Outline the purpose of the presentation and its contents

Assignment Help Basic Computer Science
Reference no: EM13309429

Description

Using the group and information you collected and submitted in the report; deliver a presentation to the class in weeks 11 and 12.

Requirements

Your presentation should have the following aspects:

• It should be in the form of an academic presentation (See Presentation Structure Below)
• It should run for 20 minutes "only" with an extra 5 minutes dedicated to Questions and Answers.
• It must be a PowerPoint presentation and/or System Demo (for reports that required it).

Presentation Structure

The presentation should be structured in the following manner:

• Abstract: A slide highlighting the main points of the presentation.
• Introduction: A few slides longer that outline the purpose of the presentation and its contents focusing on the Background, Related Work and Methodology.
• Background: Any assumed knowledge required for your chosen topic/product/algorithms should be discussed here.
• Related Work: Any concepts comparable to your chosen topic/product/algorithms should be discussed here.
• Methodology: The topic/product/algorithms you have chosen should be discussed here.
• Analysis: If any experimentation was conducted (i.e. Option 2 or 3), it would be discussed and interpreted in this section.
• Conclusion: A summary of the presentation focusing on the main contributions in the Methodology and Analysis (if included).

 

 

Reference no: EM13309429

Questions Cloud

Interpreting elasticity : Consider the demand for gasoline. When the price of gasoline increases by a relatively large amount, the quantity of gasoline purchased falls by a relatively small amount. Consider the market for cigarettes. When a 200% tax is imposed on the consumer..
Compute the heat transfer in kw necessary for the process : Liquid water is fed to a boiler at 24°C and 10 bar and is converted at constant pressure to saturated steam. While operating, this process produces 10,000 m3/h of steam, which is discharged through a pipe with an inner diameter of 10 cm.
Determine what is the maximum height the water can reach : A fireman reduces the exit area on a nozzle so that the velocity inside the hose is quite small relative to the exiting velocity. What is the maximum exiting velocity and what is the maximum height the water can reach
Compute the approximate volume of a proton : The nucleus of a hydrogen atom is a single proton. The radius of a proton is approximately 1 fm (1 multiplied by 10âˆ'15 m). What is the approximate volume of a proton
Outline the purpose of the presentation and its contents : 7205ICT –ADVANCED DATABASES. A few slides longer that outline the purpose of the presentation and its contents focusing on the Background, Related Work and Methodology.
Compare the head loss for water flow in a steel pipe : Compare the head loss for water flow (Q=5 cfs) in a 12 in., 3000 ft. long steel pipe using the darcy-weisbach equation and the hazen-williams formula.
Explain the final ph of, a solution of formate titrated : what is the final ph of, a solution of 30ml of .2 m formate titrated with 25 mL of .24M HCL Kb for formate = 5.6*10^-11
What is the mass of radon gas present : If 15 g of radon gas with a half-life of 4 days is present in a balloon at t = 0, what is the mass of radon gas present
Define net ionic equation for the reaction of aqueous sodium : Enter the net ionic equation for the reaction of aqueous sodium chloride with aqueous silver nitrate Imagine that andA, B are cations and X,Y Z,, and are anions, and that the following reactions occur

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are the advantages of inheritance

In C++, What are the advantages of Inheritance? What are the advantages of Composition?

  Explaining use of information technologies to act ethically

When it comes to use of information technologies, it is frequently difficult to find out how to act ethically. Consider some of your own use of information technologies.

  Privacy and security issues are inherent in data storage

Privacy and security issues are inherent in data storage. Let's consider the question of who owns the data about a particular person: medical, credit, personal, financial, consumer information, etc.?

  Persuade your team to give time to organization

Discuss whether you should accept this demand from your manager or whether you should persuade your team to give their time to the organization rather than to their families.

  Write pseudocode algorithms addition subtraction multiply

Describe the classes and write pseudo-code algorithms to perform addition, subtraction and multiplication of polynomial expressions.

  Compare the basic features of http status codes

Compare the basic features of HTTP status codes with those of the FTP reply codes given by RFC 640. What is one way in which these codes are similar and one way in which they are different?

  Write a mips program where we store 5 integers in the array

Write a mips program where we store 5 integers in the array. For example.

  Choose one schedule development tools

In this discussion, choose one of the schedule development tools introduced or another tool that you are already familiar with that was not identified in the studies. Identify the tool and complete the following.

  Write the code for invoking a method named sendobject

Write the code for invoking a method named sendObject . There is one argument for this method which is of type Customer . Assume that there is a reference to an object of type Customer , in a variable called John_Doe . Use this reference as your a..

  Complete the one-variable data table

As a student at USI and a member of the budget committee for theMadrigal Feaste, you have been given a partially completed workbook, MadrigalFeaste.xlsx, and asked to complete the project.

  Discuss when program might use both base and derived class

Discuss when a program might use both the base class and the derived class and why

  Expalin programs like ping and some of scanning tools

When using programs such as ping and some of the scanning tools to do forensic investigations, we may easily tip off the suspect that is under investigation

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd