Discussion

Course: Operational excellence  ( Information Technology )  

Que: 

Think about a recent order (pizza, book, clothes, etc) you made online or over the phone. Describe the processes used in taking an order, filling the order, and receiving payment. Create a flowchart showing the steps used, Then, create a second flowchart indicating where you would recommend improvements to the processes and why.

*( One page need )*

Discussion

Discussion: Access Controls

Learning Objectives and Outcomes
  • Analyze access control implementations in various environments.
Assignment Requirements

Microsoft Windows implements access controls by allowing organizations to define users, groups, and object DACLs that support their environment. Organizations define the rules, and Windows enables those rules to be enforced.

Answer the following question(s):

  1. Do you think access controls are implemented differently in a government agency versus a typical information technology company? Why or why not?
  2. Do you think access controls differ among private industries, such as retail, banking, and manufacturing? Why or why not?

Fully address the question(s) in this discussion; provide valid rationale for your choices, where applicable; and respond to at least two other students’ views.

Required Resources
  • Course textbook
  • Internet access
Submission Requirements
  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • APA Citation Style
  • Length: 1/2 to 1 page
Self-Assessment Checklist
  • I fully addressed the question(s) in the discussion instructions.
  • I included justification or rationale for my choices, where applicable.
  • I responded to at least two other students’ views.
  • I followed the submission guidelines.

Microsoft Access Project

The instructions for creating the data base is in the link below.

https://lms.pennfoster.edu/nodes/microsoft-access-graded-project-unit-cloned-1579636842/objectives/create-a-home-inventory-database-that-can-be-referred-to-in-of-20180621-cloned-1579636842/resources/graded-project-microsoft-access-2016-resource-54740-1-cloned-1579636842

SDLC

Discuss activities that occur during the problem definition phase of the system development life cycle. 

Describe at least THREE ACTIVITIES that you consider most important and why.

VPN – duee in 6 hours

 What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices? If you do use a VPN, which one and why did you select that particular one? 

Week 5 Discussion 1

 ITPM Best Practices” Please respond to the following:

  • Explain how ITPM best practices can align the IT portfolio with business requirements in order to create the greatest possible value for the organization.
  • Assess the systems development life-cycle (SDLC) and explain how the life cycle, when executed properly, can maximize business value. Note: All stakeholders point of view should be considered.

I need python homework

Modify the Pi Simulation program to improve its appearance, behavior, and/or code in order to meet the quality objectives. You should implement at least 5 modifications.  Be sure to use comments to identify each of your modifications.