Help2

Company Profile

Across the States Bank (ASB) takes pride in providing our customers with superior service and the ability to manage their finances 24/7 from anywhere in the world. As one of America’s largest banks, our 132,500 employees are available to address personal and business banking customer needs any time of the day or night by phone, e-mail, or through our online chat feature. Our seamless online and mobile banking and 24-hour customer support ensure that your money management needs can always be met.

Based in Metropolis, California, ASB offers over 17,000 branch offices and ATMs to service customers across the continental United States. When traveling abroad, ASB customers can easily access accounts and complete routine banking transactions in most European nations through our foreign partner, Across the EU Bank. Always looking for means of expanding our $10 billion business, we are developing additional foreign partnerships that will soon allow us to expand our services to South America and Asia to better meet our customer needs.

 

Products and Services

Personal Banking

As one of the nation’s leading personal banking service providers, ASB allows individuals to select from a wide range of banking services, including:

  • Savings and checking accounts
  • Debit and credit cards
  • Personal and automobile loans
  • Home loans, including first mortgages, home equity, and lines of credit
  • Insurance
  • Investment banking services
  • Wealth management and estate services

Business and Commercial Banking

To meet the diverse needs of business and commercial customers, ASB offers individually selected and bundled services, including:

  • Business savings and checking accounts
  • Business loans
  • Merchant services
  • Payroll services
  • Insurance
  • Investment banking
  • Trust services
  • Shareowner Services

QUESTION 

Students have evaluated the various laws, compliance standards, secure configurations, and policies that organizations must apply to meet business needs and customer expectations, achieving both a level of trust and competitive advantage. This week’s topic will enhance the knowledge learned by considering the holistic views of security within the corporate environment in regard to establishing a security program and communicating the strategy/roadmap to leadership.

Write a four to five-page paper describing the components necessary for a comprehensive security program for your corporate profile scenario, selected previously. The paper should include:

  1. An executive summary (introduction paragraph) and a closing statement (closing paragraph) that provide the purpose and justification for the elements presented (consider recent events, lack of awareness, loss of finances, reduced competitive advantage, proactive vs. reactive, etc.).

  1. The paper must include at least 10 main elements of a security program (minimum 75 words per component). Examples include: Security Awareness Program, Incident Management, Disaster Recovery, Risk Management Program, Provisioning Process, Identity and Access Management (IAM), Security Operations Center, Security Engineering, Policy Management, etc.

  1. Provide a header for each main element and a paragraph describing the purpose, associated technologies, and best practices for implementation and communication. For example, describe why security awareness training is important, how to implement it throughout your organization, what technology can be leveraged to increase awareness, etc.

  1. Identify which fundamental security design principles are in play, how they interrelate, and methods in which they should be applied to develop systems worthy of trust.
download

info 321 final project

Term Project – week 8 – (17%):

You were just hired by an airline industry to create a database to record the various airlines and the pilots that work for them
Discussions with the industry representatives focused on two initial entities, Airlines and Pilots; the following key points were agreed:
1. Each pilot is assigned a unique PilotID.
2. Each AirlineID is unique
3. Each pilot may work for one airline, each airline can have many pilots.
4. FName, LName, JobTitle and Salary describe each pilot (with the obvious meaning)
5. AirlineID, NPlanes, NRoutes, NPilots describe each airline (NPlanes number of planes, NRoutes number of routes, NPilots number of pilots)
6. No fields beyond those in the report are needed.

The objective of this exercise is to demonstrate an understanding of some basic concepts covered in the course. The exercise is a straight forward application of those concepts – there are no “hidden” complexities – should you identify something in the key points or data that adds complexity, contact the instructor before submission – you may be over thinking the exercise.

The sample data may not represent all possible values of each field – consider each field’s domain during the design.

The objective is to replace the following report with a relational database. The submission will consist of a word compatible document to record the design process, and an Access DB.

download

Here is the relational schema (table notation) for the above report / table:
PilotAirlines (PilotID, FName, LName, JobTitle, Salary, AirlineID, NPLanes, NRoutes, NPilots)

The functional dependencies are:
PilotID – – > FName, LName, JobTitle, Salary, AirlineID, NPLanes, NRoutes, NPilots
PilotID – – > FName, LName, JobTitle, Salary, AirlineID
AirlineID – – > NPLanes, NRoutes, NPilots

The specific tasks are listed below, the percentage in parenthesis corresponds to the grade weight for each task.
Name your document Last Name_TermProject (i.e. Smith_TermProject). When you are asked to provide an explanation or description, include enough content to demonstrate that you understand the definition, term, concept, etc. and how it applies to this exercise.

SUGGESTION: Review the Terms and Concepts Discussion, especially the One-to-Many Normalization Process: Parts and Suppliers example. There is also a normalization MP4 file that can be downloaded from the Resources section.

Incorporate the following outline in your submission – include the section numbers – not the questions or other content from the instructions.

1) Review the existing report, functional dependencies provided and the sample data (as well as field domains and common knowledge) and document any assumptions you feel are appropriate (beyond those in the key points) and identify initial entities (person, place, thing). (10%)

2 Define functional dependency, and explain one row of the functional dependencies provided above in plain English (use field names). (15%) (you do not need to explain partial or transitive dependency)

3) Based on multiplicity – explain the relationship between the initial Entities in plain English – (either one-to-many, or many-to-many). (15%)

4) Design: specify all tables and fields at each normal form level
a) First Normal Forum (1NF) assessment / action – if needed 10%
Copy the 1NF definition from the text (include quotes and page number)
Assess the UNF table provided and if necessary, make the changes needed to conform to the 1NF definition. Document the resulting 1NF table(s) using relational schema notation or spreadsheet format (see the above example or page 111 Figure 4.2.6 of the text).
Explain how each table(s) meets the 1NF definition (use field names)
b) Second Normal Form (2NF) assessment / action – if needed 10%
Copy the 2NF definition from the text (include quotes and page number)
Assess the 1NF table(s) in the previous section and if necessary, make the changes needed to conform to the 2NF definition. Document the resulting 2NF table(s) using relational schema notation or spreadsheet format.
Explain how each table meets the 2NF definition (use field names)
c) Third Normal Form (3NF) assessment / action if needed 10%
Copy the 3NF definition from the text (include quotes and page number)
Assess the 2NF table(s) in the previous section and if necessary, make the changes needed to conform to the 3NF definition. Document the resulting 3NF table(s) using relational schema notation or spreadsheet format.
Explain how each table meets the 3NF definition (use field names)

5) Use the 3NF tables in your design, to create an new MS Access database, load the sample data provided,
Name your database Last Name_TermProject (i.e. Smith_TermProject). (5%).

6) Create a Query, that provides the results for the following request: List each PilotID, FirstName, LastName, the Airline each pilot works for, sorted by pilot. (5%)

7) Create a Form: New Pilot Input (5%)

8) Create a Report: Pilot List – list all pilots, their first and last names, and Salary (5%)
Upload the database to the assignment area as one of the deliverables

9) Submission content organization, clarity, spelling and grammar (10%)

Discussion 10- Org Behavior

Assigned Readings: Chapter 10. Understanding Work Teams Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. You are on a team which features individuals high in openness and emotional stability. What is the likely result of task conflict within your team? Why is this?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text-

Title: Essentials of Organizational Behavior, Student Value Edition 

ISBN: ISBN-13: 9780135468890 

Authors: Stephen P. Robbins, Timothy A. Judge 

Publisher: Pearson 

Edition: 15TH

Corporate IT Security Audit Compliance

 

  • Read the Case Study: On the relation between corporate governance compliance and operating performance. Accounting & Business Research (Wolters Kluwer UK), 39(5), 497-513. Vander Bauwhede, H. (2009). 
     (this case study is located in the EBSCO Host of the University of the Potomac Library) 
  • Write a summary analysis and what is your opinion of the discussion? What is the high point that convinces you that Corporate governance compliance does make a difference in the operating performance?

Writing Requirements

  • 4–5 pages in length  (excluding cover page, abstract, and reference list)
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

H5

 Download and read the document and answer all questions in the document. Please see attached document H3 & APA Criteria doc.   

Need summary of all videos available here

Please go through the below links and write the summary and bullets points for each lecture. Furthermore some of the example from your own has to added in the reading assignment as well.

1. https://www.youtube.com/embed/PySo_6S4ZAg

2. https://www.youtube.com/embed/AwQHqWyHRpU

3. https://www.youtube.com/embed/JUJNGv_sb4Y

4. https://www.youtube.com/embed/ANszao6YQuM

5. https://www.youtube.com/embed/IM9ANAbufYM

6. https://www.youtube.com/embed/G5FNYxbW_Qw

7. https://www.youtube.com/embed/gCJCgQW_LKc

8. https://www.youtube.com/embed/733m6qBH-jI

9. https://www.youtube.com/embed/NP2XqpgTJyo

10. https://www.youtube.com/embed/IFLstgCNOA4

Discussion Topic/ respond to classmates

 

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

Research various methods of communication that are commonly used in business, such as email, VoIP, texting, messaging, as well as software applications used to support each (Microsoft® Outlook®, Skype®, Twitter®, Instagram®). 

Discuss the questions:

  • In what business context would it be appropriate to use each communication method?
  • What are some of the advantages of using one method or application over another?

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

Research paper

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  • This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  • Introduction
  • Roles and Responsibilities
  • Incident Response
  • Plan Activation
  • Document History
  • Procedures

Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussioon 250 words

 

If you were asked by your employer to develop a new Information Security Policy, where would you turn to find resources to build this policy? List the two most important items you would include in this new policy and explain why you felt these were most important.

A Discussion Board rubric clearly communicates expectations for participation, please see the NEC Grading Matrix for Discussion Board Postings as an example.

ml

There are four possible time moments for complication prediction: on base of the information known at 1. the time of admission to hospital: all input columns (2-112) except 93, 94, 95, 100, 101, 102, 103, 104, 105 can be used for prediction; 

2. the end of the first day (24 hours after admission to the hospital): all input columns (2- 112) except 94, 95, 101, 102, 104, 105 can be used for prediction;

 3. the end of the second day (48 hours after admission to the hospital) all input columns (2- 112) except 95, 102, 105 can be used for prediction;

 4. the end of the third day (72 hours after admission to the hospital) all input columns (2- 112) can be used for prediction