BST 3

 

Assignment Content

  1. Conducting research and creating a supporting research report serves two important purposes with respect to your project:
    1. It explains your technological choices in terms of business benefits and risks. This explanation is crucial for executive approval.
    2. It either reinforces or improves your plan–but only if you apply the results of your research to a new draft of your plan. In the industry, project managers develop their plans iteratively and change them as they conduct more research and identify better or cheaper alternatives. This iterative approach is especially relevant to IT projects because new technologies are developed and forced to retire at a very quick pace.
    3. For this assignment, you will conduct research and create a supporting research report. Then, based on your research, you will identify and explain the rationale for three improvements to the project plan you submitted last week.

      Download the Supporting Research Report template.

      Conduct additional research on your project’s industry, recommended technology vendors, and the categories presented in the Supporting Research Report. You may want to include the Gartner Group and Forrester Research in your list of organizations to research.

      Complete the Supporting Research Report template.

      Create a second draft of your project plan. Highlight in yellow the three changes you made to the second draft based on the in-depth research you conducted this week, and explain why you made the changes.

       

discussion online

 

This discussion topic is to be reflective and will be using your own words and not a compilation of direct citations from other papers or sources. You can use citations in your posts, but this discussion exercise should be about what you have learned through your viewpoint and not a re-hash of any particular article, topic, or the book.

Items to include in the initial thread:  

  1.  Enterprise Risk Management
  • “Interesting Assignments” – What were some of the more interesting assignments to you? 
  • “Interesting Readings” – What reading or readings did you find the most interesting and why? “Interesting Readings”
  • “Perspective” – How has this course changed your perspective? 
  • “Course Feedback” – What topics or activities would you add to the course, or should we focus on some areas more than others? 

Analyzing and Visualizing data

“A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. For this week’s discussion question, please view the Periodic Table of Visualization at the following link: http://www.visual-literacy.org/periodic_table/periodic_table.html

Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. Provide your classmates with a brief description of your choices and explain why you made your choices. Also, describe what advantage do your choices have over the others. 

web dev

 

ASSIGNMENT 1: PITCH DECK

Due in Week 2 and worth 50 points

You have been hired to create a Website. In this assignment, you will begin to gather the necessary information to complete the work and present your ideas to your client.

You will need to answer the following questions:

  • What kind of domain name(s) will you register (i.e., .com, .biz, .net, etc.)? Why do you suggest this kind of domain? (Review the section in Week 1 on domain names.)
  • Will you register the site using multiple domains? Why is this necessary?
  • Will you need to secure any portion of your site? Why? (See section on HTTPS.)
  • Given the nature of Web trends and changes in technology, what steps, if any, do you suggest to keep your site viable for more than one year?
  • What browsers do you anticipate your visitors will be using based on information available today?
  • Does the browser have any impact on your design?
  • Based on what you’ve just learned this week about CSS, how will this help in the development of your site?

You may submit this in multiple formats though a pitch deck (PowerPoint is highly recommended; extra points if you would actually like to create a presentation in a video device or software of your choosing that you can upload to YouTube or similar online easily accessible hosting service. Note: Your instructor must be able to access your video if you choose this option. Prior coordination is needed to ensure your instructor will be able to access your video). You’ve been hired, but remember you still need to show off how awesome you are.

GP part 2 MF

The purpose of the second part of the comprehensive project is to compute financial statement ratios. Based on the Carnival company you selected complete the following:

  1. Based on formulas in your textbook, compute the following ratios for two years. You may use Excel to compute your ratios.
    1. Debt ratio
    2. Gross profit margin
    3. Free cash flow
    4. Times interest earned
    5. Accounts receivable turnover
    6. Inventory turnover
  2. Prepare a DuPont Analysis of ROE for two years, including computations of
    1. Return on Sales
    2. Asset Turnover
    3. Return on Assets
    4. Financial Leverage
    5. Return on Equity
  3. Briefly evaluate the ratio trends. Indicate on your worksheet whether each ratio is:
    1. stronger / weaker
    2. quicker /slower
    3. more / less liquid
    4. more / less risk
  4. Write a 3-6 page report evaluating trends in all of the above ratios. Discuss whether your company’s profitability, efficiency, liquidity, and solvency are improving or deteriorating. Suggest ways the company can improve the ratios that show problems. The report should be well written with cover page, introduction, the body of the paper (with appropriate subheadings), conclusion, and reference page. References must be appropriately cited.

4s week 10 assignment EH

In 300 words

Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software – that will give them access to your passwords and bank information as well as giving them control over your computer.

Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation be avoided?

Reference Article Link: 

https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Include references.

No copy-paste, use your own words.

OAP

Summary:

Each student will write an 8-10-page paper on an organization of his or her choice. Students must use research from 8-10 peer reviewed journal articles and submission must be in full APA 6th edition format.

Instructions

The organizational analysis of one (1) particular organization must contain the following sections: 

  • An introduction of the organization you chose, including history and background. 
  • The organizational strategy. 
  • The organizational design and your assessment of the effectiveness. 
  • The organizational culture. 
  • Your conclusion and what you would change about the selected organization for improvement.

Special Instructions

1. Choose a well-known organization in the USA (only). Do not choose organizations which are not publicly traded and aim is to make a profit in other words (NO INTERGOVERNMENTAL ORGANIZATIONS).

2. Do not copy and paste plagiarism will incur failing and zero grades. 

Data Science and big data analysis

  Subject name: Data scince and big data analysis 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

 Assignment Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Week 1 discussion 1

Why does a CISO need to be able to differentiate the drivers of corporate governance and IT governance?

Compare and contrast corporate and IT governance from the standpoint of someone trying to explain the difference to IT personnel who may not know the corporate drivers.

discussion

 

We learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.  The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

 With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation? Support with references and do your usual critical review of at least 2 other students’ posts.