Customer Info with the following columns

1. Customer_Info, with the following columns: CustomerID, Name, Email, Income, State

2. Product_Customer_Info, with the following columns: TransactionID, Name, Email, Product_Purchased, Income, State, Purchase_date

3. Product_Info, with the following columns: ProductID, Product_Name, Price

4. Sales_Info, with the following columns: CustomerID, ProductID, StoreID, Quantity, Purchase_dateThe question is:

Let’s define “Top Purchaser” as the customer(s) who have the highest number of visits/transactions (count of lines). In how many different months did the top purchaser(s) made a purchase in total? Note that there could be more than 1 top purchaser.e.g. if the top purchasers made a purchase on only 2 months each, but the months they made a purchase on were different – E.g., Top Purchaser A made a purchase on May & June, Top Purchaser B made a purchase on July & August and Top Purchaser C made a purchase on August & September – then the answer will be 5 (May, June, July, August, and September).The answer of the query has to be the final number, not a list of months.

roles and access privileges

 

Part 1

The scenario for this assignment is based on the Acme Distribution Center, a fictitious company. You need to play the role of Sam, the system administrator. Acme is responsible for completing a huge target of 180,000 orders. It holds the reputation of having an extremely low error rate for the central distribution per the industry standards. Therfore, Acme is viewed as a model of efficiency. another good thing about Acme is that it operates 24/7, even on holidays!

At the Acme Distribution Center, your colleagues are the following employees:

  • Robert, the lead warehouse receiver
  • Jennifer, sales and accounts payable
  • Bradley, the warehouse general manager
  • LuEllen, the shipper
  • Buster, the shipper
  • Lloyd, the purchasing agent
  • Spare, for temporary help

Jennifer works in the Sales Department by day and part-time as the evening accounts payable clerk with credit memo privileges to correct customer orders. Jennifer is a valuable asset for the organization. Since she joined the accounts payable department, the late payment rate has dropped by 20% while the warehouse-shipping rate increased by 10%, and the overall profit has increased by a modest amount of 0.005% for the first reporting period.

Your General Manager, Bradley is concerned that there is a high-value inventory moving through the system, but the profits are, at best, meager for high margin items. Bradley discussed the issue of inventory volume with Lloyd to see if he knew of any reason for the miserable performance, since so many high-value items were being ordered and shipped.

Your goal is to ensure that the users have only those access permissions that they need to perform their jobs effectively. A bit of research reveals that the warehouse has many goods to ship. You have developed the following matrix and scheme to identify conflicts in duties to address with the management. This will help Acme during the pending audit and reduce asset risk.

Using the following legend, provide the users with the appropriate rights and permissions:

  • T = Temporary
  • BP = By Position assigned
  • F or A = Needed for primary function
  • N = Never
  • RO = Read only

The first chart shown below depicts the current system. Please fill in the second chart to show which control each person should have based upon their role. For example, LuEllen should have an F under shipping since it is her primary role.

Mobile Forensics Lab

 

Directions

Mobile forensics is a fast-evolving science with rapid changes to techniques capable of accessing and analyzing data from mobile devices.

Digital crimes using mobile devices is growing. Criminal activity utilizing a mobile device leaving traces that can be important evidence in a criminal investigation. The advanced and constantly improving methods for analyzing technical evidence makes mobile forensics a rapidly growing field.

When considering a career in mobile forensics, it might be useful to consider how to overcome the challenges you will face. We have listed five key challenges here. In this lab you write a research paper 750 words in length using APA style addressing these five challenges in mobile forensics:

  1. What are the challenges with mobile password security and encryption in a forensics investigation?
  2. How do Operating Systems on mobile devices differ and how do digital forensics investigators address those differences?
  3. What software tools and equipment are necessary to extract evidence for mobile forensics investigation?
  4. What anti-forensics techniques do criminals use to circumvent mobile forensics analysis?
  5. What are the roles and responsibilities of manufacturers and software developers in assisting with the process of mobile forensics?

Problem solving with python or r code

    

Using either R or Python (or anaconda) and the data set provided, I want you to provide me the code and output that completes the following. That said, I will communicate the data structures of this assignment using R.

