Description
Hello!
Do some online research on how organizations are using interactive voice response systems (IVRs) to improve business processes. Write a short paper (2 to 3 pages Font 11 double space with reference) that illustrates the patterns of IVR use by business. Business reasons for implementing IVRs. And Benefits realized from IVR deployment. Include several case examples.
Thanks!
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Just the thing I needed, saved me a lot of time.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
ITEC 610 UMDC Hands-on Activity Using an OLAP Tool Discussion
Visit Fedscope (http://www.fedscope.opm.gov/) and identify and explain at least one interesting trend. This tool is an exa ...
ITEC 610 UMDC Hands-on Activity Using an OLAP Tool Discussion
Visit Fedscope (http://www.fedscope.opm.gov/) and identify and explain at least one interesting trend. This tool is an example of OLAP.Also, describe a possible business strategy based on the trend you identified.Attach a screenshot along with your narrative in Word format. Minimum length = 100 words.INSTRUCTION ON ATTACHING A SCREENSHOT OF EACH TREND. When the trend appears on your screen, press the PrtScrn (Print Screen) key on your keyboard then go into Word and select Edit, Paste. You might want to edit and crop the pasted image -- select the image, choose Picture Tools/Format, click the Crop button, adjust the sizing bars, then click the Crop button again. Below the screenshot, describe the trend and relate it to a business strategy. Attach this Word document to your posting.Instructions for using Fedscope can be found at: http://www.fedscope.opm.gov/fedshelp/index.asp Hint: Use the Chart icon which is the second button on the toolbar at the bottom of the Fedscope screen. Also, try changing your dimensions like twisting your Rubik's cube!Here is a sample of a completed assignment.Note: Avoid the use of Google Chrome for this assignment. This site is best viewed in Internet Explorer 5+, Netscape 7+, Mozilla, and/or Firefox but there is no guarantee that the site will be accessible.
Air Force Institute of Technology Database Design and Development Questions
database foundations, type theory, gatheringdatabase requirements, normalization, performance and optimization, processing ...
Air Force Institute of Technology Database Design and Development Questions
database foundations, type theory, gatheringdatabase requirements, normalization, performance and optimization, processing data atscale and speed, SQL databases, No-SQL databases, unordered databases and distributeddatabases.
6 pages
Projectnx Risk Assessment
Risk assessment is an important tool in project development. Similar to every other project, information systems are faced ...
Projectnx Risk Assessment
Risk assessment is an important tool in project development. Similar to every other project, information systems are faced with a number of challenges ...
Southern New Hampshire University Client Server Development Project
s you have learned, CRUD functionality is essential for interacting with databases. In Module Two, you gained practice usi ...
Southern New Hampshire University Client Server Development Project
s you have learned, CRUD functionality is essential for interacting with databases. In Module Two, you gained practice using CRUD commands within the mongo shell. In order to develop a web application that connects a client-side user interface (such as a dashboard) to a database, it will help to develop a portable Python module that enables CRUD functionality for this data connection. In this milestone, you will begin creating a Python module that enables create and read functionality. You will finish developing the update and delete functionality for your Project One submission. This Python module will eventually be used to connect the user interface component to the database component of your dashboard in Project Two.
Note: This milestone requires you to use the “aacuser” account and password that you set up back in the Module Three milestone. If you did not successfully complete that milestone, follow the steps in Part II of the Module Three milestone to set up the “aacuser” account before beginning this milestone.
Prompt
After completing the readings for this module, you will implement the fundamental operations of creating and reading documents (the C and R of CRUD) in Python. You will use the PyMongo driver to create CRUD functional access to your document collection.
Upload the Austin Animal Center (AAC) Outcomes data set into MongoDB by importing a CSV file using the appropriate MongoDB import tool. This file is in the /usr/local/datasets/ directory in Apporto and the filename is “aac_shelter_outcomes.csv”. Use the database name “AAC” and collection name “animals”. Complete the import using the mongoimport tool and take screenshots of both the import command and its execution.
Note: If you completed the Module Three milestone, you have already completed this step.
Next, you must develop a Python module in a PY file, using object-oriented programming methodology, to enable create and read functionality for the database. To support code reusability, your Python code needs to be importable as a module by other Python scripts.
Develop a CRUD class that, when instantiated, provides the following functionality:
A method that inserts a document into a specified MongoDB database and collection
Input -> argument to function will be set of key/value pairs in the data type acceptable to the MongoDB driver insert API call
Return -> “True” if successful insert, else “False”
A method that queries for documents from a specified MongoDB database and specified collection
Input -> arguments to function should be the key/value lookup pair to use with the MongoDB driver find API call
Return -> result in cursor if successful, else MongoDB returned error message
Important: Be sure to use find() instead of find_one() when developing your method.
