Assignment and memo

 

1.Assignment

  • identify and apply the different analysis and design methods for business applications;
  • operate effectively within a team environment demonstrating team building and project management skills in information systems analysis and design; and
  • communicate information effectively in presentations with oral, written and electronic formats using media formats widely adopted for information systems development in business and government.

Create an alternative decision matrix for the case system. Using Excel or Word, develop a decision matrix to be used to evaluate three proposed design alternatives (alternatives A, B, and C).

The idea is to create a worksheet that can be applied to any set of alternatives.

Criteria: Decision matrix has columns for criteria weights and points available, and columns that represent three proposals. Within each proposal include columns for points assigned and

the product of points assigned times criteria weight. The bottom row of the matrix contains column totals.

Your essay should be 3 pages in content and fully explore all of the following items described above. Include at least 2 outside citations (not including your text) and use proper APA formatting.

Atleast 2 In-line citations and references required.

2. Weekly Memo – Memo should be related to the discussions , assignment and should be one page(citations,references, APA not required).

One Page outline of a Term Paper on are there any loopholes in the IT ACT 2000?

 Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. The term paper details are listed below. ALL TOPICS MUST BE APPROVED. A FAILURE TO HAVE THE TOPIC APPROVED WILL RESULT IN A ZERO GRADE FOR THE TERM PAPER OUTLINE AND THE TERM PAPER. You can send a message with the topic for approval.

This project provides you with the opportunity to increase and demonstrate your understanding of cyberlaw theory and practice. You will need to choose a law(s) that you are interested in researching. The paper must be 4-6 pages in length detailing the below questions. Before completing the below steps, please make sure that the topic is approved.

1. Thesis: What law are you researching (You are to choose a specific law. Please do not choose a topic)? What position do you want to take in regard to your chosen law? You will need to decide if you agree or disagree with the current way the law is written. You can choose to like certain aspects of the law and not others.

2. Background: What is the existing point you want to challenge or support, and how did the law get to be that way (This is where you would need to find cases, background information, etc.)?

3. Inadequacies: What are the deficiencies in the present way of doing things, or what are the weaknesses in the argument you are attacking?

4. Adequacies: Discuss the positive aspects of the law?

5. Proposed Changes: How will we have a better situation, mode of understanding or clarity with what you are advocating? In short, how can the law be improved (or not diminished)? (This is where you have the chance to change the law with your own ideas of how it should be written).

6). Conclusion: Why should and how can your proposal be adopted?

A detailed implementation plan is NOT expected, but you should provide enough specifics for practical follow-up. In making recommendations, you are expected to draw on theories, concepts, and reading 

Use the information below to help with the outline for the term paper

 Are there any loopholes in the IT ACT 2000?

Yes, there are many weaknesses and loopholes revolving around Information Technology Act, 2000 even after the 2008 amendments. They are as follows:

  1. ITA 2000 does not deal with Proper Intellectual Property Protection for Electronic Information and Data. Contentious yet very important issues concerning online copyrights, trademarks, and patents have been left unnoticed by the law, thereby leaving many loopholes.
  2. It does not pay any heed to Domain Name related issues. It does not deal with the rights and liabilities of domain name holders.
  3. It does not cover various evolving forms and manifestations of cybercrimes such as:
  • Cyber theft;
  • Cyberstalking;
  • Cyber harassment;
  • Cyber defamation;
  • Cyber fraud;
  • Chat room abuses;
  • Misuse of credit card numbers.

4. It does not touch upon antitrust issues.

5. It is not explicit about the regulations of electronic payments.

And the biggest flaw is the improper implementation of the cyber laws as the police stations are not well equipped with the required technology and technical skills associated with them.

bitcoin economics research paper

 Bitcoin Economics.  For this week’s research paper, search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused accepting Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin). 

5 pages , APA format, 3 scholar references

Visualization and Analyzing

 

Instructor”s question and case for class discussion:

“Why do we need to understand data visualisations? There is more and more data around us, and data are increasingly used in decision-making, journalism, and to make sense of the world. One of the main ways that people get access to data is through visualisations, but lots of people feel like they don’t have the skills and knowledge to make sense of visualisations. This can mean that some people feel left out of conversations about data.”http://seeingdata.org/developing-visualisation-literacy/

Choose three of your favorite visualizations. Post a 3 – 5 sentence summary (for each) of why you chose the visualizations. What catches your attention? Are these visuals effective in presenting the provided data? If possible, explain what you would do to improve the visualization(s).

Also Reply to your classmates:

When replying to a classmate, offer your opinion on what he/she posted and the visualizations they chose. Using at least 3 – 5 sentences, explain if you agree or disagree with his/her evaluation of the visualizations.

bi15 discussion

 Research Apple Home Pod. How does it interact with smart home devices?  Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.
 

300 words

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Microsoft Access Discussion Easy

 

Let’s Pause and Reflect on your journey with the MICROSOFT ACCESS relational database management application.

Please identify at least one new feature/function discussed this week in the application and explain why you feel it may be useful to you and/or others.

You’re almost there!!! You should be able to see the ‘light at the end of tunnel’ with your journey through Microsoft Office…Are you planning for future use of these applications?
Please share how you plan to regularly and practically utilize the skills acquired in this class moving forward. How will you keep up your practice in using these applications?

ASSIGNMENT RUBRIC – Wrap Up Extra Credit: Participating in this week’s wrap up thread and satisfying all the criteria of the assignment rubric listed below is worth 0.50 points towards the overall course grade. Click on the Reply link below to make your post.

Points

Identifies and explains a useful feature/function of the application covered in the current week

0.20

Shares substantive response to additional Wrap Up questions

0.20

Satisfies minimum word count requirement = 100 words

0.10

Total Points

0.50

Week 3 Office Talk – Access Discussion

 

Topic Questions
As per our textbook, Access, a relational database application, is the most widely used PC-based database management system (DBMS) software for both personal and business users. Like other database systems, the structure of the database file is of the utmost importance. For this exercise, you must demonstrate your understanding of the Access database system by describing how you would begin to create a database file with one of its tables (No templates). Your example may be a personal or business database. In addition, what are the advantages of managing database information in Access versus using an Excel spreadsheet?

Thread Directions
Students are required to participate in these weekly online classroom discussion threads. Students should post at least 1 post on 3 separate days in the active week’s discussion thread. Please make sure to read all topic questions, thread directions, and assignment rubric criteria to ensure that responses are accurate and complete. Points may be deducted, at the discretion of the instructor, for not adhering to any of the following guidelines. Discussion posts will be graded according to the assignment rubric provided below.

How to Post:

1. First Post – Respond to the discussion topic questions listed above. Click on the Reply link listed below to make your response. Minimum word count=100 words

 

Internet security policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.