MS 2

  

Scenario:

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Answer should follow below instructions

——————————————————–

You will develop an annotated bibliography with a minimum of 10 peer reviewed scholarly articles. Additionally, you will write the literature review for the project. The entire task should be a minimum of 6 pages with 10 peer reviewed scholarly articles and formatted to APA 7 style.

Note:

Below are some examples for formatting your bibliography.

· https://owl.purdue.edu/owl/general_writing/common_writing_assignments/annotated_bibliographies/annotated_bibliography_samples.html

· https://guides.library.cornell.edu/annotatedbibliography

· https://sites.umgc.edu/library/libhow/bibliography_tutorial.cfm

· https://columbiacollege-ca.libguides.com/mla/annot_bib 

Here are some resources to complete a literature review:

· https://uscupstate.libguides.com/c.php?g=627058&p=4389968

· https://www.youtube.com/watch?v=-ny_EUJXHHs 

· https://umb.libguides.com/litreview

· https://writingcenter.unc.edu/tips-and-tools/literature-reviews/

· https://writingcenter.ashford.edu/writing-literature-review

P13.7 and P13.8 computer science C++ coding assignment

computer science C++ coding assignment

Please see the attachments for the instruction of this assignment

Additional info:

In the instruction, it says that ” Implement an iterator that produces the moves for the Towers of Hanoi puzzle described in Worked Example 13.2 “, however, worked example 13.2 is the wrong section. It’s supposed to be Worked Example 11.2 so I attached it.

ERM w7

 

here becomes a considerable increase in capital requirements especially when new rules are applied to financial markets with high-risk parameters, such as emerging markets are. The increased cost due to higher capital requirements could be a disincentive to investment in markets with higher risk profiles than the developed markets, taking also into account that diversification benefits deriving from investing in emerging economies have shown a decrease over time. The reduction of institutional investors can thus represent a brake on the process of innovation and evolution of emerging markets.

In your initial post, please discuss an example of one risk that countries or companies in emerging markets face today. Describe the impact this risk has on the micro- and macro-economies of an emerging market. For example, one such risk is that of pandemics and other health crises (fast-traveling pathogens such as COVID-19, or other developing world disease such as HIV/AIDS), which could jeopardize supply chain operations, consumers, employees, and others.

Respond substantively to at least two other students’ posts. Please describe what strategy you would recommend to address and mitigate the risk mentioned in your peer’s original post. For example, a collaborative mitigation strategy could provide improved information resulting from improved dialogue and data analysis around the risk issue, producing benefits such as improved mechanisms for identification, mitigation, and monitoring.

*please remember to include at least one credible scholarly reference with your initial post!

Discussion Post BPaas-4

 

Discuss, in your own words using 500 words or more, how business process as a service (BPaaS) reduces risk for commercial enterprises. 

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post.

APA References and Citations

cybersecurity

  

Scenario

Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

“To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.”

Consider the following questions:

1. What does “malware free” mean?

2. How can a user demonstrate that their computer or device is malware free?

3. What are the steps necessary to establish a malware-free computer or device?

4. How should Always Fresh verify that a client computer or device is compliant?

Tasks

Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction—what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 to 4 pages

What are the Consequences of Software Piracy?

 

For this assignment you will prepare a write a two-page essay on a current technology issue.

You may choose one of the technology issues from the list. Research your topic using a popular search engine or other resources. Print out at least three articles that you will use as sources for your project. Read and highlight the important and pertinent facts that you want included in your project.

Write a two-page essay (double spaced) on the topic. As with all of the issues, there are positive and negative points to consider. I want you to present facts derived from your research, and then state your opinion on your topic. You must have 3 references.

Urgent only 24 hours : Apache Pig Hadoop Assignment2.3

 

Do online research and find out one case study where Apache Pig was used to solve a particular problem.

Expecting 4 page write-up including diagrams. Please provide as much technical details as possible about solution through Apache Pig.

Must:

1)Atleast 2 Technical diagrams to explain the solution. own diagrams please, not from internet.

2) Maximum one page for business problem and 3 pages of technical solution.

3) No plagiarism.

4)Deadline 24 July, only respond if you can complete it in 1 day. i had enough with some fools and they wasted a week with no work. 

Database Optimization and Performance Tuning Paper

 

In a 500- to 750-word document, address the following:

  1. Explain the phases and function of the query optimizer.
  2. Identify the tools to edit query optimizer strategies.
  3. Explain how performance of a database system is measured.
  4. Differentiate between response time and throughput.
  5. Explain how the physical design of a database influences performance tuning.
  6. Explain three ways queries can be altered to increase database performance.
  7. Present specific examples to illustrate how implementing each query alteration could optimize the database.