Wk 5 – Practice: Pareto Charts,

  

Assignment Content

  1.     There are several tools and techniques featured in the textbook that are used for quality control in IT projects. A Pareto chart is a type of histogram that can be used to define quality problems in a system. It allows you to see what areas need improvement.

    Create a Pareto chart based on the information below. First, create a spreadsheet in Excel using the data in the table or use the Pareto Chart template. List the most frequent customer problems first. Check your entries so your resulting chart looks like the one in Figure 8-7 in the textbook.

    Customer Complaints; Frequency/Week
    Customer is on hold too long; 90
    Customer gets transferred to the wrong area or cut off; 20
    Service rep cannot answer customer’s questions; 120
    Service rep does not follow through as promised; 40

    Submit your chart.

DISCUSSION

 In the course, we are making a special focus on Microsoft Office using MS Excel.

It is important or not to study MS Excel in the course? Argument your answer. 

How you can use this application software in your professional future?

 

Discussions: How will be evaluated.

1- The discussion will have a value of 100 points

2- Your opinion about the subject will be graded as 70%

3- Your criteria for another student’s opinion will be 30% (minimum 2)

So, you will need to have a minimum of three posted in the discussion. 

Your arguments will be very important.

Do not copy answers from the Internet. 

The answers should be your own opinions.

Comments : 

1-  I believe it is important to at least know the basics of MS Excel. Excel is a very useful tool for analyzing data and managing finances, thus saving you a lot of time and can also be more accurate than having to crunch numbers on paper yourself. It is widely used in the professional world. A lot of businesses use excel to organize data, as well as use Excel to perform basic and more complex mathematical functions. Companies can use Excel to gather data and create graphs and charts, as well as project figures. MS Excel also boosts company productivity when employees can quickly create a spreadsheet with formulas. In some instances, knowledge of MS Excel can also be a determining factor in a salary increase for an employee. 

2-  In my opinion it is really important to know or have basic excel skills because of your future jobs or business in the future i can use this application for my job or just the daily to keep organized. I really like to keep track of everything i do like jobs studies and also i need to lis patients in my job so it has been helpful for me.

Discussion 1

 

Introduction to Risk

Individuals, businesses and governments face risk daily. Risk is manifested in different forms and may be described as business, non-business, or financial. Irrespective of the type of risk, it’s important to remember the basic goals of security – to maintain confidentiality and integrity, while also ensuring the availability of data and systems. Organizations and governments usually employ different approaches to mitigating risks, but with a good understanding and consideration for risk elements including (i) vulnerabilities, (ii) threats & threat agents, (iii) impact, and (iv) likelihood. Other considerations include an organization or government’s appetite for risk, business goals, as well as internal and external drivers (laws, regulations, and standards). Proven strategies to deal with risk employ an enterprise risk management approach, and also rely on risk management frameworks including but not limited to: NIST’s risk management framework, ISACA’s risk IT framework, and COBIT 2019.

Overview

Follow these directions to complete the assignment:

Identify a cybersecurity-related attack:

Using scholarly sources and/or the web, research, identify, and share an example of a cybersecurity-related attack. Examples may include cyber warfare such as “Stuxnet” or the “Equifax” data breach. Feel free to use any of these. Once you’ve decided on the example you will share, “claim” it by posting it to the discussion. Do not post about the same type of attack as your classmates.

Create your post:

In a discussion post of approximately 600 to 800 words, explain risk and risk elements related to this attack, including a synopsis, attack type, characteristics, vulnerabilities, threats & threat agents, impact, and likelihood of this attack. You may need to make some assumptions as you write about the risk elements. Clearly state any assumptions that you make. Do not offer a potential solution to the attack;

 

Action Items

  1. Complete all of the reading for this module.
  2. Claim the cybersecurity-related attack you intend to discuss by posting it to the discussion.
  3. Create your discussion post according to the directions in the overview.

EPCA

 Select an organization that you can research that has an on-premises business function that you believe will benefit from a migration to cloud computing. This paper must be entirely original content and checked with grammarly.com before submitting. The paper should include the following sections. Each explicitly listed with a heading. 

  • Company Overview:  The section should include the company name, the industry they are in, and a general overview of the organization.
  • The On-Premises Function: Discuss the current application or functional domain that you are proposing for a move to the cloud. For example, an inventory management system or the organization’s email platform. Why will this benefit from cloud migration?
  • The Proposed Cloud Solution:  Describe your proposal for moving the function to the cloud. Be specific and detailed. What services would you use? Which service provider would you use? What timeline do you propose? Include as much detail as possible. This portion should be 2 pages. For example, indicate the specific services you will consume or subscribe to, (if you are moving to AWS, I would expect to see specific services listed such as EC2, S3, Redshift, Lambda, and others). Indicate where storage is duplicated and failovers may be present.
  • Conclusion:  Summarize the most important ideas from the paper and make recommendations on how they might achieve even greater success. 

Total 4 pages

Data base and design

 

  1. Application Implementation

You Must write each of the following SQL commands:

Write a set of at least 6 SQL queries that would retrieve relative and important data from your database.

Write a set of at least 5 SQL updates that would modify relative and important data in your database.

Write a set of at least 5 SQL deletes that would delete some data from your database. Write a set of at least 2 SQL views that would define some virtual tables in your database.

 For each of the above SQL commands give a brief explanation of the purpose of each command and the output (if any) for each..Optional (extra credit):

Create forms, reports, queries, menus or navigation forms as needed on top of the tables. In general, a simple data entry form should be created for each table. For example, if the business takes orders from customers, create a form with Orders and Order items with

  1. Write Up Final Report
    The final step is to prepare a formal report and brief presentation. This report should include:

    • A separate cover page indicating the GROUP Number, the title of your project, the full names and IDs of the group members, the course number and course section.
    • An introduction section similar to the proposal.
    • Entity Relationship Model diagram.
    • The collection of normalized relations and functional dependencies, and a brief discussion as to the normal form(s) achieved, the methods used to achieve these normal forms, and reasons why any de-normalization was done.
    • The SQL DDL used to create the tables and add primary key and foreign key constraints.
    • The SQL commands (as required in 5 above) along with their brief explanation of the purpose of each command and the output (if any) for each.
    • Optional (extra credit) An example printout of each of the forms, reports and queries accompanied by a description of the function of each. Along with each form.
    • A narrative conclusion section that describes:
      a) the group’s experience with the project (which steps were the most difficult? Which were the easiest ? what did you learn that you did not imagine you would have? if you had to do it all over again, what would you have done differently?)
      b) if the proposed benefits can be realized by the new system
      c) any final comments and conclusions

ITS-530 – Analyzing & Visualizing Data – Paper

Homework:

Review The Power of Good Design- https://www.vitsoe.com/gb/about/good-design   and select three of the ten principles noted for good design. Next in R, utilize these three principles in a problem that you will solve. First, note the problem to solve, the dataset (where the information was pulled from), and what methods you are going to take to solve the problem.  Ensure the problem is simple enough to complete within a two-page document. For example, I need to purchase a house and want to know what my options are given x amount of dollars and x location based on a sample of data from Zillow within each location. 

Ensure there is data visualization in the homework and note how it relates to the three principles selected.

Parts of this assignment:

Part 1:  Review the 3 Principles that you are going to use.

Part 2:  Discussion of the Problem.

Part 3:  The dataset (where you got the data)

Part 4:  Explain how you can solve the problem

Part 5:  Make sure you have a data visual (you can create the visual with R-Language)

Note: plagiarism check required, APA7 format, include References, within 8hrs

cybersecurity and AI

 Technical report. It should minimum 10 pages and should be single space. But before technical writing, there should be report outline with references. 

database discussion response

 Please respond to the following discussion below with 150 words or more relating to relational algebra and its relation to SQL. 

From what I have researched, relational algebra is one of a few  different collections of mathematical formulas to manipulate data in a  relation or table. It is a procedural query language that uses relation  instances for input and relation occurrences for output (AskingLot,  2020). It is the formal description of how a database operates and a  means to interface with it to manipulate and utilize raw data (Russell,  2016). Basic relational algebra operators are select, project, union,  set difference, and Cartesian product.

