Chapter 7 Q

Complete Discussion Questions 1-5 on Pg 101  DISCUSSION QUESTIONS   
1.  What are the two different categories of sponsors? Give examples of both, and explain them.
2.  What are the six types of sponsorship opportunities organizations have to sell? Explain, giving examples of each one.
3.  What are the different types of goods or services available for esports sponsorship? If you work for the rights holder, which ones would you prioritize when seeking to sell sponsorship opportunities to companies and their brands? Explain your answer.
4.  What are some of the most important issues facing both rights-holding properties and sponsors? Explain, and give examples of the issues you identify.
5.  How can both rights-holding properties and sponsors evaluate sponsorships? Give examples of different types of information or data you would like to collect or see in order to properly undertake sponsorship evaluation.

IT402 As2.

Zero mark will be given if you try to bypass the SafeAssign (e.g., misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
Demonstrates deep, thorough understanding of the topic. Highly insightful. Connects topics to the reading, research, and own experience. Supports opinions with multiple specific examples of cited evidence. When reporting on own progress, provides a thorough, detailed description and analysis. Asks specific questions, solicits specific feedback.
You can use valid and documented sources related to the assignment.
These are sources through which you can search for the answer, but I do not want there to be copies in the answer from these sources. There is no similarity in a solution. I want my own solution.
When the solution is completed, add the references in the APA method.
I want the source of scientific articles and journals
References at least 7-10.
I want the solution to be finished within the specified time.
Please I did plagiarism when solve the assignment.
When finished the assignment will prepare A 10-slide presentation related to a report that you are going to finish.Case Study Instructions

Case Study Objective:
Report and Presentation Slides on the case study .

Case Study Report
Each Case Study Report will be evaluated according to the marking criteria mentioned in each question section.

Note: the following case study is just an example, students are supposed to find a separate case study

Example Case Studies: Enterprise Software Choice Nightmares
Each example assumes steps as follows:
1.Key individuals involved – most costly in any company are the active participants on the team
2.The Selection Processes, Re-selection processes,
3.Dropping challengers to the short-list
4.Final selection procedures to make your decision.
5.Purchase, finance, loan, check, or capital expenditure.
6.Enterprise preparations – hardware, software, education, systems infrastructure
7.Installation – infrastructure readiness and execution
8.Integration – training and systems integration
9.Implementation processes
10.Return on investment (ROI) can now begin
11.Follow on: Restoring, training, and ongoing support, re-visiting old ground.
Case # 1 –Corporation is unprepared for what is coming – but believed they were okay.A manufacturer/distributor must upgrade their software to satisfy their business and client needs, or they will unavoidably fail. Upon examination, we find infrastructures are inadequate, and inner resources do not allow this change. Additional, because of their cash position, they cannot fund the lowest requirements for a new enterprise solution.
What are they supposed to do?
They must retrench and reconstruct quickly in as cost-effective manner. To serve their requirements, they must substitute all servers, operating systems, upgrade the network architecture, PCs, printers, improve their internet connection, rise network bandwidth, install wireless networking, protect their data backups, email SPAM control, implement security firewall,. i.e.: upgrade it all! What was believed to be a software spend of $35-$55K derived to be an enterprise spend of $160-$260K, and excluding the software.
It is avoidable with proactive budgeted enterprise management. You cannot permit your business to fail because systems are out of reach.
Case # 2 – Corporation is prepared to spend – but don’t know enough to execute properly.When we encounter a client that has the financial capitals but not sufficient technical resources to deply today’s enterprise systems, we are prepared to contribute in hiring, raining, and support. The trick is the cost of these resources is high, and availability is inadequate. Businesses in a sound financial situation must also know they have resource necessities to consider while taking on a up-to-date solution. It is not for the reason that systems are complex it is because infrastructure and user requirements have raised.
For example:
Today is a extremely competitive and combative environment. Let’s look at some factors disturbing these pieces. Global rivalry is all the rage. China pays its employees $0.50/hour. Without the complete best systems, technologies, implementation, integration, utilization, cost-controls, security of the enterprise, accuracy in data, dedication to continuous monitoring and decision support tools, our businesses will flop and feel like they could do nothing about it.
We have, today the absolute utmost robust and reliable tools a little generation of business has ever seen. We can perform our business from a mobile phone from the inside of the Desert. If we can do this, the remaining is a matter of application.
Note: the above mentioned case study is just an example, students are supposed to find a separate case study.

