Leverage social media and networking technologies

Assignment Help Basic Computer Science
Reference no: EM13760488

Scenario: Imagine that you have been hired as a consultant for a university that wants to leverage social media and networking technologies to encourage the collaboration of students, and improve their overall sense of community.

Analyze how the university might integrate at least two social media and networking technologies to accomplish their goals. Your analysis must cover the advantages and disadvantages of social networking. The president of the university also needs to know what the system development life cycle is, and how you intend on bringing social networking tools to life within this cycle.

Translate the critical details of your proposal into a 10- to 15-slide Microsoft® PowerPoint®presentation that you will present to the university president.

Include the process of acquiring the correct information systems and applications needed to effectively run these new pursuits.

Include the following in your presentation using the features of Microsoft® PowerPoint®:

A slide template

Slide layouts

Themes

At least one example of animation

At least one example of a media object

Reference no: EM13760488

Questions Cloud

Comparison and contrast patterns of development : You'll write your essay using comparison and contrast patterns of development. Your analysis should focus primarily on the significance these changes have on the plot development.
Research an emergency incident : Research an emergency incident of your choice that has occurred in the past twenty years and describe how the incident was handled in regard to incident command. Did they follow the ICS system? What were some mistakes? Make some recommendations.
Office manager of a medium-sized medical practice group, : As the office manager of a medium-sized medical practice group, you have compiled a compliance plan for the office. Your compliance plan was reviewed and the board of directors asked if you would present your compliance plan to a group of office mana..
The steps to investigate a cyberstalking case end-to-end : As a member of the electronic crime investigation unit, you have been assigned to a cyberstalking case. Use the ITT Tech Virtual Library and the text with proper APA format to prepare a three-page report answering the following:•What are the steps to..
Leverage social media and networking technologies : Imagine that you have been hired as a consultant for a university that wants to leverage social media and networking technologies to encourage the collaboration of students, and improve their overall sense of community.
Units of measurement : Convert the ingredients in your recipe from its original imperial units into metric units.
Explore the two major groups of ethical theories : In the unit Discussion, you will explore the two major groups of ethical theories called consequentialist (teleological) and nonconsequentialist (deontological) theories. There are multiple theories in each category that you will be able to address i..
Describe several types of building construction : Describe several types of building construction. Explain modern construction techniques. List common materials used in building construction. Explain the impact of fire in buildings.
What alternative objectives exist when selecting a system : part AIs it generally a good idea for an institution to select the system/vendor that is most prevalent in the region in order to build information exchange systems?What alternative objectives exist when selecting a system, and what are the arguments..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Data execution protection

Data Execution Protection

  Manufacturer of fine cosmetic soap products

Handcrafted Soap is a manufacturer of fine cosmetic soap products. Sweet Treats' two main products are soap and cleanser. Each batch of soap consumes 50 pounds of glycerin and 30 pounds of oil. Each batch of cleanse consumes 20 pounds of glycerin and..

  Write a program that prompts the user to input a string

Write a program that prompts the user to input a string and then outputs the string in the pig Latin form. The rules for converting a string into pig latin form are described in Programming example : Your program must store the characters of a str..

  Create a shadow on the phrase html5 canvas

Create a shadow on the phrase "HTML5 Canvas" with an offset -x of 2px, an offset -y of 5px, a blur of 6px, and a text shadow color grey.

  Distributed denial of service attack

Research via the internet and find recent news article regarding denial of service attack, or distributed denial of service attack.

  Provide example of a business networking scenario

Provide example of a business networking scenario

  Input boxes control element text numerical entry true false

Input boxes are a form control element used for text and numerical entries. True False

  Find some articles or research on project management

Do the same for key points that make project management easier for an Agile project.

  Develop a program to play lottery

Suppose you want to develop a program to play lottery. The program randomly generates a Lottery of a two-digit number, prompts the user to enter a two-digit number, and determines whether the user wins according to the following rule.

  Company officers to find which planning approach is suitable

If you were in charge of systems planning for a small firm, what questions would you ask the company officers to determine which planning approach would be the most appropriate.

  Use free or open source

Use free or open source.

  Design a nine-step counter to count

Design a nine-step counter to count in the following sequence using D flip-flops (TTL 74704) on a breadboard

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd