Discussion (course – Bussiness Continuation Plan & Disaster Recovery Plan )

 

Compose and submit well-written paragraphs that contain a minimum of 200 words, which address the following: 

Select an organization of your choice and identify five steps taken to build the interim plans for initial security protection; describe each step as well.  

The post should include adequate citations and references that adhere strictly to the APA format.

week 6

s

Part 1: Beta

Visit the following web site or other websites:

Yahoo Finance : https://finance.yahoo.com/

1.  Search for the beta of “Carnival Corporation & plc”

2.  In addition, find the beta of 3 different companies within the same industry as Carnival Corporation & plc 3.  Explain to your classmates what beta means and how it can be used for managerial and/or investment decision

4.  Why do you think the beta of Carnival Corporation & plc and those of the 3 companies you found are different from each other? Provide as much information as you can and be specific.

Part 2: Capital Budgeting

Before you respond to Part 2 review the following information on Capital Budgeting Techniques

Capital Budgeting Decision Methods (LINK) —– https://www.youtube.com/watch?v=hfZ6lznPf2U&ab_channel=MichaelNugent

To avoid damaging its market value, each company must use the correct discount rate to evaluate its projects. Review and discuss the following:

• Compare and contrast the internal rate of return approach to the net present value approach. Which is better? Support your answer with well-reasoned arguments and examples.

• Is the ultimate goal of most companies–maximizing the wealth of the owners for whom the firm is being operated–ethical? Why or why not?

• Why might ethical companies benefit from a lower cost of capital than less ethical companies?

CAPITAL BUDGETING (PRINCIPLES & TECHNIQUES) —- https://www.scribd.com/doc/37253036/Capital-Budgeting-Principles-Techniques

Discrete structures

 

Chapter 1

1.1 (1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)

1.2 (1, 2, 3, 4, 5, 8, 9, 10, 11, 12)

1.3 (1, 2, 3, 13, 14)

Chapter 2

2.1 (1, 2, 3, 5, 6, 7, 8, 12, 13, 14, 15, 16, 17, 25, 26)

2.2 (1, 2, 3, 4, 5, 6, 9, 10)

2.3 (1, 2, 3, 4, 5, 6, 7, 8, 12)

 

Chapter 4

4.1 (1,2,3,4,5,6,7,8,9,10,15,16,18,24)

4.2 (1,2,4,12)

4.3 (1,2,3,4,5,6,9,10,11,15)

4.4 (1,2,3,4,5,6,12,13)

4.5 (1,2,3,4,7,8,11)

Chapter 5

5.1 (1,2,3,4,5,6,7,8,10,11,12,18,29,33,34,37,40,43,59,62,71,72)

5.2 (1,2,6,20,21,22,23,26,27)

5.3 (3,4,5)

5.4 (1,2)

5.5 (1,2,3,4)

5.6 (1,2,3,4,22)

 

Chapter 6

6.1 (1ab, 14, 17, 34)

6.2 (1)

6.3 (1)

Chapter 7

7.1 (1, 17, 18)

7.2 (9, 15)

Chapter 8

8.1 (7, 11, 13, 14)

8.2 (1, 2)

8.3 (2, 5)

8.4 (1)

Policy, Legal, Ethics

  

1) You are the web master of a college website. You share a server with other school departments such as accounting and HR.Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security. your own work and use your own words.  Write min of 300 words.

2) Read this Time article and view the video explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  Write in essay format not in bulleted, numbered or other list format. Discuss in 500 words your opinion, Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraph.

3) Answer below questions, each of these questions in a paragraph with at least five to six sentences.Include the question and number your responses accordingly. Min 1 citation for EVERY question and it needs to be referenced. References & citations should be less than 6 years old. They also need to be an academic source something from the library or scholar Google not just any random website. It must be a peer reviewed academic source or an industry recognized type reference. Make sure your citations and your references use proper APA formatting if you are unsure consult the OWL website. 

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Contingency Planning

 

Contingency Planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Types of Clouds – Cloud computing

 

In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

final paper dsdba

 

The Final Project has two parts: Limitations of Blockchain and Emerging Concepts.

Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems.  Several challenges have already been associated with the use of this technology.  Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.  

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.

Conclude your paper with a detailed conclusion section which discusses both limitations and emerging concepts. 

The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

COPPA, CIPA or FERPA cover this situation with photography

 

I’d like to take a little different tack here.  There are several laws designed to protect the rights of children and students, COPPA, CIPA and FERPA.  With those laws in place to protect children, is it legal to take pictures of children in a public place without the parent’s consent?  The situation has come up several times where individuals were taking pictures of children at playgrounds.  The parents objected but did the courts uphold the parents or the photographers?  I understand that different local jurisdictions will have different laws but let’s keep our discussion to general laws in the US.  

Let me ask this, would COPPA, CIPA or FERPA cover this situation with photography in a public or private location?  Why or why not?

4s week 13 assignment IA

In 350 Words

What are some of the industry-standard certifications that exist.  Which ones are the most sought after in the IT security field and why? What are the requirements for the certifications, test, number of questions, duration, domain, years of experience required?

Include references.

No copy-paste, use your own words.