As you develop your code, be sure to use industry standard best practices such as proper naming conventions, exception handling, and in-line comments. This will ensure that your code is easy to read and reusable for future projects.
TIP: Use the following sample code to get started. Note that the authentication to MongoDB is in the initialization method for the CRUD class.Example Python Code to Insert a Document from pymongo import MongoClient from bson.objectid import ObjectId class AnimalShelter(object): """ CRUD operations for Animal collection in MongoDB """ def __init__(self): # Initializing the MongoClient. This helps to # access the MongoDB databases and collections. self.client = MongoClient('mongodb://%s:%s@localhost:YOUR_PORT_NUMBER' % (username, password)) self.database = self.client['project'] # Complete this create method to implement the C in CRUD. def create(self, data): if data is not None: self.database.animals.insert(data) # data should be dictionary else: raise Exception("Nothing to save, because data parameter is empty") # Create method to implement the R in CRUD.
Finally, create a Python testing script that imports your CRUD Python module to call and test the create and read instances of CRUD functionality. Be sure to use the username and password for the “aacuser” account for authentication when instantiating the class. This script should be created in a separate Jupyter Notebook IPYNB file, and should import and instantiate an object from your CRUD library to effect changes in MongoDB. After creating your script, execute it in Jupyter Notebook and take screenshots of the commands and their execution.
Guidelines for Submission
For your submission, you must include the code files for your Python module (PY file) and your Python testing script (IPYNB file). You must also submit a Microsoft Word document with your screenshots from Step 3.
Create an administrator account in the mongo shell by following steps #2–3 of the MongoDB Manual Enable Access Control tutorial. Then exit the mongo shell.
IMPORTANT: Write down the password for the admin account and keep it somewhere safe. You will need to use this account later in the course.
Enable user authentication for the database by typing the following commands exactly into the Linux shell in Apporto:/usr/local/bin/mongod_ctl stop /usr/local/bin/mongod_ctl start
You can verify that you have enabled user authentication by accessing MongoDB with your new username/password. Type the following command into the Linux shell to start mongo:mongo --authenticationDatabase "admin" -u "admin" -p
This will prompt you to enter your password. Then use the command to show databases to verify that you have set up authentication correctly. If you are not logged in with your admin account, no databases will be viewable.
Note: These commands have been customized for the Apporto environment. If you are accessing MongoDB on your own machine, refer to the MongoDB Manual Enable Access Control tutorial.
If you accidentally messed up user authentication, or if you forgot your password, you can disable user authentication with this set of commands:/usr/local/bin/mongod_ctl stop /usr/local/bin/mongod_ctl start-noauth
Create a new user account called “aacuser” for the database AAC in the mongo shell. Refer to steps #6–7 of the MongoDB Manual Enable Access Control tutorial, linked above, to help you with this task. You will need to modify the commands so that the account name is “aacuser”.
Cumberlands University Blockchain Big Data & Government and Policies Research Paper
The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper a ...
Cumberlands University Blockchain Big Data & Government and Policies Research Paper
The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you'll have at least 4 sources cited). Start your paper with an introductory paragraph.Prompt 1 "Blockchain" (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future. Prompt 2 "Big Data" (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? How does big data affect a global economy.Prompt 3 “Government and Policies” (1-2 pages): Discuss the role government plays in a global economy. Also, look at what policies are currently in place and then discussion what policies should be put in place..Conclude your paper with a detailed conclusion section. The paper needs to be approximately 5-8 pages long, including both a title page and a references page (for a total of 7-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.Your paper should meet the following requirements:• Be approximately 5-8 pages in length, not including the required cover page and reference page.• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles from the UC library to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
3 pages
Safeguarding Network Assets
Firewall describes a system design which protects against unauthorized access to a network. Firewalls are implemented in b ...
Safeguarding Network Assets
Firewall describes a system design which protects against unauthorized access to a network. Firewalls are implemented in both hardware and software. ...
Similar Content
University of the Cumberlands Entrepreneurship in A Global Economy Essay
This week, you have read about entrepreneurship in a global economy. For your written assignment this week, complete a cas...
University of Central Missouri Importance of Planning and Health Care System Discussion
Explain in your own words why you believe planning is important. Select one of the following businesses: a large bank, a g...
ASSESSMENT OF THE IT POLICY SYSTEM, computer science homework help
Critique needed:ASSESSMENT OF THE IT POLICY SYSTEM
who will conduct the audit
An outside, third party, company will cond...
CMP 610 UMGC Software Development Life Cycle Paper
Project 3: Software WeaknessesStep 3: Explore the Software Development Life Cycle (SDLC) (1page)Now that you understand SC...
