Problem 6- Initiating Project

This week’s exercise will be to create a Risk Register for the Week 2 Business Case that you have utilized throughout the semester. Additional instructions are in the Word template.

You will complete the attached Risk Register in the Word template provided. A risk needs to be identified for each of your six (6) Key Deliverables (this would be listed under the Deliverable column). An example of the Risk Register is available in Exhibit 11.9 on page 370 of the textbook.

The following is a description of what should go under each column.

Risk Description: Identify the Risk associated with the Deliverable. These should not be failures of management, planning or execution. These should be out of the control of the project team.

Impact Statement: This is a narrative of potential impact if the risk should occur. This statement should specifically justify scores provided in Impact and Probability columns.

Deliverable: This will be the associated Deliverable. Identify one risk for each of your six (6) deliverables.

Probability: This is a score of 1-5. A score of 1 would be if the probability of the risk occurring is very slight and a score of 5 is that it will almost likely occur.

Impact: This is a score of 1-5. A score of 1 would be the impact would have little impact if the risk occurs and a score of 5 would be catastrophic impact if risk event occurs.

Score: This is the Probability multiplied by the Impact.

Response Strategy/Solution: This should identify one of the risk response strategies from the textbook. Then provide a brief plan on how respond to risk if it should occur. This must include direct correlation to the scores assigned to Probability/Impact. At least one risk response strategy needs to be identified for each and make logical sense. For example, you cannot Avoid a natural disaster so you would not select Avoid as the risk response strategy.

Seminar on Face Recognition

  

Face recognition is a method of identifying or verifying the identity of an individual using their face. Face recognition systems can be used to identify people in photos, video, or in real-time. Law enforcement may also use mobile devices to identify people during police stops. 

Research Questions

 1. What are the benefits of using facial recognition software technology?

 2. Name some of the risks associated with this technology?

 3. What industries or companies are using facial recognition and what are they using it for?

 4. How do you feel about law enforcement using this technology? 

 5. Do you believe this system would work to catch terrorists and criminals? How so?

 6. Are the benefits of facial recognition technology more trouble than they are worth for retailers? 

Question 19

  

Section 2: Revised Project Plan

Use Microsoft Project to:

1. Update the project plan from Project Deliverable 4: Analytics, Interfaces, and Cloud Technology, with three to five (3-5) new project tasks each consisting of five to ten (5-10) sub-tasks.

The specific course learning outcomes associated with this assignment are:

· Develop information systems-related activities to maximize the business value within and outside the organization.

· Demonstrate an understanding of existing and emerging information technologies, the functions of IS, and its impact on the organizational operations.

· Evaluate the issues and challenges associated with information systems integration.

· Use technology and information resources to research issues in information systems.

· Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions.

Click here to view the grading rubric.

Unit 7

 

IT332-5: Recommend data storage and data protection technology for a computer system.

Purpose

In this assignment, you will conduct research about the various technologies for file systems. You will create a comparison table presenting the different storage mediums and associated methods to access the data, file system constraints, and how these constraints can affect performance. You also will learn about the differences between a logical file system and a physical file system and the purpose of each.

Assignment Instructions:

A number of physical storage mediums are available in today’s computing world, including hard disk, flash drive, DVD, and tape, to name a few. These mediums might have different file allocation methods and size constraints. Discuss the various mediums and associated methods and constraints. Additionally, for each medium, discuss the concept of fragmentation, why it occurs, what devices are more susceptible to it, if there are file systems that are able to avoid it, and how to prevent and fix fragmented space.

The minimum concepts to cover and explain in the paper are contiguous and non-contiguous, allocation table, indexing, tape allocation, disk allocation, storage allocation, partitions, volumes, fragmentation, and defragmentation.

Include a comparison table for the different mediums and associated methods and constraints.

Assignment Requirements

Your paper should be 3 pages in length, including a comparison table for each of the storage mediums. Be sure to use the appropriate APA format and cite your textbook or other sources that you used in your paper.

The paper should contain sufficient information to adequately answer the questions and contain no spelling, grammar, or APA errors. Points deducted from the grade for each writing, spelling, or grammar error are at your instructor’s discretion. 

For assistance with APA requirements, please go to Academic Writer. You will find the link in the Academic Tools section of the course.

Also, review the university policy on plagiarism. If you have any questions, please contact your professor.