1. Create a data set with the following values.

x = c(94, 90, 72, 72, 95, 7, 89, 36, 61, 30, 80, 15, 73, 99, 24,

96, 36, 40, 39, 84, 4, 12, 39, 8, 96, 7, 38, 91, 84, 49, 3, 34,

52, 6, 11, 2, 54, 75, 61, 47, 62, 73, 41, 41, 12, 77, 81, 74,

44, 97, 10, 15, 5, 53, 26, 1, 36, 15, 37, 3, 86, 93, 92, 28,

42, 44, 57, 19, 67, 18, 37, 46, 94, 50, 84, 52, 56, 49, 32, 17,

23, 69, 96, 95, 69, 67, 52, 85, 58, 13, 6, 4, 89, 40, 26, 73,

9, 70, 29, 41, 57, 91, 77, 54, 53, 63, 88, 39, 98, 71, 67, 14,

2, 82, 42, 8, 34, 7, 54, 7, 79, 12, 97, 26, 94, 85, 13, 12, 75,

2, 58, 6, 43, 12, 59, 25, 81, 10, 28, 96, 61, 16, 41, 41, 32,

82, 48, 3, 21, 75, 85, 1, 98, 84, 7, 42, 30, 28, 47, 13, 5, 34,

34, 14, 7, 59, 90, 84, 40, 7, 21, 68, 27, 95, 11, 23, 86, 83,

28, 23, 80, 42, 32, 25, 76, 28, 82, 1, 93, 38, 8, 79, 96, 82,

24, 75, 96, 43, 62, 35)

If you are interested in how I created the well formatted vector provided above, below is the code snipped from R that created it.

x=floor(runif( min=1, max=100, n=200))

page(x)

2.  Identify the mean, standard deviation, quartiles, and median using any method available to you. Please clearly identify your answer is! Please provide any code that you use to derive your answer whether R or python.

3. Using the sample function, sample the vector above to create a new vector of length n where n = {10, 50, 75, 100, 150}.  For each of these new vectors, calculate the value of mean, standard deviation, quartiles, and median. Explain what is happening in the above scenario as the sample size increases.

5. This will require some thinking. I would like you provide statistical evidence that a coin flop has a 50/50 probability of landing on heads (or tails) by generating a vector of length 200 and applying the concepts of mean, median, standard deviation, etc. to evaluate the data set. Hint: you may have to run your experiment more than once! 

a. For your answer, please provide any code / results that you use. 

b. Please provide a short paragraph describing why your findings are evidence that a coin flop has 50/50 probability of landing on heads or tails.

Powerbi Data analysis

 “Analyse This!” – Bring your user stories to life with PowerBI Having successfully completed your analysis of user stories, you have been requested by HOLISTICO to deliver a prototype dashboard. You will use your experience gained from Week 05 (Think like a designer) and the Power BI content from Week 8 to Week 12 to develop a visually compelling dashboard that encompasses user stories completed in Assignment 02. You will then pitch this dashboard to HOLISTICO’s team to show them the value of the analytics exercise they have undertaken with you as you uncover insights about their operation and direction. A sample dataset for this assessment is provided in the spreadsheet (BUS5AP-HOLISTICO-AS03- Dataset.xlsx) on the LMS under Assignment 03. 

Discussion

 

  1. Think about how you would feel  if there were no rules regarding how your credit card information was  stored on merchants’ websites. Consider whether you would purchase items  online. Would the Internet be as big as it is today if we had no laws  or information security policies regarding data that makes up an  e-commerce transaction? Provide rationale for your answer.
  2. Imagine that you work for an  organization that has no Internet use policy. Employees use the Internet  in whatever way they want using company-owned personal computers. Could  this cause a problem for the organization? Why or why not?

Fully address the questions in this  discussion; provide valid rationale for your choices, where applicable;  and respond to at least two other students’ views. 

Create a 3 – 4 page matrix

Refer to Devil’s Canyon, Part A in Wk 4.

Using the potential risks for Devil’s Canyon you identified in Wk 4, create a 3- to 4-page matrix to share with the team. In your matrix, you should:

  • Describe briefly each of the identified risks/threats.
  • Evaluate the security controls that mitigate each of the risks/threats identified.
  • Provide a rationale for how each of the controls identified mitigates the risk to an acceptable level.
  • Research and describe the security technologies and security design that can be used to mitigate each of the identified information security risks.

network administration

a Windows Server 2016 VPN:

  • What tools are available for configuring and managing a VPN?
  • What are the general steps required to install a VPN?

Problem 5- Org behavior

1. Discuss John Holland’s personality-job fit theory.

2. Describe the five value dimensions of national culture as identified by the Hofstede’s framework for assessing cultures.

 This is to be in narrative form. Bullet points should not to be used.  Times New Roman 12-pt font, double-spaced, 1 inch margins and utilizing at least one outside scholarly or professional source related to organizational behavior. This does not mean blogs or websites. This source should be a published article in a scholarly journal. This source should provide substance and not just be mentioned briefly to fulfill this criteria. The textbook should also be utilized. Do not use quotes. Do not insert excess line spacing. APA formatting and citation should be used.

Text-

Title: Essentials of Organizational Behavior, Student Value Edition 

ISBN: ISBN-13: 9780135468890 

Authors: Stephen P. Robbins, Timothy A. Judge 

Publisher: Pearson 

Edition: 15TH