Week 4 Discussion

    

For this discussion, you will need to address the question below and be sure to participate fully by responding to your classmates as well. Citations should be used to support your analysis and references should be included in APA format. Before you begin, be sure to review the Discussion Question Guidelines!

Productivity software (such as Excel or Google Sheets) is used by almost every business. Think in terms of your own field of study and future profession, in what ways could you use productivity software to increase efficiency in your work?

The Question:

•Productivity software (such as Excel or Google Sheets) is used by almost every business.  •Think in terms of your own field of study and future profession, in what ways could you use productivity software to increase efficiency in your work? 

Ask yourself:

•Please note this week Excel is studied. •What is productivity software (Excel)? •How is productivity software (Excel) increasing efficiency in your own field of study and future profession?  

Case Study

 

Using the case study below, you will analyze an existing business problem, create a secure network topology, and write a security plan. Your written paper should be completed in word and consist of a Cover page, four to five-page written pages and a bibliography for cited references.

Case Study:

You are a consultant working with a dental office that has just merged with another dental practice. The original office housed three dentists, two dental assistants, and one receptionist in one location. With the merger, there are now five offices in different parts of the city, 15 dentists, 12 dental assistants, and five receptionists. Four of the dentists work in the offices but also are mobile in that they provide dental checkups to elderly patients in their homes or at the senior citizen centers, and to school children in the three inner-city elementary schools. The mobile dentists need to be able to send and receive patient records while they are out of the office. All the dentists and dental assistants must have real-time access to all patient records and daily schedules. The lead dentist has reminded you that they are required to meet HIPAA requirements for protecting patient information. You, as a telecommunications specialist, have been asked to design the telecommunications network to support this new multi-location practice. Others on the team will develop the applications and databases. Your task is to identify the requirements and design a network solution that will meet those requirements.

  1. Analyze the given case and provide a clear set of solutions for the network solution.
  2. Identify the information that is to be protected and the related security requirements.
  3. Identify the network components, security hardware, devices and equipment that would be involved in meeting the needs of the stationary offices and the mobile dentists.

Unit 2 Assignment 2 -Deliverable 1: Analyze the Business Problem

  1. Analyze the given case and provide a clear set of solutions for the network solution.
  2. Identify the information that is to be protected and the related security requirements.
  3. Identify the network components, security hardware, devices and equipment that would be involved in meeting the needs of the stationary offices and the mobile dentists.

Scoring Guide

Global Economy

Today’s Global Economy is very top-down driven with the government making all the decisions and regulations as it relates to doing business globally.  What are some advantages and disadvantages to this approach?  Is there another approach that might work better?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

Ask an interesting, thoughtful question pertaining to the topic

Answer a question (in detail) posted by another student or the instructor

Provide extensive additional information on the topic

Explain, define, or analyze the topic in detail

Share an applicable personal experience

Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Paper Operational Excellence

Hitachi 

Prepare a Paper that describes the assigned company. – Hitachi

  

a. Technological advances of the organization that makes the product or service viable. (2 pages)

i. What technology advances are key to this company?

ii. What is the physical layout of the company’s facilities? Does this impact their use of technology?

————————————————————————————————————————————–

b. Why are their solutions good for consumers and the business? (1 page)

i. Describe any policies that they have for their customers, suppliers, shareholders, employees, and society at large. Are there any conflicting policies?

  

c. Business model to market the product or service (1 page)

i. Is the model different in various global markets?

Total 4 Pages and prepare 4 Slides 

a – 2 slides ppt 

b and c 2 slides ppt 

Data mining

   Part1) What are the privacy issues with data mining? Do you think they are substantiated? 

   225 Words + 2 References

   Part2) 

   a) Define data mining. Why are there many names and definitions for data mining?

   b) What are the main reasons for the recent popularity of data mining?

   c) Discuss what an organization should consider before making a decision to purchase data mining software.

   d) Distinguish data mining from other analytical tools and techniques.

   e) Discuss the main data mining methods. What are the fundamental differences among them?

   Min 180 words answer for each question in part 2.

Checklist:

APA Formatting

Part1 and Part2 needs to attached as two separate docs

Atleast 2 references for each part

Plagiarism report

Formula for Celsius to Fahrenheit

programming project 1

 

CELSIUS TO FAHRENHEIT

Write a program that converts Celsius temperatures to Fahrenheit temperatures. The formula is

Formula for Celsius to Fahrenheit where F is the Fahrenheit temperature and C is the Celsius temperature. Write a program that prompts the user to input a Celsius temperature and then displays the corresponding Fahrenheit temperature.

  • Must Submit Flowchart (from RAPTOR) and C++ program files.
  • Name the Visual Studio Project folder containing your entire project (replacing LastName and FirstInitial with YOUR name): LastName_FirstInitial_Program1 (example: Smith_J_Program_1).
  • Create a Windows Compressed Folder (do NOT use any other ZIP programs, just use a Windows Compressed folder) that contains your entire project along with your 1 RAPTOR file (I only need the .rap file of your RAPTOR program).
  • Name the Windows compressed folder (replacing FirstInitial with YOUR name): LastName_FirstInitial_Program_1.zip (example: Smith_J_Program_1.zip).

History of Cryptography

In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page

49

9)Read the following articles:

https://thedailychronicle.in/news/2356877/digital-forensics-market-share-forecast-to-witness-considerable-growth-from-2020-to-2025-by-top-leading-vendors-accessdata-cellebrite-msab-opentext-guidance-software/

https://www.openpr.com/news/2149363/digital-forensics-market-to-eyewitness-massive-growth

What do you believe the future of digital forensics holds? 5 years from now?  10 years from now?[2pages]

4) Instructions

Identify what are the different types of hash values. Then tell me, what is the recommended hash value and WHY (and see if you can find case law supporting this!)

Value of this assignment

When you lead an investigation then it is important for you to be comfortable with the different types of hash values as well as knowing what hash value your tool (hardware or software) will provide.

Knowing all this is helpful as part of your courtroom experience and/or if you want to cross-examine the forensic specialist.[1 page]

Research project need it by oct 12

Project. Students will write a final paper that answers a research question by utilizing risk models. The paper should consist of an introduction section that clearly states motivation and research question or hypothesis, data and methodology section that includes discussion on strengths and weaknesses of your method/model, results section that presents the findings of the model, and conclusions section that answers the research question and highlights valuable takeaways. The final paper should be no longer than 10 pages double spaced using Arial font size 11 with 1” margins and submitted by the due date as indicated. The written paper is worth 200 points, while the presentation is worth 100 points.

Examples of successful research papers: “Investment Risk and Firm’s Market Capitalization”, “Are Islamic Banking Compliant ETFs safer than the Traditional ETFs?”, “Comparing the Risk of Companies with Male CEOs to the Risk of Companies with Female CEOs”, “Is energy industry safer than the automotive industry?”, etc.