BI_Discussion_1

Discussion (Chapter 1): Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.
Response should be 250-300 words and with references

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

RDBMS CONCEPTS

 

The use of keys are instrumental in database management. Primary keys  allow for distinct records and foreign keys tie records together to  create unique relationships between two or more entities and/or tables.  In Blockchain, we know that a hash is the equivalent to a key – and  makes the chain secure and indisputable (or so we think). Why is it then  that with an RDBMS, a primary key and foreign key can still create  redundancy, thereby causing data anomalies? Can the same be said about  blockchain?

Instructions

  • This is a required assignment, worth 15 points. The assignment  must be submitted by the due date. Late assignment are not allowed. 
  • You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
  • Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
  • Do not claim credit for the words, ideas, and concepts of  others. Use in-text citation and list the reference of your supporting  source following APA’s style and formatting. Points are deducted per the  rubric for this behavior.
  • Do not copy and paste information or concepts from the Internet  and claim that is your work. It will be considered Plagiarism and you  will receive zero for your work. A second offense results in a zero for  the course. A third is termination from the university.

OPERATING SYSTEM – 2

 

  • Briefly describe how the BIOS boots or starts the computer and the operating system.
  • Describe utilities that are on your Windows OS under System Information, Task Manager, and  Resource Monitor.
  • Provide a screenshot of the Performance and Overview tabs of your computer. (If you feel  that a screenshot shows too much personal information, you can choose another tab or decline this part of the assignment.)

Emerging threats_7.1

Research Paper:

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

Your paper should meet the following requirements:

  • Be approximately six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

BSWP Week 5

  

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

1. Prohibit guessable passwords

· such as common names, real words, numbers only

· require special characters and a mix of caps, lower case and numbers in passwords

2. Reauthenticate before changing passwords

· user must enter old pw before creating new one

3. Make authenticators unforgeable 

· do not allow email or user ID as password

Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations. Do you agree or disagree with these recommendations. Would you change, add or delete any of these? Add additional criteria as you see necessary.

Research paper – Enterprise Risk Management

The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion

 compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organizations security posture