Assignment: Submit the assignment, The CEO's Challenge

 

  1. The CEO’s Challenge
    Use the Week 3 Assignment Template to complete this assignment.
    Choose a company to base this paper on. You may use a current or former employer, but do not disclose anything confidential. Or, you can pick another organization if you are familiar with their internal (not customer-facing) information systems. You can disguise the organization and populate it with famous names. Made-up companies are problematic because of the amount of detail and realism they require.
    You’ve just left an all-hands meeting at this company. The CEO was very upset at the rise of shadow IT projects, a major indicator that the company’s internal information system has failed to meet its needs. Because the current information system is inadequate, inefficient, and outdated, the CEO is inviting everyone in the organization to propose a new operational, decision support, or enterprise information system to replace it. The executives have allocated $5 million to fund the most promising idea.
    This is your chance to make a difference in the company (not to mention your own career). Write your proposal as a memo that the entire C-suite will review. Include at least these points, in your own words, to be persuasive:

    1. Identify the main functions of your proposed information system and why they are important to the business.
    2. Describe what types of data your information system will hold and how data quality will be ensured.
    3. Explain how the old information system handles the functions you mentioned, the problems that occur, and why your information system will handle things better.
    4. Offer evidence of feasibility: Show that similar information systems have been built successfully and that they save more money than they cost.
    5. The executives are busy, so keep your memo to 1–4 pages and avoid any extraneous content.
      This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.
      The specific course learning outcome associated with this assignment is:
    • Develop an information systems solution to address an organizational problem.
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Work Breakdown Structure

 

A project’s Work Breakdown Structure (WBS) and Gantt chart provide structure for a project. In this week’s assignment you develop both the WBS and Gantt chart for a fictitious organization. The Manage Your Health, Inc (MYH) scenario will be used in the weekly assignments for the rest of the course.

Review the Manage Your Health Scenario and follow the directions below for completing a WBS and Gantt chart.

Develop a work breakdown structure (WBS) for the project. Break down the work to Level 3 or Level 4, as appropriate. Use the Work Breakdown Structure Template and Work Breakdown Structure example in this text as guides. Upload the WBS in list form. The WBS should be based on the information that would be in a project scope of this scenario. You can review your project plan from Wk 1. 

Create a Gantt chart using the WBS you developed with Microsoft Excel or another software of your choice and approved by your instructor. Do not enter any durations or dependencies. 

Submit 2 deliverables: the WBS and Gantt Chart. 

need case study help minimum 300 words

Read the case study “Teloxy Engineering (A)” on page 948 attached and answer the corresponding questions on the same page.

Questions

1. Using the expected value, is it economically better to make or buy the component?

2. Strategically thinking, why might management opt for other than the most economical choice?

SQL Servers installation and access (Cyber Security)

 Using your textbook, the Internet, and any other suitable references, answer the following questions in your own words. Save your answers in a single file (minimum length of a full page of content).  Remember to include any sources that you use.

  1. Why would you perform a silent installation?
  2. Under what circumstances would a system administrator lose access to an instance of SQL Server? Give an example.
  3. Oracle offers a free download of all editions of the Oracle Database.  How does the company derive benefits from this approach?

Wireless Network……

 

First Section 

In a 350- to 500-word essay, address the 4 questions. 

Case study: A publicly traded home builder has hired you to install a new wireless network. The company currently has a wireless network that is a few years old. The problem with the current wireless network is that it was built using proprietary standards instead of 802.11. This current wireless network does not have an upgrade path to 802.11.

On the new wireless network, the corporate office wants a system that allows construction workers to enter progress reports into the system in order to stay up-to-date with all the different community building sites. Each community has a model home that will need Wi-Fi to connect back to the corporate office in order to enter these reports. The construction workers will be using iPads to enter the information. The company currently has 32 sites across the country that will need Wi-Fi. 

In each of these sites, there will be two sales employees that will need to have Wireless IP Phones so that customers can get in touch with them easily. The sales employees will also have laptops, as well as two sales kiosks that allow customers to browse the different options to choose from for their new home build. The kiosks will connect to the Internet, and when the customer chooses their options, the information will be entered into a database. Once the customer chooses the options they want, the sales person will pull up the report on their laptops to print for the construction workers. 

Directions: Looking at the current wireless network and what the home builder would like to accomplish with the new network, explain to the company why the current wireless network will have to be replaced before you can begin the project. The Chief Information Officer (CIO) has asked you to come up with a plan to implement this new wireless network. Include in your report:

1. A brief description of the problem with the current wireless network

2. The benefits of global/industry standards vs. proprietary standards

3. What types of problems exist with mixed standards 

4. A plan to correct the problems with the current wireless network

__________________________________________________________________________________

 Second section…. 

1. PROJECT SCOPE –

Project scope

2. FEASIBILITY STUDY –

Objectives of the Network:

1. Secure Service – What is the main objective of this network? 

2. Integration and Updates –What needs to be done to get the current network up-to-date?

3. Versatile Information Process –What does the network need to be able to do? For example, applications, devices, computers, laptops, etc. 

