13 – Imoprtance of strategic IT planning

 Discussion :IT Project Management

In your initial post, answer the following questions about IT Project Management. 

What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents.

In your peer responses, be sure discuss your thoughts on project management, your views on project’s attributes, and your thoughts on successful project management. You can take opposing/differing views than your peers but be sure to provide applicable resources as needed. Properly provide examples in your peer responses as well and any additional challenges you see with IT projects.

Note: Answer should be a minimum of 300 words and Please don’t copy and paste the answer from google or any other resources. Should use atleast 2 scholary artcles and APA format

Discuss the key components of human resource management

 

  1. Discuss the key components of human resource management. Pick at least four concepts from chapter nine and describe how these concepts interrelate to individual performance on a team.
  2. Review table 9.2 and select one of the dimensions listed, note why it was chosen and how you relate to this behavior. If you have a personal experience, please share.
  3. How do leaders select the best talent? What are some tools they can use to select the best-talent?

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive. Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread. Please ensure to use information from your readings and other sources from the UC Library. Use APA references and in-text citations.

BI_Discussion_1

Discussion (Chapter 1): Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.
Response should be 250-300 words and with references

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

RDBMS CONCEPTS

 

The use of keys are instrumental in database management. Primary keys  allow for distinct records and foreign keys tie records together to  create unique relationships between two or more entities and/or tables.  In Blockchain, we know that a hash is the equivalent to a key – and  makes the chain secure and indisputable (or so we think). Why is it then  that with an RDBMS, a primary key and foreign key can still create  redundancy, thereby causing data anomalies? Can the same be said about  blockchain?

Instructions

  • This is a required assignment, worth 15 points. The assignment  must be submitted by the due date. Late assignment are not allowed. 
  • You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
  • Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
  • Do not claim credit for the words, ideas, and concepts of  others. Use in-text citation and list the reference of your supporting  source following APA’s style and formatting. Points are deducted per the  rubric for this behavior.
  • Do not copy and paste information or concepts from the Internet  and claim that is your work. It will be considered Plagiarism and you  will receive zero for your work. A second offense results in a zero for  the course. A third is termination from the university.

OPERATING SYSTEM – 2

 

  • Briefly describe how the BIOS boots or starts the computer and the operating system.
  • Describe utilities that are on your Windows OS under System Information, Task Manager, and  Resource Monitor.
  • Provide a screenshot of the Performance and Overview tabs of your computer. (If you feel  that a screenshot shows too much personal information, you can choose another tab or decline this part of the assignment.)

Emerging threats_7.1

Research Paper:

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

Your paper should meet the following requirements:

  • Be approximately six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

BSWP Week 5

  

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

1. Prohibit guessable passwords

· such as common names, real words, numbers only

· require special characters and a mix of caps, lower case and numbers in passwords

2. Reauthenticate before changing passwords

· user must enter old pw before creating new one

3. Make authenticators unforgeable 

· do not allow email or user ID as password

Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations. Do you agree or disagree with these recommendations. Would you change, add or delete any of these? Add additional criteria as you see necessary.

Research paper – Enterprise Risk Management

The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.