Discussion-6 MM

 

Which is more detrimental to a firm, pricing your product or service too high, or pricing your product or service too low? 

1. DISCUSSION: Using 300-350 words, write a brief discussion, in your own words of how the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment. 

2. REFERENCES: All references must be listed at the bottom of the submission–in APA format. (continued) Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required. Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.

Cryptography

 

Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

Be sure to include your reference citation.

Excel Data Analysis

 

X1 in the EXCEL file corresponds to question 1.

X15 corresponds to question 15 etc.

You must complete these analytic functions for all 59 questions: X1 – X59.

  • Descriptive Statistics
  • Histogram (bar chart) with Frequency Distribution Table and Pie Chart with labels
  • Correlation
  • Regression

The data is coded.

For some questions the coding is 1-10 for an interval scale and others 1-5 for a 5 point Likert scale.

Not all scales in this questionnaire have the same descriptors. You must read the questionnaire.

It is impossible to interpret the data without referring to the questionnaire.

Some questions include scales that use these 5 descriptors

(Strongly Agree, Agree Undecided, Disagree, Strongly Disagree) and other questions include scales that use 5 different descriptors.

Descriptive Statistics

You will use EXCEL to generate the Descriptive Statistics for all variables: X1 – X59.

You must interpret and in explain in words the Mean.

Histograms

You will create histograms (bar charts) with frequency distribution tables and pie charts with labels.

Labels are important since color coded pie slices may not always be viewed in color.

After clicking DATA, DATA ANALYSIS, and then HISTOGRAM

EXCEL will ask you for input and the BIN.

You will need to create a table in EXCEL which lists the coding for the Bin Input.

The BIN is 1, 2, 3, 4, 5 for some questions and you should include the descriptors Strongly Agree, Agree, Undecided, Disagree, Strongly Disagree, and Not Applicable.

For other questions the BIN will be 1, 2, 3, 4, 5, 6, 7, 8, 9, 10.

Correlation

Determine the Pearson Correlation Coefficient for:

Gender and Satisfaction with Your Car (X16)

Gender and Color (X22)

Place of Birth and Employment Status

 

Regression

Use EXCEL to generate a regression analysis for:

Dependent Variable: X 16 – Level of Satisfaction

Independent Variables: X17, X18, X19, X20, X21, X22, X23, X24 and X25.

Telecom Network Security Assignment

Team Research Assignment

Assignment

 type of firewall: o Cloud firewalls

· Investigate how that type of firewall works.

· Investigate the vendors that provide that type of firewall. Is there a top vendor for that type?

· Investigate what types of situations are best suited for that type of firewall. What situations is it not well suited for?

· What other types of firewalls work best in conjunction with that type? Are there types that it does not work well with?

· What are the pros and cons of that type of firewall?

Research Paper Format

· The paper must be in the APA format

· At least ten pages in length plus cover, abstract and references.

· Graphs, illustrations, and spreadsheets are allowed, but will not count toward the 10-page requirement.

  • Research      Paper must have at least 5 works cited of which 2 must be peer-reviewed      works/articles (note your book can be included as a      reference)

PowerPoint Presentation

· 30-minute team presentation with PowerPoint slides (All participants must present a topic). 

· Must align with your paper

· Provides the highlights of your paper

· Graded on the completeness of the topic 

· Graded on presentation delivery 

Week 7 discussion – Cyber Law

 Week 7 discussion Hacking and invasion of the computers of others

Please describe a case that has been in the news recently and describe what harm can be done by the unlawful intrusion into the computer of another. Please respond in 400 words. And add references using APA format.

IT project management

 

Address the importance of project risk management.  Your response should include considerations pertaining to planning and identifying risks, as well as performing a qualitative risk analysis.  Please also consider common sources of risk for information technology projects.  To assist you in your qualitative risk analysis, consider the following case:

Most people are very familiar with the movie The Great Escape but may not be familiar with it as a project executed in the spring of 1944. The starting point for the project was in March of 1943 with the move to a new camp, the North Compound, created to relieve some of the overcrowding in the existing camp. From the outset, the move to and taking up of brand-new quarters would cause confusion and provide new opportunities, and all sort of possibilities for escape.

Roger Bushell and the escape committee were faced with the conundrum of determining the best possible approach to an escape. They needed to balance variables like the availability of resources and the overall risk to the escapers and POWs in the camp.

In the East Compound, the POWs had lost or abandoned at least fifty tunnels in a thirty-month time frame much to the dismay of the camp’s escape committee. This was a dismal and unsatisfactory track record, and POW morale was sagging very low. The escape committee (like a PMO) could prioritize the escapes that had the best chance of success. They could also determine the best Return on Investment (ROI) for the escape by analyzing the resources and risks for the escape.

