Stuck with your technology & it assignment?

Get answers from academic experts to any study-related questions.

Assume you are part of a multi-disciplinary investigation team, the IIC has asked you to analyse the rapid growth of Valujet as it may have played a role in the accident Valujet 592. Assume there is pressure from the highest office to not explore growth any further. Based on your analysis the IIC asks you if you’re ok dropping this and moving onto another part of the investigation. How would you respond to that?

If there is pressure from the highest office to not explore ValuJet’s growth any further, I will not resist. However, I will let the leadership know that its rapid growth could offer significant clues on what may have contributed to the flight 592 accident. The information that could help other...

What factors determine the dimensions of an airport’s catchment area?

The location of an airport is an extremely important business endeavor for any company. Indeed, according to Blachut, transportation, while being a primary revenue domain for an airport, is not exclusive in terms of service provision. Hence, the modern perception of airports is closely associated with the additional services presented...

Identify three good reasons why a Tier 2 data center would not meet Facebook’s needs.

Facebook is a social media channel of communication that allows users to share information through the internet. Since the company needs a large computational capacity to process all of its customers’ requests, data center investment is one of its most critical expenses. A data center is a climate-controlled structure (or...

Tour project sponsor is concerned about the risks associated with this website migration and what he believes could be a customer satisfaction nightmare. Identify and discuss the top three risks for this project and how you will prioritize tackling each one.

The risks associated with website migration include the following: Broken internal links can be one of the possible issues. This can happen because some historic pages were not redirected, and some links may lead to the old versions of URLs. All links should be updated immediately to solve the problem,...

Analyse the CVR data and the crews actions during the Alaska Airlines 261 accident.

Cockpit voice recorder (CVR) transcripts indicate that although the ill-fated Alaska Airline Flight 261 was diverted to Los Angeles Airport, the flight dispatcher wanted to have the plane continue to San Francisco. The dispatchers believed that diverting the plane would lead to schedule (flow) issues. Starting at 00:19 UTC, the...

Assume you are part of a multi-disciplinary investigation team, the IIC has asked you to analyse the rapid growth of Valujet as it may have played a role in the accident Valujet 592. From the data available do a high-level analysis of Valujet’s growth, and how rapid growth affects safety in general for the IIC to decide if this is an area worth exploring.

ValuJet’s growth in the early fall of 1995 was impressive, and Lewis Jordan – the company’s president and chief operating officer – wondered about the next step to consider to sustain the company’s remarkable performance. Launched in October 1993, the company had shown consistent profitability since its second month of...

It has been argued by many experts that the “culture” at NASA was to blame for the accident. One of the investigators was quoted as saying “Challenger all over Again” analyse the information available via reporting systems that could have prevented this accident.

Some information available through the reporting system could have helped to prevent the accident. For example, the day after launch, the Intercenter Photo Working Group personnel received pictures that revealed a debris strike at 81.9 seconds after launch. The group did not notice this bit of information while reviewing videos...

It has been argued by many experts that the “culture” at NASA was to blame for the accident. Critically analyse the culture at the time of the accident.

When the accident occurred, cultural norms at the National Aeronautics and Space Administration (NASA) tended to be fairly resilient, having bounced back into shape after being altered a bit. The agency’s powerful human space flight culture and institutional practices remained intact despite the appointment of new directors at the Marshall,...

End users have expressed some concern about completing their day-to-day tasks on Linux. How would activities such as web browsing work? How would they work with their previous Microsoft Office files?

The transition from the Windows environment to the Linux environment can pose a challenge of adaptability and portability of files between the two environments. In this case, the Ubuntu desktop and Ubuntu server have been chosen as the preferred Linux distros. Ubuntu desktop provides a graphical user interface that closely...

Define the violations caused by Dirty read and Phantom.

A dirty read is a situation in a database system where a data item that has been updated by transaction A and not yet committed is read by transaction B. If a transaction B performs an update and commits the changes, it can cause a violation of some transaction rules...

Assume you are tasked with an investigation of British Airways Flight 268. Analyse the crew’s decisions from the time of the fire to the eventual landing. Do you think the Captain should have been charged by the FAA? Explain.

The British Airways Flight 268 incident occurred on February 20, 2005, and involved the flight’s engine being caught in flames shortly after they have left the airport in Los Angeles. The fire was, reportedly, caused by an engine surge, almost immediately after takeoff, with flames visibly coming from it. The...

What can we learn from the example of the Wi-Fi Alliance with regard to the necessity of networking standards?

Wi-Fi Alliance is an excellent example of how large technology companies’ coordinated adherence and promotion of network standards ensures the continuous development of Internet technologies. Their vision for digital technologies and related products is manifested in their certification policies. Thanks to this, the current online space provides a wide variety...

Identify what you believe to be the area of most severe consequences for Deloitte — direct impact, business disruption, recovery, legal, or reputation.

It is important to note that cyber threats are becoming more prominent due to the factors of technological advancements and dependencies of modern organizations, such as Deloitte, on hackable and vulnerable instruments of communication. The most severe consequence for the company is its reputation since the majority of revenue comes...

Identify one social media that you believe will not be viable in 2026. You must provide valid and research supported reasoning as to why you believe the platform will not be a viable platform in 2026.

The Clubhouse app came out in the spring of 2020, and in my opinion, this app will not last until the year 2026. Moreover, the marketing of Clubhouse is based on the idea of “you will miss something”, which cannot maintain a constant high interest in the promoted service. Strielkowski...

Please explore the Web sites for the Law Enforcement National Data Exchange (N-DEx) and Law Enforcement Enterprise Portal (LEEP). Discuss commonalities and differences between these two Web sites.

The main common feature of these two sites is the provision of information about criminal cases, analytical resources, and a lot of information related to them. The second similarity is that the users of these web pages are law enforcement agencies for criminal justice. A distinctive feature is that Law...

Normalize the following unnormalized table using the three normalization rules and describe each step.

Normalization means organizing data in a full database by creating separate tables and establishing relationships among them. When normalizing a table, three rules, or steps, need to be followed. Student-ID Student-Name Student-City Student-Code_Area Instructor-ID Instructor-Name Instructor-Office Course-ID Course-Name Grade S1445 Ahmad Dammam 03 F12 Abdullah 315 CS140 Programming 1 A...

Requirements are often difficult to derive, especially when the environment in which the system will function, and the specific task it will perform, are unknown. Explain the problems that this causes during development of information or computer security assurance.

The uncertainty of the environment and functions to be performed by a computer system may lead to various problems when developing information and computer security assurance, as outlined below. First, customers’ ignorance of their project demands may lead to incorrect information or insecure computer systems. Analysts are always left with...

During the systems development life cycle (SDLC), certain key problems discovered in the later stages could be directly traced back to inadequate and poor efforts in the requirements phase and industry studies show that over 50% of systems problems belong to this case. In addition, as mentioned in this week lecture notes “the cost of errors in requirements that weren’t discovered until later” may go up to 1,000 times. As a systems analyst, what should we do to minimize this problem? How might this be avoided?

System development aims to create software capable of meeting users’ needs within a specific time frame and budget. This process goes through several stages, and the most important of them is the first – the phase of requirements development. Its clarity and organization determine the project’s success, the development process,...

Do project managers in your organisation practice resource levelling and smoothing?

In my organization, project managers practice both leveling and smoothing. In the same way, that capacity may be something of an elastic quantity, so too overall IT implementation schedules may be treated with a certain amount of flexibility. While ‘as soon as possible’ is a general practice, IT projects are...

Can structured techniques and object-oriented techniques be mixed? How should we start? How can they be mixed? How are the tasks in this mixed approach different from the traditional structured analysis?

There are many ways to analyze and model data in modern programming. One of the oldest and most fundamental ways is the traditional structured approach. The structured approach is made for “procedural problems where the overall objective is clear and in which the requirements are well defined”. An object-oriented approach,...

Discuss the advantages and disadvantages of MYOB.

Advantages of the MYOB accounting software include even alignment of the journal list of options in the banking set of choices. This makes it easy to enter the GST amounts. Moreover, it offers the option to store accounts in numerous locations. Hence, various company files are saved simultaneously. Finally, the...

Identify the CIA requirements for the ATM machines using examples. You are also required to identify the importance of each requirement.

The security of the Automatic Teller Machine is very paramount since it guarantees the security of the money of bank customers. The advancement in information technology has been accompanied by greater insecurity issues. The ATM systems should ensure that they employ the CIA triad principals appropriately to enhance their security....

What are the benefits of social computing?

Social computing can be termed as the medium used by marketers and consumers to the network through the internet. Such examples include Facebook, YouTube, and Twitter. There are several benefits associated with social computing. For instance, it acts as a platform that fosters communication and conveyance of information in an...

What are some of the best software programs one should have on their PC? Include in your advocacy of any product how well it works. It can be antivirus software, cleanup software, registry repair software, etc. any good utilities to have in one’s toolkit.

One of the best software products one should have installed on his or her PC is the antivirus and anti-spyware. This is because viruses and other security threats like malware and spyware can transform your PC by changing its settings without your knowledge of what is happening, hence hindering its...

Can you describe Ethernet CSMA-CD algorithm?

CSMA/CD is a terminology used to define an intelligent way of sending data on a network known as Carrier Sense Multiple Access with Collision Detection. This method was popularly used in bus networks though currently, it is the application has reduced owing to better methods. In this method, a transmitting...

Compare pure ALOHA and slotted ALOHA.

To understand the role of pure ALOHA and slotted ALOHA, it is important to consider the role of MAC protocols. MAC or Medium Access Control is a mechanism that is used to assign a unique address to a piece of network hardware. This is accomplished by the data link layer...

In the context of network security, explain: IP Sec, a network layer protocol (VPN), SSL, an application & session layer security protocol, and public-key encryption on a concept level.

On network security of data being transmitted is a major concern given that the data is carried on public communication channels. This suggests that if the data can be intercepted by the wrong people, there can be untold damage. In public-key cryptography today, the most popular method to achieve this...

In the context of multimedia applications, explain the protocols RTSP, RTP, and RTCP. SIP and H323 on their function level. What are they for? Compare Jitter & Delay.

Real-Time Streaming Protocol or RTSP is a protocol associated with the client-server application control protocol. The protocol is mainly used for repositioning with regards to streaming media retrieved over a communication channel. Among the uses of this protocol include functions such as rewinding, fast-forwarding, pausing, and resumption of media access....

Compare DiffServ & IntServ from the complexity point of view. Explain priority queues in DiffServ. Explain the token bucket & leaking bucket traffic shaping mechanism.

Having set up a connection and initiated the session, there appears to be a need for some mechanism to ensure quality is maintained across the network. The link capacity must be maintained and the QoS function to ensure the tasks undertaken can be completed using the available resources. The QoS...

In the context of network management, explain the function types of SNMP protocols, i.e., request, response, trap, UDP is used for SNMP (Port 161 & 162), the concept of SMI, MIB, and SNMP.

It is important to provide some form of management on a network to control the resources available to meet real-time, operational, and Quality of Service requirements at a reasonable cost. This management includes deployment, hardware integration and coordination, software, and human elements with a view to testing, polling configuration, analysis,...

What are the major issues that must be investigated when designing a network?

Network administrators and designers should investigate the following issues: The network size – this is concerning the computers and people using the computers. The network designers should consider the size requirements provided by the company building the network. The size determines the type of network. For instance, a small location...

Carla has asked for your help in solving a problem with her desktop computer. The computer hangs at odd times and sometimes gives “insufficient memory” errors. The Windows XP system has 512 MB of installed RAM, so you decide it does not need a memory upgrade. You suspect that one of the DIMM modules installed might be going bad. Find and download a memory testing utility from the Internet. Use the utility to test the memory on a similar computer. Provide the name of the utility and the Web site that you downloaded it from.

The type of utility that can be used to test memory utility is ViceVersa Pro. It can be used to do the following job: compare, mirror, synchronize files and back up folders and files. For more information, you can visit this website SnapFiles.

Joseph has a Windows XP desktop system that contains tax information for his small business. He frantically calls you to say that when he turns on the computer, the lights on the front panel light up and he can hear the fan spin for a moment, and then all goes dead. His most urgent problem is the data on the hard drive, which is not backed up. The data is located in several folders. What is the quickest and easiest way to solve the most urgent problem, recovering the data? List the major steps in the process.

At one time, the computer is working, and the next minute you find it is not working. Instead, it is showing a blue screen of death, and you find all your data is gone. If you find your computer performing weirdly like crashing or frequently freezing up, this is a...

Identify, what is a “thick client”?

Thick clients refer to computers that have all the necessary features to operate independently. These computers are usually connected to a network, but they can still operate using their features when they are disconnected from the network. The word client is a result of its connection to a server. Thin...

IPv4 and IPv6 Coexistence – What Does That Mean?

Research on the Web to find and share the information to answer each of the following questions. IPv4 and IPv6 coexistence — what does that mean? Will older versions of Windows OS support IPv6? What is dual-stacking as regards IPv4 and IPv6? What are the standards for IPv6 addressing? Is...

Argumentative Essay on Regulating Cyberspace

Provide Your Stance on Regulating Cyberspace in an Argumentative Essay. Should we regulate cyberspace? Or should we even try? This is the topic question. The paper must contain: clear developed thesis statement that takes position to the question; a introductory paragraph that presents thesis statement and frames the thesis within...