4. Collaboration – How will the network be used to collaborate with other offices? Other users in a different location?

5. Scalability – How will the network be able to adapt to change?

Intended Users –What type of mobility requirements, client device requirements, and signal coverage requirements are needed?

Design Assumptions – State the assumptions for unknown factors that could affect the project. 

Equipment Needs and Proposed Budget

Security controls

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. Describe operating system hardening
    1. Define it
    2. Why is it done?
    3. What steps are usually done in a Windows environment?
  2. Describe system restoration methods and procedures
    1. Define it
    2. Why is it needed?
    3. What tools and approaches are recommended?
  3. Describe network security controls
    1. Define it
    2. Why is it needed?
    3. What steps, tools, and policies are used to secure networks?
  4. Describe incident response teams and the role of evidence
    1. What are incident response teams and why do they exist?
    2. How does evidence collection relate to incident response teams?
    3. Discuss evidence
      1. Describe why evidence is collected,
      2. How it should be collected
      3. What can happen if it is collected or handled in an inappropriate way

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

Cloud Computing Discussion 9

  

Describe in 500 words the shared security responsibility model that a dba must be aware of  when moving to the cloud.

Use at least three sources. Do not use Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

project 2

  Now that you understand and have created a virtual machine,  your Caduceus CTO, Eliza, has asked you to extend that application and  provision infrastructure in the cloud. Specifically, you will provision a  Windows operating system in the cloud. The provisioned infrastructure  could be accessed by any end-user device client. This includes a desktop  running Microsoft Windows, a Mac device running Apple MacOS, iPad,  Android Tablet, and even a Google Chromebook. You will use any of the  aforementioned end-user devices to access the provision infrastructure  once this is set up.

Step 1: Log in to the AWS Dashboard

CMIT 495 requires you to complete hands-on assignments in the Amazon Web Services (AWS) virtual environment.To get started, log in to the AWS free account you created in Week 1.

Step 2: Download the Week 2 Assignment Template

Next, watch the video and download the template from the Cloud Computing Assignment Resources page. You will answer the questions and embed the appropriate screenshots of your cloud infrastructure provision as you work.When providing a detailed overview of the steps required to  install the Windows operating system on the virtual machine, make sure  to include screenshots of each step in the process. Specific details and  instructions are included within the Week 2 Assignment Template.

Step 3: Install and Configure a Microsoft Windows Operating System

  • Provision cloud infrastructure via Amazon and a OS platform (PaaS) by installing and configuring a Microsoft Windows operating system that can be accessed on demand by any end-user device.   
    • Research and use AWS documentation and tutorials for instructions and guidance to complete the assignment.  
    • Consult the AWS Connection Documentation in order to connect to the Microsoft Windows operating system.  
    •     How Will My Work Be Evaluated? The following evaluation criteria aligned to the competencies will be used to grade your assignment:  
    • 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.  
    • 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.  
    • 2.3.1: State conclusions or solutions clearly and precisely.  
    • 3.1.1: Identify quantitative information that is relevant to a problem or situation.  
    • 3.1.2: Analyze quantitative data using an appropriate method.  
    • 10.1.1: Identify the problem to be solved.  
    • 11.1.3: Install software.  
    • 11.3.1: Add and update systems as required.  
    • 11.2.1: Configure technology according to stakeholder specifications and requirements.  

Step 4: Upload Your Work to the Assignment Folder

  • When complete, export your file as a PDF and upload to the LEO Assignments Folder (e.g., Project 2 – Cloud Computing).  

Step 5: Stop and Terminate Your Amazon Instance

After you complete the Week 2 Assignment, stop and terminate your  Amazon deployment/instances so you do not receive any unexpected charges  on your account. 

country Presentation to the Board of Directors

 

Assignment Content

  1. Based on readings in Rising Powers, Global Governance, and Global Ethics and related discussions, choose 1 of the countries or regions from the book into which your company might wish to expand. 

    Develop a 1-to 2-page table using either Microsoft Word, PowerPoint, or Excel that accurately compares your U.S.-based company’s ethics, based on classical ethical theory as well as its ethical stance on privacy, protection of intellectual property, and protection of PII to those within your country of choice. The column headings are “U.S.-based Company” and “Country of Choice.” The row headings are “Classical Ethical Theory,” “Privacy,” “Protection of Intellectual Property,” and “Protection of PII.”

    Create a PowerPoint presentation containing 8 to 10 slides for your corporate Board of Directors logically depicting at least 3 ethical challenges you might anticipate along with a policy statement for each. Include research concerning the country’s stance on issues, such as privacy, protection of intellectual property, corruption index, major religions, or indigenous tribal groups in the speaker notes.

    Include supportive graphics and appropriate backgrounds and styles. All references need to adhere to APA guidelines, and images should not be copied unless you obtain author permission or use copyright-free images.

    Note: You may use other applications like Adobe® Spark®,, Microsoft® Sway®, or Mix instead of PowerPoint.

    Submit your assignment.