Overall there were different types of escapes possible with varying approaches for example:

  • An unplanned and opportunistic escape, where 1 or 2 escapers take immediate advantage of a presented situation. For example, climb and hide in the back of a truck inside the camp. These opportunities were extremely rare and risky, and just to the immediate escapers and not the rest of the camp. In addition, the POWs had no time to prepare and would end up outside of the camp with no resources and equipment to continue the escape.
  • A planned escape, used once only, a throwaway escape where the escape route would be exposed and could not be reused, for 1 to 3 escapers to get out. For example, finding a blind spot along the perimeter fence and cutting through the wire. This would be discovered within 24 hours and was a little less opportunistic and risky. The POWs would end up on the outside of the camp with resources and equipment to continue the escape.
  • Planned escape, reused several times, for 1 to 10 escapers, several escapes spread over several months, through a tunnel. There were problems in disguising missing POWs in the camp for more than a few days. Camp authorities would search with little let-up. Continuation of the project would be very difficult. The POWs would have resources and equipment outside of the camp to continue the escape.
  • Planned mass escape, used once only, a throwaway escape where the escape route would be exposed and could not be reused, for up to 250 escapers to get out. With many escapers, the contribution to the escape would be significant, the pooling of a lot of materials and resources. The POWs would have good resources and equipment outside of the camp to continue the escape

Clearly, Project Risk Management was a major concern in The Great Escape project, so carry out the following exercises to identify and analyze the project risks involved. Preferably, work as a team to develop responses as though you were working in a Project Management Office (PMO) for this project.

  1. Identify how risk management should be practiced through each stage of the project.
  2. Play out scenarios that recognize overall areas of risk, and then identify specific risks.
  3. First, because it is simpler and easier to do so, complete a qualitative risk analysis for each specific risk you have identified.
  4. Collect metrics that quantify each of these risks in terms of calculating the cost of the impact of each risk, and sort in priority order.
  5. Plan risk responses that are realistic, even though some have to be just simply accepted.

How to Handle Application Scalability

Competency

Summarize cloud applications scalability concepts

Scenario

You are a software developer for a retail company that sells mobile phones via the web. Your company has deployed the entire website onto the public cloud. The mobile manufacturing company launches a new mobile every year. Your company’s website gets ten times the traffic during the new mobile launch. Customers often complain about the timeout and slow website performance. Some of them are even moving to other competitor’s websites, directly impacting your annual profit.

The public cloud provides various options to handle website scalability. Your manager has asked you to investigate various alternatives and walk through the best possible cost-effective solution. The goal is to handle the scale-up of the application during the pick load and scale down during the less load.

The public cloud company also provides a cost calculator to estimate the approximate cost to host the solution.

Instructions

In a Microsoft Word document of 5-6 pages, provide a step by step walk through to your manager and discuss the following points.

  • The public cloud vendor you have selected.
  • A description of the public cloud architecture for your web application.
  • A description of the components that are required for your public cloud and their functionality.
  • An explanation of how scale up and scale down will work.
  • How security will be enhanced.
  • A description of the benefits of deploying to multiple cloud regions.
  • An overview of serverless architecture and the benefits provided.
  • The approximate cost to host your design on the cloud.

Be sure use a professional tone and check grammar and spelling.

References

Include a minimum of 5 scholarly resources.

Resources

Requirements to pass (Rubrics)

Word document is 5 or more pages in length.

Public cloud vendor is selected.

Full, robust, and detailed description of public cloud architecture.

Full, robust, and detailed description of the components and functionality that are required for your public cloud selection.

Full, robust, and detailed explanation of how scale up and scale down will work.

Full, robust, and detailed explanation of how security will be enhanced.

Full, robust, and detailed explanation of the benefits of deploying to multiple cloud regions.

Full, robust, and detailed overview of serverless architecture and the benefits provided.

Full, robust, and detailed explanation of the approximate cost to host your design on the cloud.

Spelling and grammar are correct; professional tone used.

5 scholarly references provided; documented correctly.

Memo: Developing Channels of Communication and Collaboration

As the new communications manager for International Gadgets, you have assembled a team of technical communicators with experience in communicating with various audiences in a business setting. Research & Development (R&D) has created a new product that it believes will revolutionize the industry. But the department needs the buy-in of several levels of the corporation to launch the new product. First, upper management needs to understand the product and how it will help the company expand before it will approve the funding needed to mass-produce the product. Sales and Marketing need to understand the product so it can be properly marketed. Technical Support needs to thoroughly know the product in order to support it to the customer base. And all employees need to know as much about the product as possible so that they can build excitement about the proposed launch. The head of R&D has come to you for your help in building excitement and buy-in throughout the company for the new product. Create a memo to your team that discusses the following:

  • The possible channels of communication that can be used to communicate information about the product to various levels of the company, and how they could be used
  • Your suggestions for which channels will be appropriate for which audiences and why
  • Plans for how your team will communicate and collaborate on this project for the purpose of choosing the best channels of communications for various audiences in the company

Back up your plans with solid reasoning and research.