The professor said the assignments wasn’t complete and received 17/50 (F). I h

The professor said the assignments wasn’t complete and received 17/50 (F). I h

The professor said the assignments wasn’t complete and received 17/50 (F). I have included the completed assignment, the professors feedback and the requirements for the assignment.

FEEDBACK FROM PROFESSOR; Overall Feedback
Thanks for sharing. Good summary and rationale. Please be sure to review requirements/course announcements. There were to be 4 separate cases – each having an associated diagram.
In this module, you learned that users of a new system and system analysts work together to develop and model the requirements of a system. You also learned that use case diagrams support the visualization of both requirements and design of a software system. Use case diagrams are considered to be high level to help stakeholders and users understand the system. Meanwhile, use case specifications are low level, and are intended to be used by the developers coding the program. For this activity, you will create use case diagrams and their use case specifications.
Prompt
Imagine you are an employee of a consulting firm. The consulting firm was hired to design a new system that will better automate how a patient checks into a patient care facility for medical services. Part of the consulting services that you will provide include developing use case diagrams and their use case specifications that demonstrate how the various actors will use the IT system. UML should be used to illustrate how the software solution should facilitate certain check-in/check-out services for a patient.
For this week’s activity, you will create:
Use Case Diagrams: The four use case diagrams must illustrate the check-in/check-out process of the patient at the clinic. They must include an identification of:
Actors
Relationships between the actors
System boundaries
Use Case Specifications: The four use case specifications must apply the features, functionality, and operations in the software solution mentioned in the business case.
All required use case diagrams and their use case specifications must be complete, without any missing components, as you will be graded on completion
THESE ARE THE FOUR ITEMS
The four key services that you will create use case diagrams and use case specifications for are:
Capture patient information/reason for visit
Verify patient insurance
Capture patient copay
Schedule next appointment
PLEASE LET ME KNOW IF YOU HAVE ANY QUESTIONS

Your discussion question response should be at least 200 Words Risk is defined a

Your discussion question response should be at least 200 Words
Risk is defined a

Your discussion question response should be at least 200 Words
Risk is defined as the probability that a threat will be realized. You can calculate the expected loss by multiplying the risk probability by the asset cost. Based on your own experience, which of the following security review activities (Monitor, Audit, Improve, and Secure from page 218 of the book Fundamentals of Information Systems Security) do you feel should receive the most resources? Explain why.
NOTE- 1) APA format
2) NO plagiarism
3)NO AI generated text
4)write reference
5)What ever written in questions i need like same answers No extra NO missing

Describe a specific real-world situation in which using the Cloud provided benef

Describe a specific real-world situation in which using the Cloud provided benef

Describe a specific real-world situation in which using the Cloud provided benefits over on premises solutions. Be sure to provide an actual situation and include a description of this situation using your own words. You should also include at least one quote from a reference source using APA formatting.

iscuss “information behavior” as it is presented by Case & Given as well as your

iscuss “information behavior” as it is presented by Case & Given as well as your

iscuss “information behavior” as it is presented by Case & Given as well as your understanding of “information behavior”, its complexity and research history, which reviews the assigned reading of the “information behavior: an introduction” (Case, 2016, ch1); “the complex nature of information behavior” (Case, 2016, ch2); and “history and focus of research” (Case, 2016, ch3) in the context described as follows (*all “bullet point” items should be addressed in the essay):

Links to an external site.
Introductory Paragraph (Introduction)
Describe “information behavior” as it is presented by Case & Given in the chapters specified, as well as your understanding of “information behavior”.
Main Paragraphs (Analysis)
Why is information behavior complex? What is the “complex nature” of information behavior?
The study of information behavior is comprised of much research on various information behaviors. Provide an overview of the history of that research in information behavior as well as the research trends as described by Case & Given.
Concluding Paragraph (Conclusion)
Summarize what you have learned, observed and/or concluded.
Reflect on how this knowledge can help you today and in the future.
Separate Reference Page (References)
Suggested length: 2- 4 pages PLUS a separate Reference page.

Submission Outline
Use an essay format with:
A distinct introductory paragraph – to describe what you are writing about, establishing the context of the analysis;
Main paragraphs – these paragraphs will comprise most of the essay and contain the main topic content, in this case, the “analysis” questions.
Concluding paragraph – this should be an account of what you have learned, observed and/or concluded from the readings.
References – this is a list of references (labeled References) on a separate page in correct APA format .

Indicate the usefulness of User Behavior and UX Design and the importance of it.

Indicate the usefulness of User Behavior and UX Design and the importance of it.