Campbellsville University Information Security and Cloud Policy Discussion
Information security uses administrative, technical (logical), and physical controls to mitigate risks related to organiza...
Security Policy Framework
Assignment 1: IT Security Policy FrameworkEstablishing an effective Information Technology Security Policy Framework is cr...
Information Systems
A business process can be described to be a logically transmitted collection of activities that mostly defines the way cer...
Clustering Algorithms
Clustering algorithms are the techniques applied in the process of grouping data. A clustering algorithm can be applied to...
Nist
Businesses that operate in the United States are under obligation to adhere to the standard that are set by NIST. NIST ref...
Related Tags
Book Guides
The Secret Life of Bees
by Sue Monk Kidd
The Power of Habit - Why We Do What We Do in Life and Business
by Charles Duhigg
Siddhartha
by Hermann Hesse
The Outsiders
by S.E. Hinton
A Brief History of Humankind Sapiens
by Yuval Noah Harari
Persuasion
by Jane Austen
The Nightingale
by Kristin Hannah
The Sun Is Also a Star
by Nicola Yoon
The Knife of Never Letting Go
by Patrick Ness
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
ITEC 610 UMDC Hands-on Activity Using an OLAP Tool Discussion
Visit Fedscope (http://www.fedscope.opm.gov/) and identify and explain at least one interesting trend. This tool is an exa ...
ITEC 610 UMDC Hands-on Activity Using an OLAP Tool Discussion
Visit Fedscope (http://www.fedscope.opm.gov/) and identify and explain at least one interesting trend. This tool is an example of OLAP.Also, describe a possible business strategy based on the trend you identified.Attach a screenshot along with your narrative in Word format. Minimum length = 100 words.INSTRUCTION ON ATTACHING A SCREENSHOT OF EACH TREND. When the trend appears on your screen, press the PrtScrn (Print Screen) key on your keyboard then go into Word and select Edit, Paste. You might want to edit and crop the pasted image -- select the image, choose Picture Tools/Format, click the Crop button, adjust the sizing bars, then click the Crop button again. Below the screenshot, describe the trend and relate it to a business strategy. Attach this Word document to your posting.Instructions for using Fedscope can be found at: http://www.fedscope.opm.gov/fedshelp/index.asp Hint: Use the Chart icon which is the second button on the toolbar at the bottom of the Fedscope screen. Also, try changing your dimensions like twisting your Rubik's cube!Here is a sample of a completed assignment.Note: Avoid the use of Google Chrome for this assignment. This site is best viewed in Internet Explorer 5+, Netscape 7+, Mozilla, and/or Firefox but there is no guarantee that the site will be accessible.
Air Force Institute of Technology Database Design and Development Questions
database foundations, type theory, gatheringdatabase requirements, normalization, performance and optimization, processing ...
Air Force Institute of Technology Database Design and Development Questions
database foundations, type theory, gatheringdatabase requirements, normalization, performance and optimization, processing data atscale and speed, SQL databases, No-SQL databases, unordered databases and distributeddatabases.
6 pages
Projectnx Risk Assessment
Risk assessment is an important tool in project development. Similar to every other project, information systems are faced ...
Projectnx Risk Assessment
Risk assessment is an important tool in project development. Similar to every other project, information systems are faced with a number of challenges ...
Southern New Hampshire University Client Server Development Project
s you have learned, CRUD functionality is essential for interacting with databases. In Module Two, you gained practice usi ...
Southern New Hampshire University Client Server Development Project
s you have learned, CRUD functionality is essential for interacting with databases. In Module Two, you gained practice using CRUD commands within the mongo shell. In order to develop a web application that connects a client-side user interface (such as a dashboard) to a database, it will help to develop a portable Python module that enables CRUD functionality for this data connection. In this milestone, you will begin creating a Python module that enables create and read functionality. You will finish developing the update and delete functionality for your Project One submission. This Python module will eventually be used to connect the user interface component to the database component of your dashboard in Project Two.
Note: This milestone requires you to use the “aacuser” account and password that you set up back in the Module Three milestone. If you did not successfully complete that milestone, follow the steps in Part II of the Module Three milestone to set up the “aacuser” account before beginning this milestone.
Prompt
After completing the readings for this module, you will implement the fundamental operations of creating and reading documents (the C and R of CRUD) in Python. You will use the PyMongo driver to create CRUD functional access to your document collection.
Upload the Austin Animal Center (AAC) Outcomes data set into MongoDB by importing a CSV file using the appropriate MongoDB import tool. This file is in the /usr/local/datasets/ directory in Apporto and the filename is “aac_shelter_outcomes.csv”. Use the database name “AAC” and collection name “animals”. Complete the import using the mongoimport tool and take screenshots of both the import command and its execution.
