week 2 Marketing Management

Discuss how the marketing mix will vary in relationship to the offering of service and of a product ( 350 words)  APA format with references 

1 reply of 250 words

CSR And Value Chain Research Report

  

CSR And Value Chain Research Report:

Using a variety of academic research and industry sourced material, examine the key challenges facing organisations whose value chains incorporate operations in developing economies.

Identify and analyse the scale and scope of global operations sourcing materials and/or labour in these regions. What are the recommended approaches to ethical considerations of local stakeholders?

Are they successful and how can they be improved?

Readings For The Assessment :

Lectures Materials, further readings at the end of each lecture’s slides, MyAthens for credible journals articles.

Questions

Information Systems for Business and Beyond Questions:

  • Chapter 9 – study questions 1-10, Exercise 3 &4. 

Information Technology and Organizational Learning Assignment:

  • Chapter 7 – Review the section on dealing with multiple locations and outsourcing.  Review figure 7.2 and note how virtual team communications further reiterates the importance of this model.

RStudio to generate a word document for the data analysis

Background: This course is all about data visualization. However, we must first have some understanding about the dataset that we are using to create the visualizations.

Assignment:

  • Use RStudio to generate a word document with basic data analysis of the following dataset: 
  • Use the following video to learn the simple commands to conduct basic data analysis with RStudio:

Questions/Requests:

  • Create a summary of stats for the dataset. (provide a screen shot)
  • Create a correlation of stats for the dataset. (provide a screen shot) (Hint: Transform may be needed)
  • What is the Min, Max, Median, and Mean of the Price? (provide a screen shot)
  • What is the correlation values between Price, Ram, and Ads? (provide a screen shot)
  • Create a subset of the dataset with only Price, CD, and Premium. (provide a screen shot)
  • Create a subset of the dataset with only Price, HD, and Ram where Price is greater than or equal to $1750. (provide a screen shot)
  • What percentage of Premium computers were sold? (provide a screen shot)(Hint: Categorical analysis)
  • How many Premium computers with CDs were sold? (provide a screen shot)(Hint: Contingency table analysis)
  • How many Premium computers with CDs priced over $2000 were sold? (provide a screen shot)(Hint: Conditional table analysis)

Your document should be an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

Data Security

Considering the importance of data in an organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately 3-4 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Introduction to technology 1010

 We want you to read at least one article or view a video about hardware (not software). Then write a brief summary (or create a short presentation) summarizing the article using MS Word or PowerPoint. Brief means no less than 10 sentences but not more than one page. Make sure to cite your source properly. 

computing

 
File submission: Final project – Project-based learning 

 
Objective of the activity  Through this project the student will demonstrate the mastery of skills in the use of productivity applications MS Word 2016, MS Power Point 2016 and MS Excel 2016. 

 

Instructions

Access the following link. final project.docxPreview the document

 
Deliverable  The activity is individual. The work must be delivered on time, without spelling or grammatical errors. The works will be submitted to the tool to detect similarity of content (now Urkund). 

 
Activity value   82 points 

 
Basic review resources  Microsoft. (2018). Word for Windows Training. Retrieved from https://support.office.com/es-es/article/word-for-windows-training-7bcd85e6-2c3d-4c3c-a2a5-5ed8847eae73 (Links to an external site.) Shelly Cashman Series (2017). Microsoft Office 365. Office 2016 Advanced. Boston: Cengage Learning. Pages WD433 –WD676 (Links to an external site.) Shelly Cashman Series (2017). Microsoft Office 365. Office 2016 Advanced. Boston: Cengage Learning. Pages PPT409 – PPT647 Shelly Cashman Series (2017). Microsoft Office 365. Office 2016 Advanced. Boston: Cengage Learning. Pages EX433 – EX684 Tutorials for modules III – VIII Supplemental review resources  Microsoft. (2019). Tips for creating and presenting an effective presentation. Retrieved from https://support.office.com/es-es/article/sugencias-para-crear-y-realizar-una-presentaci%C3%B3n-eficaz-f43156b0-20d2-4c51-8345-0c337cefb88b (Links to an external site.) Universia Colombia. Retrieved from https://noticias.universia.net.co/en-portada/noticia/2015/03/13/1121434/9-consejos-buena-presentacion-power-point.html 

2 Discussions 1 Case Study and 1 weekly Summary

Discussion 3.1

Define Cyber Kill Chain and describe its steps 

Discussion 3.2

What type of social engineering attacks do APTs use?

Case Study 3.1

Describe the tradecrafts of APT: zero-day attacks, advanced malware, social engineering and phishing, and strategic Web compromises

(References Should be no later than 2015)

Weekly Summary 3.1

Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.

Research Paper

  you will analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  The writing assignment requires two written pages to evaluate history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.