External Environment

 Read Chapter 3 and view the required videos on PESTEL Analysis and the Five Forces Framework.Select one of the cases from Part 2 of the Thompson (2022) textbook to analyze the six components of the Macro-Environment and the Five Forces Model.For this assignment:

  • Prepare a brief PESTEL Analysis for your selected case from Part 2 of our Thompson (2022) text.  You must address all six elements.
  • Prepare a brief Five Force Analysis as presented in our Thompson (2022) text for your selected case. Address all five forces.

NOTE this Requirement:  The Standard & Poor NetAdvantage Database provided in the NEC Online Library is a required source (and will be extremely helpful). The Standard & Poor Database is located under the general Library database listing. Once you have accessed the Standard & Poor site, the tabs at the top allow you to click on companies or industries. If you choose industries, it then provides a box and drop-down menu showing the various industrial reports which are available. Access the relevant report, and then review the details in the report to support this assignment. The information is incredible relevant and provides a detailed analysis of the entire industry including a listing of the key companies in the industry.  See Course Content tab for a 2020 document noting how to find this database.Submission Details: 

  • Your analysis must be driven by facts, research, and data.
  • Your analysis should be between 1000 and 1500 words.
  • Incorporate at least our course text and one non-course scholarly/peer reviewed source in your paper.
  • Create Leve1, 2 and Level 3 APA headings for each portion of the analysis.  
  • All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, double-spaced and proper in-text citations using APA guidelines.

References:

Professor feedback:

 

This should not be formatted as a question and answer document.

Submission Details: 

  • Your analysis should be 500 words or less.
  • Incorporate a minimum of at least our course Thompson 2022 Text and one non-course scholarly/peer-reviewed sources in your paper to support your analysis.
  • All written assignments must be formatted ini APA, and  include a coverage page, introductory and concluding paragraphs, reference page, and proper in-text citations using APA guidelines.

Risk management project part 4

 

Project Part 4: Business Impact Analysis (BIA) and Business Continuity Plan (BCP)

Senior management at Health Network has  decided they want a business impact analysis (BIA) that examines the  company’s data center and a business continuity plan (BCP). Because of  the importance of risk management to the organization, management has  allocated all funds for both efforts. Your team has their full support,  as well as permission to contact any of them directly for participation  or inclusion in the BIA or BCP. Winter storms on the East Coast have  affected the ability of Health Network employees to reach the Arlington  offices in a safe and timely manner. However, no BCP plan currently  exists to address corporate operations. The Arlington office is the  primary location for business units, such as Finance, Legal, and  Customer Support. Some of the corporate systems, such as the payroll and  accounting applications, are located only in the corporate offices.  Each corporate location is able to access the other two, and remote  virtual private network (VPN) exist between each production data center  and the corporate locations. The corporate systems are not currently  being backed up and should be addressed in the new plan. The BCP should  also include some details regarding how the BCP will be tested. For this part of the project: 

  1. Research BIAs and BCPs.
  2. Develop a draft BIA plan for the Health Network that focuses on the data center. The BIA should identify:     
    1. Critical business functions
    2. Critical resources
    3. Maximum acceptable outage (MAO) and impact
    4. Recovery point objective (RPO) and recovery time objective (RTO)
  3. Develop a draft BCP that could recover business operations while  efforts are ongoing to restart pervious operations. You may use or  repurpose a BCP template you find online. Include a description of how  you would test the plan.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide

Estimated length: 6-7 pages 

Discussion Board – Unit 3

 

For this Discussion Board, please complete the following:

Many people take for granted the unique identification of devices on a network. Each device must contain one or more Internet Protocol (IP) address. 

 

  • What is the difference between IPv4 and IPv6? In your opinion, why was there a need for IPv6?
  • What problems might occur with IPv6, and what do you think are the solutions?

Technical Spec Comparison

 Overview: In this assignment, you will identify and list the technical specifications of a hardware device and differentiate among alternative replacements.

 Instructions: 

• Select one hardware component (CPU, RAM, motherboard, HD, video card, camera, sound, or monitor) that you want to improve in your current computer system.

 • List your current component’s specifications and shop for two new components that are potential replacements. 

• Compare the three items (your old part, and the two possible replacements) by listing their specifications side by side and comparing the cost of the new items.

