Leader Traits and attributes

Discuss and identify leader traits and attributes that are most beneficial in implementing the best decisions in an organization. 

  1. Explain the differences in charismatic and transformational leadership and how both leadership styles impact organizational effectiveness.  Please note how these leadership styles affect implementing new innovative technologies.
  2. Review table 8.1 in the reading this week, note the work characteristics and the traditional versus high-performance focus, note which focus is best for strategic decisions and which is best for operational decisions.  Please explain.

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Use APA references and in-text citations.

Discussion Question

Discussion Question (250 words minimum) 

Explain in your own words why businesses must have an Internet and IoT marketing strategy

An initial post must be between 250-300 words and is due by Tomorrow 11:59 pm EST.

Must cite your discussion with 2 reviewed refereces and also do intext citation. APA format is required

i need help with COBOL programming

  

1. The commission percent is 20% for those records with a sale code equal to “E” and 10% for all others

2. The commission amount is found by multiplying total sales by the correct commission percent.

final week

You are a network security consultant and have been hired by a manufacturing firm, Vandelay Industries, to help them secure their enterprise network. Each item below was requested by Vandelay’s executive management and small IT team. Assume that the company has nothing in terms of security as you approach recommending solutions in these areas. Also assume that money is no object, so don’t worry about how much something costs but be within reason in the context of the company’s details below. In other words, they’re not a Bank of America with a 300 million dollar information security budget. 

Vandelay’s requested milestones:

  1. Prevention and detection of phishing messages. 
  2. Defense of workstations and servers (aka endpoint defense). 
  3. Top five operating system hardening techniques for Windows workstations. 
  4. Network defense and security monitoring. 
  5. Best practices for protecting sensitive systems & information within AWS
  6. Network architecture recommendations to prevent ransomware and destructive malware outbreaks. 
  7. Aggressive monitoring on a small group of servers containing highly sensitive information. 
  8. Physical security recommendations for both facilities. 

Vandelay corporate information and network details:

  • 375 employees, two locations – a HQ building and one distribution facility nearby (pictures attached of each building). 
  • Employees use Windows workstations. Vandelay’s full system fleet has a mixture of Windows workstations, Windows servers, and Linux/Unix servers. 
  • Vandelay utilizes Microsoft O365 for email, productivity, cloud storage etc. 
  • Vandelay utilizes AWS for their corporate website in addition to several applications such as inventory tracking, logistics, customer ordering etc. 

You don’t need to go extremely deep, but pitch recommendations that are well thought-out and make sense for this company. 

Your paper should be at a minimum:

  1. Five pages double-spaced NOT including the cover page, index, reference page etc. That means a minimum of five pages of your own content to address the eight items above. 
  2. Using APA formatting –  https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html
  3. Utilizing no less than 5-7 high-quality references
  4. Using no copied material or direct quotes from your references. 

Failover and Disaster Recovery

 

In 400 words or more, compare DNS failover and cloud failover. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand-alone quotes will not count toward the 3 required quotes.

Write in essay format, not in bulleted, numbered, or other list formats. 

Rubic

 The purpose of this assignment is to examine the components of a research article and help you identify guidelines for conducting critical analyses of published works.  

 

Please use the attached “Guidelines for Evaluating a Research Article” to answer the below questions.  Write a 2 page paper on:

  1. What is an Information Technology Project?  
  2. Identify & explain the major parts of a research paper.
  3. Explain the difference(s) between qualitative vs quantitative research methods.
  4. Why use Peer Reviewed journals?
  5. Why are keywords used during the Literature Review process?
  6. Why are project deliverables, limitations & deadlines an important aspect of project development?
  7. Why use/apply APA Basic Citation Stiles in YOUR writing assignments/research?
  8. Why is Academic Integrity important (see syllabus)?
  9. Explain the difference between plagiarism vs self-plagiarism?

 

  • Use at least three – five (3 – 5 ) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format

Discussion question, 350 words and 2 references.

A.     What is the leadership paradox? Give some reasons why a leader can encounter difficulty in newly formed teams or groups using a participative management system. Support your discussion with at least two (2) external sources.

B.     Present a discussion of the strategies for encouraging participative management in the workforce, and how to implement each of these strategies. Support your discussion with at least two (2) external sources.

C.    What serious biases or misassumptions do groups that are involved in inter-team conflict sometimes experience? How do these biases and prejudices affect the ability of teams to accomplish their goals? Support your discussion with at least two (2) external sources.

Cyber Security planning and Management

Many believe that cloud computing can reduce the total cost of computing and enhance “green computing” (environmentally friendly). Why do you believe this to be correct? If you disagree, please explain why?

Enterprise Risk Management

  1. Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.
    In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

    • Introduction
    • Why should an organization Implement an ERM application?
    • What are some key challenges and solutions to Implementing an ERM?
    • What is Important for an effective ERM?
    • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
    • Conclusion, final thoughts for future research
    • Recommendation
    • Your paper should meet the following requirements:
    • Be approximately seven to ten pages in length, not including the required cover page and reference page.
    • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

cc-15

 https://www.youtube.com/watch?v=W_O7mziH3vM&ab_channel=DEFCONConference

Review in 500 words or more the video above called Cloud Security Myths.