Assignment

 

Company’s Website Vibe: In this portion of the assignment you are to select only one (1) of the sites below and visit the website.

Flyer’s Home ( www.frys.com )
Tiger Direct ( www.tigerdirect.com )
Best Buy ( www.bestbuy.com )
Zapoos ( www.zappos.com )
Overstock ( www.overstock.com )

Instructions:

  • Select one of the sites above to visit and go there.
  • Take a screenshot of the site you selected and visited (the home page only) insert the screenshot into your Word Document.
  • Take out a note pad and prepare to write.
  • Explore the website try to visit each page, get a feel for the company’s vibe and architecture, navigation and user experience, visit the shopping cart go as far as you can without completing the purchase, look at newsletters, help pages and so on.. and report your findings.
  • What did you like? What did you not like? What frustrated you? Did you find anything broken on the site, such as a link or image?
  • Look at how the company uses key engagements and interactions that users can partake in. This could bring up a whole range of things such as a completed sale, social sharing or newsletter signups for example, and be sure to log these.

Please submit a Word Doc with your observations and answer to the bulleted list above, in 500 words or more, and be sure to use APA references in support of your answers. Be sure to place your Name and Class on your submission, for example:

Smith, John
WEDB122

Class, please feel free to explore your own research for eBooks, journals and articles that best answer the topics and assignments. Do your best to locate resources that are no more than three (3) years old. PLEASE DO NOT USE WIKIPEDIA AS A RESOURCE AND OR REFERENCE.

life cycle

Review the Pine Valley Furniture Company Background in Ch. 3, p. 40 of your textbook, found in the Wk 1 Learning Activities folder.

Imagine you work for Pine Valley Furniture. The board is considering starting a webstore and does not know what is involved in developing a new system. You have been asked to present to the board of directors to help them know what to expect.

Prepare a 12- to 16-slide presentation to the board with speaker notes and media such as graphics or tables. (See below information for PP guidelines).

Explain why it is important to use systems analysis and design methodologies when building a system. Justify why not to “just build the system” in whatever way appears to be “quick and easy.”

Review the criteria for selecting off-the-shelf software presented in Ch. 2. Identify additional criteria that are, or might be, used to select off-the-shelf software.

Consider if the choice was between alternative custom software developers rather than prewritten packages. Identify the criteria that would be appropriate to select and compare among competing bidders for custom development of an application. Be sure to briefly define each of these criteria

An Investigation of the Therac-25 Accidents

Question 1

Describe, in your own words, what caused the accidents with Therac-25?

Question 2

Identify and describe 5 communication failures discussed in the article. For each failure, discuss what led to that failure happening and what could have been done to prevent it.

Some of these communication failures are obvious, but some are more subtle. Communications failures include any instance where somebody tried to transmit information to somebody else but couldn’t, regardless of the specifics.

It helps to remember that communication failures are often mediated through systems (i.e. we build things to communicate for us and these can fail to give our message when they should). For example, if I was trapped on a desert island and put a message in a bottle, that’s an attempt at communication. If the bottle sank 5 months later in a storm, that’s a communication failure.

MF week 5

Cost of Capital

In the links below, you will explore how companies compute their cost of capital by computing a weighted average of the three major components of capital: debt, preferred stock, and common equity. The firm’s cost of capital is a key element in capital budgeting decisions and must be understood in order to justify capital projects. 

Cost of Capital:

For this Discussion, imagine the following scenario:

You are the director of operations for your company, and your vice president wants to expand production by adding new and more expensive fabrication machines. You are directed to build a business case for implementing this program of capacity expansion. Assume the company’s weighted average cost of capital is 13%, the after-tax cost of debt is 7%, preferred stock is 10.5%, and common equity is 15%. As you work with your staff on the first cut of the business case, you surmise that this is a fairly risky project due to a recent slowing in product sales. As a matter of fact, when using the 13% weighted average cost of capital, you discover that the project is estimated to return about 10%, which is quite a bit less than the company’s weighted average cost of capital. An enterprising young analyst in your department, Harriet, suggests that the project is financed from retained earnings (50%) and bonds (50%). She reasons that using retained earnings does not cost the firm anything since it is cash you already have in the bank and the after-tax cost of debt is only 7%. That would lower your weighted average cost of capital to 3.5% and make your 10% projected return look great.

Based on the scenario above, post your reactions to the following questions and concerns:

What is your reaction to Harriet’s suggestion of using the cost of debt only? Is it a good idea or a bad idea? Why? Do you think capital projects should have their own unique cost of capital rates for budgeting purposes, as opposed to using the weighted average cost of capital (WACC) or the cost of equity capital as computed by CAPM? What about the relatively high risk inherent in this project? How can you factor into the analysis of the notion of risk so that all competing projects that have relatively lower or higher risks can be evaluated on a level playing field?

B) 3 replies each 150 words

PhD Interview Questions INFORMATION TECHNOLOGY

INFORMATION TECHNOLOGY – PROVIDE AN AUTHENTIC PERSONAL STATEMENT TO EACH OF THE FIVE FOLLOWING QUESTIONS/PROMPTS REFLECTING ON THEIR INTERESTS. IN THE EVENT THAT ANY OUTSIDE RESOURCES ARE USED, RESOURCES SHOULD BE CITED IN APA FORMAT. SUBMISSIONS SHOULD BE A MAXIMUM OF 500 WORDS OR 125 WORDS PER QUESTION/PROMPT. IT IS BEST TO RESPOND TO EACH PROMPT/QUESTION INDIVIDUALLY FOR CLARITY OF THE REVIEWER. WRITING SAMPLES SHOULD BE SUBMITTED IN MICROSOFT WORD FORMAT AND INCLUDE THE CANDIDATE’S NAME.

1. PROVIDE A BRIEF INTRODUCTION FOCUSING ON YOUR EDUCATION, CAREER, AND DECISION TO APPLY TO UNIVERSITY OF THE CUMBERLANDS.

2. IN RELATION TO YOUR DOCTORAL PROGRAM APPLICATION, WHAT AREA OF RECENT RESEARCH IN THE FIELD WOULD YOU WANT TO STUDY, AND WHY?

3. HOW DOES YOUR CURRENT VOCATION RELATE TO YOUR APPLICATION TO THE DOCTORAL PROGRAM?

4. HOW WILL YOUR EXPERIENCES AND PERSONAL SKILLS HELP YOU TO BE SUCCESSFUL IN YOUR PROGRAM?

5. WHAT LONG-TERM GOALS DO YOU HAVE FOR APPLYING YOUR LEARNING FROM YOUR DOCTORAL PROGRAM?

project isol

 

The primary goal of operational security is to protect & secure the operations of an enterprise, while securing the technologies needed to maintain network and resource availability.  Your residency project will include research & analysis on the below: 

Write a five – seven (5 – 7) page paper in which you:

  1. Compare & Contrast access control in relations to risk, threat and vulnerability.
  2. Research and discuss how different auditing and monitoring techniques are used to identify & protect the system against network attacks. 
  3. Explain the relationship between access control and its impact on CIA (maintaining network confidentiality, integrity and availability).
  4. Describe access control and its level of importance within operations security.
  5. Argue the need for organizations to implement access controls in relations to maintaining confidentiality, integrity and availability (e.g., Is it a risky practice to store customer information for repeat visits?)
  6. Describe the necessary components within an organization’s access control metric.

Your assignment must follow these formatting requirements:

  • Use at least eight – ten (8 – 12 ) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. 
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are NOT included in the required assignm

Cryptocurrency

While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.

500 words.

At least two scholarly source should be used. Use proper citations and references(APA).