Discussion Board – Unit 4

 

For this Discussion Board, please complete the following:

Computer networks are wonderful and typically work flawlessly as all people benefit from using application on their phones, such as mobile banking, social networking, and gaming. A computer network allows computers to communicate. Humans communicate through spoken language. Computers also have communication abilities though Transmission Control Protocol / Internet Protocol (TCP / IP), which is a set of rules that allows computers to talk. 

Answer the following questions:

  • How are network protocols similar to human-to-human communication?
  • What do you think are the most important TCP / IP settings and how are they utilized?

Apply: Risk Register

 

Assignment Content

  1. Tony and his project team identified some risks during the first month of the Recreation and Wellness Intranet Project. However, all they did was document the risks in a list. They never ranked the risks or developed any response strategies. Because the project has had several problems, such as key team members leaving the company, users being uncooperative, and team members not providing good status information, Tony decided to be more proactive in managing risks and want to address positive risks as well as negative risks.

    Complete the following tasks:

    1. Create a risk register for the project. Identify 6 potential risks, including risks related to the problems described in the previous paragraph. Include negative and positive risks.
    2. Develop a 45- to 90-word response strategy for each risk. Enter the information in the risk register.
    3. Write a separate 175-word paragraph describing what specific tasks would be required to implement the strategy. Include time and cost estimates for each strategy.
    4. Submit your risk register with the response strategy and explanation.

      Note: A Risk Register template is available, but it is not required that you use it. 

Software -9B

 

Please read chapter 25 and review PP slides, IGU online library and reputable resources and explain:

What is configuration management? And briefly escribe the following configuration management activities: 

1)Version management, 

2) System building,

3) Change management, 

4) Release management.

                                                  Please list your reference/s

Discussion Forum 2 (LO1) , Discussion Forum 1 (LO3)

In the video, “What is Data Mining and Why is it Important?” the presenter uses the statement “patterns in data help answer business questions,” a broad statement. Consider a small business that is a computer store. How would data mining help expand their business? (LO1)

Essential Activities: 

  1. Watching “What is Data Mining and Why is it Important?” will assist you with the discussion forum.

Notes:

  1. Please refer to this assignment’s discussion forum rubric on the start here tab.
  2. To earn total points on the discussion forums each week, include outside sources to support your discussion.

Discussion 2 

In the article, Why Business Analysts Are Essential to Your Operations Team, September 3, 2019 by Paul Crosby, the following 5 reasons are listed. 

 1.     Business Analysts Improve Operational Productivity

2.      Business Analysts Need to Prove Their Value to the Operations Team

3.      Business Analysts are Problem Solvers by Nature

4.      Business Analysts Drive Value By Wearing Many Hats

5.      Every Operations Team Will be Data and Analysis-Driven

Briefly discuss your view on the necessity of each.  Can you think of additional reasons? If so, please share. 

APA Stylesingle spacedTimes New Roman font of size 12, and references must all be cited. 

No divergence, no sidetrack, but focus on the question!

Questionnaire on IPSec

 

  • 9.1 Give examples of applications of IPsec.
  • 9.2 What services are provided by IPsec?
  • 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
  • 9.4 What is the difference between transport mode and tunnel mode?
  • 9.5 What is a replay attack?
  • 9.6 Why does ESP include a padding field?
  • 9.7 What are the basic approaches to bundling SAs?
  • 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?

CIS 109 Discussion 6

  

Our readings this week focused on databases and SQL. We learned about several types of databases and how to interface with them. Use the Internet to find some examples of database technology that you might encounter in your chosen career field. Share an example with the class. As a business professional, why do you think it is important to understand databases and SQL language?