SQL is the query language that is essentially the front end user  interface built upon relational algebra. Relational algebra and  relational calculus together form the base for the SQL language  (AskingLot, 2020). SQL operator inputs are translated to relational  algebra before being applied to the relation. Some basic syntax  operators for SQL are select, insert, delete, update, and create.

Examples of the differences in syntax are below:

SQL:

SELECT *attribute* FROM *table/relation/s* WHERE *condition to be met*

Relational Algebra:

PROJECT *attribute* (SELECT *condition to be met* (table/relation))

or

π *attribute* (σ *condition to be met* (table/relation))

Cyber Defense Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

I can think of a few different web based firms that offer online security checks. I personally do trust these types of services. Of course I would only ever use well known software like Norton or MacAfee. I’ve never heard about anything going wrong with utilizing services like these and I have definitely seen things go wrong while operating on a PC or laptop without protection. 

Norton Security offers different security options that range from Plus ($19.99), Standard ($25.99), Deluxe ($29.99), and Select ($99.48). These different options which vary by price also vary by what the plan covers. Mainly, the less expensive options have less levels of protection versus the more expensive plans which get additional benefits or areas of security. Looking at the most expensive plan, the Select Plan, the coverage options seem pretty extensive, it’s a plan I would go with if I chose to use this service. There is security for 5 different devices, PC Cloud Backup, Virus Protection, Parental Controls, Private Browsing with VPN, Stolen Funds Reimbursement, etc. This plan and coverage is pretty in depth. I would say that this type of software is one that I would trust and I would recommend to people, especially with windows computers. There have been many issues over the years with flaws in windows security allowing for data breaches via way of hackers gaining access to networks and devices. I wouldn’t want to risk something like that and I feel that most people have a lot of information stored on their devices these days, probably more information than ever before as the world continues to transform to an all electric operating system. These days most people have thousands of pictures on their devices, important scanned documents, school and medical related documents and paperwork, etc. This puts us all in a very vulnerable position because if anyone were to gain access to these devices they can steal the information, they can lock it, and they can destroy it all together. 

¹ Norton. Cyber Safety. 2021. 

Felicia 

RESPONSE 2:

There have been times in the past were I had to restore to using one of these free services to scan my system. Free tools such as Avast antivirus have been a great help in detecting some of the standard malicious software; however, this protection is limited in its capacity. If you want those additional features, it will cost you. There are many free security options out on the web, but there are even more that have been found to be malicious. Some of these rogue security applications will take names similar to those of respected developers or official-sounding names such as BitDefender 2011 or Windows XP Recovery, which will be used to trick unsuspecting users into installing them on their systems (Prakash & Parameswari, 2016). Typically deployed after a user visits a questionable website which will alert the user to possible infection and offer a link to download the free security software. Once on the system, the user will be bombarded with phony alerts stating that their system has been compromised further and would require a higher level of protection at a cost to the user. Already at this point, the user has opened themselves up to the installation of all forms of nasty malware, including rootkits, trojans, and ransomware. 

I have since moved on to other antivirus options such as McAfee since the service was free through the military. However, McAfee offers a subscription-based service, with multiple tiers, with prices ranging from $19.99 to $39.99. The standard features provided with this security solution range from its standard antivirus protection, VPN licenses, encrypted storage, and password management. Some of these services are unnecessary, such as the 128-bit encryption for storage, which encrypts data on a hard drive to protect against unauthorized viewing. The encrypted storage feature can be found on any modern system. Another feature offered is the password manager, which stores all your passwords in a single repository. It also suggests sufficiently solid passwords and automatically holds them for you. Although this makes password management a breeze, a compromise in this area could reveal all your passwords to an adversary. Luckily all this information is protected with encryption, and if the anti-malware protection is being used, it should block any malware that would capture this data. 

-Joshua

Prakash, G., & Parameswari, M. (2016). On reviewing the implications of rogue antivirus. Journal of Information Ethics, 25(2), 128-139. Retrieved from https://www-proquest-com.ezproxy2.apus.edu/scholarly-journals/on-reviewing-implications-rogue-antivirus/docview/2064887596/se-2?accountid=8289

McAfee. (n.d.). McAfee Total Protection 2021: Beyond Antivirus. McAfee.