25 points
Presents ideas in a clear, logical order appropriate to the task.
3.75 points
Attempts to present ideas, but the logic is not clear and/or not appropriate to the task.
0 points
Does not present ideas in a clear, logical order appropriate to the task.
Score of 1.1.3: Present ideas in a clear, logical order appropriate to the task., / 5
1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.
7 points
Explains the relationship between the ideas presented in a thorough manner to enhance clarity and comprehension.
5.95 points
Explains the relationship between the ideas presented to enhance clarity and comprehension.
5.25 points
Attempts to explain the relationship between the ideas presented, but there may be gaps in clarity and comprehension.
0 points
Does not explains the relationship between the ideas presented to enhance clarity and comprehension.
Score of 1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension., / 7
2.1.1: Identify the issue or problem under consideration.
7 points
Identifies the issue or problem under consideration in a clear and thorough manner.
5.95 points
Identifies the issue or problem under consideration.
5.25 points
Attempts to Identify the issue or problem under consideration, but there is a lack of clarity or thoroughness.
0 points
Does not identify the issue or problem under consideration.
Score of 2.1.1: Identify the issue or problem under consideration., / 7
2.1.2: Describe the context surrounding the issue or problem.
7 points
Describes the context surrounding the issue or problem clearly and accurately.
5.95 points
Describes the context surrounding the issue or problem.
5.25 points
Attempts to describe the context surrounding the issue or problem.
0 points
Does not describe the context surrounding the issue or problem.
Score of 2.1.2: Describe the context surrounding the issue or problem., / 7
2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.
7 points
Explains the assumptions underlying viewpoints, solutions, or conclusions in a comprehensive and accurate manner.
5.95 points
Explains the assumptions underlying viewpoints, solutions or conclusions.
5.25 points
Attempts to explain the assumptions underlying viewpoints, solutions or conclusions, but the explanation lacks clarity.
0 points
Does not explain the assumptions underlying viewpoints, solutions, or conclusions.
Score of 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions., / 7
2.3.4: Address alternative viewpoints, perspectives, and methods.
7 points
Addresses alternative viewpoints, perspectives, and methods accurately and appropriately.
5.95 points
Addresses alternative viewpoints, perspectives, and methods.
5.25 points
Attempts to address alternative viewpoints, perspectives, and methods, but there are issues with the accuracy and/or appropriateness.
0 points
Does not address alternative viewpoints, perspectives, and methods.
Score of 2.3.4: Address alternative viewpoints, perspectives, and methods., / 7
11.1.3: Install software.
20 points
Installs software that is fully functional and appropriate for the given requirements.
17 points
Installs software that is appropriate for the given requirements.
15 points
Installs software that may not be fully functional and/or appropriate for the given requirements.
0 points
Does not install software.
Score of 11.1.3: Install software., / 20
11.2.1: Configure technology according to stakeholder specifications and requirements.
20 points
Configures technology accurately and thoroughly to meet stakeholder specifications and requirements.
17 points
Configures technology that meets stakeholder specifications and requirements.
15 points
Attempts to configure technology according to stakeholder specifications and requirements.
0 points
Does not configure technology that meets stakeholder specifications and requirements.
Score of 11.2.1: Configure technology according to stakeholder specifications and requirements., / 20
13.1.1: Create documentation appropriate to the stakeholder.
20 points
Creates thorough and accurate IT documentation that exceeds requirements.
17 points
Creates IT documentation that meets requirements.
15 points
Creates IT documentation that lacks detail and/or does not fully meet requirements.
0 points
Does not create appropriate IT documentation.
Score of 13.1.1: Create documentation appropriate to the stakeholder., / 20
Total
Score of Project 3: Proof of Concept Report, / 100
Overall Score

Exceeds Performance Requirements
90 points minimum
Meets Performance Requirements
80 points minimum
Approaches Performance Requirements
70 points minimum
Does Not Meet Performance Requirements
0 points minimum
Associated Learning Objectives
Learning Objective 1.1.3: Present ideas in a clear, logical order appropriate to the task.
Assessment Method: Score on Criteria – 1.1.3: Present ideas in a clear, logical order appropriate to the task.
Required Performance: Meets Performance Requirements
Learning Objective 1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.
Assessment Method: Score on Criteria – 1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.
Required Performance: Meets Performance Requirements
Learning Objective 11.1.3: Install software.
Assessment Method: Score on Criteria – 11.1.3: Install software.
Required Performance: Meets Performance Requirements
Learning Objective 11.2.1: Configure technology according to stakeholder specifications and requirements.
Assessment Method: Score on Criteria – 11.2.1: Configure technology according to stakeholder specifications and requirements.
Required Performance: Meets Performance Requirements
Learning Objective 13.1.1: Create documentation appropriate to the stakeholder.
Assessment Method: Score on Criteria – 13.1.1: Create documentation appropriate to the stakeholder.
Required Performance: Meets Performance Requirements
Learning Objective 2.1.1: Identify the issue or problem under consideration.
Assessment Method: Score on Criteria – 2.1.1: Identify the issue or problem under consideration.
Required Performance: Meets Performance Requirements
Learning Objective 2.1.2: Describe the context surrounding the issue or problem.
Assessment Method: Score on Criteria – 2.1.2: Describe the context surrounding the issue or problem.
Required Performance: Meets Performance Requirements
Learning Objective 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.
Assessment Method: Score on Criteria – 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.
Required Performance: Meets Performance Requirements
Learning Objective 2.3.4: Address alternative viewpoints, perspectives, and methods.
Assessment Method: Score on Criteria – 2.3.4: Address alternative viewpoints, perspectives, and methods.
Required Performance: Meets Performance Requirements

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount