Physical securrity Discussion 6(500 words and references)

 10 threats choose 5:

  

a. Internal theft or diversion

b. Armed attack

c. Hostage incident

d. Burglary

e. Civil disturbance

f. Auto theft

g. Sabotage

h. Employee pilferage

i. Kidnapping

j. Robbery

he course textbook outlined the top ten security threats to an organization. For this assignment, write at least 500 words discussing the following:

  • Out of the ten threats list the five you think are most important
  • Describe and define each of these five threat areas as to their significance
  • Provide strategies you would have implemented to improve these areas to reduce risk and vulnerability

Assignment Requirements

Please provide and discuss the above

  • Each paragraph must have at least four complete sentences
  • You also need to respond to at least two (2) classmates’ posts (150-word each)
  • There should be no personal pronouns in your initial discussion post.
  • Your initial post is due by Wednesday before 1159pm
  • You should have a minimum of three credible in-text citations (Not at the end of your paragraphs)
  • All requirements must be met, and proper grammar, spelling, and punctuation must be correct.
  • Please also ensure you use the Discussion Board Header; you can find this template in the Getting Started folder.
  • No contractions should be used, or any conjunctions at the beginning of a sentence.
  • Failure to follow each instruction will negatively affect your grades.

discuss some key terms in business.

Discussion: This week we discuss some key terms in business.  Please define what a business process is and note the tools of documentation within business processes and why they are important to understand.

Note: The first post should be made by Wednesday 11:59 p.m., EST. 

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

java Raptor

Part 1 Your finished flowchart should get an air temperature from the user for each of five days. It should then display

  • the average temperature for the five days,
  • the highest of the five,
  • and the lowest of the five.

To complete, you will need to do the following:

·         Initialize the variable in main that needs to be initialized (you don’t need to initialize the variable that will hold the user’s input). In getHigh, initialize the two variables that need to be initialized.

  •  Add a call to the subchart getHighest Test your flowchart and make sure it works.
  •  Create a subchart called getLowest, put in the proper steps and call it from main.
  • Create a subchart called getTotal, put in the proper steps and call it from main.
  • Create a subchart called getAverage and call it from main.
  • Create a subchart called displayOutput where you display the required output in a user friendly way.

See printed directions for a possible extra credit item.

Rubric on which you will be graded:

Item

Possible Points

Raptor flowchart runs without errors and produces correct output

60

Internal documentation identifies programmer and date; filename includes the programmer’s last name

5

Subcharts created where required

10

Loop used correctly

5

Selection structure used correctly

5

Output contains information required without any unnecessary information. The output contains text to explain to the user what is being displayed

Assigment

 

Writing Assignment – WK 5

According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (2-4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. Be sure to use your own words.

 

Week 5 – Discussion

Many believe that cloud computing can reduce the total cost of computing and enhance “green computing” (environmental friendly). Why do you believe this to be correct? If you disagree, please explain why?

 

Week 5 Assignment

  • 5.1 Provide a brief definition of network access control.
  • 5.2 What is an EAP?
  • 5.3 List and briefly define four EAP authentication methods.
  • 5.4 What is EAPOL?
  • 5.5 What is the function of IEEE 802.1X?
  • 5.6 Define cloud computing.
  • 5.7 List and briefly define three cloud service models.
  • 5.8 What is the cloud computing reference architecture?
  • 5.9 Describe some of the main cloud-specific security threats.

1 Case Study

Case Study 3.1

Read “Can We Trust Big Data?” (see attached file)
Answer the questions

Please use this strategy when you analyze a case:

  1. Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).
  2. List all indicators (including stated “problems”) that something is not as expected or as desired.
  3. Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.
  4. Identify the areas that need improvement (use theories from your textbook)
    • Specify and prioritize the criteria used to choose action alternatives.
    • Discover or invent feasible action alternatives.
    • Examine the probable consequences of action alternatives.
    • Select a course of action.
    • Design and implementation plan/schedule.
    • Create a plan for assessing the action to be implemented.
  5. Conclusion (every paper should end with a strong conclusion or summary)

Writing Requirements

  • 3–5 pages in length  (excluding cover page, abstract, and reference list)
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Discussion 3.1

If the following data were stored as rasters, which ones would be discrete and which would be continuous: rainfall, soil type, voting districts, temperature, slope, and vegetation type?

Discussion 3.2

List the main advantages of using topology-based data sets in GIS.

Tasks assignment

 

There are TWO tasks that you would need to do( they are separate): 

Task 1 (Minimum 300 words): 

There are three levels of management hierarchy: strategic, managerial and operational.

1. Review at least 4 academically reviewed articles on each management hierarchy. 

2. Summarize all 4 articles in your own words.

3. Discuss how the three levels of management hierarchy: strategic, management, and operational relates to the mission of a business.

4. As an IT professional, how would you use information technology to improve the efficiency of the three levels of management hierarchy?

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index.