Practical Connection Assignment

write a 1-2 page paper on how you can use the lessons you learned ORGANIZATION LEADERSHIP AND DECISION MAKING course in your current job as OPENSTACK CLOUD ENGINEER.

500 words or two spaced 2 pages and atleast one reference provided, APA format no plagiarism.

Topic 9 and 10 due in 12 hours

  topic 9:

  

Instructions:

Answer all the below questions, save the changes to this file, and upload to Moodle.

topic 10:

Instructions:

Create an Excel file according to the instructions below. Save the changes to the file, and upload to Moodle.

review the corresponding data set and use it to answer questions and complete an exploratory data analysis. You will use R and Excel to complete the assignment.

The second data set includes data about the customers of a telecom company, the services they subscribed to, and whether they left the company’s services. Multiple aspects of the customer’s behaviors could be analyzed using this dataset.

The data and the variable descriptions can be found at:

https://www.kaggle.com/blastchar/telco-customer-churn

Requirements:

Part I: Contextualization

In the Introductory section for Part 1 of your 4-5-page report, provide a contextualization of the dataset by doing the following:

Download the selected data set and review its description. Specify the selected dataset.

Summarize the story behind the data. Provide in-text and reference list citations of any outside sources that you consulted to contextualize the data collection efforts.

Explore the dataset. Explain the attributes of the entities.

Describe the data captured in the data set.

Summarize three observations from a cursory visual inspection of the data.

Part II: Research Questions

When data is collected, or even before collection starts, we have the purpose of the analysis in mind and plan accordingly. For an analysis to provide us with meaningful insight, we must plan it well and have a clear research question or questions in mind. The term “research” can sound scary, but it refers to a path to satisfying curiosity or resolving a problem. For Part II, which should be 2-3 pages, provide an analysis based on the background of the data sets:

Write three questions that this dataset can help answer.

Explain the importance of these questions in a business or other relevant context.

Identify the variables from the data set that are relevant to the questions.

Write a sample statement of outcome that your analysis may reveal.

Underline the words in these statements that refer to the variables identified in task prompt H.

Part III. Data Preparation and Distribution Analysis. Using an R script, please perform the following:

Identify the columns that hold the values of the variables you previously identified in the analysis of the research questions. Write R script to generate a subset of the given data. If the variable is categorical and the values are not numerical, transform the values into numerical values. For example, if the values of a column are ‘Y’ and ‘N’, use SQL to convert them to “0” and “1” respectively when generating the subset. That includes only the values for the selected variables and translate categorical values into numeric codes.

Write an R script for a query that provides insights into your research question.

Part IV. Reporting

Write a 250-word executive summary for members of the general public outlining the findings from your analysis.

Your well-written report should be 10-12 pages in length, not including the title or reference pages. Use Saudi Electronic University academic writing standards and APA style guidelines, citing at least two references in support of your work, in addition to your text and assigned readings.

You will upload a zipped file that includes your 10-12-page report and all supporting files, including Word, R code and Excel files, and screenshots that support the presentation of the findings in the report.

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.

Apply: Ethical Challenges

 

Assignment Content

  1. Your team of international developers will be developing a publicly accessible cloud-based application which may potentially house user PII data, information about users’ behaviors and activities (e.g., physical locations, online sites they visit, searches, purchases, etc.), and users’ intellectual property (e.g., photos, artwork, videos, etc.).

    Continue your work with your team on the features of the application by identifying ethical challenges and specifying the type of data the feature uses, a risk mitigation strategy for the risk you provided in Week 2, and a global ethical perspective of the choices you made in implementing a risk mitigation strategy.

    Develop a 1-page table using the Ethical Challenges Worksheet template provided. Turn in 1 table for the team.

    Note: This assignment will help you develop your individual assignments in subsequent weeks.

Legislated Privacy Concerns

Go to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.

Using WORD, in you OWN WORDS, write an ORIGINAL brief essay of 300 words or more  :

  • Summarize the case
  • Give your opinion of the decision.
  • Describe how the case deals with the material in this chapter

Essay and assignment

  

  1. Write an essay (500 Words)

discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection?

Use the five paragraph format. Each paragraph must have at least five sentences. 

Include an interesting meaningful title.

Include at least one quote from each of 3 different articles. 

USE : https://libguides.nec.edu/az.php not google.

  1. Assignments (300 Words)

Learning About Cookies as Spyware.

Research what kind of information cookies store. You might find the following websites helpful:

www.allaboutcookies.org/ 

www.howstuffworks.com/cookie1.htm

Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. For your first written assignment, you have unlimited times to retry your assignment.

Submit references separately (or add as text) otherwise they cause the Safe Assign score to increase.

Activity Diagram

Create an activity diagram of the Request For Proposal (RFP)/Proposal interaction between a potential customer and Acme Electric, LLC (Acme).

You are an analyst tasked to create an activity diagram in the analysis phase of an object-oriented analysis and design project. What follows is the interaction between a potential customer and Acme. The activity starts when the potential customer creates and sends an RFP. This activity ends when the potential customer either accepts or rejects Acme’s Proposal and possibly informs Acme of the decision.

You are NOT documenting a system, you are creating an activity diagram for a business process. The business process that you will model using an activity diagram is as follows:

A potential customer (Customer) creates and sends to the owner of Acme (Owner) a Request For Proposal (RFP) which includes an Electrical Drawing (ED) for the proposed work. An ED is an architecture blueprint which only includes the electrical portion of the work.

Owner studies the ED and RFP for the following:

  • Amount and types of electrical materials required
  • Amount and types of special equipment that may be required
  • Amount of labor that may be required
  • Specific dates Customer may have asked for the project to occur
  • Any other information that Customer may have included in the RFP

Owner sends to his supply person (Supply) a:

  • Bill of Materials (BOM)
  • special equipment list

For both lists, Supply enters the wholesale price and availability of each item. The gathering of data for each list is not dependent on the other for completion and return. Supply obtains the information for the BOM either from stock on-hand or electrical supply vendors, completes the form, and returns the BOM to the Owner. Supply obtains the special equipment information from equipment vendors, completes the form, and returns the special equipment list to Owner.

Owner checks his crews’ calendars for availability during the time period that the customer has requested.

After Owner has gathered all the information, Owner decides on a proposal price. Owner prepares a proposal and sends it to Customer.

If Customer likes the proposal, they sign it and return it to Owner. If Customer does not like the proposal, they either ignore it or inform the owner of the decision.

– UML state/activity

Active Directory Recommendations , Course Subject : Application Security

 

Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:

1. System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users?

2. How will the procedures for making changes to the user accounts, such as password changes, be different in Active Directory?

3. What action should administrators take for the existing workgroup user accounts after converting to Active Directory?

4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers [SIDs].)

  

Submission Requirements

Format: Microsoft Word (or compatible)

Font: Times New Roman, size 12, double-space

Citation Style: APA

Length: 2 to 4 pages

No plagiarism 

organizations

1. In 100-150 words, Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? The video on Google’s Data Center may give you some ideas to write about for this assignment.

2. In 100 -150 words, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency.