Discussion forum on Article readings

Required Textbook: Tapscott, D., &Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin. 

This week’s reading introduced an overview of blockchain and its impact on business(see the attachment). 

Discussion:

 1.choose a use case from section III, and a risk for adoption from section IV. 

2.Describe a real blockchain-based product that implements your chosen use case and how your chosen risk could impact the project’s success. 

3.Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read or videos you watched from this week’s assigned activities. You’re not trying to test each other, but you are trying to start a discussion. 

Write one page document

Assignment2020

 Follow the instructions outlined in the attached PowerPoint presentation.  Use the information to write a 5-page paper conducting a risk assessment based on the information from the presentation.  Remember proper APA formatting, cite and paraprhase your sources. 

4 discussions due in 24 hours

 4 DISCUSSIONS DUE IN 24 HOURS – 50 WORDS EACH

Browsers 

All browsers can retrieve and display webpages, but their features and ease of use vary. Many factors can affect the decision to choose the browser that best fits your needs.

Many browsers are included by default with some mobile devices and smartphones. Their features vary greatly. Some allow users to zoom and use keyboard shortcuts with most websites, while others display only websites optimized for mobile devices. The more popular mobile browsers are Chrome, Firefox, Internet Explorer, Edge, Safari, and Opera Mini. 

View the below YouTube video on Alternative Browsers

 

Browsers 

All browsers can retrieve and display webpages, but their features and ease of use vary. Many factors can affect the decision to choose the browser that best fits your needs.

Many browsers are included by default with some mobile devices and smartphones. Their features vary greatly. Some allow users to zoom and use keyboard shortcuts with most websites, while others display only websites optimized for mobile devices. The more popular mobile browsers are Chrome, Firefox, Internet Explorer, Edge, Safari, and Opera Mini. 

View the below YouTube video on Alternative Browsers

 https://youtu.be/WL2YkK5dvkg 

 Research and discuss the advantages and disadvantages of popular browsers available today? 

 

INSTRUCTIONS: 

  • Respond to the following topic in a minimum of 50 words. 

 

Files and Directories

A root directory is the very base of a file system, under which all other directories are sub-directories. The root directory changes for different volumes. In other words, the root directory for the C: volume is different from the root directory of the D: volume because each volume has its own root directory. 

View the below YouTube video which demonstrates working with Windows files and folders.

  https://youtu.be/4-MF7t5KGuQ 

Why should folders be created on a hard drive instead of placing every file in the root directory?

 

INSTRUCTIONS: 

  • Respond to the below topic in a minimum of 50 words. 

 

Protection from Viruses and Other Malware

Click the link below to view the video from TEDTalks  as computer security expert Mikko Hyppönen tells us how we can stop these new viruses from threatening the internet as we know it.  

TedTalk Video: Fighting viruses

It is impossible to ensure a virus or malware never will attack a computer, but you can take steps to protect your computer.

What precautions do you take to prevent viruses and other malware from infecting your computer? 

 

INSTRUCTIONS: 

  • Respond to the below topic in a minimum of 50 words. 

 

Would You Connect to an Unsecured Network? 

View the below YouTube video on WiFi (wireless) security.

 https://youtu.be/WZaIfyvERcA 

 What would you do if you found out that someone was using your wireless home network without your permission? How should legal authorities address such abuse? What punishment should violators receive? Should those leaving their networks unsecured receive punishment, too? Why or why not?  

 

INSTRUCTIONS: 

  • Respond to the below topic in a minimum of 50 words.

Entry level networking

I have a timed packet tracer assignment that I would like to complete after 10pm this evening.  I will not know the details until I open the assignment and then clock starts.  My guess is that it will be building a small network with 7 or less devices and will involve some subnetting and will require to ping a device.  I will need somebody that can be on the phone with me for 40 minutes to help me.  I can copy and email the assignment once it is opened.  

organizational behavior and Leadership ppt

Your task is to conduct a global industry comparative analysis that will help develop the strategy

for expanding your organization’s products into a new country. Note that the term products will

refer to products, services, or a combination of the two.

In this fictional market expansion, your analysis will examine a real-life organization. To

accomplish this task, you need to identify and assess the risks that your organization may

encounter, such as market barriers and competition, as well as opportunities for success in the

selected country. As the general manager for strategy, you have been tasked with the following:

 Analyze your organization’s resources and capabilities (organization profile).

 Evaluate the external environment, specifically the industry in which your organization

operates (industry analysis).

 Select a new country as a market for expanding your organization’s products (country

risk assessment). You will select one country from the provided list and assess the risks

associated with doing business in that country, including risks presented by its economic,

political, and cultural environments.

Based on your research, in Week 5, you will make a recommendation to your senior vice

president and CEO on expanding into this new market. Be sure to budget enough time for each

of the following 12 steps:

1. Choose an organization

2. Examine your organization’s background

3. Analyze the strategy and competitive position of the organization

4. Develop your organization’s competitive strategy statement

5. Summarize financial performance of your organization

6. Analyze trends in your industry

7. Apply Porter’s Five Forces Model

8. Select a new country as a candidate for market expansion

9. Assess international expansion

10. Conduct a PESTEL analysis

11. Assess global value chain

12. Examine cultural issues

assignment-8

 Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable. 

Business Intellegence

 

Discussion Questions: 

1. Some say that analytics, in general, dehumanize manage-rial activities, and others say they do not. Discuss arguments for both points of view. 

2. What are some of the major privacy concerns in employing intelligent systems on mobile data?

3. Identify some cases of violations of user privacy from current literature and their impact on data science as a profession. 

Exercise: 

1.  Search the Internet to find examples of how intelligent systems can facilitate activities such as empowerment, mass customization, and teamwork 

Term Paper

Excluding diagrams, figures, and references it must be 5 pages.

Follow .dox file for more details.

Only accept bid if you have cybersecurity knowledge including Control System, System architecture, HMI, Servers, Controllers, Nodes