bi assignment 9

 1. How does prescriptive analytics relate to descriptive

and predictive analytics?

2. Explain the differences between static and dynamic

models. How can one evolve into the other?

3. What is the difference between an optimistic approach

and a pessimistic approach to decision making under

assumed uncertainty?

4. Explain why solving problems under uncertainty sometimes

involves assuming that the problem is to be solved

under conditions of risk.

5. Investigate via a Web search how models and their

solutions are used by the U.S. Department of Homeland

Security in the “war against terrorism.” Also investigate

how other governments or government agencies are

using models in their missions.

2 pages
be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) 

paper-5

http://www.ijiss.org/ijiss/index.php/ijiss/article/viewFile/20/pdf_5

 

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

paper 12

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Project Management

 Read an article or watch a video about a recipient of PMI’s Project of the Year award.

Search online for information from PMI’s website.

  • Write a two page paper summarizing a winning project, focusing on how the project manager and team used good project management practices.

 

  • A minimum of 500 words excluding the title page and references is required.
  • Use APA format – Refer to APA Style 

 

  • Cite your source, must have been written within the last five years.

Exp19_Excel_Ch05_ML1_RealEstate

  

Project Description:

You are a real estate analyst who works for Mountain View Realty in the North Utah County area. You have consolidated a list of houses sold during the past few months and want to analyze the data. For a simple analysis, you will outline the data and use the Subtotal feature. You will then create two PivotTables and a PivotChart to perform more in-depth analysis.

dis 8

  

1.
Using the Internet as a resource, research multiple file systems for hard disks supported in Windows, such as MS DOS’s FAT file system, the 32-bit FAT file system, and the NTFS file management system. Submit your findings in a report.

2. Compile a list of various data-compression techniques that are commonly employed in today’s computer systems. Which of these techniques is the most efficient? That is, which of these techniques has the maximum gain in storage space with the least effect on processing time?

Write a paper of 2 pages each and answer all the sub-question 

week 3 MF

Part 1: Stockholders and Management Interests

Stockholders and managers want the same thing, don’t they? Theoretically, yes, but in reality, it does not always work that way. Too often, managers’ personal goals compete with shareholder wealth maximization. Sometimes, managers pay themselves excessive salaries or bonuses that are at odds with the idea of shareholder wealth maximization. How many times have you seen in the news examples of CEO excesses or outlandish spending on events or things that definitely do not help the overall goal of stockholder wealth maximization? 

To prepare for this Discussion, think about a time in your professional experience when a decision was made that seemed to benefit a specific manager or small group of managers and not the overall corporation. If you do not have professional experience directly related to this topic, research a situation in the news where this theme is demonstrated. Consider the outcomes of such an imbalance between manager and stockholder interests and research on how to avoid such a situation.

Describe the situation from either your professional experience or your research.

Explain two or more motivational tools that can aid in aligning stockholder and management interests.

Explain how your selected tools are effective in resolving potential conflicts among managers and stockholders.

Support your discussion with appropriate academically reviewed articles. Use APA format throughout.

Part 2: Application of Concepts/Time Value of Money

Review the video links below. Based on the materials presented in these videos, discuss how you will use the time value of money concepts in managerial decision making. Be specific and give examples based on your experience or research.

http://www.teachmefinance.com/bondvaluation.html

B. 3 replies each 150 words 

paper2

 

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

White or Gray Hat Hacking

 Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas to explain why a company might benefit from hiring someone to hack into their systems in3-4 paragraphs in APA format

UML diagram

System Design Specifications (including System Architectural [Layered, “Physical”] Design Scheme selected; Package Diagram [populated with interrelated classes]; Database Tables; EntityRelational diagrams; Window Navigation Diagrams; Drafts of User Interfaces; and Examples of System-Response Report Forms);