Information Technology Essay Paper

Information Technology Essay Paper

The capability statement should contain the following sections:

Technical Skills
Non-Technical Skills


Work Ethic/Motivation
Social Media
Schedule/Availability Information Technology Essay Paper

Computer Science homework help


By the end of this week, you should be able to:

  • Articulate the difference between quality dimensions and usability evaluation through your research papers.
  • Discuss inspection methods and how they impact usability studies.


  • Hartson, R. (2003). Cognitive, physical, sensory, and functional affordances in interaction design. Behaviour & information technology, 22(5), 315-338. (Download)
  • Fallman, D. (2008). The interaction design research triangle of design practice, design studies, and design exploration. Design Issues, 24(3), 4-18. (Download)
  • Norman, D. (2019). Norman’s Three Levels of Design | Interaction Design, from Computer Science homework help



Research Paper

A usability evaluation examines the way users interact with products and services in order to achieve a goal. Often times, there are measures that are tied to those goals that are quantified. Academic literature has a robust catalog of research on studies that examine various perspectives that explore user attitudes and experiences. Such attitudes and experiences include:

Service Quality (Group 5, 6)

Remember, usability is not one-dimensional. It is a complex system of properties. Usability integrates many factors. It is subjective from user to user. And in this assignment, you will unravel each of the quality dimensions or how satisfaction ties back to a usability evaluation.

For this assignment, as a team, you are asked to explore the topic assigned to your group. You are to conduct an analytical research review of the assigned usability category/dimension above. Within each quality dimension or satisfaction measure, there are sub-measures! Explore them and better understand how they are important to usability evaluation. Computer Science homework help


Each group will write a paper that covers the following:


Title Page


Literature Review of Concept

Make Recommendations of Additional Ideas For Future Literature Review Consideration


The paper should be a minimum of 8 pages content. This does not include the cover page, abstract, citations, and references. You must use APA format throughout the entire paper.


Grade Rubric

Technical Merit – 160 (53.33333%)

You explained the topic thoroughly by providing greater than 5 examples across 10 or more scholarly sources.


Business Merit – 50 (16.66666%)

You provide a minimum of five practical exemplars from literature to validate your topic in the form of research studies conducted using this topic. You present the results and explain the outcomes clearly and succinctly.


Grammar/Spelling – 40 (13.33333%)

Your paper does not contain any grammar or spelling errors.


APA – 30 (10.00%)

You provide a minimum of 10 quality academic peer reviewed journal sources (not blogs, wikis, or online websites) as evidence to support your topic. Your presentation of the content in APA is also accurate with less than 3 errors. Computer Science homework help


Organization – 20 (6.66666%)

Your organization fully meets the organizational structure as outlined in the assignment and is consistent with an academic literature review.



Visual Analytics Assignment

Visual Analytics Assignment

Visual Analytics

First phase the assignment idea:

The first task is to find a dataset and identify a business problem or a series of interesting questions. You must analyze and visualize real-world data. In order for you to have the greatest chance of success with the final outcome, it is important that you choose a manageable dataset.

  1. The data should be readily accessible and large enough that multiple relationships can be explored. As such, your dataset must have at least 8 Measures and 8 dimensions. (exceptions can be made but you must discuss with me first).
  2. To assist you in choosing a feasible problem and dataset, check with me by email about your idea for approval by 04/12/2022.
  3. Informal discussions with the professor can help to refine the assignment.
  4. Here are some links you can check to get data (but not limited to, so you can still do your search and find a dataset):

Popular open data repositories:

UC Irvine Machine Learning Repository:

Kaggle datasets:

Amazon’s AWS datasets:

Data Portals: Visual Analytics Assignment

Open Data Monitor:


Assignment Requirements:

You need to use and apply the Visual Analytics concepts that we discussed in the class.

  1. Data Discovery: Show how to use Tableau as a tool to explore the dataset to understand what data you have visually. For example, you can generate at least four graphs to discover some relationship between fields.
  2. Questions: Your visualization must be able to answer the proposed questions. A good question may involve in two or more attributes (variables) and related to time or spatial information. You may need to revise your questions several times to tell a good story. You must have five questions.
  3. Calculations: You must use Table calculations along with another type of calculations (like Row-Level, Aggregate calculations or LoD expressions). Explain why you used this type of calculation. You need to use at least 4 calculations.
  4. Visualization: At least 8 or more different visualizations must be used. Use different types of visualizations. Make sure to follow the guidelines to create informative and effective charts.
  5. Dashboard : must be included. The dashboard must be interactive. You need to have at least one parameter. You need to design the dashboard by following the dashboard format guidelines.


Assignment Report (Word Document):

A narrative description of the business problem should be addressed.

