SCS 100 Module Four Activity Template
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
100
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
2
Uploaded by ProfIron8664
SCS 100 Module Four Activity Template
Replace the bracketed text below with your responses. Support your responses with specific details and
examples from your advertisements. You do not need to conduct outside research, but if you use
sources, cite them using APA style.
Describe the underlying meanings or socially significant messages each of your advertisements
communicates.
The underlying meanings and socially significant messages communicated in the first 3 of my ads;
Pantene: #SeeBeautyNotGender, Unilever: United We Stand and Stronger Together, is acceptance of
diversity, inclusion, unity, and strength. These ads show different cultures and ages, different
backgrounds and genders.
It shows how through acceptance we can have unity. Differences should be a
good thing, not something used to separate people. The socially significant message for the Apple ad is
climate control.
A promise to future generations that they are and will continue to do better for our
world.
Write a research question based on a social science perspective and related to at least one of your
advertisements.
What is the connection between the use of diverse groups in advertising on the audiences perception of
unity and inclusion in today’s culture?
The importance of advertising in almost all aspects of today’s media driven world is understood.
With
this research question, the social scientist would be looking for the influence of ideas of acceptance and
unity and inclusion on the receiving audiences.
1
Describe how you used a social science perspective to create your research question.
For this mod I have focused on 3 of the 4 ads since they follow a similar theme. From a social science
perspective, psychology and sociology were my focus.
For the psychology focus, have the ads influenced
people's thoughts and ideas on unity and acceptance? What type of response was received, was it a
positive or negative effect on the product and ultimate message of unity, diversity, and inclusion?
In
Sociology, how do these ads challenge traditional stereotypes? How are these cultural groups
represented and how is their place in today’s society represented?
2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Use Cases and User Stories
any other relevant articles you may find on the Internet, write a report that discusses the advantages and disadvantages of Use Cases and User Stories,
under different circumstances. Provide at least five different references for the points you are making, and provide a Works Cited list, using APA style for both references and Works Cited. The body of the report should be at least 1600 words long (not including references and Works Cited)
Your report should have the following sections: 1. Introduction 2. Similarities and differences between User Stories and Use Cases
a. Similarities b. Differences
3. When and how to use User Stories, Use Cases, both, and neither
a. Under what conditions should we use User Stories b. Under what conditions should we use Use Cases c. Under what conditions should we use both d. Under what conditions should we use something else to determine requirements
5. Summary
6. Works Cited
arrow_forward
QUESTION 1
Draw level 1 DFD of the given scenario. Mention your brain storming as well before the drawing. A web based software for an online book store is to be developed when a valid customer logon to the site a list of available books is displayed. When the customer selects the required book a form will be displayed that will take input the credit card number and other necessary information of the user.
After submission of the form by the customer the validity of the credit card is ensured by a banking system (external to the system). The valid orders are passed to the shipment department and an email is sent to the customer that his order is being shipped.
arrow_forward
Page Layout
References
Mailings
Review
View
file originated from an Internet location and might be unsafe. Click for more details.
Enable Editing
13. The following processes are being scheduled using a priority (a smaller priority number
implies a higher priority) and shortest job first all preemptive scheduling algorithms.
Arrival
Priority
50
Process
Burst
P1
30
P2
40
35
25
P3
40
35
30
P4
45
25
60
P5
15
20
100
P6
20
20
105
Draw the Gantt charts that illustrate the execution of these processes using the
above scheduling algorithms.
What is the turnaround time of each process for each of the scheduling
algorithms in part a?
What is the waiting time of each process for each of these scheduling
algorithms?
Which of the algorithms results in the minimum average waiting time (over all
i.
ii.
111.
iv.
processes)?
S 164%
Vords: 679
MEIZU PRO7
W
DUAL CAMERA
e to search
44
arrow_forward
SQL Injection “OWASP stands for the Open Web Application Security Project, an online community that produces articles, methodologies, documentation, tools, and technologies in the field of web application security.’ – OWASP Foundation, 2020. “The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.” – OWASP Foundation, 2020. “Globally recognized by developers as the first step towards more secure coding.” – OWASP Foundation, 2020.
SQL injection is a prominent vulnerability that results in drastic damage to companies around the world.
