What are the challenges of making STEM fields more diverse and inclusive?

What are the challenges of making STEM fields more diverse and inclusive? Why is it important to make STEM fields more diverse and inclusive?

Describe activation of component(s), if needed, required to deliver this solution

Gilmore’s Tires, Inc. (aka Goodyear Tires, Inc.)
Scenario: Mr. Gilmore and his managerial staff agree that everyday driver feedback is a valuable strategy to strengthen market share. In addition to this feedback, Mr. Gilmore feels that rewarding a customer’s loyalty to his brand will facilitate a long lasting business relationship.
Instructions:
Propose IT solution
– Detail current information system (Note: It can be assumed this organization has a dynamic information system capable of deploying all components associated with CRM
– Describe activation of component(s), if needed, required to deliver this solution
– Recommend a customer loyalty program (if needed)

Evaluate the classical approaches to leadership and how these have evolved into more contemporary leadership approaches in the current business environment.

Evaluate the classical approaches to leadership and how these have evolved into more contemporary leadership approaches in the current business environment.

Focusing on an organisation of your choice critically evaluate their approach to leadership and analyse the impact of:

a/ leadership styles on management practice and

b/ a globalised work force on leadership and management practice

Create a Data Flow Diagram (DFD) relating the tables of your database schema through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia.

This is an ongoing project and i have uploaded the introduction please read and build upon that in addition i have uploaded a sample paper please make sure to include all necessary diagrams.
One of the main functions of any business is to be able to use data to leverage a strategic competitive advantage. This feat hinges upon a company’s ability to transform data into quality information. The use of relational databases is a necessity for contemporary organizations; however, data warehousing has become a strategic priority due to the enormous amounts of data that must be analyzed along with the varying sources from which data comes. Since you are now the CIO of a data-collection company which gathers data by using Web analytics and operational systems, you must design a solution overview that incorporates data warehousing. The executive team needs to be clear about what data warehousing can provide the company.

Section 1: Design Document

Write a four to six (4-6) page design document in which you:
Support the need for data warehousing within your company and elaborate on the best practices that the company will adhere to.
Create a schema that supports the company’s business and processes. Explain and support the database schema with relevant arguments that support the rationale for the structure. Note: The minimum requirement for the schema should entail the tables, fields, relationships, views, and indexes.
Create an Entity-Relationship (E-R) Diagram relating the tables of your database schema through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix. Explain your rationale behind the design of your E-R Diagram.
Create a Data Flow Diagram (DFD) relating the tables of your database schema through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.
Illustrate the flow of data including both inputs and outputs for the use of a data warehouse. The diagram must map data between source systems, data warehouses and specified data marts. The diagram should map data between source systems, data warehouses, and specified data marts. Note: The graphically depicted solution is not included in the required page length.

What are at least 3 of the different “views” that Axiom can display for the analyst?

Objectives:         Explore options for mobile extractions.
Explore options for mobile analysis

Perform an Android backup analysis

Preparation:  Be sure to view to the presentations in Canvas before beginning the lab. The presentation will show you how we got here.

Overview:

There are several avenues we can take to access mobile data. Sometimes the device is the hardest way. Passcodes, PINS and today’s encryption technologies make smart phone access very, very difficult. For this reason, we often find it simpler to locate a backup on the suspect’s computer or in the cloud. With automated backups being so common, people often destroy their physical devices but forget the backup exists in one or more places.  In this lab, we will examine a backup of Norm’s tablet.

Lab Resources:   

  • Magnet Axiom software
  • Android phone Image

Scenario:  On the tablet recovered from Norm’s house we were able to access the cloud backup of his Android mobile phone. You are tasked with finding evidence on the mobile image provided to you that may tie Norm to stealing the OWAT code.

PART 1: Get ready!

  1. Review Power Point presentation on Android file structure.
  2. Extract the mobile image provided in the zip file that was posted.
  3. Open the mobile image within Axiom.

