Business Intelligence – End-of-Chapter questions

Chapter 1 – Discussion question #1 &
                    Exercise #5, #7, & #15

Chapter 2 – Discussion question #1 &
                     Exercises #4, #5, and #15

– Each answer must be at least 125 words

– 2 references apa format

– no plagiarism

Discussion on General Cryptocurrency (Block Chain)

Check the  attached book and questions

Chapter 10 introduced ten blockchain implementation obstacles. Create a new thread, choose two obstacles from those discussed in chapter 10, 

Q1- then describe them and how they could disrupt blockchain acceptance. 

Q2- describe how you would overcome each of these obstacles

Introduction<>

1. THE TECHNOLOGY IS NOT READY FOR PRIME TIME

2. THE ENERGY CONSUMED IS UNSUSTAINABLE

3. GOVERNMENTS WILL STIFLE OR TWIST IT

4. POWERFUL INCUMBENTS OF THE OLD PARADIGM WILL USURP IT

5. THE INCENTIVES ARE INADEQUATE FOR DISTRIBUTED MASS COLLABORATION

6. THE BLOCKCHAIN IS A JOB KILLER

7. GOVERNING THE PROTOCOLS IS LIKE HERDING CATS

8. DISTRIBUTED AUTONOMOUS AGENTS WILL FORM SKYNET

9. BIG BROTHER IS (STILL) WATCHING YOU

10. CRIMINALS WILL USE IT

Conclusion<>

Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 10 or 11

References 

Minimum 2 ref or more including the Text Book author. 

Cloud security and counter measures

 

Use of the cloud for data storage has grown exponentially.

Picking some of the topics in Chapter 16, find an article that discusses cloud security and/ or data breaches 

Discuss how the company approached the problem or what they should have had in place based on the NIST standards.

Post should have 800 words with atleast 3 references and cited with APA format.NO PLAGIARISM.

Attached the text book.

Term Paper Outline

Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. Provide at least 3 references in APA format showing you have been successful in finding resources for your topic.

Information on the Term Paper:

In Week 7, you must write a 4-6 page term paper on a computer related crime which can be solved by using computer forensics. You must detail the procedures used in discovering and investigating the evidence. Discuss the case, the investigation process, data recovery, securing the evidence and chain of custody. Remember to explain the types of software you would use to complete the case. You may use the cases noted in the book for guidance or may use one of your own. When writing the term paper you must have a minimum of 3-5 outside sources cited and referenced using APA Style formatting in the paper.

Ethical hacking

Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

Case Study: Implementation Strategies

Use the Week 7 Case Study Template to complete this assignment.

Your proposed information system is still a contender. The  executives, however, are asking whether it is too limited to prevent the  shadow IT projects that continue to take place throughout the  organization.

They believe that you have considered what the organization does  now, but how will your system adapt to new products and processes? Read Nicolet Plastics’ Quick Response Manufacturing Strategy  for a concrete example of what they mean. You’ll have to quell their  fears, so it’s time for another memo. Please focus on these points:

  1. Identify any significant changes that your organization might  reasonably make in its product offerings in the next three years.  Explain the competitive benefits of this change.
  2. Explain how your information system addresses or can adapt to the introduction of these new product offerings.
  3. Give one reason why capabilities for the new product offerings  should or should not be incorporated in the initial information system  design. Justify your reason.

This memo should be 3–5 pages long.

This course requires the use of Strayer Writing Standards. For  assistance and information, please refer to the Strayer Writing  Standards link in the left-hand menu of your course.

The specific course learning outcome associated with this assignment is:

  • Determine how information systems influence organizational strategies to improve decision making.
     
Reference

IQMS. No date. Nicolet Plastics’ Quick Response Manufacturing  Strategy.  https://www.iqms.com/files/case-studies/quick-response-manufacturing.pdf

How do trustworthy and ethical leaders enhance knowledge sharing in organizations?

 

Required Reading:

Read LE BA PHONG, LEI HUI, & THAN THANH SON. (2018). How Leadership and Trust in Leaders Foster Employees’ Behavior toward Knowledge Sharing. Social Behavior & Personality: An International Journal, 46(5), 705–720. https://doi.org/10.2224/sbp.6711

http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=pbh&AN=129468910&site=eds-live&custid=s8501869&groupid=main&profile=eds_new

Read CHANHOO SONG, KWANGSEO RYAN PARK, & SEUNG-WAN KANG. (2015). Servant Leadership and Team Performance: The Mediating Role of Knowledge-Sharing Climate. Social Behavior & Personality: An International Journal, 43(10), 1749–1760. https://doi.org/10.2224/sbp.2015.43.10.1749

http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=pbh&AN=111059573&site=eds-live&custid=s8501869&groupid=main&profile=eds_new

Assignment:

This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:

How do trustworthy and ethical leaders enhance knowledge sharing in organizations? How does this impact the rate of information technology implementations? How does this impact data management within organizations? 

How does servant leadership assist with transferring knowledge in an organization? 

When thinking about data analytics, how does transformational leadership assist with building good data structures?

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

Computer Science CCIS 301

Discussion topics

Projects 1

 Two page paper for each question  

  1. Submit a report that discusses the differences between the next-fit and worst-fit algorithms.

2. List the steps involved in program relocation, including loop sequences, decision sequences, branching sequences, and data references. 

Additional Resources
  1. Beginner’s      Guide to Memory Management:

http://www.memorymanagement.org/mmref/begin.html

  1. Windows      Memory Management: https://msdn.microsoft.com/en-us/library/aa366779(VS.85).aspx
  2. IBM:      Inside Memory Management:

http://www.ibm.com/developerworks/linux/library/l-memory/

5. Ravenbrook – The Memory Management Reference:

http://www.memorymanagement.org/

dis 6

 

  1. Discuss the importance of mutual exclusion and synchronization in the case of process cooperation. What problems could arise if the system lacks these two features?  How could semaphores help? 

2.Compare threads and processes and discuss their similarities and differences.  

Avoiding Pitfalls

Email campaigns, are still vibrant and active parts of company marketing and you as the web analyst may be asked to make sense of this data. One of the biggest pitfalls in web analytics is how to understand and deal with the data from these email campaigns. Explain the three (3) pitfalls and how you would avoid them with specific examples for each. 

300 words minimum