1 Discuss, with examples, the concept of SQL injection. 2 Explain, with examples, any two defences against SQL injection that could be employed by database developers.
arrow_forward
Business Rules:
Each musician at NewTalent should have a name, address, and phone number on the system. The Instruments used in the songs have a unique name, musical genre (i.e. rock, pop, hip hop), and type (i.e. string, piano, guitar). Every album recorded under the NewTalent label has a title, copyright date, format, and an album identifier. Each song recorded has a title and an author. Musicians can play several instruments, and an instrument can be played by multiple musicians. Every album contains several songs, but a song can only appear on one album. Songs are performed by one or more musicians, and a musician can perform numerous songs. Each album has one musician acting as its producer, although a musician can produce multiple albums.
Create an ERD for the above scenario that describes its business rules.
Use Crow's Foot notations and make sure to include all of the following:
All entities correctly identified with Primary key and any foreign key attributes.…
arrow_forward
Tairiq MinesError! Bookmark not defined. Tairiq Mines in Glen Austin has several parking lots, which are used by staff. Each parking lot has a unique name, location, capacity, and number of floors (where appropriate).Each parking lot has parking spaces, which are uniquely identified using a space number. Members of staff can request the sole use of a single parking space. Each member of staff has a unique number, name, telephone extension number, and vehicle license number.
Write an SQL query that displays the parking space number, location as well as the name of the staff member to whom the parking space has been allocated
arrow_forward
Tairiq MinesError! Bookmark not defined. Tairiq Mines in Glen Austin has several parking lots, which are used by staff. Each parking lot has a unique name, location, capacity, and number of floors (where appropriate).Each parking lot has parking spaces, which are uniquely identified using a space number. Members of staff can request the sole use of a single parking space. Each member of staff has a unique number, name, telephone extension number, and vehicle license number.
Write an SQL query that displays the parking space number, location as well as the name of the staff member to whom the parking space has been allocated. Please make the solution clear.
arrow_forward
Tairiq MinesError! Bookmark not defined. Tairiq Mines in Glen Austin has several parking lots, which are used by staff. Each parking lot has a unique name, location, capacity, and number of floors (where appropriate).Each parking lot has parking spaces, which are uniquely identified using a space number. Members of staff can request the sole use of a single parking space. Each member of staff has a unique number, name, telephone extension number, and vehicle license number.
1. Represent the above as a single Entity Relation model. Provide any assumptions necessaryto support your model
arrow_forward
Define the objectives: Start by defining the objectives of the interview. What are the objectives of the interview?
arrow_forward
draw Sequence diagram including both view and data access layers s.o.a.p
arrow_forward
SQL Injection
"OWASP stands for the Open Web Application Security Project, an online community that produces
articles, methodologies, documentation, tools, and technologies in the field of web application security.'
- OWASP Foundation, 2020.
"The OWASP Top 10 is a standard awareness document for developers and web application security. It
represents a broad consensus about the most critical security risks to web applications." – OWASP
Foundation, 2020.
"Globally recognized by developers as the first step towards more secure coding." – OWASP
Foundation, 2020.
Source: [Online] https://owasp.org/www-project-top-ten/ [Accessed on: 8 March 2020]
SQL injection is a prominent vulnerability that results in drastic damage to companies around the
world.
2.1 Discuss, with examples, the concept of SQL injection.
2.2 Explain, with examples, any two defences against SQL injection that could be employed by
database developers.
arrow_forward
Copyright notice: This question is part of a graded exam and cannot be redistributed in any form or fashion. ID: 10-52-01-
5012. This copyright notice does not impact the contents of the question or answer choices. Hosting this question on any
website or service constitutes as an academic integrity violation and is an infringement of copyright.
Selena Gomezz has ventured into e-commerce and her website has a lot of products - so many that
her employees are having a hard time learning about all of the products that they sell which has led
to some struggles with providing excellent customer service. What would you recommend to Selena
to help with this issue? Choose the best answer from the options that are available below.
O Cloud based enterprise system
Customer relationship management system
Knowledge management system
None of the options are correct
O Supply chain management system
0.2 pts
Question 40
Copyright notice: This question is part of a graded exam and cannot be redistributed…
arrow_forward
es, 13 seconds.
