Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.
Enterprise Risk management – Practical connection assignment
At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making and enterprise risk management. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.
Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
- Provide a 500 word (or 2 pages double spaced) minimum reflection.
- Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
- Share a personal connection that identifies specific knowledge and theories from this course.
- Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
- You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
- Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).
Windows Server Network Proposal
Writing a networking proposal as attatched.
Windows Network Proposal – Networking
You have been hired by Fixing Windows LLC as an Information Technology consultant to develop a technology proposal. Fixing Windows LLC manufactures and distributes solar panel for the consumer market. Your job is to submit a proposal that meets their criteria.
cap
Class: BLCN 531 Introduction to Blockchain and Crypto-currency Assignment: Capstone Project. Length: Minimum of 1000 words.
Pick one area where you think Blockchain Technology could be proposed as a solution and briefly explain your proposed solution. Your final document should include an Abstract and a Conclusion. This assignment should be in APA format and have to include at least six references.
Bad implementation of Database
Describe, in 350 words, an example of a very poorly implemented database that you’ve used or know that illustrates the potential for really messing things up. Explain an analysis of what might have caused the problems and potential solutions for them.
home work assignment
Submit a report that discusses the techniques used by malware developers to disguise their code and prevent it from being analyzed. Give suggestions on how these techniques should be classified and ranked in the disaster recovery documentation.
minimum 300 – 400 words
Assignment should follow all APA rules and include a min. of (1) citation/reference.
no plagiarism
5Th Discussion And Assignment
Discussion:
This week we discuss the overall process of developing new software. Please also note the differences between software development and methods (200 to 300 words) references
Exercise
- How is the IT function organized in your school or place of employment? Create an organization chart showing how the IT organization fits into your overall organization. Comment on how centralized or decentralized the IT function is.
- Which software-development methodology would be best if an organization needed to develop a software tool for a small group of users in the marketing department? Why? Which implementation methodology should they use? Why?
- Chapter 7 – Review the section on dealing with multiple locations and outsourcing. Review figure 7.2 and note how virtual team communications further reiterates the importance of this model.
- Chapter 8 – Review the Siemens AG case study. Note the importance of understanding the interrelationships amongst all the senior leaders at every location. Pay special attention to Figure 8.1 and Figure 8.2. Note how the corporate CIO should engage with each of the regional leaders. Why is this important?
truncatabel prime
Assignment 4: Truncatable Primes
Background
A left-truncatable prime number is one where the numbers resulting from removing the left-most digits are also prime. For instance, the number 9137 is a left-truncatable prime since 9137, 137, 37 and 7 are all prime.
A right-truncatable prime number is similarly defined, but removes a digit from the right. For example, 31193 is a right-truncatable prime since 31193, 3119, 311, 31, 3 are all prime.
A truncatable prime, also known as a two-sided prime, is one that is both left-truncatable and right-truncatable simultaneously. An example of such a prime is 3797.
We will be writing a program to explore these truncatable primes.
As a side note, the property of truncatable is dependent upon the base that the number is represented in. For this program, only worry about base 10.
Analysis
First note that the property of truncatability always produces a chain of numbers that terminate in single digit prime numbers. Therefore we can identify prime numbers by starting at the end of that chain and build numbers by adding digits. That is, we should be able to identify 3797 as a truncatable prime by building it from the right as in 7, 97, 797, then 3797, all the while verifying each step is left-truncatable.
Next note that when building from the right, we can only add odd digits. If we were to add a 0, 2, 4, 6, or 8, the resulting number would be divisible by 2 and thus not prime.
Finally, all of the single digit prime numbers are 2, 3, 5, and 7. These form the basis of our search.
Approach
Based upon the analysis above, we can find truncatable primes by building primes that are right-truncatable by construction, and verify they are left truncatable as we go. This suggest the following recursive algorithm
Build Truncatable Primes(int start)
if (start is not prime)
return
if (start is left truncatable)
found one. print it out
Build Truncatable Primes (start * 10 + 1)
Build Truncatable Primes (start * 10 + 3)
Build Truncatable Primes (start * 10 + 7)
Build Truncatable Primes (start * 10 + 9)
For left-truncatable, consider testing the number 12345. We know that we need to check 12345, 2345, 345, 45, and 5. But since all must be prime, the order they are tested in does not matter. In particular, we can check them in the order 5, 45, 345, 2345, 12345. What is nice about that order is we can get those digits by modding by successive powers of 10. Therefore you can use a loop that starts at 10, and updates by multiplying by 10.
Tips
· Start by writing an is_prime function.
· Next write an is_left_truncatable function.
· Using the modulus operator with powers of 10 can cut off digits from the left side.
· Write the algorithm specified above.
· Start the algorithm with all possible single digit prime numbers.
Sample Output
The truncatable primes are:
2
23
3
313
3137
317
37
373
3797
5
53
7
73
739397
797
Wk 2 – Roles, Responsibilities, and Governance of Security
2 Part Assignment
Assignment Content
- One of the roles of the Chief Information Security Officer (CISO) is to translate technical jargon into business language that senior leadership and executives can understand to support business decisions.
As the CISO, the board of directors has asked you to share your ideas for developing a cybersecurity program for the company. The board has specifically requested that you base your recommendations on the major components that make up a cybersecurity program, including personnel.
Part 1
Develop a 2- to 3-page table in Microsoft® Word that lists the roles and responsibilities of each of the following with respect to security.Use the following column headings:
- Title
- Role
- Responsibilities
- Use the following row headings:
- Chief Executive Officer (CEO)
- Chief Operations Officer (COO)
- Chief Financial Officer (CFO)
- Chief Information Officer (CIO)
- Chief Information Security Officer (CISO)
- Senior Security Manager
- Information Security Architect
- Information Security Engineer
- Information Security Auditor
- Information Security Analyst
- Security Technician/Specialist
- Part 2
Develop a 10- to 12-slide presentation using your choice of software for the board of directors. Include a title slide, a reference slide, and detailed speaker notes. In your presentation: - Concisely describe cyber security governance, including major components like organizational oversight and security processes.
- Recommend an information security control framework.
- Logically explain how an information security control framework benefits a business.
- Describe one organizational challenge of implementing information security and provide an example of how you, the CISO,would address the challenge.
- Include supportive graphics and appropriate backgrounds and styles. Don’t use images unless you obtain permission from the copyright holder or you use copyright-free images.
Format all citations according to APA guidelines.
Submit your assignment.