Answer questions from two other people in class

Assignment Help Basic Computer Science
Reference no: EM131638932

Take a look at slide 33 in the slide deck for Lesson 2. What I'd like you to do is write up the four questions, respond with them here, and then answer questions from two other people in class. If you look at someone's questions and two people have already answered, please move on to someone else's. 

Then, once you've got your answered questions, come up with a persona based on your results. Post that as a response in your initial set of questions. With the persona's name, tagline, picture, and paragraph about your persona and how he/ she would use the new library system. It does not have to be fancy or visually appealing for this discussion.

Try to have your questions posted by Sunday so you can write up your persona Monday/ Tuesday morning.

Reference no: EM131638932

Questions Cloud

What kind of software is this ad selling : An advertisement on a web site touts that the software for sale enables users to enter typed text, handwritten comments, drawings, or sketches
Explain what a coral reef is and how its created : Explain what a coral reef is and how it's created. Discuss locations where coral reefs are commonly found and why this environment is important to it's growth.
Programming language you desire : You may manipulate this database with any programming language you desire.
Environmental awareness and organizational sustainability : Determine the major effects that an organization's environmental awareness has on its sustainability - Environmental Awareness and Organizational Sustainability
Answer questions from two other people in class : What I'd like you to do is write up the four questions, respond with them here, and then answer questions from two other people in class.
Concepts in the speaker notes : Your presentation should fully explain these concepts in the speaker notes and should answer the following questions:
Predict the most significant ethical issue : Predict the most significant ethical issue that you believe HR professionals will face in the next ten (10) years. Provide a rationale for your response
What purposes would honeypots serve : What purposes would honeypots serve in an academic setting or a business environment? Is installing a honeypot somewhere within an enterprise an efficient?
What are some characteristic that are a part of your culture : What are some characteristics that are a part of your culture that are important to you? Do you feel as if you are a disposable worker? Why or why not?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Would an analogous web record be of use in supporting http

would an analogous WEB record be of use in supporting HTTP?

  What wireless access points would you recommend for wvcc

Do some Internet research to find an access point that will meet WVCC's needs and write two or three paragraphs about the product and why you chose it.

  How does a padded cell system differ from a honeypot

What is network footprinting? What is network fingerprinting? How are they related?

  Leadership style interview for a company newsletter

Select someone in a leadership position at your organization or at a local company where you might seek employment.  This individual could be a director, manager, supervisor, or CEO of the organization.

  Ideal communication mechanism

The Internet is an ideal communication mechanism because of its openness and anonymity but people must make ethical decisions about how to use this power.

  Judicial system impacts and affects businesses

Explain the origins of the U.S. judicial system and how the judicial system impacts and affects businesses. Discuss the concept of judicial review.

  What is the potential application of this field

List three protocols in the IPv4 network layer that are combined into a single protocol in IPv6.

  Calculate execution time of a program

A.) Calculate execution time of a program on a 2 GHz processor. B.) Find global CPI of the program. C.) If number of load instructions can be reduced by one-half, what is the speed up and CPI?

  Describe what policy changes you would implement to mitigate

The damaging scandals of Wikileaks/Bradley Manning and Edward Snowden demonstrate a series of critical failures of existing security policy.1. For both scandals describe the policy failures that you believe were responsible for the incidents. 2. Desc..

  Es technology in professional ?elds

In our discussion of expert systems (ESs) we saw that the increased use of ES technology in professional ?elds has generated some ethical and social concerns.

  Large volume of works of art

An art museum owns a large volume of works of art. Each work of art is described by an item code (identifier), title, type, and size; size is further composed of height, width, and weight. A work of art is developed by an artist, but the artist fo..

  An exhaustive search of the key space

1.Consider the following threats to Web security and describe (in detail) how each is countered by a particular feature of SSL:a. Brute-Force Cryptanalytic Attack: An exhaustive search of the key space for a conventional encryption algorithm.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd