Prepare and practice a five minute presentation with slides that defends your to

Prepare and practice a five minute presentation with slides that defends your topic idea. Present your argument and case for significance. Base your argument on the existing literature and how you identified a gap or problem.
You may create up to 3 content slides and 1 for References.
You will be graded both on your defense of your topic idea and on your clear, articulate presentation of it.
I will upload my Introduction paper and my literature review so you can have an overview of my research study topic . This study is going to be quantitative study pretty much.
Initially, I will collect data from Twitter API about these 50 accounts link I will cover data collection of public tweets and following lists. First thing to start is to get a Twitter developer account, I will sign up for Academic Research account .This will allow me to collect data for academic purpose link. I can always customize the data I am requesting for my research study.
My literature review, some of the references in the my literature review file is useful some are not because my research topic got shifted from the “Impact of Artificial Intelligence on Twitter trends ” to the topic the current topic.
You don’t have to stick to the literature review , you can find new references related to my new shifted topic , Peer review articles are recommended.
all what I need is 3 slides , notes , and one more slides as reference slide

Dear writer ! Here report and powerpoint presentation is needed. We need you to

Dear writer ! Here report and powerpoint presentation is needed.
We need you to estimate the required number of pages and slides for it.
Group Project Description and Rubric
You are assigned to a group of 4 students to conduct a database project during the semester. Each group is to identify a real-world database development project. You are required to analyze, design, and implement a prototype database system using MySQL for your identified project. The subject could be an organization that you are employed with or an organization you are observing. Contacts with a representative from the particular organization are encouraged but not required.
If the students did not participate in any parts of the group project, they will receive a 0 for the final group project grade!
The deliverables of the project are (TOTAL SCORE: 100 pts):
A. mid-term presentation (5 pts)
B. final presentation(60pts)
C. project report (30 pts)
D. individual team member rating (5 pts)
A. A mid-term presentation to the instructor (5 pts)
a. A general description or the introduction of the company where the group project is being conducted, which includes: business goals of the company and products/services provided by the company etc. (1 pt)
b. Identify and report user requirements for your group project (1 pt)
c. (Conceptual Data Modeling) Draw a basic Entity-relationship diagram based on user requirements described in item b (3 pts)
B. Final presentation and code demonstration (power point or equivalent).Each group is given 10 min. to present your project to the class and demonstrate your database implementation. One or two representatives from each group must present. Must contain the following: (60 pts)
a. A General description or a introduction of the company where the group project is being conducted, which includes: business goals of the company and products/services provided by the company etc. (2 pts)
b. Identify and report user requirements for your group project. (8 pts)
c. (Conceptual Data Modeling) Draw Entity-relationship diagram based on user requirements described in item 2 (20 pts).
d. (Logical Database Design) Convert Entity-relationship data (ERD) model into a relational data model (10 pts).
e. (Implementation in MySQL) Implement relations in the relational data model developed in item 4 by using DDL and DML in MySQL. Populate sample data into these tables (20 pts): (1). Tables, columns, keys, etc. with at least 20 rows of data per table. (10 pts); (2). 5 SQL Queries inclusive of at least 3 JOINs; (5 pts); (3). 2 Views and 2 Stored procedures. (5 pts)
C. A project report documents the process and the results of your group project. The report should have at least the following: (30 pts)
a. General description (1 pts)
b. User requirements (4 pts)
c. Conceptual Data Modeling (10 pts)
d. Logical Database Design (5 pts)
e. Implementation in MySQL (10 pts)
D. Individual team member (5 pts)

What does privacy mean to you? With the amount of technology surrounding us toda

What does privacy mean to you? With the amount of technology surrounding us today, do you expect privacy in your home and out in public? With regards to technology, what ways do you give up your privacy? There is a collection of TED Talks on the topic of privacy. Using the links below, please select at least one video to watch, briefly summarize it, and describe how the video resonates with you/your experiences. The selected video should be published within the last few years (2018-21).
https://www.ted.com/playlists/666/who_s_watching_us
https://www.ted.com/playlists/374/what_your_data_reveals_about_y