  1. Introduction: Start with a draft of the introduction section of your assignment. This introduction should introduce your business problem and the potential solution. Visual Analytics Assignment
  2. Explore the Data: Describe what Tableau Techniques you used to discover and understand the data. List all the charts that you created with enough description about each.
  3. Questions: Clearly state all the five business questions.
  4. Calculations: Describe all the calculations that have been made to the data. Include the functions, charts and the results.
  5. Visualization: Include screenshots for all the generated charts along with the Dashboard. Under each graph, discuss how this chart answered the business question and the find the insights.
  6. Conclusion: Write down your final results and conclusion about the findings. Suggest solutions/actions that the business needs to take in order to solve the problems.
  7. Format: APA


Submission Checklist:

  1. Dataset file: original file and the modified one in case if you did any modifications.
  2. Tableau workbook (.twbx).
  3. Report document (.doc). Visual Analytics Assignment

Computer Science homework help

Part A

Think about the last time you utilized a mobile application or attempted to build your own mobile website.  What planning process did you go through before you began your project?  You may have considered the steps or tasks you needed to perform.  You may also have considered the resources and platforms needed for your outcome.  For example, which model fits your business domain needs?  Do you have time constraints that will make completing the web application/site difficult within a reasonable period of time?  You may also have considered the myths that surround developing mobile apps and the difficulties generally associated with mobile app development.

  • How does design & utility make a difference between good vs great websites? Explain
  • How is deciding between a mobile application vs a mobile website an important consideration by developers? Explain.
  • Why are push notifications the preferred method of communication over instant messaging among young people?




The seven domains of a typical IT infrastructure include the User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and System/Application Domain. As you’ve learned, each domain has business, technical, and security policy challenges that affect organizations.Computer Science homework help

Answer the following question(s):

  1. What is an advantage of organizing IT security policies by domain?
  2. What is a disadvantage of organizing IT security policies by domain?
  3. Do you think one domain is more challenging than the others as far as applying security policies? Explain your answer.

Advanced Operating Systems Project

CSE 461 Project I

The first part of this project requires that you implement a class that will be used to simulate a disk drive. The disk drive will have numberofblocks many blocks where each block has blocksize many bytes. The interface for the class Sdisk should include :



Class Sdisk
public :
Sdisk(string diskname, int numberofblocks, int blocksize);
int getblock(int blocknumber, string& buffer);
int putblock(int blocknumber, string buffer);
int getnumberofblocks(); // accessor function
int getblocksize(); // accessor function
private :
string diskname;        // file name of software-disk
int numberofblocks;     // number of blocks on disk
int blocksize;          // block size in bytes

An explanation of the member functions follows :

  • Sdisk(diskname, numberofblocks, blocksize)
    This constructor incorporates the creation of the disk with the “formatting” of the device. It accepts the integer values numberofblocksblocksize, a string diskname and creates a Sdisk (software-disk). The Sdisk is a file of characters which we will manipulate as a raw hard disk drive. The function will check if the file diskname exists. If the file exists, it is opened and treated as a Sdisk with numberofblocks many blocks of size blocksize. If the file does not exist, the function will create a file called diskname which contains numberofblocks*blocksize many characters. This file is logically divided up into numberofblocks many blocks where each block has blocksize many characters. The text file will have the following structure :
    Bytes 0 – blocksize-1Block 0Bytes blocksize – 2*blocksize-1Block 1Bytes 2*blocksize – 3*blocksize-1Block 2……Bytes ?-?Block numberofblocks-1
  • getblock(blocknumber,buffer)
    retrieves block blocknumber from the disk and stores the data in the string buffer. It returns an error code of 1 if successful and 0 otherwise.
  • putblock(blocknumber,buffer)
    writes the string buffer to block blocknumber. It returns an error code of 1 if successful and 0 otherwise.

IMPLEMENTATION GUIDELINES : It is essential that your software satisfies the specifications. These will be the only functions (in your system) which physically access the Sdisk. NOTE that you must also write drivers to test and demonstrate your program. Advanced Operating Systems Project

Computer Science homework help

Please use all 600 words to summarize the following topics (be specific and use terminology from the class):
Explain Darwin’s theory of evolution. What is natural selection? What makes an organism naturally fit?
Why do we study non-human primates? What are some distinctive features of primate evolution?
Human Origins


Define Punctuated equilibrium and Phyletic gradualism. What are advantages of being bipedal?
Why is Homo Erectus being a big game hunter a debated fact? Why is it important? Computer Science homework help
The document MUST be 600 or more words, and typed in Times New Roman 12-point font, being either single or double-spaced. In the header please include your name, date, and class (ANTH 37). Failure to do this will result in an immediate 5-point deduction. DO NOT USE ONLINE RESOURCES. Use information provided to you through the textbook and powerpoints.

Cpsc 1050 Networking Data Packets

Cpsc 1050 Networking Data Packets

  1. Start the “TCP/IP” (reliable connection simulator) applet.
  2. In the text field labeled “Your message:”, type the following: “Computer networking is essential in our world today.“. Then press the button “Send a message.”
  3. Watch the entire sequence of packets that are sent for the sample message. How many “DAT” packets were sent? How many “ACK” packets were sent?
  4. If each character or blank in a packet header counts for one character, and all “DAT” packets except the last carry 10 characters (including the blanks), and “ACK” packets have no data characters (though they do have a header), count up how many characters were sent in total.
  5. There are 52 characters in the above message, including blanks and punctuation. Subtract 52 from the total number of characters sent in both directions in all packets. Divide this number by the total number of characters to get the overhead (those characters which are not really data but yet you have to transmit them), represented as a percentage.


  6. Imagine that you have a million-character message to send, perhaps a large file. How many characters in total (and to your best estimate) would be sent in all packets necessary to move it from node 0 to node 1?
  7. What would be an obvious way to decrease the overhead?
  8. Repeat Steps 1 and 2. Cpsc 1050 Networking Data Packets
  9. Select “Delete packets that are touched“.
  10. Delete some data packets by clicking on them as they move along the wire and watch the retransmission after timeout.
  11. What happens if you delete the re-transmitted packet?
  12. Now try deleting some ACK or NAK packets. What happens?
  13. See if you can compute the checksum as TCP/IP does. Run the applet, using any message. Select a data packet, but don’t select the last packet because it might be too short, less than 10 characters. Count up the characters, including blanks. If they do not equal 10, assume there are blanks at the end so that the character count is 10.
  14. Using the “Text Encoding in ASCII” applet, type in the characters from the data packet, and click on “translate text“.
  15. Add up the values for each of the characters. Then calculate the modulus of this number using 256.
  16. Compare your manually computed checksum for the first packet of the message “Introduction to Computer Science” against what the applet shows for the packet. Do they match?
  17. Now damage your packet by altering one character. Re-compute the checksum. You should realize how the applet can spot errors.
  18. Think of a way that a packet can be damaged and still have the same checksum as the undamaged version. Give one example for this scenario. Cpsc 1050 Networking Data Packets

Discussion Board, Fundamentals Of Database Systems

Discussion Board, Fundamentals Of Database Systems

Your management team has had a chance to review the entity relationship diagram (ERD) that you are proposing, and they like the progress shown so far. However, they are concerned about duplicate data and how the current system can ensure that data are kept in sync. After all, they previously had two different applications and you have convinced them that having one is best—but how can this single application prevent people from needing to make changes to data twice?


For this Discussion Board, you will describe normalization and how it can be used to solve insert, update, and delete anomalies.

Your post should answer the following questions:

  • Why is normalization important in the design of databases?
  • How can third normal form reduce insert, update, and delete anomalies?

Disaster Recovery & Business Continuity Planning

Disaster Recovery & Business Continuity Planning


Each student will locate and review an article relevant to the topic of the class (student’s choice). The review is between 2 pages and should summarize the article contents with proper citations. Students will then include how it applies to the topic selected for this assignment, and why the student found it interesting.  The article should not be older than 2 years and students will provide the link to the article used for the research paper. Disaster Recovery & Business Continuity Planning


Example:  Article on a natural disaster and how a company responded to that event.

**Standard for all discussion posts:

A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post. Disaster Recovery & Business Continuity Planning

Poorly Implemented Database Discussion

Poorly Implemented Database Discussion

Poorly designed or produced databases include incomplete information in various rows, ambiguity or uncertainty, complex and often invasive attempts, and uncertain information in the database. A poorly constructed dataset is inefficient, demanding, and maintenance-oriented, and it cannot address the actual working circumstances. Any organization has a significant database since it contains all information about the company, its suppliers, and its customers. The database design varies depending on the company’s strategy (Badia, 2015).Poorly Implemented Database Discussion


My office is a poorly implemented database that I joined. I worked with such a health company in which we recognized a customized platform in the sector as a monster. Some of Monster’s data have been deleted and are static stable. Significant data instability and preprocessing conclusion. It will contain extensive catalog interfaces and programs that effectively create zero logical information and mission descriptions. Monster files have several important issues, which appear to be the product of poorly planned manufacturing choices (Kraleva et al., 2018).

As a project for additional risks, several movements are required. A unique software attack method is present in the Monster archive, and programming occurrences are compared. The firm may market a local consumer brand as a viable alternative. For a week, the few intentionally eligible sellers have assessed the significant shift, together with a bargaining explanation statement that they created a year ago. The database generally includes changing the data found in system changes and is designed to work without compromising the program’s fundamental functioning over time as technology changes. The system controller controls a wide variety of technological initiatives in companies. The deliberate regulation is measured as a safety concern (Malik & Patel, 2016). Poorly Implemented Database Discussion


Badia, G. (2015). Multiple Databases are Needed to Search the Journal Literature on Computer Science. Evidence Based Library and Information Practice10(4), 241.

Kraleva, R. S., Kralev, V. S., Sinyagina, N., Koprinkova-Hristova, P., & Bocheva, N. (2018). Design and Analysis of a Relational Database for Behavioral Experiments Data Processing. International Journal of Online Engineering (IJOE)14(02), 117.

Malik, M., & Patel, T. (2016). Database Security – Attacks and Control Methods. International Journal of Information Sciences and Techniques6(1/2), 175–183.

Poorly Implemented Database Discussion