Explain your selected technology. What is it? How does it work? What is its purpose?

Historical Context and Ethical Questions
START ASSIGNMENT
Due Sunday by 11:59pm Points 70 Submitting a file upload Available after May 14 at 11:59pm
This week, you will consider the historical and ethical contexts of your Course Project topic. This will provide a factual foundation to help guide your analysis in the coming week. For this assignment, complete the following. • Definition:

Explain your selected technology. What is it? How does it work? What is its purpose?

 

Prepare a PowerPoint presentation that compares how 802.11a works and lists the advantages and disadvantages of 802.

Your presentation will be graded on content to include grammar and spelling.
Assignment:
The Baypoint Group needs your help with a presentation for Academic Computing Services , a nationwide organization that assists colleges and universities with technology issues. ACS needs more information about the differences between the IEEE 802.11a and IEEE 802.11g standards so that their salespeople will be better equipped to sell this wireless technology to schools.

Deliverables

1. Prepare a PowerPoint presentation that compares how 802.11a works and lists the advantages and disadvantages of 802.11a over 802.11g. Because ACS is a technical group, the presentation should have a high level of technical detail. Your presentation should last 15-20 minutes.

Identify and analyse a theme that cuts across at least two different class sessions and to explore its various dynamics.

Law, money and technology

The writer must answer the following question:
The course introduces a range of required source materials over a range of topics  the writer should directly use the required source materials, along with lecture notes and slide presentations that i will be providing to identify and analyse a theme that cuts across at least two different class sessions and to explore its various dynamics. the writer should not count the week 1 and week 2 blockchain classes as separate sessions; they should work as one longer session, that would then need to be compared with another session.

An answer, for example, may explore the theme of ‘public/private’ distinctions in relation to crypto currencies and access to justice. Or an answer might address the theme of inequality, as it relates to smart contracts, communication, and access to justice.

 

Briefly describe the major technology-related threats, risks, and challenges to protecting data. What are the major threats and risks?

INFORMATION ASSIGNMENT INSTRUCTIONS
OVERVIEW
Technology brings significant risks and challenges along with its benefits. Wise public administrators need to know about those risks and constantly be vigilant to prevent misuse of information by themselves, their organizations, or external forces.
INSTRUCTIONS
This paper focuses on the stakeholders in public sector information management—who are they, what are their roles and impacts, and why is each important to me as a public servant or citizen?
It consists of 3 parts plus an introduction and references sections. To make it easier for readers to follow your thinking, please discuss the topics in the order presented below, with appropriate heading.
• 8 – 10 pages of content, double-spaced
• Current APA format
• Must include citations from all readings, videos, and presentations for the assigned Module:
Week plus additional, relevant scholarly articles you select—for a total of 12 – 15 sources.
RESEARCH PAPER: CHALLENGES AND BIBLICAL PRINCIPLES IN MANAGING INFORMATION
Part 1: Ethical/Legal Issues and Challenges:
• From your perspective what are the major ethical and legal challenges and risks for abuse that we must keep top of mind in the collection, management, and use of information and technologies overall—and in the public arena specifically?
• Suggest guidelines to help prevent unethical uses of data in general and especially in the public sector.
Part 2: Technology-related Threats and Challenges, e.g., Cybersecurity:
• Briefly describe the major technology-related threats, risks, and challenges to protecting data. What are the major threats and risks?
• The “dark web” is big business.
o What is the “dark web”?
o What threats does it pose to your personal/family use and/or your organization’s use of technology and information?
• How do we minimize the risks you discussed above? E.g., what are some best/next cybersecurity practices for protecting information and technology assets?
Part 3: Biblical Principles:
• Which Biblical principles can help inform and shape your collection, management, and ethical use of information and technologies?
• Make this knowledge personal and actionable–how will you and how will you help those around you:
o Prevent the misuse or abuse of information and Wisely use information and technology for the benefits of all?

Critically discuss and justify your proposed database designed for the digital platform, taking into consideration the entities, attributes, data types, keys, and relationships.

Using an organisation of your choice as an example, write an essay on how the organisation can design, host, market, and host a digital platform to offer its products and/or services online. In your essay, critically discuss and justify your proposed database designed for the digital platform, taking into consideration the entities, attributes, data types, keys, and relationships.
• Logical and relational designs of the digital platform’s database which should include a minimum of five (5) entities with associated attributes, keys, relationships, etc clearly outlined.
• A marketing plan for the organisations’ new digital platform and why this plan would work.
• A hosting plan for the platform and why this is suitable.
• Discuss how this new digital platform impacts the organisation’s business model.

In your discussion, you are expected to make appropriate use of the academic literature, where possible , and give practical examples, to support and add depth to your discussion

Describe which components of your computer system support how data is stored and retrieved.

In your new position, imagine that as part of your role within healthcare leadership, you are involved in several committees for the organization. One of your responsibilities is to review technology infrastructure, including hardware and software, that supports the health care institution and patients. Answer the following questions in paragraph form:

Using the information about the components of the computer you designed in Part One, explain how data and information are stored on your “system” and how you go about retrieving said information. Describe which components of your computer system support how data is stored and retrieved.
Research the data analytics tool Tableau. Describe the purpose of the software and how it can be used in healthcare to improve patient outcomes.

Identify the right target for implementing AI and ML and recommend appropriate solutions that are likely to create value.

Create an executive summary that you can share with the decision makers and business stakeholders at your organization. The executive summary should accomplish the following goals:
Establish compelling rationales for implementing AI to address challenges and opportunities in a specific business domain
Identify the right target for implementing AI and ML and recommend appropriate solutions that are likely to create value.
Substantiate your recommendations by applying the knowledge you’ve gained in the programme, synthesising empirical evidence gathered through case studies and citing reliable external resources.
Outline a step-by-step process for implementing AI at your organisation. At each stage of the implementation plan, articulate measurable objectives, action items and designated actors.
Predict foreseeable risks by applying the knowledge gained in the programme

Write a report on how much it follows the guidelines of the National Institute of Standards and Technology.

Go to https://txwes.edu/media/twu/content-assets/documents/it/policyprocedures/firewall-policy.pdf.

Read and compare against the guidelines in http://csrc.nist.gov/publications/nistpubs/800-41-
Rev1/sp800-41-rev1.pdf.

Write a report on how much it follows the guidelines of the National Institute of
Standards and Technology. You don’t have to use the firewall policy from http://www.txwes.edu; you can use any firewall policy from a big organization to compare against the guidelines.