Indicate the usefulness of User Behavior and UX Design and the importance of it. Can not use Wikipedia or Webopedia as a reference.
Find 3 peer-reviewed sources (industry articles, journals, academic textbooks, professional textbooks, case studies) and 5 total references to support selected and pre-approved project topic

DD.04 :Design document: Follow the instructions in A/DD.04 and record your desig

DD.04 :Design document:
Follow the instructions in A/DD.04 and record your desig

DD.04 :Design document:
Follow the instructions in A/DD.04 and record your designs for each of the problems in your Design Document. Make sure to:
List each design in a clearly marked section indicates which question the design belongs to.
For each design make sure to note any details about the question that are relevant to your design, such as the inputs, outputs, any required displays.
Also make sure to detail your tests including all inputs and outputs you’d expect to see.
Each problem should have a detailed plan which outlines step-by-step how you get the required outputs from the provided inputs.
If you divide any problem into smaller algorithms, make sure to detail all of the information for those designs as well.
As a rule of thumb, your designs should include enough detail that anyone else could take your design and implement the same solution without confusion. If you’re questioning if a design is clear enough, ask a TA if they understand your work!
A.04: assignment:
Follow the instructions in A/DD.04 and once done with your design implement each required function in this assignment. Use the Python Template in the course Toolbox to start your implementation.
Make sure to follow all course guidelines!
# TODO; My functions
def main():
# TODO; Test my functions
pass
if __name__ == “__main__”:
main()
A/DD.04:Question 1: List Utilities
Design and implement the following functions:
copy_list: which takes a list and returns a copy of that list.
Inputting ([a, b, c, d]) would result in something that looks like ([a, b, c, d])
reverse_list: which takes a list and returns a new list that is reversed.
Inputting ([a, b, c, d]) would result in something that looks like ([d, c, b, a])
modify_list: which takes a number and a list of numbers and returns a new list containing the first number added to each of the items.
Inputting (a, [b, c, d]) would result in something that looks like [a+b, a+c, a+d]
combine_lists: which takes in two lists and returns another list that contains the sum of all indices that were possible.
Inputting ([a,b,c], [d,e,f,h]) would result in something that looks like [a+d, b+e, c+f]
Question 2: Blackjack
In the game of Blackjack, the goal is to get a score as close as possible to 21. To “bust” is to go over this value. Design the algorithm blackjack that takes a “hand” as a list of integers representing the cards in a deck, from 1 to 11, and displays the total of the cards in that hand. If the hand busts, show a message indicating the one-indexed place of the card in the hand caused the total to go over. If there are any illegal cards in the hand, print “Cheating!” and immediately return.
Examples for Question 2Input
Display
[1, 2, 10, 3, 5]
Total: 21
[4, 4, 5]
Total: 13
[]
Total: 0
[6, 4, 10, 10, 3]
Total: 33 is a bust! Blame card 4.
[1, 2, 10, 3, 5, 2]
Total: 23 is a bust! Blame card 6.
[1, 2, 12, 4]
Cheating!
Question 3: Merging Lists
Design and implement the function merge_lists, which takes two sorted lists of integers and outputs a single sorted list of integers containing all the values in the inputs. Your algorithm must be able to take any two independently sized lists and merge them, even if there are duplicates! Consider the following non-exhaustive list of edge cases you might have to consider:
Examples for Question 3Input A
Input B
Output
[1, 2, 3, 4, 5]
[1, 2, 3, 4, 5]
[1, 1, 2, 2, 3, 3, 4, 4, 5, 5]
[1, 2, 3]
[4, 5]
[1, 2, 3, 4, 5]
[-10, 6, 12]
[-4, 0, 0, 4]
[-10, -4, 0, 0, 4, 6, 12]
[2, 4, 8, 8, 10]
[5, 6, 8, 10, 11]
[2, 4, 5, 6, 8, 8, 8, 10, 10, 11]
Question 4: Lists of Instructions
Create a function sum_indices, which takes a list of integers and a list of floats and computes the sum of values from the second list as indicated by the indexes in the first list. In other words, the first list contains all the indexes in the second list that your algorithm should use to compute the final sum.
The integers in the first list are not unique and can include any integer. To prevent your algorithm from crashing, when there is an out-of-bounds index, immediately return 0 and display a message with the index that caused the error.
Examples for Question 4Input A
Input B
Output
[1,0,3,1]
[1.0, 2.0, -3.0, 4.0]
9.0
[2, 2, 1]
[3.4, 5.6, 7.0]
19.6
[]
[3.0, 1.0, -4.0]
0.0
[3, 2, 5]
[4.2, 5.6, 3.1, 3.0]
0.0
Extra: Windowed Average (+3/1.5)
This is an extra credit problem that will add (3) points to DD.04 and (1.5) points to A.04 for total bonus of (+15%) and (+15%), respectively. This is a difficult problem but can be done using all of the tools we’ve gathered so far.
The windowed average is an operation that we can apply to a list of numbers to compute localized averages. This is done by summing the ‘window’ of the ‘n’ elements surrounding some index and then shifting that window to the right until it cannot shift any more. Consider the graphic below which shows and example of this when n=1 for a list of length five.
Consider for a moment what it would mean to when n=0. Using the example above, it would be the average of zero items to the left and right and essentially copy the list. Similarly, n=2 would be an average of the entire list, resulting in a list of size one.
For this problem, design and implement a algorithm that computes the n-windowed average of a list of numbers called windowed_average. It should take an integer as the ‘n’ along with a list of floating point numbers and it should output the computed windowed average as a list. The signature of this function would then look as follows:
def windowed_average(n, lst):
…If a window is too big, this means there wasn’t enough to average and you should return an empty list. Check that ‘n’ is a valid integer and return an empty list if it is not.
No partial points will be given. To receive credit for this problem you must:
Provide a Data Flow Diagram of your algorithm in your design document along with your test cases.
Submit a valid implementation that works for all possible inputs.
Some things to note:
The Ag will only provide general feedback on if your algorithm conformed to course policies.
Staff cannot help with implementation details or understanding the problem, however, working on the design with your fellow classmates is heavily encouraged.