Required Resource: Search the term Family Educational Rights and Privacy Act (FE

Required Resource:
Search the term Family Educational Rights and Privacy Act (FERPA) using your favorite search engine
Instructions:
In this lab, you will create a high-level IT asset inventory list, you will prioritize those assets, you will identify the risk exposures, and you will make recommendations for policies that can mitigate the risk exposures.
Security policies mitigate risks in a wide variety of environments. Some risks are unique to different environments, and some environments produce highly significant risks. To counter these special environments, such as a hospital, school, or financial institution, the government legislates special acts to provide guidance and countermeasures. This lab uses the environment of a school and the guidance of the Family Educational Rights and Privacy Act (FERPA).
Case Study: Premier Collegiate School
You are the new director for Information Technology at Premier Collegiate School. The private school teaches grade 7 through grade 12 with 300 students and 30 staff members and faculty. Each of the 10 administrative staff members has a dedicated desktop computer. The school’s principal has a notebook computer that she takes home and when traveling to conduct both school business and personal tasks. She maintains a Facebook™ account and has opened a MySpace™ account to monitor the activities of the students who also have such accounts. The teachers have 10 computers that they share in the teacher’s lounge to record grades and do all work associated with conducting their assigned classes (daily lesson plans, research, handouts, tests, quizzes, and final exams).
The school has two file servers. One is for administration business and the other serves student computing needs. The administration server has dedicated storage for each of the teachers and both hardwired access and wireless Local Area Network (LAN) access throughout the school. The student server has applications the students might need for their schoolwork, and provides wireless access for student-owned laptop computers. All students are required to have a laptop computer with wireless access. In addition, the school has a dedicated computer lab with 25 desktop computers for the students to use in computer science classes.
Deliverables:
Include the following in your Lab Report File:
Download the attached document [MS-Word File Size 160 KB] to create a high-level IT asset inventory list and prioritize the IT assets in terms of importance to a school’s operation and business.
Identify the top five risk exposures found in the high-level IT asset assessment.
Recommend IT security policies that can help mitigate the identified risk exposures.

First half of a page: 100 words feed back Major adverse events such as the 9/11

First half of a page:
100 words feed back
Major adverse events such as the 9/11 World Trade center terrorism event often result in future constructive change. As pointed out by Shore (2007), 9/11 had a significant impact on technology and the business continuity and disaster planning for private, public, healthcare, education, and other industries. The term “proactive preparedness” shares the need to be prepared in advance. In addition to have BCP/DR plans organization must have the technology, resources, upper management support, and processes to execute the plans. The roles of employees and their safety are critical requirements for BCP/DR.
Reflecting on the current COVID-19 pandemic, how do you think this event will influence future business impact analysis, and business continuity/disaster planning?
Reference
Shore, D, (2007, June 8). Sept. 11 teaches real lessons in disaster recovery and business continuity planning, Tech Republic. Impact of 9-11 on Disaster Planning
Second half of a page:
100 words feedback
One of the challenges organizations have is the dynamic nature of information growth and requirements combined with a complex supply chain. Health care organizations have complex supply chains that may go four tiers deep. That complicates security, operations, risk management, and the BIA. Defining the scope is a challenge.
What organization should lead the BIA in a hospital? How would the scope be defined?

Summarize the authors work and include security features, security requirements

Summarize the authors work and include security features, security requirements or security vulnerabilities, existing security solutions for 3GPP 5G network. also add countermeasures ideas for the research issues about the new features and techniques in 3GPP 5G network. only use the attached paper as source.

For these tasks you should refer to, and follow, relevant instructions in the of

For these tasks you should refer to, and follow, relevant instructions in the official Amazon Elastic Compute Cloud User Guide (Amazon Web Services, n.d.-k), available in this week’s resources.
TASKS:
1. Log on to AWS Educate using your AWS educate starter account, and click AWS Console button.
2. Launch a new instance using the Amazon EC2 console, in your default Region/Availability Zone.
3. Select the Amazon Linux AMI.
4. Choose the t2. medium instance type.
5. Launch the instance in the default virtual private cloud (VPC).
6. Assign the instance a public IP address (your choice), and add a tag to the instance of Key: Name, Value: ITEC6210-YourName.
7. Create a new security group called ITEC6210-Group-YourName.
8. Add a rule to the group ITEC6210-Group-YourName, allowing Secure Shell (SSH) access from any IP address.
9. Launch the instance, and when prompted for a key pair, create a new public-private key pair—ITEC6210Key-YourName. Download the private key (a .pem file) to your workstation.
10. Open a Linux terminal or command prompt window, and copy the private key into the working directory. Note, if on a pre-Windows 10 machine, you may need to download and install the CYGWIN “Linux emulator for Windows” tool by following the instructions provide here: www.cygwin.com.
11. Run the chmod command on the key file, as follows: chmod 400 ITEC6210Key-YourName
12. SSH into the instance using the public IP address, the user name ec2-user, and the ITEC6210Key-YourName .pem file.
The command format is:
ssh -i ‘.pem’ ec2-user@
13. Use relevant Unix commands to navigate through the directory structure of your AWS t2 instance, and view the types of folders and files available.
14. Close the SSH session by typing the exit command.
15. Return to the AWS console and terminate the instance you created.
By Day 7
Submit a report in Blackboard summarizing your experiences with carrying out the tasks and including screenshots of the tasks you perform.