Part 2:  Answer the following questions regarding android file structure:

  1. To start acquiring evidence from an Android device, there are many requirements that must be done on the mobile device when plugged into the host machine first before Axiom will be able to examine evidence on the device. What are the top three most important requirements before being able to acquire evidence from an android device?
  2. There are multiple areas on an android device that are important artifacts. Please list below five important areas where artifacts can be found, and what can be found in those directories.
  3. Android devices pertain a decent amount of partitions on the system as there is usually no limit to the amount of partitions can be found on the device. List below five of some of the most common partitions on android devices.
  4. One of the most important artifacts on mobile devices can be email artifacts such as the Gmail app on android devices. Where on the android device are Gmail’s artifacts stored? I am looking for the full path to these artifacts, and the partition they rely in.
  5. Answer:
  6. Path:
  7. Partition:
  8. Text messages are a very important artifact when it comes to mobile forensics. Where on android devices are text messages logs stored? Please give the full path, and the .db file associated with where the log is written to.
  9. Answer:
  10. Path:
  11. File name:

Par 3:  Answer the following questions regarding Axiom software:

  1. In Axiom, there are several tabs in the navigation pane off to the left side of the screen. What are at least 3 of these tab names? (Hint: Look at the video, and look off to the left under “All Evidence”)
  2. What are at least 3 of the different “views” that Axiom can display for the analyst? (Hint: In the top right-hand corner of Axiom, there is a dropdown with the different types of views)
  3. Next to the button in Axiom, there is a dropdown bar with a few other options to explore and see evidence in a different way compared to “Artifact view”. What is name of the tab that allows an analyst to see the actual system view of the mobile device like how FTK imager shows the contents of an HDD?
  4. Underneath of the “Operating System” Tab in the navigation pane, there is a sub section called “Android Device Information”, and in that section, what is one piece of evidence that Axiom can provide for the analyst that may be useful off a mobile device?

Part 4:  Answer the following questions about Norm’s mobile phone backup:

  1. Where and what time did Rebecca and Norman have their meeting scheduled for? Provide a path of where you found the artifact, and a screenshot of the artifact.

Answer:

Path:

Screenshot:

  1. What is Norman’s email address? Provide a path of where you found the artifact, and a screenshot of the artifact.

Answer:

Path:

Screenshot:

  1. Did Norman connect to the Wi-Fi provided at the meeting place Rebecca and Norman scheduled to meet? Provide a path of where you found the artifact, and a screenshot of the artifact.

Answer:

Path:

Screenshot:

  1. What is the password to the encrypted file located on the mobile device? Provide a path of where you found the artifact, and a screenshot of the artifact.

Answer:

Path:

Screenshot:

  1. Inside of the encrypted file, there is an image that does not appear to be an actual image, and it may require some further analysis to discover what the original extension was. What was the original extension of the file, and what is the name of said file with the changed extension? Provide a path of where you found the artifact, and a screenshot of the artifact.

Answer:

Path:

Screenshot:

  1. Finally, provide proof of the OWAT code on Norman’s device, and provide a path of where you found the artifact, and a screenshot of the artifact.

Answer:

Path:

Screenshot:

 

 

 

 

 

 

Review the assignment instructions below and click on the underlined words for information about how to craft each component of an annotation.

Assignment: Annotated Bibliography

Submit: Annotated Bibliography

This week culminates in your submission of an annotated bibliography that should consist of an introduction, followed by two quantitative article annotations, two qualitative article annotations, and two mixed methods article annotations for a total of six annotations, followed by a conclusion.

An annotated bibliography is a document containing selected sources accompanied by a respective annotation. Each annotation consists of a summary, analysis, and application for the purpose of conveying the relevance and value of the selected source. As such, annotations demonstrate a writer’s critical thinking about and authority on the topic represented in the sources.

In preparation for your own future research, an annotated bibliography provides a background for understanding a portion of the existing literature on a particular topic. It is also a useful precursor for gathering sources in preparation for writing a subsequent literature review.

Please review the assignment instructions below and click on the underlined words for information about how to craft each component of an annotation.

Please use the document “Annotated Bibliography Template with Example” for additional guidance.

It is recommended that you use the grading rubric as a self-evaluation tool before submitting your assignment.

By Day 7

  • Use the Walden library databases to search for quantitative, qualitative, and mixed methods research articles from peer-reviewed journals on your topic of interest.
  • Before you read the full article and begin your annotation, locate the methodology section in the article to be sure that it describes the appropriate research design.
    • For quantitative research articles, confirm that a quantitative research design, such as a quasi-experimental, casual comparative, correlational, pretest–posttest, or true experimental, was used in the study.
    • For qualitative research articles, confirm that a qualitative research design or approach, such as narrative, ethnographic, grounded theory, case study, or phenomenology, was used in the study.
    • For mixed methods research articles, confirm that a mixed methods research (MMR) design was used in the study. There are several design classifications in MMR; some examples of MMR types or families of design are parallel, concurrent, sequential, multilevel, or fully integrated mixed methods design.
  • Prepare an annotated bibliography that includes the following:
    • A one-paragraph introduction that provides context for why you selected the six research articles you did: two quantitative, two qualitative, and two MMR.
    • A reference list entry in APA Style for each of the six articles that follows proper formatting. Follow each reference list entry with a three-paragraph annotation that includes:
    • A one-paragraph conclusion that presents a synthesis of the six articles.
  • Format your annotated bibliography in Times New Roman, 12-point font, double-spaced. A separate References list page is not needed for this assignment.
  • Submit your Annotated Bibliography.

Submission and Grading Information

To submit your completed Assignment for review and grading, do the following:

  • Please save your Assignment using the naming convention “WK10Assgn+last name+first initial. (extension)” as the name.
  • Click the Week 10 Assignment Rubric to review the Grading Criteria for the Assignment.
  • Click the Week 10 Assignment link. You will also be able to “View Rubric” for grading criteria from this area.
  • Next, from the Attach File area, click on the Browse My Computer button. Find the document you saved as “WK10Assgn+last name+first initial. (extension)” and click Open.
  • If applicable: From the Plagiarism Tools area, click the checkbox for I agree to submit my paper(s) to the Global Reference Database.
  • Click on the Submit button to complete your submission.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

 

Ben-Natan, M., Sharon, I., Barbashov, P., Minasyan, Y., Hanukayev, I., Kajdan, D., & Klein, K. A. (2014). Risk Factors for Child Abuse: Quantitative Correlational Design. Journal of Pediatric Nursing, 29(3), 220–227. https://doi-org.ezp.waldenulibrary.org/10.1016/j.pedn.2013.10.009

 

Finlay, J. M., & Kobayashi, L. C. (2018). Social isolation and loneliness in later life: A parallel convergent mixed-methods case study of older adults and their residential contexts in the Minneapolis metropolitan area, USA. Social Science & Medicine, 208, 25–33. https://doi-org.ezp.waldenulibrary.org/10.1016/j.socscimed.2018.05.010

 

Hebert, S., Bor, W., Swenson, C. C., & Boyle, C. (2014). Improving collaboration: A qualitative assessment of inter-agency collaboration between a pilot Multisystemic Therapy Child Abuse and Neglect (MST-CAN) program and a child protection team. Australasian Psychiatry, 22(4), 370–373. https://doi-org.ezp.waldenulibrary.org/10.1177/1039856214539572

 

Walton, T. (2016). Using a Mixed Methods Approach to Investigate University Student Success after Support Service Interaction: A Case Study and Analysis. Journal of the Australian & New Zealand Student Services Association, 48, 38–48.

 

 

 

 

Referring to a nursing theorist: state how their theory will influence and guide you as you progress through the educational process of obtaining a BSN.

Requirements:

  • A Personal Philosophy of Nursing paper will be written using APA format describing the student’s present view of nursing. No abstract is needed, but the paper must include introduction and conclusion paragraphs per APA guidelines. The title page and reference page are not to be included in the page count. The paper must not exceed four pages. Level headers are required according to APA guidelines-if you are unfamiliar with the use of level headers please review or ask.
  • Students will submit the paper electronically using the drop box in Canvas. It is recommended that students keep a clean copy of their paper for their professional portfolios.
  • Papers will be graded according to the Philosophy of Nursing Paper Grading Rubric.  Students must address all items in totality in order to receive full points.
  • References:  3 referencesare to be included in the paper. References must be of a professional level and cited in the paper using APA format. Of note – Wikipedia is not a professional reference. Examples of professional references include professional journals, text books, and/or professional websites. If you are unsure if a reference is acceptable to use contact faculty or other resources: librarian and writing specialist.

Mechanics: Sentence structure, typographical errors, spelling, and grammar will be evaluated according to the paper’s rubric.

 Items to be addressed in the paper:

  1. Bellin College’s values must be addressed in the paper. It is your determination where the college’s values are most reflective and apply to your philosophy of nursing.
  2. Referring to a nursing theorist: state how their theory will influence and guide you as you progress through the educational process of obtaining a BSN.
  3. Referring to a definition of nursing > please do not use the definition from a dictionary >ANA and other sources have professional nursing definitions > summarize the definition and state what the definition means to you as a future Registered Nurse.
  4. Choose an influential current nurse leader > there are many choices to chose from: board of nursing member, congressperson, military, nurse theorist, personal choice of a nurse who has influenced you > state how he/she has made an impact on the nursing profession.
  5. What is your vision for the future of the nursing profession?

 

What are the issues with today’s browsers?

Read the following article for some initial insight from Tim Berners-Lee on the 25th anniversary of the browser:

(Links to an external site.)

For this week’s lecture consider what issues browsers contend with now and where the browser, and by extension the Internet, is going:

What are the trends in browsers?
What are the issues with today’s browsers?
Which application protocols need updating and why?
How are mobile/handheld browsers different from the traditional desktops?
On a personal level, what are your own experiences with browsers? How often do you use mobile browsers and what problems do you see with the current state of browsers? Where do you see them going?

State and discuss the applicable ethical theory from Module 1 that supports your decision.

Description

This assignment is an opportunity to explore and apply a decision making framework to an IT-related ethical issue. A framework provides a methodical and systematic approach for decision making. UMGC Module 2 – Methods of Ethical Analysis (see LEO Content – Readings for week 2) describes three structured frameworks that may be used for ethical analysis, namely Reynolds Seven-Step Approach, Kidder’s Nine Steps, and Spinello’s Seven-Step Process. There are several ways described in UMGC Module 2 to systematically approach an ethical dilemma, and while each of the frameworks described has its merits, each will result in an ethical decision if straightforwardly, objectively, and honestly applied.

In addition, consider the ethical theories described in Module 1 – Introduction to Theoretical Ethical Frameworks (see LEO Content – Readings for week 1) which help decision makers find the right balance concerning the acceptability of and justification for their actions. A separate write-up of the ethical theory that supports your decision is part of the following requirements.

*I have selected the dilemma below.*

Privacy on the Web: What is happening now in terms of privacy on the Web? Think about recent abuses and improvements. Describe and evaluate Web site policies, technical and privacy policy protections, and current proposals for government regulations.

The method of Ethical analysis will be Reynolds Seven- step
approach.

The ethical theory will be computer ethics.

For this paper, the following five elements must be addressed:

Describe a current IT-related ethical issue: Since this is a paper exercise, not a real-time situation, you may want to construct a brief scenario where this issue comes into play, and thus causes an ethical dilemma. The dilemma may affect you, your family, your job, or your company; or it may be a matter of public policy or law that affects the general populace. See the list below for a list of suggested issues, which may be a source of ethical dilemmas.

Define a concise problem statement that is extracted from the above description or scenario. It is best if you define a specific problem caused by the dilemma, that needs a specific ethical decision to be made, that will solve the dilemma. Be aware that if it is a matter of public policy or law, that it may require a regulatory body or congressional approval to take action to implement a solution.

Analyze your problem using one of the structured decision-making frameworks chosen from Module 2. Make sure that you identify the decision-making framework utilized. In addition, the steps in the decision-making framework selected must be used as major headings in the Analysis section.

Consider and state the impact of the decision that you made on an individual, an organization, stakeholders, customers suppliers, and the environment, as applicable!

State and discuss the applicable ethical theory from Module 1 that supports your decision.

Concerning your paper:

Prepare a minimum 3- 5 page, double-spaced paper and submit it to the LEO Assignments Module as an attached Microsoft Word file.
Use headings for each topic criteria
Provide appropriate American Psychological Association (APA) source citations for all sources you use. In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style.
Include a Cover Page with your Name, the UMGC/Name of the Class, and the Title of the Paper.

Create a simple BPMN diagram for the scenario using the Lucidchart diagramming tool.

Description

This week, you will learn the basics of BPMN, create your own BPMN diagram. You will use a web-based, easy-to-use, free diagramming tool called Lucidchart () to create your BPMN diagram.

• Choose one of the two following scenarios:

o Going out to eat at a sit-down restaurant (not fast-food)

o Going to a Vacation Resort

• Create a simple BPMN diagram for the scenario using the Lucidchart diagramming tool. The goal is to represent the major activities and processes in a simple, easy-to-read diagram. Use the “keep it simple” principle. Be sure to include swim lanes.

Review a few BPMN diagram examples

(This is the official site for BPMN – has lots of information)