Question Completion Status:
A Moving to another question will save this response.
Question 2
is a picture which shows the information that is created, stored, and used by a business system.
Model
Physical design
Logical design
ERD
W
Type here to search
DELL
關
arrow_forward
Differentiate between normalizing and standardizing. Explain your response by providing specific instances.
arrow_forward
Church Information System
XYZ Church is a fast-growing church in Grand Rapids area. Over the past three years, since the popular Reverend Timothy Becker has taken over leadership of the congregation, the church has more than doubled in size. It now has approximately 400 registered households. Reverend John Howard has also recently been added as a second minister. Since the Church was rather small in the past, most of its records have been kept on paper forms. However, the Church’s Business Manager, Margie Roberts, has suggested to Reverend Becker that a computerized system might help the Church better meet its information needs and manage its activities.
In addition to Ms. Roberts, the Church employs a part-time administrative assistant, Mabel McGregory. Mabel performs clerical duties such as filing, record keeping, answering phone calls, and typing the weekly church bulletin using WordPerfect for Windows on the Church’s only personal computer. A retiree, Leroy Stricty, is employed…
arrow_forward
J 1
create an infographic that summarizes organizing and presenting data. The infographic should include the various graphs used to display data and their purpose.
arrow_forward
complete the assignment following the instructions that I gave you. And dont use any AI or or plagraise please
arrow_forward
Income statement and balance sheet columns on a worksheet should balance when they are first
added up.
arrow_forward
Alert dont submit AI generated answer.
arrow_forward
please give me full answer please thanks
Question # 02:
What makes the group discussion successful?
arrow_forward
create a sequence diagram for a donation organization website,
the system has two users one for the admin and one for the donors/volunteers
the system sends emails for accepting volunteers
the system has a place for users to upload pictures or pdf files to upload proof of donation for the admin the check
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Related Questions
- Use Cases and User Stories any other relevant articles you may find on the Internet, write a report that discusses the advantages and disadvantages of Use Cases and User Stories, under different circumstances. Provide at least five different references for the points you are making, and provide a Works Cited list, using APA style for both references and Works Cited. The body of the report should be at least 1600 words long (not including references and Works Cited) Your report should have the following sections: 1. Introduction 2. Similarities and differences between User Stories and Use Cases a. Similarities b. Differences 3. When and how to use User Stories, Use Cases, both, and neither a. Under what conditions should we use User Stories b. Under what conditions should we use Use Cases c. Under what conditions should we use both d. Under what conditions should we use something else to determine requirements 5. Summary 6. Works Citedarrow_forwardQUESTION 1 Draw level 1 DFD of the given scenario. Mention your brain storming as well before the drawing. A web based software for an online book store is to be developed when a valid customer logon to the site a list of available books is displayed. When the customer selects the required book a form will be displayed that will take input the credit card number and other necessary information of the user. After submission of the form by the customer the validity of the credit card is ensured by a banking system (external to the system). The valid orders are passed to the shipment department and an email is sent to the customer that his order is being shipped.arrow_forwardPage Layout References Mailings Review View file originated from an Internet location and might be unsafe. Click for more details. Enable Editing 13. The following processes are being scheduled using a priority (a smaller priority number implies a higher priority) and shortest job first all preemptive scheduling algorithms. Arrival Priority 50 Process Burst P1 30 P2 40 35 25 P3 40 35 30 P4 45 25 60 P5 15 20 100 P6 20 20 105 Draw the Gantt charts that illustrate the execution of these processes using the above scheduling algorithms. What is the turnaround time of each process for each of the scheduling algorithms in part a? What is the waiting time of each process for each of these scheduling algorithms? Which of the algorithms results in the minimum average waiting time (over all i. ii. 111. iv. processes)? S 164% Vords: 679 MEIZU PRO7 W DUAL CAMERA e to search 44arrow_forward
