Archive | Technology RSS feed for this section

How have new information and communication technologies, including the Internet, affected the political economy in general?

How have new information and communication technologies, including the Internet, affected the political economy in general?

Read More | Order Now

Are Robots Hurting Job Growth?

https://youtu.be/w2lDmF8ZShI
Summarize the current affairs video in 500+ words “Are Robots Hurting Job Growth?” (link above) In your summary, critically evaluate how new technologies are replacing workers, at the same time making US economy more competitive with low wage countries like China and India? How this new high tech economy will impact income inequality? What economic lesson you learned frown this video?

Read More | Order Now

Computer Graphics

What is Computer Graphics? Where Computer – Generated Pictures are used? Please explain in detail.

Read More | Order Now

why are modern computers named digital?

why are modern computers named digital?

Read More | Order Now

Information Technology;Research Paper Assignment.

You are required to submit a research paper. The paper must focus on one of the following topics:

A comparison of Windows versus Linux based operating systems.
Modern approaches to process synchronization.
Limitations of mobile operating systems and how they may be overcome.

Read More | Order Now

Technological Pedagogy Knowledge:

Technological Pedagogy Knowledge: This area involves advanced learning processes through the use of technology that contribute to a wider variety of differentiated instructional opportunities including iPads that have text to speech programs, SMARTboard with text magnification, and online educational games that provide immediate feedback.
Assignment Instructions
Using the classroom environment and the demographics created in Week Two, the instructional strategies that align with the CCSS in the blog created in Week Three, the unit plan created in Week Four, and the summative assessment created in Week Five, you will create the framework for a TPACK lesson plan.
Include the following in your lesson plan:
1.Title: The title of your lesson.
2.Grade level and basic class demographics.
3.Anticipated Outcome (Lesson Objective): This must be measurable and written to align with the CCSS.
4.Common Core State Standard: This can be from your Unit Plan.
5.NETS-T standard being met.

Read More | Order Now

The Electronic Era and Postmodernism

Topic: The Electronic Era and Postmodernism
Summary:
Read: The Electronic Era and Postmodernism by Margot Lovejoy
Postmodernism Goals for reading reflection: How dada, surrealism and fluxus lead the way into postmodernism. Shift to conceptual interests. Dematerialization and conceptual art. Video, kinetic, and performance art. Collaboration between artists and scientists. Lack of critique of technology. The Art and Technology exhibition and three categories of work shown. Photography and Walter Benjamin’s notion of authentic aura. Feminism. Postmodern characteristics. Channel surfing leads to web surfing. Mediated reality (this is a central theme of this course). Increased public interaction with art. Collectives of artists and collaboration and Group Material. Use of popular media and the art world.
here the link to the reading
http://lisahutton.net/reading/TheElectronicEraAndPostmodernism.pdf

 

Read More | Order Now

Technology-capturing data

Consider a physical location from your favorite television show or movie. This building has some piece of electronic data stored on a hard drive in whatever passes for the most secure room in the facility.

For example, If you chose the bar from It’s Always Sunny in Philadelphia, the hard drive will be connected to a computer in the back office. If you chose Bruce Wayne’s house, the hard drive would be connected to a computer in the Bat cave etc…

Take a few minutes and think about how you, a complete stranger, would get the data off that drive. Things to consider, are there physical processes (business or otherwise) that can be exploited to achieve my goal? Can the drive be physically accessed at all, if so, how will I get the data off? Would it be easier to go in over the wire? What kind of security can you expect? What are the odds of encountering encryption, and if you do, then what? How would you connect to this box in the first place? Can social engineering solve any smaller problems?

Your task here is to create a theoretical plan to capture that data.

Read More | Order Now

Information Technology

Reference book is
Turban, Efraim & Volonino, Linda & Wood, Gregory R. & Sipior, Janice C.. ( © 2013). Information technology for management: advancing sustainable, profitable business growth, 9th edition.

Use 12-point font, double space, one inch margins and default word wrap. If you have tables or graphics (which you may provide for no extra credit), append them using APA format after the reference page.

Question 1 (Essay Question) You work for a small store that sells automobile tires.   You see an opportunity to expand the business by offering products and services information via the Internet.  The store does not have any computer systems.Search the Internet and discuss your recommendation for an e-Business system. Be specific about the following business capabilities: functional IS systems (Turban et al., Figure 9.1 in Chapter 9), collaboration/ communication tools (Turban et al, Section 10.4 in Chapter 10) with suppliers/ customers/ employees, and web presence solutions (i.e., applications that create and host web sites). Justify your recommendation. (Emphasis on Turban et al. Chapters 6, 9 and 10.) For the entire question (question and response), the minimum length is one page; maximum length is 1.5 pages.

Question 2 (Short Answer with analysis). A health care organization is planning to implement an automated patient care system that will enable the health care organization to electronically share information with their patients.  They would like to provide patients with access to medical records, submit consent forms for treatment, and enable electronic payment of bills using the internet. (Hint: Emphasis on issues discussed in Turban et al. Chapters 5 and 14).For the entire question (question and response), the minimum length is one page; maximum length is 1.5 pages.
a. Use a (bullet) list to identify and explain the top 3 privacy and security concerns that the healthcare solution needs to address.

b. Use a (bullet) list to identify and explain the top 5 recommendations for policies and/orIT technologies necessary to mitigate these concerns.

Read More | Order Now

Discuss with your team how the bookstores use the Internet and if they use collaboration technology.

Weekly Reflection
Discuss with your team how the bookstores use the Internet and if they use collaboration technology. If they do not use collaboration technology, in what ways could the bookstores use it? Discuss with your team how the Week Three objectives relate to the bookstore project. Prepare an outline that includes concepts from Weeks One through Three to detail your research for the bookstore project. Include the following criteria: The use of databases and data communication technologies The company is Amaszon and please provide speaker notes so I can explain in front of a class. No paper needed

Read More | Order Now