DQ Responses Oct 30

Q. Please read the below paragraph and write your opinion, also by discuss any differences you may see.

Note: 250 words with intext citations and references needed.

Business architecture defines an organization’s capabilities in a structured way. It identifies all kinds of resources a business possesses, such as personnel, infrastructure, and business, them comes up with a strategy to make the most value out of them. The purpose of business architecture is to transform high-level vision into actionable items, so that the company survives and becomes successful in today’s market. In a hierarchical structure, a company’s major concerns might be separated into operation, finance, marketing, information, HR, compliance, and security, which represent the critical components in the architecture. The seamless coordination among those components is critical for the execution of a transformation of vision.

Many of the tech giants have chosen to lay off employees this year due to the slow down of growth. This is part of a bigger move that those companies are making based on their predictions of the situations and strategies to counter them. The layoffs, reorganizations, and other moves mean that companies are adjusting their business architecture to suit the transformation of their visions. Sometimes, the layoff itself is rather a symbolic action to convey the high-level vision to employees and the public, with the hope of showing their responsiveness to stakeholders. The purpose of such organizational transformation is to improve the company’s current stand in the ever changing market.

Inferential Statistics in Decision-making

Assignment: 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of Inferential Statistics in Decision-making have been applied, or could be applied, in a practical manner to your current work environment. 

Requirements: 

Provide a 500 word (or 2 pages double spaced) minimum reflection. 

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

500 words with APA format needed.

Security Work

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course(Dissertation seminar) have been applied or could be applied, in a practical manner to your current work environment(IT field).

APA format with references needed.

Policy

 Answer each of these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Should society help workers dislocated when technology, like the Internet, eliminates their jobs in a process called ‘Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contractor under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for online behavior in his/her own time? 

10. What is the relationship between BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Operation Stop Hack

 

Introduction

Suppose you have recently responded to your first computer forensic incident. The case in question involves a potential underground hacking ring, which the police, working in conjunction with the Federal Bureau of Investigation (FBI) have been investigating for several years. It has since been determined that an IP address confirms that location, and the identity of one of the suspects. Warrants have been issued for search and seizure of all electronic devices found on the premises.View the setup found in the suspect’s home. Then document your findings and secure all relevant evidence.

Instructions

Write a 2–3 page paper in which you:

  1. Investigate the legal statutes involved in this type of case and outline specific legal consideration to take when collecting evidence.
  2. Pre-plan how to approach the crime scene, documenting the steps and procedures to process the digital evidence.
  3. Analyze the crime scene diagram and document and tag each device that will be collected for evidence, specifying the importance of each device.
  4. Use the Strayer Library to conduct your research. Use no less than three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed and double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides. Citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

Learning Outcomes

The specific course learning outcome associated with this assignment is:

  • Outline the legal steps and procedures to process and collect digital evidence.

For this problem you must use Java's semaphore class. Your implementation for this problem must only use the semaphore methods to control the concurrency of your solution (IE. acquire and release). Consider a small take-out food restaurant called Burri

 

For this problem you must use Java’s semaphore class. Your  implementation for this problem must only use the semaphore methods to  control the concurrency of your solution (IE. acquire and release).  Consider a small take-out food restaurant called Burrito Brothers that  is open 24 hours, seven days a week. This very popular establishment  offers a VERY-TASTY burrito. There are three servers that own a private  beef area, a cheese area, and a tortilla area (IE. Each server has their  own ingredients in an infinite supply). Additionally, there are three  shared counter locations, a shared cash register and a shared waiting  area that can accommodate up to 15 customers. By law the shop has a  maximum customer capacity of 15. A customer cannot enter the shop if it  is filled to capacity. If the there is room a customer will gain access  to the shop. Each customer will enter the shop with an order of one to  20 burritos. As soon as a server is free, the customer that has the  shortest order is served next. A server is either servicing a customer  or waiting. Each server will make (at most) three burritos at time for a  given customer. Once a server has obtained all ingredients, a burrito  can be made. When a customer’s entire order is finished, the customer  pays a cashier and leaves the shop. Since there is only one cash  register, only one patron may pay at a time. However, in the event that a  customer’s entire order has not been filled by the server at the  completion of the current counter visit the customer must reenter the  waiting area. The waiting area is organized by the shortest order next.  Implement a solution to this problem as a Java application using the  Java semaphore class for synchronization. Your zip file must expand into  a single directory and your application must compile at the command  prompt using javac *.java. Output must include the arrival of each  customer and each state transition: leaving full shop, entering shop  with an order of m burritos, customer standing, getting service from  server n, paying, and leaving. Each customer is represented by a  corresponding thread and each server in your implementation is also  represented by a unique Java thread. All customers and servers exist  within a single application. The system must compile using the command:  javac *.java. The system must run using the command: java Burrito.

Exp19_Access_Ch06_Cap – Insurance 1.0

Exp19_Access_Ch06_Cap – Insurance 1.0

Exp19 Access Ch06 Cap Insurance 1.0 

Access Chapter 6 Capstone – Insurance  

EX19_AC_CH06_GRADER_CAP

  

Project Description:

You have been asked to modify a database that tracks driver data and insurance details. You will update, add to, and delete records from tables. You will also create queries that aggregate data, find unmatched, and find duplicate values.

     

Start   Access. Open the downloaded Access file named Exp19_Access_Ch6_Cap_Insurance. Grader has automatically added   your last name to the beginning of the filename. Save the file to the   location where you are storing your files.

 

Open   the Drivers table, observe the data, and then close the table. Create an   update query based on the Drivers table. Include all of the fields from the   table.

 

Set   the criteria to update Special   drivers to Senior.   Run the query, save it as Update Class,   and then close the query.

 

Create   a make table query based on the Drivers table. Include all of the fields from   the table. Set the criteria to select Senior   drivers. The query should make a new table named Non-Standard   Drivers   in the current database.

 

Run   the query, save it as Make Non-Standard   Drivers   and then close the query.

 

Make   a copy of the Make Non-Standard   Drivers query and save it as Append Non-Standard   Drivers.

 

Change   the query type to Append and   append records to Non-Standard Drivers.   Set the criteria to select Minor   drivers. Run, save, and then close the query.

 

Set   DriverID as the primary key field   of the Non-Standard Drivers table. Save and close the table.

 

Make   a copy of the Append Non-Standard   Drivers query and save it as Delete Non-Standard   Drivers.

 

Change   the query type to Delete. Set the   criteria to select Minor   or Senior drivers. Run, save, and then close the   query.

 

Create   a crosstab query based on the Non-Standard Drivers table. Set Class as the row heading field and Gender as the column heading field.   Summarize the data by counting the DriverIDs. Save the query using the   default name, and view the query results.

 

Modify   the query so that Class displays   as the column heading and Gender   displays as the row heading. Save the query as Non-Standard   Drivers_Crosstab and run the query.

 

Modify   the database (Non-Standard Drivers table) so that the gender M displays as Male and F displays as Female.   Run the crosstab query again to display the changes. Close the query.

 

Create   a find duplicates query based on the Drivers table where there is a repeated   LastName and Street value. Add the DriverID   and FirstName fields to the   query results. Save the query using the default name, and view the query   results. Note that Eric and Kirk Abelson live at the same address, but have   two different DriverIDs. In the Drivers table, expand the Subdatasheet for   Eric and notice that he carries insurance for both household vehicles. Close   the table and the query.

 

Create   an unmatched query to find drivers in the Drivers table who have no insurance   listed in the Insurance table. Include all fields from the Drivers table.   Save the query using the default name, and view the query results.

 

For   the driver named Lawrence Alexander, add a record to the Insurance table.   Enter the InsuranceID number as 10010,   the DriverID as 341890123,   and the Agent as AS8842.   Populate the remaining fields (AutoType, AutoYear, TagID, and TagExpiration)   with data of your choice. Close the table. Run the Drivers Without Matching Insurance query again. Note that   Lawrence Alexander no longer appears in the results, as you have used the query   to identify missing data and corrected the error. Kirk Abelson is covered   under the same policy as Eric, his father. Close the query.

 

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

Week 4

 

Assignment Instructions:

  • Uh-oh, the Legal department and the HR department are demanding their own network.
  • The departments feel that their data is sensitive enough that their data should be separated from the other departments.
  • In addition, the Outside Sales department has gotten brand new Apple iPads for all of their users. So there needs to be a Wireless network setup so they can go online.
  • So, you need to build out a change order for the network to account for these two curveball requests.
  • Your submission should be in a Word document and should cover the following (not a complete list)
    • How will you separate the networks, physically or virtually?
    • What type of WiFi network will you setup?
      • What hardware will you use?
      • What encryption method will you use?
      • Will you limit the WiFi signal via physical means?
    • What additional hardware is needed? Software? Etc?
    • Remember to justify your choices

Network Security Project Assignment

 Overall Project Scenario

Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs’ services to solve problems involving malware removal, to manage data recovery and network issues, and to install hardware and software.Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff.You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.

Deliverables

The project is divided into several parts. Details for each deliverable can be found in this document. Refer to the course Syllabus for submission dates.

  • Project Part 1: Network Design