Assignment Seven

In order to complete assignment #7 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #7). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 12

1. HHS and the FTC recently launched an investigation into a major pharmacy chain for its information disposal practices. The regulators claimed that the pharmacy chain failed to protect customers’ sensitive financial and medical information by disposing prescriptions and labeled pill bottles in dumpsters that were accessible by the public. Based on the HIPAA (Health Insurance Portability and Accountability Act of 1996), what consequences should a company face for failing to properly dispose of customer information? For HIPAA act, you may check the website.

Chapter 13

2. Trust is an important part of the continued growth and development of the Internet. This is particularly the case with respect to social networking. Media reports of disturbing stories and case law alike have shown some of the consequences that can arise when individuals create false social networking profiles. In a case in California, and individual established a fake MySpace profile of his former church pastor. On the profile, he posted content that suggested that the pastor used drugs and was homosexual. Can criminal charges be brought against the party that created the fake profile?

3. Read the Family Educational Rights and Privacy Act of 1974 (FERPA) at ED, discuss who has access to your educational record at APUS. Furthermore, what is the roles and responsibilities for APUS instructors and students to comply with FERPA

 

Tasks

 

There are TWO tasks that you would need to do( they are separate): 

Task 1 (Minimum 300 words): 

– As an IT manager, discuss how your company will use Enterprise Resource Planning (ERP) to integrate the various functions of an entity. 

– What are the advantages of using ERP? 

– In your discussion, please be sure to provide a substantive explanation of what ERP is and give an example(s) of ERP. Use APA throughout.

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index.

5s week 6 assignment PL

 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. what do each of these terms refer to: copyright, patent, trademark, trade secret?

2. Why is intellectual property entitled to legal protection? 

3. Why did copyright laws become stricter and more punishing in the late 20th century?

4. What is the Fair Use doctrine?

5. Make an argument for legalizing the copying of music or software. 

6. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I don’t own them, what is my legal right to them?

7. What was the 1984 Sony Supreme Court case about?

8. Was Napster responsible for the actions of its users?

9. Why did the court find in favor of Diamond in the Rio case? 

10. What is Digital Rights Management?

Include references. No copy paste strictly.

AmazonEcho

  

Instructions

1. Please read these two articles: 

· Using forensics against a fitbit device to solve a murder:  https://www.cbsnews.com/news/the-fitbit-alibi-21st-century-technology-used-to-help-solve-wisconsin-moms-murder/

· How Amazon Echo could be forensically analyzed! https://www.theverge.com/2017/1/6/14189384/amazon-echo-murder-evidence-surveillance-data

2. Then go around in your residence / dwelling (home, apartment, condo, etc) and be creative.

3.  Identify at least five appliances or devices that you THINK could be forensically analyzed and then identify how this might be useful in an investigation. Note – do not count your computer or mobile device. Those are obvious!

4. I expect at least one paragraph answer for each device. 

Why did I assign this? 

The goal is to have you start THINKING about how any device, that is capable of holding electronic data (and transmitting to the Internet) could be useful in a particular investigation! 

comparing and contrasting documentation

 

Given the material covered in Module 3 (Hardware) and Module 4 (Software), your personal experience, and our good friend reliable sources, provide a well-formatted MS Word document (with citations) that provides a framework for comparing two different computing solutions for both hardware and software issues. [Hint: Such a document would most likely include an introduction paragraph, a table comparing individual characteristics, and a conclusion paragraph.]

For example, you might want to compare an iPhone X with an iPhone 7, or an iPhone X with a Galaxy 7, or a PS4 with an XBox, or an Apple Air with a Razer Blade Stealth.

Considerations might include:

  • # of (or importance of) exclusive software products available for that system
  • backwards compatibility for “old” materials from previous systems
  • cost of the system
  • compatibility of the system with supporting services (such as the cell phone network, gaming community, or preferred app store) 
  • availability of support for the system
  • disk space
  • type of external media supported
  • Graphics Card capabilities
  • Processor speed
  • Peripherals support

…Or any other considerations you consider important. A minimum of 2 hardware and 2 software factors must be included.

