4 Questions for IT managers to be answered and analysed

You should answer 4 questions about IT technologies and its application in management and business, the important point is there must be no similarity and plagiarism  Questions must be answered two pages for each question. Questions and instruction have been attached.

Research Paper

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Week 4 Project

 Creating a BudgetIn this assignment you will create a spreadsheet and a chart to help a hypothetical couple work out their budget. You will submit a Microsoft Excel spreadsheet following the directions below to the appropriate submission folder by the due date. You will name this file W4P_LastName.xlsx.Click on the link below, Week 4 Project Tips, for some visual aids on how to tackle this week’s project.Week 4 Project TipsPlease Note:Information to help you with this project is available in the Week 4 online lectures, your textbook, as well as Microsoft Excel Help (F1). Your professor is also a great resource. If you work ahead, you can post questions about this assignment on the Questions for the Professor discussion board and still submit your assignment on time.ScenarioTom and Sally were trying to get a handle on their budget. They heard that MS Excel could help them with that.  Tom is going to school and has cut back on his hours. Sally has finished her associate’s degree and is working full time. They want to look at the last three months of their income and expenses to see where they can make changes.Part I – The SpreadsheetFirst, in an Excel Spreadsheet, create a budget to show Tom and Sally’s income, expenses, and money leftover each month (Net). Create formulas in your spreadsheet for your calculations using the following data:

  • Tom brought home $1,000 a month for January, February, and March.
  • Sally brought home $1,900, $2,000, and $1,975 respectively for those three months.
  • They paid $1,000 for rent and utilities each month.
  • They paid $88 for insurance each month.
  • They paid $60 for cell phones and $60 for Internet/TV each month.
  • They spent $600, $750 (due to a big birthday bash), and $500 on food respectively.
  • Their car payment and gas came to $225, $250, and $300 respectively.
  • Entertainment and gifts were $75, $100, and $45 respectively.
  • They paid a little extra on their credit card $150, $125, and $100 respectively.
  • They allocated $200 each month for personal grooming and health care.
  • They put $100 each month into savings.
  • Miscellaneous Expenses came to $200, $100, and $400 respectively.

A sample budget layout is included below as an example of one way to lay out a budget. Part II – The ChartOnce you have worked out the budget spreadsheet, use the tabs at the bottom of the page to open another sheet. Here you will create a chart similar to the example below using the tools you learned about in the lectures and the textbook. On the new sheet:

  1. Create a column chart to visually represent their monthly expenses. If you have a challenge getting the chart on this sheet, research how to move your chart using your reading or Help (F1). You might also try right clicking on the chart.
  2. Add a descriptive title to the chart.

Part III – Changing Values

  1. Copy everything from Sheet 1 (the budget calculations) and paste it into a new worksheet.
  2. Change values for Sally’s March income to $200 more. Let’s say that they didn’t use as much heat in March and their utilities were $75 less (you could use a formula to figure out $75 less but you don’t have to). See how the totals change automatically if you used formulas correctly. If the values did not change, check your formulas and try them again. Seek help if you can’t figure this out.
  3. Rename each of your three spreadsheets with descriptive names.

By the due date assigned, submit this budget to the Submissions Area. In the message box, share how the process of creating this went for you, including any challenges, successes, or insights. In the Comments box, briefly share your experiences with completing this project. 

Operation Security

 

A tenet of telecommunications says the more people who access a network, the more valuable the network becomes.  This is called Metcalfe’s Law.  When organizations implement security policies, there are pressures and trade-offs ~~ Chapter nine examines different types of users on networks as it reviews an individual’s need for access & how those needs can lead to risks.

  • How can the use of security policies reduce risk? Explain
  • How can a SAP reduce risk?  Explain
  • Why are end-users considered the “weakest” link in regards to implementing security policies and controls? Explain

Discussion Question

Take a position on the ethical concerns raised by employees who are upset about organizations monitoring their e-mail or Internet access for security purposes.

  • Assess whether you believe it is fair for an employee to undergo this type of surveillance.
  • Suggest an alternative approach for an organization to control security without monitoring employee actions.

Discussion

  

1. How does prescriptive analytics relate to descriptive and predictive analytics?

2. Explain the differences between static and dynamic models. How can one evolve into the other?

The above assignments should be submitted in one-word document. Include an APA cover page and a reference page.

Research Paper: Big Data and the Internet of Things

The recent advances in information and communication technology (ICT) has promoted the evolution of conventional computer-aided manufacturing industry to smart data-driven manufacturing. Data analytics in massive manufacturing data can extract huge business values while it can also result in research challenges due to the heterogeneous data types, enormous volume and real-time velocity of manufacturing data.

For this assignment, you are required to research the benefits as well as the challenges associated with Big Data Analytics for Manufacturing Internet of Things.

Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library(https://www.ucumberlands.edu/library) is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Visualization and Analyzing

 

Instructor”s question and case for class discussion:

“Why do we need to understand data visualisations? There is more and more data around us, and data are increasingly used in decision-making, journalism, and to make sense of the world. One of the main ways that people get access to data is through visualisations, but lots of people feel like they don’t have the skills and knowledge to make sense of visualisations. This can mean that some people feel left out of conversations about data.”http://seeingdata.org/developing-visualisation-literacy/

Choose three of your favorite visualizations. Post a 3 – 5 sentence summary (for each) of why you chose the visualizations. What catches your attention? Are these visuals effective in presenting the provided data? If possible, explain what you would do to improve the visualization(s).

Also Reply to your classmates:

When replying to a classmate, offer your opinion on what he/she posted and the visualizations they chose. Using at least 3 – 5 sentences, explain if you agree or disagree with his/her evaluation of the visualizations.