Please explain the concept of globalization and the role information technology has in the global market.
Discussion 1- Managing Project Risks
Chapter 1: IntroductionsChapter 2: An Overview of RiskInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:
- What are examples of project risks?
- How do you identify risks in a project?
- What are the 4 risk strategies for risk remediation?
Text-
Title: Managing Project Risks
ISBN: 9781119489733
Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards
Publisher: John Wiley & Sons
Publication Date: 2019-08-13
Electronic Attacks in Computer Forensics
in the world of computer forensics science, describe about Electronic attacks by extremist group in about 250 words
Dathgv kyf boo
Instructions
Assume that you want to create a linked list structure
for ‘item’s. You are given
struct item
{
string data;
item *next;
item(string x, item* t)
{
data
=
X; next
= t:
7
}:
In our implementations we used first and last
pointers to keep first items and last item of linked list.
Once we add new item, a new structure is created
and added as last item.
Assume that we have only first pointer, and do not
have last pointer. Complete the following function to
add an item to at the beginning (front) of Linked
Listed using only “first” pointer. Just submit function
implementation, not the whole program.
bool Bag::insertFront(string str)
{
}
Algorithm Assignment
I need algorithm assignment by eod.
GO19_AC_CH01_GRADER_1G_HW – College Construction 1.0
GO19_AC_CH01_GRADER_1G_HW – College Construction 1.0
GO19_AC_CH01_GRADER_1G_HW – College Construction 1.0
Project Description:
In this project, you will create database objects to track the construction projects and the events related to the projects at a college. You will create a table and import data from Excel to create a second table. You will use a database template to enter data into the Events table. You will create a simple query, a form, and a report.
#Start Access. Open the file Student_Access_1G_College_Construction_HW.accdb downloaded with this project. Close the Event List multiple-items form that automatically opened. Open the Navigation Pane.
#In Datasheet view, create a new table. Beginning in the second column of the table and using the data type of Short Text, create the Building Project, Site, and Contractor fields (in that order). In the fifth column, using the Currency data type, create the Budget Amount field.
#Change the data type of the ID field to Short Text, rename the ID field to Project ID and change the Field Size to 5
Starting in the Project ID field, add the following three records to the new table:
P-356
Student Center, 3-story
Northeast Campus
RR Construction
61450000
P-823
Student Center, 2-story
Southeast Campus
RR Construction
41960000
P-157
Health Professions Center
Northwest Campus
Marshall Ellis Construction
42630000
Save the table as 1G Projects, and then close the table.
Append the records from the downloaded Excel file a01G_Projects.xlsx to the 1G Projects table.
In the Navigation Pane, organize the objects by Tables and Related Views. Open the 1G Projects table (the table has eight records). Close the Navigation Pane.
#Switch the 1G Projects table to Design view. For the Project ID field, enter a description of Enter the Project ID using the format P-### For the Site field, enter a description of Campus Location. Save the table.
#Switch to Datasheet view, apply Best Fit to all of the fields in the table, save the table, and then close the table.
#Import the records from the downloaded Excel file a01G_Contractors.xlsx into the database as a new table named 1G Contractors. Designate the first row as column headings and the CO ID field as the primary key.
#Open the 1G Contractors table in Datasheet view (the table has four records). Apply Best Fit to all of the fields in the table, save the table, and then close the table.
#Based on your 1G Projects table, use the Query Wizard to create a simple query. Add the Site, Building Project, and Budget Amount fields (in that order). Keep the default name of 1G Projects Query, click Finish to display the query results, and then close the query.
#Based on your 1G Projects table, use the Form tool to create a form for the table. Save the form as 1G Project Form, display the form in Form view, and then close the form.
#Based on your 1G Projects table, use the Report tool to create a report. Delete the Budget Amount field from the report. Save the report as 1G Projects Report.
#Sort the Building Project field in ascending order. Set the width of the Building Project, Site, and Contractor fields to 2 inches. Delete the page number from the report, save the report, and then close the report.
#Open the Navigation Pane, open the Event List form, and then close the Navigation Pane. In the Event List multiple-items form, enter the following two records (the Start Time and End Time data will reformat automatically):
Title: Groundbreaking Start Time: 6/13/22 10a End Time: 6/13/22 11a Description: Student Center groundbreaking Location: Northeast Campus
Title: Dedication Start Time: 8/26/22 12:30p End Time: 8/26/22 2p
Description: Gymnasium building dedication Location: Southwest Campus
#In the Event List form, click New Event, and in the Event Details single-record form, enter the following record (the Start Time and End Time data will reformat automatically):
Title: Community Arts Expo Start Time: 10/5/22 6p
End Time: 10/5/22 9p Description: Book and Art Expo at Library Location: Southeast Campus
Assignment 1
Course – business intelligence
Complete the following assignment in one MS word document:
Question:
Survey the literature from the past six months to find one application each for DSS, BI, and analytics. Summarize the applications on one page, and submit it with the exact sources.
Exercise 1:
Go to microstrategy.com. Find information on the five styles of BI. Prepare a summary table for each style.
Exercise 2 :
Find information about IBM Watson’s activities in the healthcare field. Write a report.
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
Digital forensics
Define several forms of metadata that can be useful to an investigation. How is it valuable to an investigator?
In 350 words
Assignment Due 6/16
Assignment is uploaded to document. Screenshot of book and pages are attached. Outside resources are able to be used if applicable
400-500 words max
HW Lesson 3
1. What is an audit universe and what does it include? List and describe each component you would include in an audit universe.
2. What is Control Objectives for Information and Related Technology (COBIT) and why is it valuable to management and IT auditors?
3. Why are risk assessments significant to the audit function? How does risk help inform an audit?
4. As the IT audit senior of the engagement, you are presenting to the IT manager and partner (as part of the planning meeting) the results of the risk assessment performed in Exhibit 3.3. Based on such results (look at Exhibit 3.3, under the “Risk Rating” and “Action Priority” columns), it seems clear that the audit should focus on Financial Application #2 (FA2). Nevertheless, the IT manager and partner, based on previous relevant experience, believe that the audit should be performed on Financial Application #1 (FA1). The planning meeting is over, and you still feel doubtful on the decision just made. Your task: Answer the questions below showing why the audit should focus on FA#2. In other words, think of additional information not necessarily documented in the risk assessment shown in Exhibit 3.3 related to:
a. Any additional vulnerabilities or weaknesses that may currently be in place affecting FA2
b. Any additional threat-sources that can trigger the vulnerabilities or weaknesses you just identified for FA2
c. Any additional risks or situations involving exposure to loss for the financial information in FA2
d. Any additional controls or procedures that should be implemented to mitigate the risks just identified
5. You are an external IT auditor asked to perform a review of the following: The Financial Transactions Application (FTA) is causing a problem with the General Ledger Application (GLA) due to the timing of the transfer of transactions. Data was transferred late by FTA causing end-of-the-month reports to be inaccurately stated. Managers met to review prior month’s activity reports and noticed a shortfall of $50,000 in some accounts. Prepare an audit plan to conduct procedures to address this type of situation.