Case Study

Answer the question from given case study and video links.
Q-1:- Assume you are a Business Analytic consultant; explain the process of adopting analytics process for LNT and state the implications on LNT’s business performance. In your opinion, what process should LNT follow to execute a successful analytic design and team?
Q-2:- Describe the component of the case difficulty cube, state the concepts in the NLT case and explain how you would position the case on the case difficulty cube.?
Video Links:-
https://www.youtube.com/watch?v=liIiwKwRQtY
https://www.youtube.com/watch?v=V8u9duVNxdo
https://www.youtube.com/watch?v=6dFrvwuHxNM
https://www.youtube.com/watch?v=7ER8E6f8YX8

New Information Security and Privacy Regulations

Discuss how the new data privacy regulations by the European Union and the State of California will affect businesses.

 posts should be 250 to 450 words minimum 

 

  • Your posts should be of substance and include additional research;  there should be at least two paragraphs that address the topic
  • Use APA format for any quotations or citations you use to support your answer

Review the contributions and determine if they have any gaps in their understanding of what happens at each layer.. 50-75 words

 

The  Transmission Control Protocol and Internet Protocol Layers refers to the  communication protocols that enable use to do anything over the  internet. There are four layers. In the Network Interface Layer things  like sending information between hosts on the same local network and  translating data from higher layers are done. The layer right above that  would be the Internet Layer where data is packaged into packets,  receive incoming packets of data, and addressing and transmitting  packets occur. Then there is the Transport Layer this layer is  responsible for end-to-end communication on the network. In short, the  transport layer collects message segments from the application and  transmits the to the nest layer.

Physical Layer – hubs, cables, modems, and repeaters.

Data Link Layer – bridges, switches, NIC’s,

Network Layer – routers, brouters

Transport Layer – gateways, firewalls,

Application Layer – PC’s, smartphones, servers

The TCP/IP Protocol suite was developed in the 1960’s and recognized  throughout the world after 1983. As for the OSI reference model it was  also recognized throughout the world in 1983. Some key similarities  between the TCP/IP and OSI Model is that they describe how data is  transmitted between devices on a network. Both models also divide the  networking concepts into layers. The ideas about how data is broken down  into smaller pieces and passed from layer to layer is the same as well.  Another similarity is that these models are used to troubleshoot  various networking problems. Both are modular and each layer represents a  separate set of functions and protocols. Some of the ley differences  between the two would be that the OSI model is a more elaborated model  where each layer has separate functionality. Unlike the TCP IP model, it  does not combine any layers. The OSI has 7 layers, and the TCP IP has 4  layers. The TCP/IP model is more geared towards networking hardware and  software used on the internet as to the OSI models is more general and  can be applied to any type of network.

References

Ahmad, A. (2022, May 9). Comparison Between TCP/IP and OSI Model. Retrieved from https://afrozahmad.com/blog/tcp-ip-vs-osi-model-differences-and-similarities/

What is the TCP/IP Model? Layers and Protocols Explained.  (2020, November 3). Retrieved from FreeCodeCamp:  https://www.freecodecamp.org/news/what-is-tcp-ip-layers-and-protocols-explained/

Discussion ( medical Record abuse and fraud)

Do a little research and prepare a short essay of an incident involved medical records breach or fraud. You summary should include:

  • Names of impacted parties (e.g., hospital, clinic, pharmacy, cloud service provider, etc.)
  • Date of incident (should be in recent five years)
  • Law/regulation involved
  • Summary of the incident and lessons learned (based on your analysis)

Week 7_1

 

  • Week 7 AssignmentComplete the following assignment in one MS word document:Chapter 12 –discussion question #1-3 & exercise 1 & 12 & 16Chapter 13- discussion question #1-4 & exercise 3 & 4 & 6When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.All work must be original (not copied from any source).
  • Week 7: Discussion 1
    Week 7: Discussion 1Create a discussion thread (with your name) and answer the following question:Discussion 1 (Chapter 12): Examine Alexa’s skill in ordering drinks from Starbucks.Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.Your response should be 250-300 words.  Respond to two postings provided by your classmates.There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

  • Week 7: Discussion 2
    Week 7: Discussion 2Create a discussion thread (with your name) and answer the following question:Discussion 2 (Chapter 13): Research Apple Home Pod. How does it interact with smart home devices?  Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report. Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.Your response should be 250-300 words.  Respond to two postings provided by your classmates.There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

ERM W 5 D

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

 

Present your discussion post as if you were presenting to senior leaders of your company.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

C++ simple coding homework

I NEED SOMEONE TO DO THIS BY TODAY I WILL BE ATTATCHING THE GRADES I HAVE SO FAR AND THE SCALE. IT HAS TO BE DONE SIMPLE BECAUSE WE JUST STARTED CODING AND WE’RE ONLY AT CHAPTER 4. SO WE CANT USE CODE I HAVENT LEARNED. 

INSTRUCTIONS:

In essence, algorithms are simply a series of instructions that are followed, step by step, to do something useful or solve a problem. You could consider a cake recipe an algorithm for making a cake, for example.

Here is a good guide on how to write an algorithm: http://sofia.cs.vt.edu/cs1114-ebooklet/chapter4.html

Being as thorough as possible, create an algorithm to calculate your grade for this class.

Research Paper – Information Governance-Portfolio Project: Milestone 1: Project Introduction

 Note: I attached the document in attachements.

our final project paper is broken down into 4 parts, worth a total of 125 points towards your final grade. This milestone is worth 25 points.

For this piece of that assignment, you will write the introduction to your final portfolio project (1-2 pages), comprehensively describing the industry you are choosing to use in the paper and preliminary challenges with information governance that you have identified. Be sure to utilize 2-3 sources from the UC Library.

Review the instructions in the Final Paper document first (attached here). Each milestone is a separate writing assignment, leading up to the Final Paper.

Expectations are that it will be a scholarly work, using largely peer-reviewed resources, formatted to APA 7 style. Grammar, spelling, and punctuation are significantly weighted. Any instance of plagiarism will result in a 0 on the activity (first offense) or failing the course (2nd offense).

Read the attached paper carefully and write a research summary

Read the attached paper carefully and write a research summary ,in two sections  Overall summary What you would like to add or change to the conclusion section  This assignment should be in APA format, plagiarism free and have to include at least two references other than the paper. 1000 words minimum