Why Should Software Developers Take Ethics into Consideration?

There are software systems that have had unforeseen lapses in ethics controls. Identify the issues and devise remedies for ethical lapses. Are such remedies doable or feasible? Address the following questions in your analysis. What makes ethics important for software developers? Give examples of ethical considerations that a developer might...

What is the difference between software quality, reliability, and software security?

Software quality is the study and art of producing software products based on the three fundamental aspects of functionality, process, and structural quality. Software reliability is the likelihood of software to perform a given task in an operating system without experiencing failure. Software security is an implementation measure that protects...

How soon will robots replace Soldiers on the battlefield?

Military robots refer to autonomous machines that can perform various functions on the battlefield, from carrying the soldiers’ weapons and gear to performing an attack themselves. The motivation for the implementation of military robots is improving combat strategies and ensuring even better protection for the soldiers. Additionally, they eliminate the...

What is spindle speed? How is spindle speed important in an ATA hard drive?

Spindle speed is a metric used to measure disk drive performance in rotations per minute of the stacked platters in the architecture of a hard drive. It is an important technology in ATA drive because it determines the efficiency with which a single bit of information can be stored or...

Explain the gridiron piping layout and its usage.

A gridiron piping layout is an improved version of a branched network due to the possibility of water circulation with a reduced chance of leakage. This effect is achieved by the special construction of the system, namely by a loop constructed by separately connected pipes. The constant circulation of water...

What does backward compatibility mean to you regarding the 8086 and 80386?

The concept of backward compatibility can best be explained by referring to Intel’s microprocessors’ history, particularly the 80×86 or x86 family. Yam notes that the 8086 microprocessor was the first Intel version of the x86 CPUs. It featured a 16-bit data bus and a 20-bit address bus. According to Antonakos,...

Professor Pybus believes there’s a conflict of interest operating when Vallez accepts money to write reviews for his website Crazy Mike’s Apps. What, exactly, is the conflict?

According to Pybus, the conflict of interest appears as Vallez accepts the money for writing an editorial review, compromising the ethics and credibility of the website. It is in the best interest of Vallez to provide a positive report on a product so that he can keep the money the...

Why is hierarchical task analysis an important tool for human factors professionals?

Hierarchical task analysis provides guidelines on how to perform certain tasks and is relevant and an Important tool to professionals. This is because: It provides consistency in the accomplishing of certain goals. Once a hierarchical task analysis has been performed, there is the establishment of a standard way of performing...

Explain the Hierarchical Task Analysis method.

Hierarchical task analysis is a structured, objective approach that gives an understanding and appreciation of the tasks that users need to perform in order to achieve certain goals. Its main aim is to identify training needs. It originated from human factors and mostly focuses on the identifiable, observable, and physical...

Who’s in favor of network neutrality? Who’s opposed? Why?

The groups such as Moveon.org, the Christian Coalition, the American Library Association, and Amazon are some of the organizations that are in favour of the maintenance of the status quo. By the status quo, I mean uncontrolled access whereby those who come first access the net first without any restrictions....

Who is Ed Catmull and what was his role in the development of computer graphics?

A technology breakthrough that made an impact on the field of computer graphics came from the introduction of such rendering techniques as texture mapping, z-buffering, anti-aliasing algorithms and other computer graphics rendering techniques. Those techniques were discovered by Ed Catmull, president and co-founder of Pixar Animation Studios. Catmull studied computer...

List and describe the equipment would you expect to find in an Emergency Control Centre? Give one example of a piece of ECC equipment that is Resilient?

The following is a list and description of some equipment found in the Emergency Control Centre (ECC). Commercial Portable Commercial Radio The emergency control center (ECC) should have an adequate portable, dual-way commercial radios to facilitate communication between the involved agencies and the command post. This commercial mobile alert service...

Discuss how the Web uses hypermedia.

Hypermedia is an extension that allows people to open new Web pages by clicking text links, images, videos, and other graphic components on a Web browser. This extension can be used to redirect the customer to another page for advertisement purposes or for providing additional information. For example, a person...

Briefly describe the application component of a social media information system.

The social media information system has such application components as hardware, software, data, procedures, and people. The hardware and software provide the existence of SMIS by hosting them on servers and creating interfaces convenient for customers’ use, respectively. Data consist of content and connections; the first type is information that...

Compare the various scaling methods. Why scalability is a key business issue for websites? Provide an example of a website that is a good representation of scalability.

Scalability is a crucial feature of any website. Scalability refers to a website being able to process requests fast enough to create a smooth experience while browsing a website. Also, it is an ability to perform equally good while the number of customers grows. As more clients begin to use...

Prescriptive analytics is considered to be a step further ahead of predictive analysis and substantially different from it. Provide an example of each and outline their differences.

Predictive analytics is about forecasting. This type of analysis builds up statistical models and then uses forecast techniques to produce the estimated insight. According to Rosenbröijer, “The enablers for predictive analytics are data mining, text mining, web mining, and forecasting.” The common implementation of this type of analysis is the...

Select one of the processes of Business Performance Management and discuss the types of software tools and applications that are available to support it.

IBM Cognos Business Intelligence is a great example of software that is used for the monitoring process. As noted by Zheng: “Its Metric Studio provides a comprehensive performance monitoring.” It is a wide array of tools for reporting, analysis, and scorecards. It can monitor both event management and the performance...

How has Digital Media influenced the field of education? Include a historical and global perspective of the US and at least two additional countries. Include whether the change has been positive or negative.

Digital media has ingrained itself deeply into every aspect of our lives. The field of education, of course, is one of the main users of digital media. Bit by bit, educational strategies are moving away from papers, pens, and printed books and towards computers and electronic libraries. However, as we...

Explain the difference between application software and support software.

Application software (end-user programs) refers to software that processes data for the user, such as spreadsheets, word processors, and database programs. Application software is usually bulky compared to system software due to its numerous functions. Example: A stock ordering system. Support software (also system software) refers to software used to...

Outline the primary logic and elements of the concept of Key Escrow. Include the proponents’ and opponent’s positions, the science and method of implementation, types, and names of the specific implementations, and the success or failure of the concept from its inception to today.

Escrow Key is an agreement by virtue of which a depositor complies to relocate property to an escrow agent for the goal of fulfilling a depositor’s responsibility to transfer it to a different party in whose interest the property is deposited to the recipient or beneficiary. The escrow agent agrees...

What are the challenges in the Opower case for energy efficiency programs in general?

The provision of energy efficiency programs has many challenges. First, there is a lot of skepticism from the utility companies, especially if the programs being suggested have never been tried or used before. This, therefore, creates doubt among the utility-producing companies, who usually doubt the efficiency or viability of the...

What are the relative strengths and weaknesses of the major imaging methods?

Of the different imaging methods, Magnetic Resonance Imaging (MRI) provides immense value in enabling the provision of high levels of resolution images. The technology entails the use of powerful magnets to get results because of which metal objects have to be removed from the vicinity. Exposure to the powerful magnetic...

What role has the federal government played in the expansion of the computer industry?

The federal government especially the defense department has played key roles in the expansion of the computer industry. Most of the computer technology projects that have resulted in the growth of the computer industry were supported or funded by the government. In addition, the federal government indirectly supported the expansion...

The “Going to “Great Lengths” to Prevent the Escape of Genes That Produce Specialty Chemicals” paper by Norman C. Ellstrand mentions “terminator” genes. What exactly is “terminator” technology?

The terminator gene is a particular genetic sequence incorporated into a seed’s DNA which, when turned on by a man-made chemical catalyst, the sequence renders the seed and crop it produces sterile. In other words, the farmers will not be able to use the seed of the crop for further...

Describe synchronous optical networking (SONET). How does it differ from synchronous digital hierarchy (SDH)?

“The synchronous optical network (SONET) is the American standard (ANSI) for high-speed dedicated-circuit services. The ITU-T recently standardized an almost identical service that easily interconnects with SONET, under the name synchronous digital hierarchy (SDH).” SONET has different optical carrier levels that start with a minimum of 51.84 Mbps. The OC...

Compare and contrast ring architecture, star architecture, and mesh architecture.

Ring, star, and mesh are the “three basic architectures used in dedicated-circuit networking.” Imagine that you’re five years old again and you’re learning to draw, so you have a ‘connect the dots book.’ The first dot is in New York, the second in Illinois, the third in Oregon, the fourth...

Discuss why human factors should or should not be included into the design of the input systems. Explain why it is or is not important to test the system on users.

Human factors is a branch in the scientific field that tries to understand the interaction among humans and other elements of machines, principals, professions data and methods employed in designing in order to optimize human well being, and overall machine performances. The human factors should be put into consideration when...

Define Sociotechnical Systems Analysis.

Sociotechnical systems analysis is a subdivision of modern technological activity and is frequently related to making technics.