Noted : I choose the application Netflixs as case study.
Learning Outcome(s): CLO1: Explain the interdisciplinary concepts, theories, and trends in ES and their role in supporting business operations.

Question One1. Your first task is to select a case study (from real-world or using internet). It can be related to enterprise systems or related to an organization/store or on any relevant topic.
2. After selecting the case study describe it in your own words using following points.
a.Clear headline: It should give the most important information.
b.Snapshot: Provide the main points, including the client’s name/industry, the product/service used, and quick result stats.
c.Client introduction: One or two sentences describing the customer and a highlight about them.
d.Problem: State the problem/goal, consequences, and any hesitations the customer had. Include quotes.
e.Solution: Share how they found you, why they chose you, what solution they chose, and how it was implemented. Include quotes.
f.Results: Describe the results and the benefits, as well as any bonus benefits that came of it. Include quotes.
g.Conclusion: Share additional praise from the customer and words of advice they have for other people/businesses like them.
Learning Outcome(s): CLO4: Design ES architectural models for various business processes.
Question TwoModel (As-Is) process using BPMN 2.0 using any tool such as Visio. Then analyze As-Is process from atleast two perspectives. Forexample, if quality and time perspectives are taken then mention at least 1 issue related to quality and 1 issue related to time in the process.
Learning Outcome(s):
CLO3: Discuss the issues and challenges associated with implementing ES and their impacts on corporate enterprises.
Question ThreePropose at least three (3) ideas for improving the process of your selected case study from any three (3) prespectives: for example a) equipments prespective, b) employees prespective, c) IT

Still a rookie at Java and have no idea what I’m doing. Help

Use JavaFX to build a GUI program that implements the Caesar Cipher algorithm, the CaesarCipherFX project.
Your user interface must include the following:Professional layout; the precise design is up to you.
A drop-down to select the Key. The Key must be an integer in the range -3.. 3; zero is an acceptable Key value.
A TextField (TF1) in which the user enters the message to be translated.
A read-only TextField (TF2), where the translated message will be displayed.
A Translate button that causes the translation to take place, using the TF1 message for input, translating the message, and displaying the result in TF2.
A Copy Up button that causes the contents of TF2 to be copied to TF1, and then clearing TF2. This makes it easy to translate a message, copy the message, and “untranslate” the message.
A Clear button that clears the Key selection, TF1, and TF2.
If the Translate button is pressed when no Key has been selected, an appropriate alert should display, informing the user that a Key must be selected before a translation can take place.
You should use the translate() method that you built for Week 1’s assignment to perform the Caesar Cipher translation. (Note that translate both encodes (key > 0) and decodes key < 0)).

Take sufficient screen shots to demonstrate that your program meets all requirements.Include the execution output of your program to convince a reader that it functions properly—both encoding and decoding messages.
Test your program with both positive and negative Key values, and text strings containing both alphabetic and nonalphabetic characters.
One test must show the alert that results when a Key has not been selected.
Paste these screen shots into an MS Word document.

For your final test, you use must use a Key value of -2 and the message “Qpeg wrqp c vkog – c nqpi, nqpi vkog ciq . . .”
Create a .zip file containing your Caesar Cipher project.Before zipping your project, right-click the project and “clean” it. This greatly reduces the file size and speeds up the program’s performance.
Then close NetBeans.

Add the MS Word document with your screenshots to your .zip file.
Rename your .zip file, following this pattern: LastName_Week2.zip.
Assignment Instructions—Part 2 Designing GUI Screens
Complete these steps for this assignment, Part 2 Designing GUI Screens.
Select a visual design software or prototyping tools of your choice.
Design the seven user interface screens required for the CapestraApp project.Note that the Employee Information report already is implemented in the CapestraApp template application.

Place each screen on a separate page in an MS Word document, labeling each screen appropriately.
Add your MS Word design document to the .zip file you created in Part 1 of this assignment.

Human Computer Interaction IT352 5639

My order:
1- No plagiarism, no match
please.
2-You can find the
instructions inside the doc
3- Please write a paper in
the document
4- Write a report on
whatever you use to research and what you write in a different document because
we will discuss it separately in class
Write at least 8-
references using the APA style.
Noticeable:
Please use simple language
Put the in-text quote in
each.
Additions within the
document
1)
Select any three websites of your choice and enlist five good and five bad features of all the websites.(2.5 Marks)
Evaluate and discuss your selected website ranking based on usability, accessibility, and User experience (UX) criteria. (1.5 Mark
2) Summarize the different aspects of the
website that you selected and suggestion(s) for improvements. (maximum 250
words)
3)a) Design three interfaces for any application
or website that you propose by following the design implications for the cognitive
processes. (3 marks)
b) Explain what are the design implications that
you follow in each interface. (2 marks)
(You may use any software to design your interfaces)
The image below is an example for three different interfaces

need to create a presentation in the topic MESI Protocol

I have selected the MESI Protocol topic because of its application in caching. The MESI protocol provides a way to control the cache cohorency with the use of several snooping techniques. The MESI protocol assigns state to each cache line. These states can be Modified, Exclusive, Shared, and Invalid.
I found the below link very helpful in understanding the MESI protocol:https://www.brainkart.com/article/The-MESI-protocol_7651/

Discussion Reply BHIS 510

Reply to two Discussion post
Respond to the discussion prompts and questions by the due dates outlined in the forum. You should contribute your first post no later than Day 3. Then, follow up on the posts of your classmates for each discussion question. The faculty and faculty and responses to your own posts. The Discussion and Participation grading rubric calls for you to post a total of 4 times per week (1 initial post 3 discussion participation posts 250-500 words).
For Example:
Discussion will include the following 4 components:
– Add new information or viewpoints
– Provide context by example, inference, explanation, or comparison
– Critically evaluate discussion content
– Challenge, question, or refute discussion content or accepted knowledge
See attached Document.
Please cite all reply.

System programming

SYSTEM PROGRAMMING EXAM. please do not bid crazy price
It will be an open-book TIMED exam with 65 minutes. You will be asked for answering questions in the form of MCQ, check all apply, filling the blank, or short essay questions
The allowed references are:
Textbook,
Class slides and class notes
Scratch paper
You may also want to use a calculator during the exam:
You can use a physical calculator.
You can use the calculator program from your OS (Windows or Mac), you may want to set it to programmer mode so calculations of hex, binary, decimal numbers and the conversion between them would be easy.
You may NOT use a web based calculator.

need an answer to dataanalysis and clustering

data analysis and clustering
please find the attached document
WHAT TO TURN INYou are being encouraged to turn the assignment in using the provided Jupyter Notebook. To do so, make a directory in your Lab environment called homework/hw2. Put all of your files in that directory. Then zip that directory, rename it with your name as the first part of the filename (e.g. maull_hw2_files.zip), then download it to your local machine, then upload the .zip to Blackboard.
If you do not know how to do this, please ask, or visit one of the many tutorials out there on the basics of using zip in Linux.
If you choose not to use the provided notebook, you will still need to turn in a .ipynb Jupyter Notebook and corresponding files according to the instructions in this homework.
ASSIGNMENT TASKS(30%) Learn more about the analysis of the FARS database.
In the last homework we learned about the FARS database, and actually USED it!
While it might seem like a nice dataset to have (and it is), researchers have been using it for years to study transportation issues in this country, with the hopes of using the outcomes of these analyses for safety policy decisions.
You will get a little more cozy with such research by reading the paper:
U. Roy, “Comparative Analysis of Fatal Pedestrian Crashes between Kansas and USA,” JTTs, vol. 09, no. 03, pp. 381–396, 2019, doi: 10.4236/jtts.2019.93024.As you will read, the phenomenon of pedestrian fatalities (involving automobiles) have been studied (and are relatively low, but not non-existent) has in recent years been on the rise, with no single reason for the change.
It is important as a data scientist, that you be able to reference literature and assess its relevance to analysese you may be doing as a professional, and with datasets such as those in FARS, there are plenty of researchers trying to understand correlation and causes between the multitude of changes in the data.
In this paper (Roy, 2019), you see some familiar concepts and some unfamiliar, but you may come understand a component of the data that we did not explore in the prior homework.
You can download the paper free from one of the following sources:
SemanticScholar link
Read the paper (it will take about an hour) and answer the questions below.
§ Task: Read the paper and write a 4-7 sentence (about a paragraph) summary. State in your own words what you learned, what expanding your knowledge of the topic and what you found interesting about the information you received. Please include the major points of the paper, and any weaknesses the authors point out with their research.
§ Task: Answer the following questions:
What time of day is most common for pedestrian fatalities in Kansas (over all years)?
How does this compare with the most common time of day for the US overall?
Looking at figure 11, would you say poor atmospheric conditions have a significant impact on pedestrial fatalities?
On page 392, the author states “For Kansas, speed limits between 30 mph and 40 mph account for 52% of total crashes (26% crashes for 30 mph and 26% for 35 mph or 40mph), …”. Why is this statement as written incorrect?
The authors go on to explain the abnormally high number of fatalities at higher speeds with “… Kansas has lot of rural roads, where the speed limit is high and in rural roads, laws are not strictly enforced, all of which might lead to a larger number of fatal pedestrian crashes.”. Which of the suggested countermeasures would you think might successfully addres this issue? If you do not find anything sufficient, what might you recommend instead?
(20%) Recreate data analysis in a published paper.
As a data scientist, you must be prepared to defend the analyses and models that you create. This is often done with workflow tools and processes which capture the full range of activities performed during an analysis. Commercial tools are very good at this, but often simply organizing your notebooks will go a long way to keeping track of your analyses.
In academic publishing, it is becoming more common for authors to submit data used in their papers. If the data was not already public, is it customary to ensure the released publication data does not violate the privacy or personally identifying information of others. It is also customary to make certain data was obtained in a way that the participants were aware that the data was going to be shared or otherwise given an option to decline to have such data publicly released.
In the case of this paper, both datasets (the KARS and FARS) are public.
For this part of the assignment you will recreate some of the graphs in tha paper from part 1 above. For all graph outputs, you do not need to recreate colors – you can use the standard colors in Pandas and matplotlib.
NOTE: You will need to refer back to, and otherwise reuse, your work from your first homework to complete this part.
§ Task: Recreate the graph (with actual FARS data) in Figure 15. You do not need to show the Kansas data. BONUS (up to to 3 points extra): You will earn up to 3 bonus points added to this assignment if you access the KARS data set and perform the same analysis (in other words, you cannot just put the numbers in figure 15 in the graph and earn the bonus).
§ Task: Recreate Figure 4 and Figure 9.
§ Task: Take the data from Figure 4 and Figure 9 and combine them. What you will end up with is a grouping by age band, then by time of day. Your final graph will be able to answer questions about which age group is more or less likely to experience a pedestrian fatality during which time of day.
(50%) Perform cluster analysis on NHTSA FARS data.
Now that we have data, let’s analyze it.
You will, by now, have watched the lectures on clustering and unsupervised learning algorithms. You will know that clustering provides a significant tool for understanding underlying patterns in data and can be powerful in explaining the various aspects of your data.
In this part, we will go one step further and begin to explore the patterns in the FARS dataset.
§ Task: (Reshape the US dataset from HW1)
You will go back to the dataset in HW1 and begin the process of reshaping the data so that you will only include pedestrian fatalities, that is to say, you will only include fatalites with pedestrians.
You will also need to make sure of the following:
you are using data from the 1975-2020 that you found in HW1
you are including all states data except Kansas
restrict to numeric features, eliminate year as a feature
scale the data using scikit-learn Standard Scaler
You will end up with a new dataset which will only have pedestrian fatalities, numeric features and data scaled for 1975-2020.
§ Task: (Perform ad hoc K-Means clustering)
You will now take the dataset from the first part and begin the process of clustering.
To be successful, please study the following:
K-Means in scikit-learn
K-Means example notebook
You will choose a three K for clusters 5, 10 and 12. You will need to report the centroids for each cluster and in words how you would describe that cluster. I will give more guidance on this in a mini-session.
§ Task: (Perform elbow analysis to find optimal cluster size)
In the first part, we chose the cluster size K. Another way to do this is to analyze the change in within cluster sum of squares and determine when such value fails to change significantly. In other words, when the addition of another cluster fails to significantly change the within cluster sum of squares, then you can be confident more clusters won’t make a difference (increasing K will no longer be relevant).
This is often referred to as “Elbow Analysis” or the “Elbow Method” because you will visually find the elbow in a plot of the sum of squares and choose K based on that.
Study the following code, implement it, and find the optimal K based on it.
Your answer must include:
the elbow graph
the optimal K
the reanalysis of the previous answer based on the optimal K (re-run your clusters and report their centroid characteristics)
Here is the code to help you:
max_clusters = 15
css = [] # within cluster sum of squares