- SQL Injection “OWASP stands for the Open Web Application Security Project, an online community that produces articles, methodologies, documentation, tools, and technologies in the field of web application security.’ – OWASP Foundation, 2020. “The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.” – OWASP Foundation, 2020. “Globally recognized by developers as the first step towards more secure coding.” – OWASP Foundation, 2020. SQL injection is a prominent vulnerability that results in drastic damage to companies around the world. 1 Discuss, with examples, the concept of SQL injection. 2 Explain, with examples, any two defences against SQL injection that could be employed by database developers.arrow_forwardBusiness Rules: Each musician at NewTalent should have a name, address, and phone number on the system. The Instruments used in the songs have a unique name, musical genre (i.e. rock, pop, hip hop), and type (i.e. string, piano, guitar). Every album recorded under the NewTalent label has a title, copyright date, format, and an album identifier. Each song recorded has a title and an author. Musicians can play several instruments, and an instrument can be played by multiple musicians. Every album contains several songs, but a song can only appear on one album. Songs are performed by one or more musicians, and a musician can perform numerous songs. Each album has one musician acting as its producer, although a musician can produce multiple albums. Create an ERD for the above scenario that describes its business rules. Use Crow's Foot notations and make sure to include all of the following: All entities correctly identified with Primary key and any foreign key attributes.…arrow_forwardTairiq MinesError! Bookmark not defined. Tairiq Mines in Glen Austin has several parking lots, which are used by staff. Each parking lot has a unique name, location, capacity, and number of floors (where appropriate).Each parking lot has parking spaces, which are uniquely identified using a space number. Members of staff can request the sole use of a single parking space. Each member of staff has a unique number, name, telephone extension number, and vehicle license number. Write an SQL query that displays the parking space number, location as well as the name of the staff member to whom the parking space has been allocatedarrow_forward
- Tairiq MinesError! Bookmark not defined. Tairiq Mines in Glen Austin has several parking lots, which are used by staff. Each parking lot has a unique name, location, capacity, and number of floors (where appropriate).Each parking lot has parking spaces, which are uniquely identified using a space number. Members of staff can request the sole use of a single parking space. Each member of staff has a unique number, name, telephone extension number, and vehicle license number. Write an SQL query that displays the parking space number, location as well as the name of the staff member to whom the parking space has been allocated. Please make the solution clear.arrow_forwardTairiq MinesError! Bookmark not defined. Tairiq Mines in Glen Austin has several parking lots, which are used by staff. Each parking lot has a unique name, location, capacity, and number of floors (where appropriate).Each parking lot has parking spaces, which are uniquely identified using a space number. Members of staff can request the sole use of a single parking space. Each member of staff has a unique number, name, telephone extension number, and vehicle license number. 1. Represent the above as a single Entity Relation model. Provide any assumptions necessaryto support your modelarrow_forwardDefine the objectives: Start by defining the objectives of the interview. What are the objectives of the interview?arrow_forward
- draw Sequence diagram including both view and data access layers s.o.a.parrow_forwardSQL Injection "OWASP stands for the Open Web Application Security Project, an online community that produces articles, methodologies, documentation, tools, and technologies in the field of web application security.' - OWASP Foundation, 2020. "The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications." – OWASP Foundation, 2020. "Globally recognized by developers as the first step towards more secure coding." – OWASP Foundation, 2020. Source: [Online] https://owasp.org/www-project-top-ten/ [Accessed on: 8 March 2020] SQL injection is a prominent vulnerability that results in drastic damage to companies around the world. 2.1 Discuss, with examples, the concept of SQL injection. 2.2 Explain, with examples, any two defences against SQL injection that could be employed by database developers.arrow_forwardCopyright notice: This question is part of a graded exam and cannot be redistributed in any form or fashion. ID: 10-52-01- 5012. This copyright notice does not impact the contents of the question or answer choices. Hosting this question on any website or service constitutes as an academic integrity violation and is an infringement of copyright. Selena Gomezz has ventured into e-commerce and her website has a lot of products - so many that her employees are having a hard time learning about all of the products that they sell which has led to some struggles with providing excellent customer service. What would you recommend to Selena to help with this issue? Choose the best answer from the options that are available below. O Cloud based enterprise system Customer relationship management system Knowledge management system None of the options are correct O Supply chain management system 0.2 pts Question 40 Copyright notice: This question is part of a graded exam and cannot be redistributed…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- COMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE LNp Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:Cengage
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage