monitoring

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Discussion: IT Security – Phishing

 

You arrive at work, open your email, and see this:

Employment Opportunity!!!

This Job is currently recruiting. A Job that will not affect your presents employment or studies, fun and rewarding. You get to make up to $300 weekly, I tried it and i made cool cash, If You are interest you can visit their website at http://getacoolJobreallyfast.work to apply and read more about the job.

Best Regards,
Human Resources and Benefits
Pyramid Placement Agency
5555 Fifth St.
Anytown, US 11111
HR&[email protected]

There are many things in this example that let you know this is not a real opportunity for employment, but more likely an opportunity for someone to gain access to your computer and your company’s private information. However, real-world attempts are not always this obvious and can take many forms. Social engineering, phishing, malware, spoofing, hacking, and card skimming are all risks to our personal and business information.

In your discussion post, consider the scenario presented here, or a real-world example of phishing, as you respond to the following:

  • Describe indicators you can use to identify a phishing email.
  • Explain the importance of employee knowledge concerning phishing attempts.
  • Provide several recommendations for information security practices that could be implemented to limit the risks and impact of phishing emails.

When responding to your peers, provide an additional suggestion for an information security practice they did not identify, and explain how your suggested practice would deter or reduce the impact of phishing within the company.

To complete this assignment, review the Discussion Rubric.

BI_Discussion_3

 Create a discussion thread (with your name) and answer the following question:
Discussion (Chapter 3): Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics. 

Add 3 References.

Database

Database
1.What is the Database transaction?
2.Define Database Lock and its types.
3.What is Data Warehousing?
4.What do you understand by Join?
5.What do you understand by Index hunting?
6.How to improve query performance using Index hunting?

Research Paper – Info Tech Strat Plan

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.