Discussion question, 350 words and 2 references.
Write an analytical summary of your learning outcomes from chapters 9 and 10. In addition to your analytical summary, address the following:
1. As a manager, discuss how you would use or have used the concepts presented in chapters 9 and 10.
2. Why might managers find a flexible-budget analysis more informative than static-budget analysis?
3. How might a manager gain insight into the causes of flexible-budget variances for direct materials, labor, and overhead?
Final Term Paper on: Privacy on the internet: practice of “Pipe dream”
This essay is an final essay from the course CSCI GLB Ethics, Law and Cyber security.
Write a full 6-pages essay on Privacy on the internet: practice of “Pipe dream”
fake news
Read this Time article and view the video explaining how Russian trolls spread fake news. Discuss in 500 words whether the government should regulate Facebook more closely.
Use at least three sources. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.
Write in essay format not in bulleted, numbered or other list format.
Answer these questions without plagarism
1. ListfivetypesofsysteminformationthatcanbeobtainedfromtheWindows Task Manager. How can you use this information to confirm the presence of malware on a system? (Hint: Look at the bandwidth and CPU utilization.)
2. WindowsTaskManagerandWindowsComputerManagerbothprovide information about system services. Compare and contrast the types of information (about system services) that can be obtained from these tools.
3. ExplainhowyoucoulduseoneormoreoftheWindowslog(Application, Security, Setup, System, and Forwarded Events logs) files to investigate a potential malware infection on a system. What types of information are available to you in your chosen log file?
4. Shouldyoufilterlogfilesduringaninvestigationintoasecurityincident?Why or why not?
5. Shouldremotedesktopservicesbeenabledonemployeeworkstationsforuse by IT Help Desk personnel? Why or why not?
6. HowdoesMicrosoftBaselineSecurityAnalyzer(MBSA)differfromWindows Update? Why are Shares a source of system vulnerabilities?
Digital Forensics Tools and Tech – New England
Define several forms of metadata that can be useful to an investigation. How are valuable to an investigator?
Post – 300 Words
Use your own words.
Discussion
What is the firewall evaluation criteria for your organization? Does your organization have one and in your opinion does it addresses the overall network security or does it have gaps? Either way, talk about how it can be improved.
Discuss how the advent of AI/MI and how it may affect network security. What do you think network security will look like 5 years, 10 years, or 15 years from now. How will the cloud play into this scenario or will there be something bigger than the cloud that could affect network security?
MF week 5
Cost of Capital
In the links below, you will explore how companies compute their cost of capital by computing a weighted average of the three major components of capital: debt, preferred stock, and common equity. The firm’s cost of capital is a key element in capital budgeting decisions and must be understood in order to justify capital projects.
For this Discussion, imagine the following scenario:
You are the director of operations for your company, and your vice president wants to expand production by adding new and more expensive fabrication machines. You are directed to build a business case for implementing this program of capacity expansion. Assume the company’s weighted average cost of capital is 13%, the after-tax cost of debt is 7%, preferred stock is 10.5%, and common equity is 15%. As you work with your staff on the first cut of the business case, you surmise that this is a fairly risky project due to a recent slowing in product sales. As a matter of fact, when using the 13% weighted average cost of capital, you discover that the project is estimated to return about 10%, which is quite a bit less than the company’s weighted average cost of capital. An enterprising young analyst in your department, Harriet, suggests that the project is financed from retained earnings (50%) and bonds (50%). She reasons that using retained earnings does not cost the firm anything since it is cash you already have in the bank and the after-tax cost of debt is only 7%. That would lower your weighted average cost of capital to 3.5% and make your 10% projected return look great.
Based on the scenario above, post your reactions to the following questions and concerns:
What is your reaction to Harriet’s suggestion of using the cost of debt only? Is it a good idea or a bad idea? Why? Do you think capital projects should have their own unique cost of capital rates for budgeting purposes, as opposed to using the weighted average cost of capital (WACC) or the cost of equity capital as computed by CAPM? What about the relatively high risk inherent in this project? How can you factor into the analysis of the notion of risk so that all competing projects that have relatively lower or higher risks can be evaluated on a level playing field?
B) 3 replies each 150 words
Blockchain Implementation
Every project that has a reasonable chance at success starts with a solid plan. A project plan is far more than just a schedule – it is a master plan that directs all planning and execution efforts to meet a project’s goals. For this class project, need create a project plan to implement a newly developed blockchain application.
Week 6 Assignment
Complete the following assignment in one MS word document:
Chapter 10 –discussion question #1-2 & exercise 1 & 7
Chapter 11- discussion question #1-4 & exercise 4
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).
Chapter 10
Discussion question 1-2
1. Based upon the current state of the art of robotics applications, which industries are most likely to embrace robotics? Why?
2. Watch the following two videos: https://www.youtube.com/watch?v=GHc63Xgc0-8 and https://www.youtube.com/watch?v=ggN8wCWSIx4 for a different view on impact of AI on future jobs. What are your takeaways from these videos? What is the more likely scenario in your view? How can you prepare for the day when humans indeed may not need to apply for many jobs?
Exercise 1 & 7
1. Identify applications other than those discussed in this chapter where Pepper is being used for commercial and personal purposes.
7. Conduct research to identify the most recent developments in self-driving cars.
Chapter 11
Discussion question 1-4
1. Explain why it is useful to describe group work in terms of the time/place framework.
2. Describe the kinds of support that groupware can provide to decision makers.
3. Explain why most groupware is deployed today over the Web.
4. Explain in what ways physical meetings can be inefficient. Explain how technology can make meetings more effective.
Exercise 4
4. Compare Simon’s four-phase decision-making model to the steps in using GDSS.