Final project

 

Final Instructions

Your company ABC Consulting Company is asked to provide a proposal for the upcoming company expansion. You will need to research and provide quotes for new computers, cabling, network security and type of network topology. A Network proposal has to be developed for a manufacturing company that plans to move to a larger facility.

They are currently in a 1500 square foot building. Below is the current office setup.

• Reception – 1 computer and printer

• CEO Office – 1 computer and printer

• Accounting Office – 5 computers and 5 printers

• Business Office – 3 computers and 3 printers

• Human Resources – 2 printers and 2 printers

• Sales Office – 10 computers and 10 printers

They are moving to a 3500 square foot building with 3 floors and each floor will have switches and routers to accommodate that floor. Below are the proposed additions:

CEO Secretary – 1 computer and printer (CEO’s office area)

• Chief Financial Officer – 1 computer and printer (Accounting Department)

• Secretary – Chief Financial Officer – 1 computer and printer (Accounting Department)

• Information Technology – 2 computers and 2 printers

• Breakroom – 2 computers

• Human Resources – 6 computers and 2 network printers

• Sales – 6 computers and 2 network printers

• Wireless network for employees and guests

• Each department will have at least 2 empty offices for additional employees.

Your proposal will need to include the following information:

• Determine the number of drops for the new facility (2 drops per office)

• Determine the type of network cables (CAT5e, CAT6, etc.)

• Determine the type of security for the network

• Determine type of hardware and software

Deliverables

• Written proposal to the CEO include a timeline for completion

• Cost analysis to include computers, servers and cabling (make, model quantities and cost)

• Detailed diagram showing location of network devices and type of topology

R programming

Module Assignment

Module 4

QMB-6304 Analytical Methods for Business

Write a simple R script to execute the following:

Preprocessing

  1. Load into R the data included in “Assignment 4 Data.xlsx”.  This data set shows age (years), weight (pounds), and height (inches) for 251 adults.  This will be your master data set.
  2. Create a new variable in the master data set which will be each individual’s body mass index.  The calculation should be done as:

BMI=(weight* .45)(height* .025)2

  1. Using the method presented in class and applying the numerical portion of your U number as a random number seed, take a random sample of 45 cases from the master data set. This will be your primary data set.

Analysis

  1. Use R to conduct a simple linear regression on the data with weight as the independent variable and bmi as the dependent variable.  As a part of this be sure to:
    1. Report the beta coefficients and associated p values and confidence intervals from your model.
    2. Give a written interpretation of your beta coefficients in terms of the actual case at hand.
    3. Assess your model’s conformance with the LINE assumptions of regression.
    4. Give a prediction using your model for an individual weighing 185 pounds. Include 95% confidence and prediction intervals and written interpretations of both intervals.
  2. A 10-year-old boy has been presented to you who weighs 72 pounds.  Give two reasons for why it would be wrong to use your model to predict the boy’s BMI.

Your deliverable will be a single MS-Word file showing 1) the R script which executes the above instructions and 2) the results of those instructions.  The first line of your script file should be a “#” comment line showing your name as it appears in Canvas.  Results should be presented in the order in which they are listed here.  Deliverable due time will be announced in class and on Canvas.  This is an individual assignment to be completed and submitted by the time stated on Canvas.  No collaboration of any sort is allowed on this assignment.  Please remember the prohibition on using screen shots in your deliverable.

DS

Discuss the future blockchain and the different applications  – referencing the reading for the week:

Future of Blockchain – A. Ali, S. Latif, J. Qadir, S. Kanhere, J. Singh, “Blockchain and the Future of the Internet: A Comprehensive Review”, arxiv.org, URL: https://arxiv.org/pdf/1904.00733v1.pdf

 

write in 500 words use APA format.  

Everything in APA format.

On time Delivery 

Plagiarism free.

Assignment and discussion

 

WEEK 4 – DISCUSSION

What do you believe to be the most compelling reason to migrate information to the cloud? What is your biggest security concern about doing so?

It should be in between 250-300 words

RESEARCH ASSIGNMENT – WK 4

Compare and contrast two difference cloud computing services (Amazon Web Service and Microsoft Azure). Explain the differences and the similarities and select your choice of providers if you had to make the decision for your business. Write up a comparison on the services offered (2 pages maximum). Once again, it is essential that you use your own words (do not just copy and paste from the Internet).

