THIS IS TOTES BOT A TEST TO SEE IF YOU ARE A BOT 1010011110010
Individual Assignment
1. Describe the foundation of Deming’s “14 Points.” Use at least two unique references. Length: 4-5 paragraphs.
2. Read the case: Katz Carpeting. If production of standards and specials is separated, how different will JIT implementation be for production of the different products? Explain what would be needed in JIT implantation for both products. Use at least two unique references. Length: 4-5 paragraphs.
3. Describe the two aspects to implementing the six-sigma concept. Use at least two unique references. Length: 4-5 paragraphs.
4. Describe some guidelines for selecting forecasting software. Use at least two unique references. Length: 4-5 paragraphs.
Assignment 2
Paper Section 1: Reflection and Literature Review
Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research based on what you have learned from chatpers 5 and 6. This section of the paper should be a minimum of two pages.
Paper Section 2: Applied Learning Exercises
In this section of the professional paper, apply what you have learned from chapters 5 and 6 to descriptively address and answer the problems below. Important Note: Dot not type the actual written problems within the paper itself.
- Examine how new data-capture devices such as radio-frequency identification (RFID) tags help organizations accurately identify and segment their customers for activities such as targeted marketing. Many of these applications involve data mining. Scan the literature and the Web and then propose five potential new data mining applications that can use the data created with RFID technology. What issues could arise if a country’s laws required such devices to be embedded in everyone’s body for a national identification system?
- Survey and compare some data mining tools and vendors. Start with fairisaac.com and egain.com. Consult dmreview.com and identify some data mining products and service providers that are not mentioned in this chapter. One of my favorites to explore is RapidMiner found at https://rapidminer.com/ and an educational license option can be found at: https://rapidminer.com/educational-program/
- Explore the Web sites of several neural network vendors, such as California Scientific Software (calsci.com), NeuralWare (neuralware.com), and Ward Systems Group (wardsystems.com), and review some of their products. Download at least two demos and install, run, and compare them.
- Important Note: With limited time for a college class, perfection is not expected but effort to be exposed to various tools with attempts to learn about them is critical when considering a career in information technology associated disciplines.
Important Note: There is no specific page requirement for this section of the paper but make sure any content provided fully addresses each problem.
Paper Section 3: Conclusions
After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward. This customized and original flow process flow or flow diagram can be created using the “Smart Art” tools in Microsoft Word.
Paper Section 4: APA Reference Page
The three or more sources of research used to support this overall paper should be included in proper APA format in the final section of the paper.
Paper Review and Preparation to submit for Grading
Please make sure to proof read your post prior to submission. This professional paper should be well written and free of grammatical or typographical errors. Also remember not to plagiarize
BS W7
In 250 words
Use the Web to search for methods to prevent XSS attacks.
Write a brief description of more than one method
Wireless Netwok
First Section
In a 350- to 500-word essay, address the 4 questions.
Case study: A publicly traded home builder has hired you to install a new wireless network. The company currently has a wireless network that is a few years old. The problem with the current wireless network is that it was built using proprietary standards instead of 802.11. This current wireless network does not have an upgrade path to 802.11.
On the new wireless network, the corporate office wants a system that allows construction workers to enter progress reports into the system in order to stay up-to-date with all the different community building sites. Each community has a model home that will need Wi-Fi to connect back to the corporate office in order to enter these reports. The construction workers will be using iPads to enter the information. The company currently has 32 sites across the country that will need Wi-Fi.
In each of these sites, there will be two sales employees that will need to have Wireless IP Phones so that customers can get in touch with them easily. The sales employees will also have laptops, as well as two sales kiosks that allow customers to browse the different options to choose from for their new home build. The kiosks will connect to the Internet, and when the customer chooses their options, the information will be entered into a database. Once the customer chooses the options they want, the sales person will pull up the report on their laptops to print for the construction workers.
Directions: Looking at the current wireless network and what the home builder would like to accomplish with the new network, explain to the company why the current wireless network will have to be replaced before you can begin the project. The Chief Information Officer (CIO) has asked you to come up with a plan to implement this new wireless network. Include in your report:
1. A brief description of the problem with the current wireless network
2. The benefits of global/industry standards vs. proprietary standards
3. What types of problems exist with mixed standards
4. A plan to correct the problems with the current wireless network
__________________________________________________________________________________
Second section….
1. PROJECT SCOPE –
Project scope
2. FEASIBILITY STUDY –
Objectives of the Network:
1. Secure Service – What is the main objective of this network?
2. Integration and Updates –What needs to be done to get the current network up-to-date?
3. Versatile Information Process –What does the network need to be able to do? For example, applications, devices, computers, laptops, etc.
4. Collaboration – How will the network be used to collaborate with other offices? Other users in a different location?
5. Scalability – How will the network be able to adapt to change?
Intended Users –What type of mobility requirements, client device requirements, and signal coverage requirements are needed?
Design Assumptions – State the assumptions for unknown factors that could affect the project.
Equipment Needs and Proposed Budget
COSO Framework
The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.
Your paper should meet the following requirements:
• Be approximately four to six pages in length, not including the required cover page and reference page.
• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
BSWA5
Learn About creating good password security.
An IT Security consultant has made three primary recommendations regarding passwords:
- Prohibit guessable passwords
- such as common names, real words, numbers only
- require special characters and a mix of caps, lower case and numbers in passwords
- Reauthenticate before changing passwords
- user must enter old pw before creating new one
- Make authenticators unforgeable
- do not allow email or user ID as password
Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations. Do you agree or disagree with these recommendations. Would you change, add or delete any of these? Add additional criteria as you see necesarry.
Note your Safe Assign score. No plagiarism.
Attach your WORD doc and then hit SUBMT.
IT Security Policy Framework Approaches
An Information Technology (IT) security policy framework supports business objectives and legal obligations. It also promotes an organizations core vales and defines how it identifies, manages and disposes of risk. A core objective of a security framework is to establish a strong control mindset, which creates an organization’s risk culture.
An Information Technology (IT) security policy framework supports business objectives and legal obligations. It also promotes an organizations core vales and defines how it identifies, manages and disposes of risk.
1. See page 225 – “Private Sector Case Study” – How are security frameworks applied in this Case Study?
2. See page 226 – “Public Sector Case Study” – How are security frameworks applied in this Case Study?
3. See page 228 – “Critical Infrastructure Case Study – How are security frameworks applied in this Case Study?
Cyber law assignment
Please run a Google search of the term, “United States Supreme Court Carpenter v. United States 2018.”
Please write an essay of not less than 500 words, summarizing the court’s decision
COMPUTER SECURITY_week7
Use the Web to search for examples of hacks that made the news.
Write a brief description of the attack indicating what type of hack was involved.
Read and respond to at least two other students Discussions.
Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.
Post between 200 and 300 words.