Note: If you completed the Module Three milestone, you have already completed this step.
Next, you must develop a Python module in a PY file, using object-oriented programming methodology, to enable create and read functionality for the database. To support code reusability, your Python code needs to be importable as a module by other Python scripts.
Develop a CRUD class that, when instantiated, provides the following functionality:
A method that inserts a document into a specified MongoDB database and collection
Input -> argument to function will be set of key/value pairs in the data type acceptable to the MongoDB driver insert API call
Return -> “True” if successful insert, else “False”
A method that queries for documents from a specified MongoDB database and specified collection
Input -> arguments to function should be the key/value lookup pair to use with the MongoDB driver find API call
Return -> result in cursor if successful, else MongoDB returned error message
Important: Be sure to use find() instead of find_one() when developing your method.
As you develop your code, be sure to use industry standard best practices such as proper naming conventions, exception handling, and in-line comments. This will ensure that your code is easy to read and reusable for future projects.
TIP: Use the following sample code to get started. Note that the authentication to MongoDB is in the initialization method for the CRUD class.Example Python Code to Insert a Document from pymongo import MongoClient from bson.objectid import ObjectId class AnimalShelter(object): """ CRUD operations for Animal collection in MongoDB """ def __init__(self): # Initializing the MongoClient. This helps to # access the MongoDB databases and collections. self.client = MongoClient('mongodb://%s:%s@localhost:YOUR_PORT_NUMBER' % (username, password)) self.database = self.client['project'] # Complete this create method to implement the C in CRUD. def create(self, data): if data is not None: self.database.animals.insert(data) # data should be dictionary else: raise Exception("Nothing to save, because data parameter is empty") # Create method to implement the R in CRUD.
Finally, create a Python testing script that imports your CRUD Python module to call and test the create and read instances of CRUD functionality. Be sure to use the username and password for the “aacuser” account for authentication when instantiating the class. This script should be created in a separate Jupyter Notebook IPYNB file, and should import and instantiate an object from your CRUD library to effect changes in MongoDB. After creating your script, execute it in Jupyter Notebook and take screenshots of the commands and their execution.
Guidelines for Submission
For your submission, you must include the code files for your Python module (PY file) and your Python testing script (IPYNB file). You must also submit a Microsoft Word document with your screenshots from Step 3.
Create an administrator account in the mongo shell by following steps #2–3 of the MongoDB Manual Enable Access Control tutorial. Then exit the mongo shell.
IMPORTANT: Write down the password for the admin account and keep it somewhere safe. You will need to use this account later in the course.
Enable user authentication for the database by typing the following commands exactly into the Linux shell in Apporto:/usr/local/bin/mongod_ctl stop /usr/local/bin/mongod_ctl start
You can verify that you have enabled user authentication by accessing MongoDB with your new username/password. Type the following command into the Linux shell to start mongo:mongo --authenticationDatabase "admin" -u "admin" -p
This will prompt you to enter your password. Then use the command to show databases to verify that you have set up authentication correctly. If you are not logged in with your admin account, no databases will be viewable.
Note: These commands have been customized for the Apporto environment. If you are accessing MongoDB on your own machine, refer to the MongoDB Manual Enable Access Control tutorial.
If you accidentally messed up user authentication, or if you forgot your password, you can disable user authentication with this set of commands:/usr/local/bin/mongod_ctl stop /usr/local/bin/mongod_ctl start-noauth
Create a new user account called “aacuser” for the database AAC in the mongo shell. Refer to steps #6–7 of the MongoDB Manual Enable Access Control tutorial, linked above, to help you with this task. You will need to modify the commands so that the account name is “aacuser”.
Cumberlands University Blockchain Big Data & Government and Policies Research Paper
The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper a ...
Cumberlands University Blockchain Big Data & Government and Policies Research Paper
The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you'll have at least 4 sources cited). Start your paper with an introductory paragraph.Prompt 1 "Blockchain" (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future. Prompt 2 "Big Data" (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? How does big data affect a global economy.Prompt 3 “Government and Policies” (1-2 pages): Discuss the role government plays in a global economy. Also, look at what policies are currently in place and then discussion what policies should be put in place..Conclude your paper with a detailed conclusion section. The paper needs to be approximately 5-8 pages long, including both a title page and a references page (for a total of 7-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.Your paper should meet the following requirements:• Be approximately 5-8 pages in length, not including the required cover page and reference page.• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles from the UC library to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
3 pages
Safeguarding Network Assets
Firewall describes a system design which protects against unauthorized access to a network. Firewalls are implemented in b ...
Safeguarding Network Assets
Firewall describes a system design which protects against unauthorized access to a network. Firewalls are implemented in both hardware and software. ...
Earn money selling
your Study Documents