Week 12 Research Paper ERM

Please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Problem set(Mangerial Finance)

Jenny Cochran, a graduate of The University of Tennessee with 4 years of

experience as an equities analyst, was recently brought in as assistant to the

chairman of the board of Computron Industries, a manufacturer of computer

components.

During the previous year, Computron had doubled its plant capacity, opened new

sales offices outside its home territory, and launched an expensive advertising

campaign. Cochran was assigned to evaluate the impact of the changes. She began

by gathering financial statements and other data. (Data Attached)

a. What effect did the expansion have on sales and net income? What effect

did the expansion have on the asset side of the balance sheet?  What do you

conclude from the statement of cash flows?

b. What is Computron’s net operating profit after taxes (NOPAT)? What are

operating current assets? What are operating current liabilities? How much

net operating working capital and total net operating capital does

Computron have?

c. What is Computron’s free cash flow (FCF)? What are Computron’s “net

uses” of its FCF?

d. Calculate Computron’s return on invested capital (ROIC). Computron has a

10% cost of capital (WACC). What caused the decline in the ROIC? Was it

due to operating profitability or capital utilization? Do you think

Computron’s growth added value?

e. What is Computron's EVA?  The cost of capital was 10% in both years.

f. Assume that a corporation has $200,000 of taxable income from operations.

What is the company's federal tax liability?

g. Assume that you are in the 25% marginal tax bracket and that you have

$50,000 to invest. You have narrowed your investment choices down to

municipal bonds yielding 7% or equally risky corporate bonds with a yield

of 10%. Which one should you choose and why? At what marginal tax rate

would you be indifferent?

Q1

Topic: Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.

Instructions: Please follow the Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. 

For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. 

Excel, statistics, pivot tables, V-Loopup, correlation tables, box plots

 

Crosstabs

Using the Supermarket data set, create crosstabs for Marital Status and Annual Income expressing the counts as percentages. Then, create a stacked 2D column chart. (Select the crosstab table and insert stacked 2D column chart). If you need to swap the x and y values, then right click on the chart, click select data, and switch row/column).

Box Plots

Using the Supermarket data set, create a box plots of Annual Income and Revenue. Which of the following income brackets appears to have the least variation in revenue (purchase amounts)?

Correlations

Using the Beta Employees data set, create a table of correlations between the variables Age, Prior Experience, Beta Experience, Education, and Annual Salary. (Look at Figure 3.18 in the example 3-3 document in Module 5 (Attached Image file for illustration purposes only). It shows a table of correlations like what you would need to produce. The bottom of the table shows the formula you would use to calculate the correlations for each cell.)

Pivot

Using the Supermarket data set, create a pivot table to find how many units were sold in total in the non-consumable category.

Complete explanation via a word document and completed Excel files using the given datasets and worked solutions in separate tabs on each applicable dataset file. Visual image instruction preferred

Network Design

 

You work as a network consultant for West Consulting, a graphic design and printing company. West Consulting is growing in customer and sales volume and, therefore, is expanding its local campus in Houston, Texas, and adding a test location in China.

You are tasked with designing a network to support their growth and expansion plan and drafting a proposal. You will work on this project over the next five weeks. The first task is to confirm your understanding of the project and outline your high-level plan to approach the design.

Refer to the West Consulting Network Design Summary document, which lists the network requirements and configuration details.

Create a Customer Design Summary that includes the following: 

  • Project Summary
  • A description of the organization, the business environment, and the project purpose
  • Design Requirements
  • Desired functional network requirements, any technical constraints, and network performance or design goals
  • Existing High-Level Network Infrastructure Survey
  • Include logical topology diagrams (layer 3) and physical network diagrams of current infrastructure and routing.
  • Implementation Plan
  • Description of a high-level network upgrade plan based on Cisco’s network design lifecycle principles and an explanation of how your plan addresses West Consulting’s goals and strategies

Diagram your current network survey in Microsoft® Visio®.

Document the remainder of your Customer Design Summary as either a:

  • 2- to 3-page Microsoft® Word document
  • 10-slide Microsoft® PowerPoint® presentation with detailed speaker notes