for k in range(1,max_clusters):
kmeans = KMeans(n_clusters=k, ‘k-means ‘, max_iter=200, n_init=10, random_state=0)
kmeans.fit(d) # where d is the dataset you have standardized in the first part of this
css.append(kmeans.inertia_)

# now make a line plot of all the values in css
…§ Task: (Find out where Kansas fits in)
Using the optimal K found in your elbow analysis and understanding the characteristics of each representative in each cluster, which cluster would Kansas likely belong to?
By extension, which states are most like Kansas (belong to the same cluster) regarding pedestrian fatalities?
§ Task: (Perform Agglomorative Clustering)
One method also worth implementing is the hierarchical technique agglomorative clustering. This clustering method has the benefit of interpretability and as mentioned in the lectures, can be a powerful technique to show how a cluster is partitioned and can give specific insights to the features of clusters themselves. Most often the output of the cluster is in the form of a dendrogram, but often these can be complex to show on a single screen or page without scrolling.
To be successful you will need to study the following:
main sklearn api to AgglomerativeClustering
plotting the dendrogram
Set the parameter n_clusters to the same value found in your work above.

NA – Gradate and professional skills discussion week 7

Discussion Board #2: Conclusions
Discussion Board #2: ConclusionsAs this semester comes to an end it is a good time to reflect on the work you have done here. For this final discussion board, please share your thoughts on the class. Refer below for the guidelines of the assignment:
1) In at least one paragraph (minimum 250 words), respond to your time in GPS. You may use the following questions to guide you: what did you learn that has helped your professional and academic skills? What was something you wish the class has dedicated more time to? Is there an aspect of your academics and/or professionalism that you are more confident about? Why or why not?
2) After you post your introduction, make sure to comment on at least 3 of your peers’ posts.

DAT/380: Advanced Database Architecture-5.6 LAB – Implement independent entity (Sakila)

5.6 LAB – Implement independent entity (Sakila)Implement a new independent entity phone in the Sakila database. Attributes and relationships are shown in the following diagram:

The diagram uses Sakila naming conventions. Follow the Sakila conventions for your table and column names:
All lower case
Underscore separator between root and suffix
Foreign keys have the same name as referenced primary key
Write CREATE TABLE and ALTER TABLE statements that:
Implement the entity as a new phone table.
Implement the has relationships as foreign keys in the Sakila customer, staff, and store tables.
Remove the existing phone column from the Sakila address table.
Step 2 requires adding a foreign key constraint to an existing table. Ex:
ALTER TABLE customer
ADD FOREIGN KEY (phone_id) REFERENCES phone(phone_id)
ON DELETE SET NULL
ON UPDATE CASCADE;
Specify data types as follows:
phone_id, phone_number, and country_code have data type INT.
phone_type has date type VARCHAR(12) and contains strings like ‘Home’, ‘Mobile’, and ‘Other’.
Apply these constraints:
NOT NULL constraints correspond to cardinalities on the diagram above.
Foreign key actions are SET NULL for delete rules and CASCADE for update rules.
Specify a suitable column as the phone table primary key.