These two links may offer some additional information for this assignment but you are encouraged to use additional sources for your project/assignment.

https://aws.amazon.com/security/introduction-to-cloud-security/

https://azure.microsoft.com/en-us/

WEEK 4 ASSIGNMENT

  • 4.1 List ways in which secret keys can be distributed to two communicating parties.
  • 4.2 What is the difference between a session key and a master key?
  • 4.3 What is a key distribution center?
  • 4.4 What entities constitute a full-service Kerberos environment?
  • 4.5 In the context of Kerberos, what is a realm?
  • 4.6 What are the principal differences between version 4 and version 5 of Kerberos?
  • 4.7 What is a nonce?
  • 4.8 What are two different uses of public-key cryptography related to key distribution?
  • 4.9 What are the essential ingredients of a public-key directory?
  • 4.10 What is a public-key certificate?
  • 4.11 What are the requirements for the use of a public-key certificate scheme?
  • 4.12 What is the purpose of the X.509 standard?
  • 4.13 What is a chain of certificates?
  • 4.14 How is an X.509 certificate revoked?

Complete your answers on a WORD Document,

COSO framework

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. Please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Apply Linked List (Data structures)

 

In this assignment, you will expand on the information provided in the course to answer the following questions in a 2- to 3-page paper:

What is the difference between a singly-linked list and a doubly-linked list?

  • In what situation would you use a singly-linked list over a doubly-linked list?
  • In what situation would you use a doubly-linked list over a singly-linked list?

If a node is in a linked list with N nodes, how many nodes will be traversed during a search for the node?

  • Explain the best- and worst-case search scenarios.
  • Explain why a singly-linked list defines a RemoveAfter() function, while a doubly-linked list defines a Remove() function.
  • Could a RemoveAfter() function also be defined for a doubly-linked list? Explain why or why not.
  • Could a Remove() function also be defined for a singly-linked list? Explain why or why not.

Format your paper according to appropriate course-level APA guidelines with at least three sources cited covering scholarly and industry sources.

Data Mininig

 Discuss the importance of preprocessing the datasets to ensure better data quality for data mining techniques. Give an example from your own personal experience. 

Wk-7 Assi

 Use the table, below, to present information about your team. Please input names exactly as they appear in the iLearn Grade Center. As you learn more during this course, the section about why privacy is important to your company will evolve. At this early stage, think about why privacy would be important to your business based on your own experiences, and what type of business you are conducting.

Business Name: ACME Inc.

Describe the nature of the business.

ACME   Inc. is an E-commerce company. The company provides an online marketplace for books, clothing, furniture, electronics, ornaments, and a wide variety of things.

List three reasons why privacy is important to your company.

Privacy is important to build customer’s trust, loyalty, and confidence.

 

Due to constant threats and data breaches, privacy plays an important and major role in the growth of the company.

 

The company’s brand value and reputation depends on data privacy and security of all the shareholders involved including customer, associate, and client.

This Table is for your information only 

Policy 1.1 Policy Statement Section Overview

This is where you organize and list each applicable privacy policy statement. These are the rules that govern your company’s actions, and those of your staff. You need to determine an organization’s schema. Look around online to find examples of a useful style. Or, you may choose to use your current workplace documentation as a go-by.

Policy 1.2 Policy Statements Contents

The contents of these policies should contain at least the following features:

· The policy, itself, such as “Reasonable Expectation of Privacy for Employees.”

· The laws, regulations, or standards that relate to the policy at issue.

· An example, when applicable, that helps your audience understand the policy.

· Directions on how to effect the policy. For example, if your company processes payments by credit or debit cards, and your policy is something like “Anyone who processes payments via payment cards must conform their actions to PCI DSS standards related to privacy.” then you may want to insert a link to those standards. Or, perhaps, incorporate examples as mentioned directly above.

This list is not exhaustive. Depending on the set of facts, you may need to include more

My topic is ACME Inc. which is an e-commerce company. And you have to write about these two-privacy policy statements (Advertising and data Safety). You have to write one page for each policy but make sure that you fulfill and cover all the above criteria.  

Additionally, I do not need any introduction or conclusion for that just write above these two polices. 

Privacy Policy Statements: 

1. Advertising

2. Data Safety and Fraud Prevention

Three References are Require.