 • Which replacement is the best choice for your system? Explain your reasoning. Requirements:

 • Submit a Word document in APA format.

 • Three pages in length, excluding the Title and Reference pages. 

• At least two resources. Be sure to read the criteria below by which your work will be evaluated before you write and again after you write. 

access control and authentication

 

Create a short paper on comparing the following access control models: Mandatory Access Control (MAC), Discretionary Access Control (DAC), or Role or Rule Based Access Control (RBAC). 

The requirements for your paper are:

  • Explain the differences between the three models.
  • Describe the impact of each model on an organization including how technical controls or Access Control Lists (ACLs) will prohibit or restrict access to users within the organization.
  • APA formatted including title page, reference page, and in-text citations.
  • Length of 2-3 pages, excuding the title and reference pages.
  • Minimum of 2 scholarly resources.

Assignment

Read chapter 13 of your textbook (lecture slides under week 5), and review online library and reputable articles/journals/online resources and write 1 page paper and discuss:

How do you design a secure network. Discuss latest technologies to keep your network secure.

Please list your reference/sources

Exp19_Excel_Ch04_CapAssessment_Rockville_Auto_Sales

 

Exp19_Excel_Ch04_CapAssessment_Rockville_Auto_Sales

 

Project Description:

You work for Rockville Auto Sales and have been asked to aid in the development of a spreadsheet to manage sales and inventory information. You will start the task with a prior worksheet that contains vehicle information and sales data for 2018. You need to convert the data to a table. You will manage the large worksheet, prepare the worksheet for printing, sort and filter the table, include calculations, and then format the table.

This program has six required

  

1) This program has six required outputs and involves
searching and sorting an array of integers.

Write a Java application that initializes an array with the
following numbers, in this order:

23, 17, 5, 90, 12, 44, 38, 84, 77, 3, 66, 55, 1, 19, 37, 88,
8, 97, 25, 50, 75, 61, and 49

Then display the unsorted values. This is required output #1
of 6 for this program.

Using a sequential search of the unsorted array, determine
and report the 1-relative (i.e. 1, 2, 3, 4, etc.) positions of the following
numbers in the array (or -1 if not found), and the number of searches required
to locate the numbers: 25, 30, 50, 75, and 92. This is required output #2 of 6.

Then display the total number of searches for all five
numbers. This is required output #3 of 6.

Sort the numbers using any algorithm of your choice and then
display the sorted array. This is required output #4 of 6.

Using a binary search of the sorted array, determine and
report the 1-relative positions of the following numbers in the array (or -1 if
not found), and the number of searches required to locate the numbers: 25, 30,
50, 75, and 92. This is required output #5 of 6.

Finally, display the total number of searches for all five
numbers. This is required output #6 of 6. (There are six required sets of output as numbered in the above paragraphs.)

Try to create an object-oriented solution for your solution
vs. a procedural one. For example, you might have a class that stores an array
passed by a driver class, with methods for sorting the array, searching the
array via a sequential search, searching the array via a binary search, and
output the current contents of the array. The driver class could not only pass
in the initial array values but call various methods to perform the searches,
sorting, and array contents display. You may use any output type class you want
(e.g. Scanner, JOptionPanel)

 

2) You may use any Java Integrated Development Environment
(IDE) you choose to develop your source code, compile and link your code, and
execute your program (jGRASP is recommended). Or you may use the Windows
Command Prompt.

 

You are to submit the following deliverables in a single
Microsoft Word file in this order, and clearly labeled.

 

a) A screen snapshot of your Java source code (all file(s)
shown separately) displayed in the IDE or Windows editor showing a successful
compilation if possible (only the beginning of the source file(s) are
necessary).

 

b) A listing of your entire source code file(s).

 

c) A screen snapshot of all of your program’s outputs for
the specified values in Step #1. For this program there are 6 (six) total sets
of item(s) to be output. Failure to show any of them will result in lost points.
In order not to confuse the grading process, and possible lose points, do not
include any other outputs besides these six items.

 

4) You will be evaluated on (in order of importance):

 

a) Following directions and inclusion and packaging of all
deliverables in Step #2.

 

b) Correct execution of your program (this includes proper
compilation). This also includes getting the correct answers!

 

c) Proper commenting of your Java code and indentation (as
specified in the text).

 

d) Neatness in packaging of your deliverables (to include
putting the items in Step #2 in the correct order).