ERM W1 D

 

Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

IT Project management part five

 Project 5 – Create a Cause-and-Effect Diagram 
There’s always the chance that something will go wrong, a stakeholder wants something different, technology doesn’t work as planned, and what you are working on becomes outdated. 
The Ishikawa Diagram (Fishbone Diagram) is a tool that can be used to help in the analysis of what is going wrong. 
Take a look at your project and refer back to Figure 7-2 or the internet and create a diagram that lists a potential issue you may have and look at the components of what you would look at to address it. 
Here are a couple of websites in addition to your text that you can refer to:  

https://kanbanize.com/lean-management/lean-manufacturing/root-cause-analysis/fishbone-diagram

https://www.qimacros.com/fishbone-diagram-template/index2.php

Executive Briefing

The topic attached is Gamestop

Prepare a paper that…

· Explains the technological development in terms that a business manager can understand.

· Discusses the implications of the development on how business is or will be conducted. Is this a tectonic shift that is going to drastically change the competitive landscape, a minor development that should be monitored but no reason to panic, or something in between?

· Suggests an action plan for the organization. (A plan to “do nothing” will probably not fly with general managers).

 The briefing should be 2000 to 3000 words in length. The Briefing should be authoritative, and should cite authoritative sources (at least 7) as evidence for its assertions. 

Question 16

  

You have already sent the memo to Mr. McAlister outlining the need for the disaster plan.  As the database administrator, you have decided to install MySQL to handle the growing need for storage for the database.  Now, in a 2-3 page report, (a minimum of two full pages of content, double spaced, APA format) discuss with the owner the need for securing MySQL and what are potential issues with security now that the system is growing larger.  Include some of the must prevalent security vulnerabilities and issues with MySQL. Again, you are relating it Home Start Realty.   Most owners will want to focus on design of a database, as it easier to comprehend.  As the database administrator, you need to focus on the need for security, so make your points known to the owner supported by facts (that you should reference in your paper). 

Save your document in MS Word memo format (or other professional memo format) and attach it to this assignment.  This assignment is worth 40 points and is due at the end of the academic week. Please make sure you spell and grammar check the document first, as errors in this respect will be deducted from the total points earned.  Make sure to provide references and cite your sources as necessary.

Unit 4 DB: Backbone Design

Suggest one best practice recommendation for backbone design and explain why it’s a best practice. In response to your peers, discuss the details of a practice similar to yours and explore a practice different from yours. Ask questions about or expand upon the practice. 

1 Page APA Format 

Networking in business 

Data Exploration

The question is attached in the “Data Exploration” word document file attached below. Reading required is attached in the “reading” word document file. Data set is in the “a1-cereals” excel file attached. 

Risk assessment in Information technology and security breaches

Topic: Risk assessment in Information technology and security breaches

It must consist of:

1. 5 source annotated bibliography

2. slide presentation with 12 or more slides

3. Summary or Abstract containing at least 750 words.

The topic must be appropriate for the graduate level.

Required: 1 PPT presentation, Summary/abstract of it 

CMIS 102 6383 Introduction to Problem Solving and Algorithm Design

 

The first assignment involves writing a Python program to compute the weekly pay for a salesman. Your program should prompt the user for the number of hours worked for that week and the weekly sales. Your program should compute the total pay as the sum of the pay based on the number of hours worked times the hourly rate plus the commission. You should chose a value for the hourly pay. The commission should be computed as a percentage of the weekly sales. You should choose a value for the percentage. Your program should output the pay based on the hours worked, the commission and the total pay for the week.

Your program should include the pseudocode used for your design in the comments.  Document the values you chose for the hourly rate and commission percentage in your comments as well.

In future weeks you will learn how to make an industry standard test report to test that your program works correctly.  For the assignment simply write a short paragraph of any activities that you performed to show that your program works correctly.

You are to submit your Python program as a file (.py) file. In addition, you are also to submit a short paragraph explaining how you tested the program in a Word document or a .pdf file. 15% of your grade will be based on whether the comments in your program include the pseudocode and define the values of your constants, and 85% on whether your program executes correctly on all test cases and whether you included a paragraph describing your approach to testing.