Review and Reflect of Business Intelligence Course

 

Review and reflect on the knowledge you have gained from this course. Based on your review and reflection, write at least 3 paragraphs on the following:

  • What were the most compelling topics learned in this course?
  • How did participating in discussions help your understanding of the subject matter? Is anything still unclear that could be clarified?
  • What approaches could have yielded additional valuable information?
  • The main post should include at least 1 reference to research sources, and all sources should be cited using APA format.

quiz

This quiz is based on chapter 6 in the text.  Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘ Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Discutipn

Need one page 

  • In 100-200 words, do you believe that there is a difference between securing cloud networks and traditional networks? Based on the activities this week, what do you think the differences are? 
  • In 100-200 words, please explain wireless security utilizing this week’s reading and learning activities

week-8

 

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

IT 501 week 4

APA FORMART word file minimum 400 words with proper references and corresponding references list 

  1. Tagging of photos and geotagging is a great way to let your friends know [a] the subject and occasion for the photos, and [b] where the photo was taken.  But, is there such a thing as too much information?
  2. What are some of the major issues with geotagging?  What concerns you the most?

____________________________________________________________

Exp19_Excel_Ch01_CapAssessment_Training

 

Exp19_Excel_Ch01_CapAssessment_Training

 

Project Description:

You manage a company that provides corporate training workshops. Your two types of clients are business people and college professors. You want to complete a spreadsheet that calculates gross revenue for upcoming training workshops. Finally, you will improve the appearance of the worksheet by applying font, alignment, and number formats.

Regulatory Compliance for the Healthcare Sector

Explain healthcare-related information security regulatory compliance requirements.

Write HIPAA-related policies and procedures.

 it should follow APA Citation rules.Please proofread, spell, and grammar check your paper before  submission. This SyncSession paper should be 1-2 pages long, not including the title page and reference page. Please use Times New Roman,12points font. Please double -space the paper

computer crimes

 

Every September 19, the entire international community is invited to Talk Like a Pirate. Here, you may indulge in that linguistic celebration, but that’s not the focus of your mission.

For this week’s Discussion, you must utilize your legal case research skills and find a case that dealt with intellectual property theft online. Your treasure map might have you begin at UC’s library, where Nexis-Uni may be effective.

This is not an exercise in finding an article or opinion piece. Your source material must be a legal dispute. In order to avoid the risk of discussing only a handful of cases amongst the hundreds or more that have gone to court and are available, do not discuss a case that another student has already initiated; review the Discussion II.b. Forum before you post your Initial Post to avoid that fate.

At a minimum, you must:

  1. Cite the legal case pursuant to APA citation guidelines for court decisions and cases (Purdue’s OWL has direction), and make sure to submit it to Discussion II.b.;
  2. What was the principle issue in the legal dispute? This should surround the legal issue at the heart of the lawsuit, and may include the essential facts of the matter;
  3. What was the rule or set of rules that the court analyzed to frame the legal dispute? Maybe they are federal laws or regulations, or it could be at the state level, or a combination;
  4. How did the court apply the rules to the set of facts posed by each side? Here, we want your summary of the logic, the critical thinking, and the rationale that the court built its conclusion upon; AND
  5. What did the court conclude? Who won, who lost, what’s left unanswered for the next phase of litigation if there is one to follow?

**Remember** Every Discussion in MSDF 633 fits into the same pattern:

  • Review the Discussion prompt, which you are reading right now, and understand it and study any additional materials implicated within it;
  • Submit an Initial Post no later than the end of Wednesday during the week the Discussion occurs;
  • Submit at least one or two Responsive Posts, more are always welcomed, to your classmates’ Initial Posts no later than the end of Sunday during the week.

Savvy? So I thought.

Write a shell script to concatenate

 Write a shell script to concatenate lists together, and output the resulting list. Do not include any argument that is a sub-list of the entire list. (The script will clean the list of any redundant items.) You must preserve the original order of the list. Remember to account for the following situations:
a : at the beginning of the list is the same as a . at the beginning of the “list” (:/bin is the same a .:/bin)
a :: any where in the list is the same as :.: (/bin::/etc is the same as (/bin:.:/etc)
a : at the end of the list is the same a :. ( /bin: is the same as /bin:. )
Project using temporary files will not be graded.
The input to the script will be color or space separated lists and the output will be a colon separated list with the original order preserved and all redundant items removed.