agile Wk3

 In your opinion, what might be some team responsibilities that are not covered in any of these roles? Could you see yourself becoming a scrum master? Why or why not? 

250-300 words

Excel Worksheet

  

A window blind company owner never knew how exactly how much material he needed for any single project. He would estimate the amount and put that figure into Excel. When he estimated too much, it cost him money for materials he didn’t use. When he estimated too little, it delayed the project’s completion because he had to get more material from his supplier. Plus, he used Excel as if it was just a paper chart.

Solution: Worksheet Creation

· Use Excel to create a worksheet for each order as part of a workbook for orders to his suppliers. 

· After all the individual orders are entered in the workbook as worksheets, the new Excel workbook calculates how much material was needed for was needed for the entire group of orders. 

· The worksheet should demonstrate savings for the company in time and money because the owner could order the right amount of material from his suppliers and allocate it correctly to the customers’ jobs.

DAta mining week 7 assignment

Give an example of a case where you would assign higher cost to False Negative (FN) then False Positive (FP)

(it has to be an example other than the ones I mention in the presentation or video)

Submit your answer as an paragraph here. 

Dr. Oner

Research paper – Organisation leader and decision making

 This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:

  1. How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? 
  2. How does servant leadership assist with transferring knowledge in an organization?
  3. When thinking about data analytics, how does transformational leadership assist with building good data structures?

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing. 

 Required Reading

Optional Resources:Chapter 5 Journal articles

Discussion 6 – Info Tech Import Plan Response to peers

Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Discussion

 As you meeting with a client, What are the top 3 points/topics that qualify as an assessor to perform a professional information security assessment? explain with examples  

Threat Model

 Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (” Do not copy and paste images from the Internet, I need 100% original work, no plagiarism is encouraged or tolerated” ). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately 2 to 3 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

paper

Write a 4-5 page paper (deliverable length does not include the title and reference pages)

  • What are key issues with interacting and using a computer for people who are visually impaired?
  • What input and output devices are specifically created to help the visually impaired use a computer?
  • What would be the privacy concerns of visually impaired learners and how is their privacy managed?