Exp19_Excel_Ch04_ML1_Pet_Supplies

  

Project Description:

You are the inventory manager for Crafton’s Pet Supplies. You are currently preforming analysis to determine inventory levels, as well as the total value of inventory on hand. Your last steps will be to check the report for duplicate entries and format for printing.

Assignment

 

Portfolio Project: Find a process within a business that you feel can help that business gain a competitive advantage.

Create a word document that contains at least the following:

Start by introducing the project:
* Explain the process you will be reviewing and want to modify.
* Explain the business and industry where this process exists.
* Give an overview of the current process and how it works.

Based on the materials within this course, explain a new technology that should be deployed.
* Be very specific.  Note the exact technology as well as the specific application of that technology (i.e. technology might be Smart Automation – while the specific application might be light dimming technology).
* Identify the pros and cons of the new technology. 
* Identify how the new technology would impact the business/industry and the process that was selected to be modified.

What are the various factors the business should consider before deploying the new technology.
* Are their cost considerations. 
* What other project are impacted or might impact the deployment. 
* What are 5 to 10 things the business should consider before implementing and explain how important it would be to use the new technology (i.e. use some type of scale like ‘Critical’ vs ‘High Priority’ vs … vs ‘Good to have’).

The project must be at least 3 pages in length, double-spaced, 12-font.  This total length does not include the APA approved cover page and the reference page(s).  There must be at least 3 APA approved references, with citations, to support your work.

ERM Certification

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

 Use proper citations and references in your post.

You can refer below URL :

 https://ieeexplore.ieee.org/document/8760937?arnumber=8760937 

JAVA Program

You are tasked with creating a weather data collection program that asks the user for data, and then uses that data to output alerts to the user when certain conditions are met.

The data that is to be collected by the program includes:

  • Temperature in either Fahrenheit or Celisius
  • Percent chance of precipitation. (How great a chance that water will fall from the sky in some form.)
  • Percent Humidity.
  • Time of Sunrise and Sunset.
  • Wind speed.

With this data the program should send out to the user the following alerts when the conditions are met.

  • If temperature is above 90 it is a heat advisory, if above 105 it is a heat warning, if below 32 it is a freeze advisory, if below 20 it is a freeze warning.
  • If precipitation is < 25 % than it is a low chance, if it is between 25 % and 75 % chance then it is a decent chance and if it is greater than 75 % then it is a likely chance of rain. (Pair this with temperature though. If its below freezing it won’t be rain but snow that comes down)
  • If about 80 degrees with low humidity and no precipitation then it is a fire warning.
  • If wind speed is greater than 40MPH then it is a wind advisory. If above 60MPH then it is a wind warning.

There are also a few checks and balances possible.

  • Sunrise should never happen before 5AM and after 8AM
  • Sunset should never happen before 5PM and after 8PM
  • Obviously anything involving percentages should never go above 100% or below 0%

Cyber Law

 

Current laws that govern cyberspace are inadequate to handle advances in the Internet and computing technologies. In your opinion, is this an accurate statement? Support your position or answer with a few examples. 

Your submission should be:

  • 300 words
  • in-text citations and references using the APA style
  • single spaced

Compose a letter to your CEO describing the different types of network firewalls

 

You have a new CEO. They are non-technical and came to your organization from a completely different market segment. Your organization narrowly escaped being breached due to the diligence of your Blue Team, but they said it was touch and go – the breach almost went through – and improvements need to be made in the area of network firewalls, specifically. Those improvements require funding. Given the current pandemic situation money is more scarce than usual and you need to put forth a convincing case for the network firewalls.

Compose a letter to your CEO describing the different types of network firewalls and where each should be used/deployed within a hypothetical/fictional corporate network (feel free to be inventive and creative – please). Your goal is to get the funding for network firewalls. Use any persuasive techniques you have at your disposal. If you need to draw pictures, draw pictures.

***Give your CEO a name. CEOs can be any gender***

What do I Know About Where I Live?

 For this discussion, you are to use the following website: https://www.census.gov/acs/www/data/data-tables-and-tools/data-profiles/2017/ (Links to an external site.)

  • On the landing page, type in the name of your state, and then the name of your city or place.
  • Click on “Get Data Profile”.
  • On the new page, you will see links to 4 sets of information on your area:  
    • Social
    • Education
    • Housing
    • Demographic
  • Choose any two variables you think might be related and find them by  using the links to the related set.  In the tables, locate the  variables you chose to work with. For example, you could use the number  of rooms (in a house) under Housing and household incomes and benefits  under Economy.
  • Find the values for each of your two variables for several years.  For example, you might use the number of rooms and household income for  the years 2012- 2017.
  • Use Excel to make a scatterplot and to find the correlation  coefficient. You should then have 6 points on the scatterplot, one for  each year.

Share your scatterplot and correlation coefficient in your post and use them to address the following in your discussion post:

  • Why did you think a relationship exists between the two variables you chose? 
  • Based on the Excel scatterplot and output 
    • State what type of relationship exists:  Negative, positive, or none. 
    • Describe the relationship in words including what happens to one as  the other changes. For example, as the number of rooms in a house  increases, does the family income increase as well?
  • Does the statistical information you obtained support or refute your alternative hypothesis that a relationship exists? 
    • How?
    • If you did not find a relationship, why do you think that is?
  • What is the value to knowing there is a correlation between the  variables? For example, what businesses might flourish in a wealthy  area?   
  • Would another variable better explain the relationship?  
  • How might the city use such information to make improvements?  For  example, if you found a relationship between crime and poverty would it  make sense to make addressing poverty a priority?
  • Can you conclude that one variable is causing the other? Why or why not?

Presentation

Create a PP 12 slides with below topics related to telecommunications and networking with applications for every parameters mentioned below. APA formatted.

overview of OSI model

Client-Server Network

TCP/UDP

Methods of Communication

Analog & Digital Transmission

Media Access Control

LAN/WLAN Components

Ethernet/Wireless Ethernet

Dedicated-Circuit Networks

VPN Networks

Network Security

references

Blockchain and cryptocurrency

 Think of the sensitive data that your organization collects and handles. Would you be able to provide for the security of that data on a public blockchain? If so, what changes would you have to make to your software to support security on a public blockchain? If your organization doesn’t handle any sensitive data, describe a role that you may pursue in the future, and how that role may interact with sensitive data. Use that scenario to describe whether you would be able to provide for the security of that data on a public blockchain. 

Legal Reg, Compliance, Invest Discussion

One and half page is fine

Managing Risk

Your company has decided to implement a human resource demographic portal.  Under the system envisioned, employees would be able to use an online internal web page to change various personal information items themselves, such as, address phone, etc.  In addition, the employees would be able to change limited payroll related items, such as 401k deduction percentages or amounts, optional United Way contributions, and the number of federal and state exemptions to be claimed. Along with thie portal would be the ability to view, download, and print current and YTD pay information, including the current paycheck and check “stub”.  

Under the current system, employees must go to the HR office to make any changes – there is no online access.

Your company already requires direct deposit for all employees, and under the new system, pay stubs would no longer be printed.  Employees would be able to do this as needed through the portal.

 There are many potential risks associated with this project

  1. Your task is to Identify as many risks as you can (4 is a minimum, but feel free to identify more risks if you so desire).
  2. Determine the relative likelihood of each risk occurring (lowmedium high)
  3. Propose at least one strategy for addressing each risk, and describe the strategy in terms of the 4 risk responses (Avoidance, Transference, Mitigation, or Acceptance).

Remember that sometimes, risks are acceptable and can be taken, so long they are identified and a strategy to address the risk is presented.  For example, driving a car is a risky venture, but to address that risk we have driver’s education (mitigation), manufacturing safety standards (mitigation), insurance (transference), and staying at home (avoidance). Driving an older, unsafe vehicle by an unlicensed and uninsured motorist could be considered acceptance,

.

Turn in as much as needed. (Sometimes less is more, sometimes more is more; it’s your call.)

Support your strategies as needed with external references, and make sure your answer directly address the potential risks with the  human resource demographic portal.