you will need to send me the invite and description (screenshots are accepted) o

you will need to send me the invite and description (screenshots are accepted) of a professional development event you have attended, as well as a 1 page write-up of your experience. This can be for any professional development or learning opportunity from any professional association (i.e., American Library Association, Association for Computing Machinery, ASIS&T, etc.) or private company (i.e., Gartner, IBM, Google, Microsoft, etc.). This cannot simply be watching a YouTube video – this should be a “live” (virtual) event where you have the opportunity to learn about a new topic or network with other professionals.
Evidence must include:
Name of the Hosting Organization
Date & Time
Event Topic
Summary/Description of the Event
You will also include a write-up of your experience:
2 pages
What did you learn?
Did you meet anyone interesting?
How do you think events like this will support your future career?
Questions you had from the event (about the topic, generally about networking, professional development, joining a professional association, etc.).
Anything else that you think is relevant to include

You “do not” have to draw a use-case diagram or set of activity diagram. “You on

You “do not” have to draw a use-case diagram or set of activity diagram. “You only have to create a BPD(Business Process Diagram) for Exercise O.” I will attach the basic information and knowledge of BPD(Business Process Diagram) on the additional materials section. I need this assignment in “PDF” form. I will now write down “Exercise O” below.—————————————————Exercise O : Draw a use-case diagram and a set of “activity diagrams” for a gym membership system. When members join the gym, they pay a fee for a certain length of time. Most memberships are for one year, but memberships as short as two months are available. Throughout the year, the gym offers a variety of discounts on their regular membership prices (e.g., two memberships for the price of one for Valentine’s day). It is common for members to pay different amounts for the same length of membership. The gym wants to mail out reminder letters to members asking them to renew their memberships one month before their memberships expire. Some members have become angry when asked to renew at a much higher rate than their original membership contract, so the club wants to track the prices paid so that the manager can override the regular prices with special prices when members are asked to renew. The system must track these new prices so that renewals can be processed accurately. One of the problems in the industry is the high turnover rate of members. Although so me members remain active for many years, about half of the members do not renew their memberships. This is a major problem, because the gym spends a lot in advertising to attract each new member. The manager wants the system to track each time a member comes into the gym. The system will then identify the heavy users and generate a report so the manager can ask them to renew their memberships early, perhaps offering them a reduced rate for early renewal. Likewise, the system should identify members who have not visited the gym in more than a month, so the manager can call them and attempt to reinterest them in the gym.——————————I will write down 4 website links that our professor told us to refer to in case you need it.
“https://www.youtube.com/watch?v=m7c–hHlZBU” “https://www.youtube.com/watch?v=0RVxX8bClFU”
“https://www.youtube.com/watch?v=zTDlD3WK9bU”
“https://www.youtube.com/watch?v=1YH7DGBiAEE”

1- The begging of IoT and what does it mean. 2- What is the smart home technolog

1- The begging of IoT and what does it mean.
2- What is the smart home technology.
3- What is the benefits of the Smart mirror and, what do you need to make one.
4- My smart mirror
• The programing and moudles I used on my smart mirror.
(I got the programing from this web https://github.com/MichMich/MagicMirror/wiki/3rd-party-modules)
The modules I used is
1# MMM-Detector
2# MMM-Earth
3# MMM-Earth-Live
4# MMM-GABackgroup
5# MMM-GoogleAssistant
*I got this moudle programing from this website (Wiki.bugsounet.fr/en/MMM-GoogleAssistant)
6#MMM-IPT
7# MMM-Jast
8# MMM-MovieListings
9# MMM-NewsAPI
10# MMM-Remote-Control
11# MMM-Screencast
12# MMM-SmartTouch
13# MMM-WeatherOrNot
5- The future of smart mirror.
*In the fourth point, I want you to add the programing of the modules