4/1 Devotional

Read: We are given a great responsibility when asked to manage. In Christianity, even God says we must take responsibility seriously. 1 Corinthians 4:2 (link) tells us, “A person who is put in charge as a manager must be faithful” (New Living Translation). Consider your definition of “faithful” from the perspective of your worldview. Why should we be “faithful” in carrying out our duties in managing? Consider the responsibility to others as you implement technology.

https://www.biblegateway.com/passage/?search=1+Corinthians+4&version=NLT

Question: 

  1. Be sure to address the following prompts in your paper:
    1. Discuss why there is a higher expectation of managers in general but even more so in the technology field.
    2. What adjustments do you need to make in your current management or leadership role to enhance your faithfulness to your employer, coworkers, or direct reports?
  2. Your paper should be at least 250 words in length.
  3. Submit your assignment by the end of the workshop.

my sql

1.Write a SELECT statement that returns InvoiceId and Total from the Invoice table.  Use the CONCAT function to insert a ‘$’ in the front of  the total value

— 2.Write a SELECT statement that returns CustomerId and average Total from the Invoice table grouped by customerId. Use the CONCAT function to insert a ‘$’ in the front of  the average total and the FORMAT function to to display it with commas and 2 decimal places. 

— 3.  Use the CHAR and CONCAT functions (for the first and last names), to format the the address for each customer in the customer table – the formatted output should look like this

— Gary Hernandez

— 3829 Broadway Ave

— New York, NY 10012 

— note ***** the output will not look like this in the workbench the CHAR functions will place columns in each row of the results *****

— 4. Display the first initial, last name, and email address of each customer in the customer table.

— 5. Return these columns from the customer table, customerid, email and Phone. Use the substr and lpad functions to render the phone number like this: ************9999

— 6. use the concat_ws function to render to display the customer lastname and firstname in this manner: Lastname, Firstname. Also display the customer’s email address but only list the customers whose email addresses have more than 20 characters 

— 7.Display the customerId and the phone for all customers who live in the USA, format the phone numbers so that they look like this 123-456-7899

— 8. For every track in the track table, return the track name and the album title. The album title should be in all uppercase letters. 

— 9. For each track, display the unitprice, unitprice rounded to 1 decimal place, unitprice truncated to 1 decimal place, smallest integer >= unitprice and largest integer <= unitprice. 

— 10. For each track, display the trackId and a random number between 1 and 10 using the trackId as a seed. 

Executive Program Practical Connection Assignment

Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have observed these theories and knowledge being applied to an employment opportunity in your field of study.  

I am not working I am a full-time student. please write the assignment in according to student environment.

requirements of project management

  

1. Clearly define the main problem and list all sub problems

2. Make a direct connection between major sub problems and the main problem. Use a Fish Bone diagram.

3. Identify all stakeholders by title and association (i.e. department, outpatient etc.) and connect them to the main problem or a sub problem. Use the stakeholder template and the Problem template.

4. Which Elicitation tools would you use to gather additional information and gain a better understanding of the problem (List two 2). Give specific examples. (for instance if you are using ethnography which stakeholders  will you observe (at least two), and what you are looking for. If you are using an Interview provide the stakeholders (at least two) you will interview and sample questions)

5. Include a Glossary of all specialty terms

6. You do not need to solve the problem or propose solutions 

week 9

Read the Innovation at International Foods Case Study on pages 234-238 in the textbook. Answer the Discussion Questions at the end of the Case Study. Your responses must be complete, detailed and in APA format. See the sample assignment.  Please view  APA Template File in the “Getting Stated” Folder. 

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

Chapter 6, 7, & 8 Journal articles

Building an Information Security Risk Management

Review the workflow steps for the security risk review in Chapter 12 in Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. What is the overall objective of the questionnaire that is distributed to primary contacts? How important is ethics when answering the various questions in the questionnaire? Provide an example of an unethical response and its impact to a company’s security posture.

HSIN Week 5 assignment

 

Using a word document with a cover sheet –

Complete:

1- Chapter 11 Review Questions 1-10 located at the end of your Database Systems Chapter 11 book. Please use complete sentences and proper grammar. 

1- Chapter 13 Review Questions 1-15 located at the end of your Database Systems Chapter 13 book. Please use complete sentences and proper grammar.

Cyber White-collar Crime, Neturlization, Theories, Cyber Stalking, Criminal Subculture

 

In a word document answer the following questions.  The total response should be 1-3 pages. 

  1. Discuss some of the internet fraud schemes
  2. Discuss the difference between “insider corporate spies” and “outsider corporate spies.” How does each group engage in corporate espionage? 
  3. Identify and describe at least three methods that identity thieves use to steal personal information. 
  4. Explain how the historical description of an embezzler no longer applies. How are modern embezzlers described?