IS 607 INTRODUCTION TO INFORMATION SYSTEMS Discussion Learning Module 2 Part 1

IS 607 INTRODUCTION TO INFORMATION SYSTEMS
Discussion Learning Module 2
Part 1

IS 607 INTRODUCTION TO INFORMATION SYSTEMS
Discussion Learning Module 2
Part 1 (module 1 learning objective 2)
You are writing a simple Java program. When you attempt to run the code, you get the following message:
Main.java:[13,32] ‘;’ expected
1 error
What type of error is this? How will you solve it? Explain in detail.
Part 2 (Module 2, Learning Objective 4)
Explain the concept of a class in Java. Describe a Java class you are familiar with and illustrate its use with an example (show actual Java code).
PLEASE USE JAVA WHEN DOING CODES FOR ASSIGNMENT
. Support your answer with at least one citation and corresponding reference from a reliable source. When citing a book, include the page number. Using APA FORMAT!

For your initial post: Describe a problem that you currently or recently experie

For your initial post:
Describe a problem that you currently or recently experie

For your initial post:
Describe a problem that you currently or recently experienced in your life (whether it’s personal, or related to your student life or professional life). Be mindful not to disclose personal information that you do not want your peers to know abou; discuss a problem that you experienced that you are open to sharing with others. In your description of your problem, you should also provide some context as to who you are, what your needs are, and why this problem should be addressed.
Propose a potential IoT solution to meet and address your problem
For example, the initial poster may state that they are a runner, hiker, or walker. They often experience the problem of not knowing how many steps they take when they exercise. In response, a peer may suggest that the solution would be to use an IoT smartwatch, like a Fitbit or Apple Watch, to monitor and track steps. This solution could monitor performance, keep track of stats, and allow the user to set new goals, which also addresses some of their needs.

Instructions: 1.This is continuation work of the ongoing project. Below I have a

Instructions:
1.This is continuation work of the ongoing project. Below I have a

Instructions:
1.This is continuation work of the ongoing project. Below I have attached a copy of all the previous resources related to them. You need to build the below paper for the same project following the information that is already there.
2. Design the overall system architecture layout and add diagrams with description as well. This paper should be strong and have detailed information.
3. Research on the algorithm that can be implemented for the solution of the project and please add diagrams related to it. You can add as much as detail as you want
4. Format the paper in APA7 format.
5. Please make sure to provide me with Plagiarism and AI Similarity Score
6. This is detailed research work. So, ask questions when you’re confused and needs in-depth research.
Phase 3 – Project Design
This chapter will provide the full details for the proposed project solution. This is really the ‘meat’ of your project. Details for this section will include all information needed to make the solution work. For example, if you are writing a program or designing a set of web pages, this section will include brief detailed descriptions, mock-ups, or functioning code. This chapter will also include full written descriptions regarding the functionality of your solution. For example, if you are designing a network solution, it will include diagrams for network connectivity. If you are writing a security solution, it will include written details about the security equipment, software, tools, or other methods that need to be implemented. It should also include any required budget information to help business leaders plan. This section should be between 10 pages in length.

Choose one of the following options for your original discussion post. Then part

Choose one of the following options for your original discussion post. Then part

Choose one of the following options for your original discussion post. Then participate in the discussion with your classmates.
Option 1: Read the list of ethical concerns in video games by Leigh Alexander, find an article that pertains to that issue and discuss it. Be sure to provide the citation.
Option 2: After reading about Studio Littleloud closing its doors and researching the facts, discuss your thoughts about games like this and whether they should or should not be banned.
Option 3: Play the game Sweatshop by Littleloud and discuss what you think about its premise. It is no longer located on the Little Loud site, but if you search on Google for Sweatshop game you can find it in many locations.
Option 4: Choose one of the topics in the syllabus for this module that interests you, find an article about the topic and begin a discussion on that topic
Instructions: The paragraph should be at least 200 words, and needs to include citation to the article using APA style.