Categories
Internet Technology (IT)

Summary – midterm project requirements=

Conduct research about Windows Operating System 7 and 10. Compare and contrast Windows 7 and Windows 10
SUMMARY – Midterm Project Requirements=
4-5 pages in length (excluding cover page, and reference list)
Follow the APA 7th edition format, Use the APA 7 template located in the Student Resource Center to complete the assignment.

Categories
Internet Technology (IT)

Include the chapter and sub topic from your textbook

Identify a key concept or foundational theory from the first four weeks of class and in half a page discuss how it applies to your current work environment or a recent social, political or business event. Include the chapter and sub topic from your textbook

Categories
Internet Technology (IT)

Conduct research about windows operating system 7 and 10.

Conduct research about Windows Operating System 7 and 10. Compare and contrast Windows 7 and Windows 10
SUMMARY – Midterm Project Requirements=
4-5 pages in length (excluding cover page, and reference list)
Follow the APA 7th edition format, Use the APA 7 template located in the Student Resource Center to complete the assignment.

Categories
Internet Technology (IT)

Conduct research about windows operating system 7 and 10.

Conduct research about Windows Operating System 7 and 10. Compare and contrast Windows 7 and Windows 10
SUMMARY – Midterm Project Requirements=
4-5 pages in length (excluding cover page, and reference list)
Follow the APA 7th edition format, Use the APA 7 template

Categories
Internet Technology (IT)

Include the chapter and sub topic from your textbook

Identify a key concept or foundational theory from the first four weeks of class and in half a page discuss how it applies to your current work environment or a recent social, political or business event. Include the chapter and sub topic from your textbook

Categories
Internet Technology (IT)

Are there patterns?

Read the article: The 30 elements of Value
https://hbr.org/2016/09/the-elements-of-value
Answer the questions below
1. What is this article about?
2. What is an “element of value”?
3. What are the four types of needs that they meet?
4. The “elements of value” are built on what psychologist’s work? Please explain his big idea (and/or show us the famous diagram that accompanies his work).
5. The article is built around a very significant figure on p. 7. Explain the figure to the class.
6. What is a “net promoter score”? Explain this concept to the class.
7. Name some technology-oriented items or products that are discussed in the article.
8. Are all elements of value equal? Or are some more important than others? Are there patterns?
9. How do digital firms differ from traditional firms in terms of the elements of value?
10. How do brick and mortar companies succeed on certain elements of value?
11. How can a traditional financial services firm apply these lessons to leverage its strengths to provide value?
12. Which industry segments from Table 2 on page 9 are relevant to fintech?
Are there any themes across these?
13. What are the three areas in which companies in which the authors recommend companies to improve value?

Categories
Internet Technology (IT)

“cash” for cash payments.

ABC Markets sell products to customers. The relational diagram shown in the attached Figure (see Student Instructions) represents the main entities for ABC’s database. Note the following important characteristics:
A customer may make many purchases, each one represented by an invoice.
The CUS_BALANCE is updated with each credit purchase or payment and represents the amount the customer owes.
The CUS_BALANCE is increased (+) with every credit purchase and decreased (–) with every customer payment.
The date of last purchase is updated with each new purchase made by the customer.
The date of last payment is updated with each new payment made by the customer.
An invoice represents a product purchase by a customer.
An INVOICE can have many invoice LINEs, one for each product purchased.
The INV_TOTAL represents the total cost of the invoice, including taxes.
The INV_TERMS can be “30,” “60,” or “90” (representing the number of days of credit) or “CASH,” “CHECK,” or “CC.”
The invoice status can be “OPEN,” “PAID,” or “CANCEL.”
A product’s quantity on hand (P_QTYOH) is updated (decreased) with each product sale.
A customer may make many payments. The payment type (PMT_TYPE) can be one of the following:
“CASH” for cash payments.
“CHECK” for check payments.
“CC” for credit card payments.
The payment details (PMT_DETAILS) are used to record data about check or credit card payments:
The bank, account number, and check number for check payments.
The issuer, credit card number, and expiration date for credit card payments.
Using this database, write the SQL code to represent each of the following transactions. Use BEGIN TRANSACTION and COMMIT to group the SQL statements in logical transactions.
On May 11, 2018, customer 10010 makes a credit purchase (30 days) of one unit of product 11QER/31 with a unit price of $110.00; the tax rate is 8 percent. The invoice number is 10983, and this invoice has only one product line.
On June 3, 2018, customer 10010 makes a payment of $100 in cash. The payment ID is 3428.
Create a simple transaction log (using the format shown in the attached figure) to represent the actions of the transactions in Problems 1a and 2b.
Assuming that pessimistic locking is being used but the two-phase locking protocol is not, create a chronological list of the locking, unlocking, and data manipulation activities that would occur during the complete processing of the transaction described in Problem 1a.
Assuming that pessimistic locking is being used with the two-phase locking protocol, create a chronological list of the locking, unlocking, and data manipulation activities that would occur during the complete processing of the transaction described in Problem 1a.
Assuming that pessimistic locking is being used but the two-phase locking protocol is not, create a chronological list of the locking, unlocking, and data manipulation activities that would occur during the complete processing of the transaction described in Problem 1b.
Assuming that pessimistic locking with the two-phase locking protocol is being used with row-level lock granularity, create a chronological list of the locking, unlocking, and data manipulation activities that would occur during the complete processing of the transaction described in Problem 1b.

Categories
Internet Technology (IT)

Bob has completed his work, but sue has been unable to start her work because of commitments to other projects.

Projects encounter conflicts. Further, anytime you are working with someone else, there is the possibility of conflicts occurring. When handled well, conflicts actually improve relationships and projects. This assignment provides you with practical experience examining through role-play a conflict situation and its resolutions.
consider the conflict scenario below. In a paper, describe the execution processes present in the project and how the processes would differ if a hybrid project approach were used. Then, apply each of the five conflict-handling modes (competing, accommodating, avoiding, collaborating, and compromising) and make your recommendation for the best approach to resolve the conflict. Expected length is 5 pages.
Scenario: Project KAPPA is an upgrade of your company’s customer relationship management (CRM) system. The project was officially approved, budget allocated, project manager assigned, and project team constructed. The project manager has put several things in place, including managing quality per a quality management plan, developing team members’ hard and soft skills, tracking potential risks, and managing communications with stakeholders.
The project requirements include adding a software module that allows the CRM to be accessed from smartphones. Bob is responsible for implementing the software module. Sue is tasked with verifying the security and data integrity of the software module. Bob has completed his work, but Sue has been unable to start her work because of commitments to other projects. Bob has accused Sue of purposefully stalling the project and wants to continue without Sue’s tests and verification, relying on the security claims of the CRM vendor.
Bob and Sue agree to meet to discuss the issue. Bob and Sue have not worked together previously but will be working on future projects together.
Even though you are working as a team, you will each submit your own paper for this assignment. Structure your paper using the following section headings:
Introduction
Competing
Accommodating
Avoiding
Collaborating
Compromising
Recommendation
For each conflict approach, include the factors of relationship importance and task importance in your analysis. Be creative in your interpretation of the scenario and your analysis.
Include a minimum of two credible sources. The textbook may be one of the sources. Add a title page and a reference page.

Categories
Internet Technology (IT)

You are in the it department of a company that sells parts to manufacturers throughout the world.

Assignment
In this Post Project, you will create a “table-top” exercise to test your firm’s information security systems. You will also create an after-incident report (a “post mortem”) explaining to senior management what the table-top was expected to test and what changes to information security policy should be made as a result of its performance in the table-top.
Deliverables (submitted in one Word document)
• 500-word table-top exercise
• 1,000-word after-incident report to management
*NO SOURCES NEEDED FOR THIS ASSIGNMENT.*
Step 1: Read the scenario.
You are in the IT department of a company that sells parts to manufacturers throughout the world. As part of your firm’s annual security assessment, you have been asked to devise a table-top (walkthrough) exercise. Your exercise should be as specific as possible, including roles and responsibilities during the exercise as well as the information systems that will be tested. The table-top exercise must anticipate the following three problems:
1. An intruder is attempting a denial-of-service attack.
2. An unknown foreign entity has breached your firm’s customer data that includes customer identification and banking information.
3. While these two intrusions are going on, you decide to make the table-top even more difficult by inserting a tornado that will level your headquarters in which all your firm’s IT infrastructure is located.
Step 2: Create a table-top exercise.
Create your table-top exercise to test your firm’s IT security and response to the three problems listed in Step 1. Using your knowledge of IT security, be as complete as you can in your table-top. (Section one of your paper.)
Step 3: Write an after-incident report.
After you create your table-top exercise, write an after-incident report (“post mortem”) detailing how each area of IT security performed. (Section two of your paper.)
• You can use any parameters you want—the table-top was 100% successful, the table-top was an absolute failure or somewhere in between.
• Define what elements of IT security were tested by the exercise, and how. Define what a “pass” would look like.
• Include a summary of what resources (capital, human, etc.) are needed if your IT security has lapses.
• If you decide your table-top was 100% successful, describe the resources that would be required to maintain that condition.

Categories
Internet Technology (IT)

In 300 words or more, Provide an example of how IoT technologies aids human effo

In 300 words or more, Provide an example of how IoT technologies aids human effort and improves the quality of life for an organization’s employees. Discuss the significance your selected example has on the organization and society.