Chapter 15 explains the City of Edmonton’s ERM process. Chapter 18 explained ERM and Bluewood Chocolates. Compare the two use cases and discuss similarities and differences (list in bulletin points for easy understanding). Do you agree with the approaches to implement an ERM and why? If you could change anything about the reasons to implement ERM in these case studies what would that be and why? Would you implement the same ERM approaches in your current organization (or future organization)?
PLEC15
Discuss in five hundred words or more a situation at work where you felt you had to consider the ethics of something you were being asked to do.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
Access Control
Discuss the threats and vulnerabilities to Access Control and what business must do to be protected.
Length, 2 – 3 pages.
All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.
All paper are checked for plagiarism using SafeAssign, you can review your score.
Physical Database Design
Answer the following question:
As the modern database grows bigger and bigger, many organizations are moving away from a relational store and looking towards NoSQL design. There is a desperate need to consider storage and file structure as part of physical design principles. If you were implementing a new database system for an ERP or CRM that required a minimum of 100 TB of storage per year, what would you consider as you plan your physical design?
Instructions
- This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed.
- You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
- Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
- Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.
- Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.
Executive Summary
one- to two-page executive summary. This summary is for the owner of Don & Associates, where you are employed in this scenario.
Use this Executive Summary Template. In the template, you will see specific instructions. Delete the instruction text before you submit the project.
Your summary should include:
- the types of cloud computing (private, public, hybrid)
- three major cloud service providers
- three cloud computing service models
- potential benefits and risks of migrating the company’s technical infrastructure to the cloud
Be sure to cite any sources you use.
How Will My Work Be Evaluated?
For this assignment, you are asked to provide your supervisor with a summary of cloud computing and the potential benefits and risks of migrating to the cloud. By summarizing your findings in a brief executive summary, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
- 1.1.1: Articulate the main idea and purpose of a communication.
- 1.1.2: Support the main idea and purpose of a communication.
- 1.1.3: Present ideas in a clear, logical order appropriate to the task.
- 1.2.1: Identify the target audience, the context, and the goal of the communication.
- 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
- 1.3.1: Identify potential sources of information that can be used to develop and support ideas.
- 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
- 1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.
- 10.1.1: Identify the problem to be solved.
- 10.1.2: Gather project requirements to meet stakeholder needs.
bi2
1. Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/ watch?v=yv0IG1D-OdU and identify the major AI drivers.
2. Explore the AI-related products and services of Nuance Inc. (nuance.com).
3. Explore the Dragon voice recognition product.12:13watch the video and write paper on it. all together 1 paper should be good
Data mining
Using search engines and find two different recent articles involving data mining. Describe the role of “data mining” in the story using your own words.
Here is an example of an article:
New police unit to check cyber crime
Social media users to face stringent watch; police can detect users quickly
Be sure to cite your sources.
dasdsad
The vast yfhhfh
security architecture risk assessment
Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (Length: Minimum of 600 words)
1. When should the architect begin the analysis?
2. What are the activities the architect must execute?
3. What is the set of knowledge domains applied to the analysis?
4. What are the tips and tricks that make security architecture risk assessment easier?
Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (Length: Minimum of 600 words)
1. What does an assessor need to understand before she or he can perform an assessment?
2. How active is each threat agent? How might a successful attack serve a particular threat agent’s goals?
Anova Discussion
- How can you get a feel for whether or not there is a difference among several population means by examining the data?
- For what purpose is the F-test used?
- Describe a randomized block design. How is this design different from an independent experimental design?