Please answer the following

Course : Enterprise Risk Management

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

No plagiarism please

Discussion 5- Project Risk & Quality Mngt

Chapter 7: Project Risk Identification Tools

Project Quality Conference Paper:  https://www.pmi.org/learning/library/practice-three-project-quality-management-7198

Project Quality Conferecne Paper:  https://www.pmi.org/learning/library/developing-grading-system-project-quality-6731

Six Sigma Conference Paper:  https://www.pmi.org/learning/library/quality-commitment-six-sigma-initiatives-4801

Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  • What is TQM?
  • What must a Project Quality Plan address?
  • What does the cost of quality refer to?
  • What is Six Sigma?
  • Compare and contrast Quality Control and Quality Assurance.

Text

Title: Managing Project Risks 

ISBN: 9781119489733 

Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards 

Publisher: John Wiley & Sons 

Publication Date: 2019-08-13

Urgent 2

 Assignment 1

Assignment Content

  1. The president and board of directors accept your proposal and are ready to adopt the cloud solution recommendation. You are asked to write a message for a dashboard publication on the company’s internal website. Your audience is a diverse workforce, and they will be reading the announcement about this new solution.

    Draft a 1- to 2-page announcement to be used for the dashboard.

    This message can be created as one of the following:

    • Website (provide a wireframe)
    • For introductory information on wireframing, refer to “Conceptualizing the Solution” from Wire Framing for Product Managers from LinkedIn Learning in the Wk 5 Learning Activities folder.
    • Microsoft® Word or Microsoft® PowerPoint® presentation
    • Another instructor-approved deliverable
    • Provide the following in your announcement:
    • A brief background of the problem
    • The solution to address the business’s needs
    • The business benefits to employees and the community
    • Key highlights of the service management and operation plan to roll out the cloud solution
    • A timeline for the implementation and the teams included in the project

Assignment 2

 

Assignment Content

  1. Securing company data is not as simple as backing up to another hard drive. It is important to have backup tools, processes, and policies for both business continuity and disaster recovery plans.  

    In the final section of your Playbook, create a 3- to 4-page outline of backup policies for when the data center is inaccessible.  

    Complete the following in your outline: 

    • List the tools used for backup purposes. 
    • Explain the following: 
    • Where employees should work from that day 
    • How employees can get to their data 
    • The communication methods about updates 
    • Outline step-by-step instructions to recover your databases and telecommunications. 
    • Provide a step-by-step guide to recover and provide any additional company assets. 
    • Discuss policies for backup media storage. 
    • Discuss policies for encryption of backup data. 
    • Note: Numbered or bulleted steps or guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps or guidelines. 

      Cite at least 2 resources to support your assignment.

      Format your assignment according to APA guidelines. 

      Submit your completed Playbook for this assignment. 

       

    •  

marketing strategies

  In 350 words

After reviewing this week’s resources, define and discuss the product life cycle and apply this to your redefined or new product or service.  Estimate how much time your product will stay in each phase of the lifecycle and define why you are making this assessment? 

Draw a representative graph of your product/service lifecycle. 

Note:  Because of the importance of the visual of the graph,  

Weeks Resource:

Online business 

The Marketer’s Handbook to Product Life Cycle

 https://partners.livechat.com/blog/product-life-cycle/  

Video:

The Product Life Cycle Model – Simplest Explanation ever 

https://www.youtube.com/watch?v=Nq7Zj18DJU8&t=25s  

Develop a Java application that plays

  

Develop a Java application that plays a “guess the number” game as described below.
a) Your application first gets a random number in the range 1-1000 inclusive (you might want to use Math.random() or the Random class).
b) The application then displays the following prompt (probably via a JLabel):
I have a number between 1 and 1000. Can you guess my number?
Please enter your first guess.
Post a textbox for the user to enter a number and post a message telling the user to hit ‘Enter’ after entering a guess in a textbox (probably using a JTextField).
c) Input the user’s guess in the code for a previously-registered event-handler method (consider using the event-handling approach discussed in the text, or the actionPerformed() method of class based on the ActionListener interface, which will require some additional research outside the text).
d) For the first guess, color the entire background red, meaning that they are getting warmer (you might want to use the setBackground() method for a container). If this is the second or later guess, and they are further from the correct number than the last guess, then color the entire background blue. If they get the correct number then color the background some other color than red or blue.
e) If the user guessed the number correctly, respond with their number, post a congratulatory message, get a new random number, and display a JButton to start a new game. Otherwise, to help the user close in on the correct number, post a message, with their guessed number, whether they are “TOO HIGH” or “TOO LOW” from the correct number, and whether they are “WARMER” or “COLDER” (this should match the background color). Also report the guess number of the next guess (e.g. “Enter guess number nnn”). You might want to use a concatenated string in JLabel for these incorrect guess messages.
f) The process is repeated each game until the user guesses the correct number. Be sure that you erase obsolete status messages. 

Computer & IOS colaboration

create a Microsoft Word document titled “YourName_COMP150_W2_Assignment”. You will take screenshots and add information from the following steps into this Word document. Make sure to provide screenshots for each of these tasks. Pictures will not be accepted.

Computer tasks:

  1. Review the backup options for your operating system and provide evidence of it being enabled for your system with a screenshot.
  2. Open the firewall system and take a screenshot showing that it is enabled
  3. Setup the operating system’s mail app with your preferred e-mail account and provide evidence that is setup with a screenshot. For example, showing settings or a new email in draft mode.
  4. Show Skype (Windows 10) or Facetime (MacOS) opened and configured in your system with a screenshot. You can show this by showing your username or account option in Skype or Facetime.

Mobile device tasks:

  1. Setup your email and provide a screenshot of a draft email or the settings of your email.
  2. Create a bookmark for https://www.chamberlain.edu/Links to an external site. and provide evidence that has been setup in your internet browser (Chrome or Safari).
  3. Download this documentLinks to an external site. and show a screenshot of the file available in your device via file manager, Google Drive (Android) or AirDrop|iCloud (iOS). If you use other cloud file management apps such as Dropbox, this will be accepted as well.
  4. Download the Chamberlain mobile app and add it to your home screen. Provide a screenshot of the app on your device.
  5. Ask your virtual assistant to create a new appointment for tomorrow at 10 AM and provide a screenshot of your assistant’s response.
  6. Take a screenshot of information about your device which is located in the settings.

Once you have completed all of these steps, submit your Word document.

JavaScript Project

I need a  functional website with 5 pages  which developed in Javascript and jquery. Please find the attached documents for project requirements. It has to be finished by 17th August.

Discussion

Part 1) Project Management: What is a project, and what are its main attributes? How is a project  different from what most people do in their day-to-day jobs? Discuss the  importance of top management commitment and the development of standards for successful project management. Provide examples to  illustrate the importance of these items based on your experience on any  type of project. Discuss the unique challenges that an IT project  presents.

Min 300 words 2 references

Part 2a “Data Warehouse Architecture”  (2 pages): Explain the major components of a data warehouse  architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

part 2b “Big Data” (2 pages):  Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

part 2c “Green Computing” (3 pages):   One of our topics in Chapter 13 surrounds IT Green Computing. The need  for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully.  Discuss that organization and share your link.

3 scholarly references. APA formatting.

Part1 and part2 need to be separately attached.

Case Studies II and Cyber Response

All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.

Based on your case study 1 and additional cases studies attached, discuss the various cyber responses.

CASE STUDY 1:

Evil Corp is one of the most popular cybercrime organizations worldwide due to its numerous attacks in the past decade (2010-2020). Evil Corp is led by Russians Maksim Yakubets and Igor Turashev, who were yet to face charges until 2019 in the US. The level of sophistication of the group is yet to be figured out correctly as the cybercrime organization is thought to have very close ties with the Russian intelligence agency (FSB). It is thought that some of the most gruesome attacks on companies in the US and the UK by the group were actions on behalf of the FSB. According to Arghire (2021), Evil Corp is still active in the hacking business despite the indictment of its lead members in the US, just that it might have evolved into corporate spying activities.

Some of the most memorable attacks perpetrated by Evil Corp are in the banking sector. They have stolen millions of dollars from unsuspecting banks. A banking Trojan known as Dridex developed by Evil Corp harnessed the confidential details of bank customers in the US as soon as they clicked on phishing emails. The scheme affected computers globally where American banks operate, leading to a loss of $100 million. In another attack by Evil Corp, the software used was known as ‘botnet.’ It would freeze a computer’s operating system leading to a malware spread where the hackers would transfer money from victims to their overseas accounts. The US department of justice also believes that Evil Corp’s malware named ‘Zeus’ and ‘Bugat’ transferred over $70 million from US individuals, some pensioners.

References

Allyn, B. (2019). Russian Hacking Group Evil Corp. Charged by Federal Prosecutors in Alleged Bank Fraud. Retrieved from https://www.npr.org/2019/12/05/785034567/russian-hacking-group-evil-corp-charged-by-federal-prosecutors-in-alleged-bank-f

Arghire, I (2021). Understanding Russia’s Evil Corp cybercrime organization. Retrieved from https://www.securityweek.com/russian-evil-corp-cybercriminals-possibly-evolved-cyberspies

Sanger, D. E., &Perlroth, N. (2020). Russian criminal group finds a new target: Americans working at home. New York Times.