PowerPoint_1A_KWT_Overview

PowerPoint_1A_KWT_Overview

     

Open the file Student_PowerPoint_1A_KWT_Overview.pptx   downloaded with this project. Then, in your textbook, turn to Project 1A and   complete all of the steps in Activities 1.01-1.14.
  Note: Activities 1.15 -1.16 are optional and may also be assigned by your   instructor but will not be submitted to MyLab IT to be graded.

 

Complete Activity 1.01   Identifying Parts of the PowerPoint Window. 

 

Complete Activity 1.02 Entering   Presentation Text

 

Complete Activity 1.03 Applying   a Presentation Theme 

 

Complete Activity 1.04 Inserting   a New Slide

 

Complete Activity 1.05   Increasing and Decreasing List Levels

 

Complete Activity 1.06 Adding   Speaker Notes to a Presentation

 

Complete Activity 1.07   Displaying and Editing Slides in the Slide Pane

 

Complete Activity 1.08 Inserting   a Picture from a File

 

Complete Activity 1.09 Applying   a Style to a Picture

 

Complete Activity 1.10 Applying   and Removing Picture Artistic Effects

 

Complete Activity 1.11 Viewing a   Slide Show

 

Complete Activity 1.12 Using   Presenter View

 

Complete Activity 1.13 Inserting   Headers and Footers on Slide Handouts

 

Complete Activity 1.14 Inserting   Slide Numbers on Slides

 

Save and close the file, and   then submit for grading.

Executive Dashboard and Data Driven Input

Assignment 1:

 Research a scholarly paper or professional video on “Executive Dashboards”  and reflect on only one (1) of the following:

  • “Components”: What are the components of an executive dashboard? 
  • “Drill-down”: What is an example of a drill-down dashboard?
  • “Analytics”: What type of analytics is most often shown on an executive dashboard?

NOTE:
You must copy and paste the topic (“Components” or “Drill-down” or “Analytics”) at the start of your paper to provide a context for your answer.
This paper must be between 250-300 words on what caught your eye and reflect on what you read. 
Do not add extraneous text that does not address the question – do not add an introduction or conclusion. 

Assignment 2:

 Research a scholarly paper or professional video on “Data Driven Input” and reflect on only one (1) of the following topics:

  • “Analytics Centric”: How can input be designed to support an Analytics Centric organization?
  • “Competency Centers”: The benefits of Analytics Competency Centers in data-driven organizational change.
  • “Roles”: The role of Systems Analysts, Business Analysts and Super Users in data-driven decisions.

NOTE:
You must copy and paste the topic (“Analytics Centric” or “Competency Centers” or “Roles”) at the start of your paper to provide a context for your answer.
This paper must be between 250-300 words on what caught your eye and reflect on what you read. 
Do not add extraneous text that does not address the question – do not add an introduction or conclusion.
Do not copy and paste text from the referenced resource. 

case-study

  • Describe any laws or regulations that may have been violated. 
  • How would you feel as a consumer if your personal information was stolen in this case?
  • How should Target customers be reassured that this won’t happen again?
  • 2 pages

Purpose:

Identify the main information security and privacy protections of the Financial Services Modernization Act of 1999 (Gramm-Leach-Bliley).

sites about the attack

https://www.infoworld.com/article/2609942/target-contractor-says-it-was-victim-of-cyber-attack.html

https://www.bloomberg.com/news/articles/2014-03-13/target-missed-warnings-in-epic-hack-of-credit-card-data

System Designs

 

A final report which describes and documents your analysis and design efforts of the proposed solution. Your report must include at a minimum

  • A brief description of the problem, functionality of your proposed information system solution, and the business benefits gained by implementing it. 
  • Artifacts such as use case diagrams, activity diagrams, context level data flow diagrams, E-R diagrams, user interfaces etc. used in your information needs/requirements specification and the systems design.
  • List of the hardware and software required to meet the needs of your business problem.
  • A brief discussion on what kind of a project methodology do you envision to use to implement your proposed solution. Include in your discussion the possible project scope and risk issues, you may encounter.

Note: For 1st and 2nd bullet points, you can use your assignment work and add it to the report

Cryptography and block chain

  

Topics to cover : 

cryptography

Encryption/Decryption algorithms

Security

Hashing

Authentication

block chain

Provide  a reflection of at least 800 words (or 2 pages double spaced) of how  the knowledge, skills, or theories of this course have been applied, or  could be applied, in a practical manner to your current work  environment. If you are not currently working, share times when you have  or could observe these theories and knowledge could be applied to an  employment opportunity in your field of study. 

Requirements: ·  Provide a 800 word (or 2 pages double spaced) minimum reflection. · Use  of proper APA formatting and citations. If supporting evidence from  outside resources is used those must be properly cited. · Share a  personal connection that identifies specific knowledge and theories from  this course. · Demonstrate a connection to your current work  environment. If you are not employed, demonstrate a connection to your  desired work environment. · You should not provide an overview of the  assignments assigned in the course. The assignment asks that you reflect  how the knowledge and skills obtained through meeting course objectives  were applied or could be applied in the workplace.

use any outside references and cite them

Object oriented

1.Distinguish the programming approach used in procedural programming 
and object-oriented programming. 
2.Discuss the validity of the following statement: The object-oriented 
programming approach is ideal for simulating real-world problems. 
3.Consider the following scenarios and outline the objects and their 
interactions in terms of messages and arguments:
a.a driver driving a car; 
b.a customer making a cash withdrawal from an automated teller machine 
(ATM); 
c.a customer buying a compact disk player from a vendor; 
d.a traffic policeman directing traffic at a junction; 
e.a lecturer delivering his/her lecture to a class of students; 
f. a tutorial discussion between an instructor and students

ERD model

APA format, in-text citation, references included

2 pages

1. What is your understanding of Entity Integrity Vs Referential Integrity in ERD model. Illustrated with simple examples for ease of understanding of the concepts.

2. Describe various types of keys in ERD model (Primary, Foreign, Superkey etc) with simple examples.

3. Describe 3 entities and illustrate different types of joins using these 3 entities assume you have three entities student, course & enrollment and these tables are related.

Activity 3- Exe Proj

 Case Study 3.1 Keflavik Paper CompanyKeflavik Paper is an organization that has lately been facing serious problems with the results of its projects.  Specifically, the company’s project development record has been spotty: While some projects have been delivered on time, others have been late. Budgets are routinely overrun, and product performance has been inconsistent, with the results of some projects yielding good returns and others losing money.  They have hired a consultant to investigate some of the principal causes that are underlying these problems, and he believes that the primary problem is not how project are run but how they are selected in the first place.  Specifically, there is little attention paid to the need to consider strategic fit and portfolio management in selecting new projects.  This case is intended to get students thinking of alternative screening measures that could potentially be used when deciding whether or not to invest in a new project.

Questions

  1. Keflavik Paper presents a good example of the dangers of excessive reliance on one screening technique (in this case, discounted cash flow). How might
  2. Assume that you are responsible for maintaining Keflavik’s project portfolio. Name some key criteria that should be used in evaluating all new projects before they are added to the current portfolio.
  3. What does this case demonstrate about the effect of poor project screening methods on a firm’s ability to manage its projects effectively?

 

Title: Project Management

ISBN: 9780134730332

Authors: Pinto

Publisher: Pears