Using the Delphi technique, your team constructed the following risks register for the VoIP project containing the risk, the likelihood of its occurrence on a scale of 1 (least likely) to 5 (most likely), and the potential negative impact on the project on the same scale. In addition, they recommended the appropriate response and identified its type for one of the risks identified.

#

Risk

Likelihood (1-5)

Impact (1-5)

Response Type

Response

1

Project Delay due to lack of resources

3

5

2

Project runs out of funds before completion

1

5

3

Users reject new system

2

4

4

Defective Hardware

1

5

5

New government regulations introduced during deployment increase the cost of running VoIP.

2

3

6

A Yearly Renewal Fee issued on the legacy system due to delay of over 30 days in deployment of the new system

1

4

Mitigation

Schedule check 30 days before project deadline to determine if action needs to be taken to avoid delay. Decision tree will be utilized.

Write a three to five (5-6) page paper in which you:

  1. Explain risk management and its associated activities and defend the need for a risk management plan.
  2. Describe the Delphi technique used to identify risks and infer n types of projects where this technique is most accurate.
  3. Examine the four (4) types of risk response (ie., avoidance, acceptance, transference, and mitigation) and determine the appropriate situation where each should be used.
  4. Complete the table with the risk response type (i.e.., avoidance, acceptance, transference, and mitigation) and a description of the response.
  5. Create a decision tree diagram with the software of your choice (Word, PowerPoint, Visio, etc.) and make an OFFICE document or PDF to address Risk Number 6.
  6.  Assume that when you check the schedule on day 60 of the project, it becomes evident that two additional engineers are needed to ensure on-time completion of the project. The engineers cost $25,000 each and a fee of $120,000 is issued by the legacy provider. The probability of completing the project on time is as follows: With the current personnel – 60%; With one engineer – 80%; With both engineers – 98%.
  7. Fully explain your rationale in the document you create. How does your decision tree flow? What are your decision points, and most importantly, what is your recommendation and how did you arrive at this conclusion? Is there a point of diminishing return where it would be so expensive that it wouldn’t be worth it to employ the additional resources? Why or why not? Be sure to use proper business communication and consider your audience to be business leaders in the organization at which you are employed. Remember, 100% original work is required. Research on the Internet is fine, but do not submit work that is not your own, and do not submit work that you’ve submitted anywhere previously. Plagiarism detection tools will be used to ensure originality.

Your assignment must follow thee formatting requirements:

  • Be typed, double-spaced, use Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA Style Guide (Edition 6).  Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include the decision three diagram created in your chosen software. The completed decision tree must be imported into the Word document before the paper is submitted.

Is this the question you were looking for? Place your Order Here

 

To ensure you include the appropriate elements in your argument paper, you must organize all of your research. This assignment will help you to determine what pieces of research you would like to include in your paper, and which claims and statements the selected research will support. The outline you create will be used as the basis for the Week 5 Final Argument Paper assignment. Follow these step-by-step instructions as they are presented, to guide you through the assignment.

Part 1: Research and Evaluation

Conduct a search in the University Library for three peer-reviewed journal articles that relate to your topic and the reasons you hold your position about that topic, which you outlined in your Week 1 Topic Selection Worksheet.

Review the articles you selected, and highlight information that supports your reasons for your position.

  • If the articles you initially select do not support your position, continue to research until you find content that does.

Evaluate each article you intend to use with the Evaluating Resources Worksheet in the Center for Writing Excellence. Your sources should meet the evaluation criteria listed to ensure they are appropriate for your paper. You will use the information from this evaluation in Part 2 of this assignment, but you will not submit this evaluation document.

Part 2: Thesis Statement and Outline

Create an outline of your argument paper using the Argument Paper Outline Template.

Complete the following areas of the Argument Paper Outline Template. Replace the template text with your information.

  • Title page
  • On page 2: Title of Paper
  • Revised thesis statement
    • Review the draft of your thesis statement from your Week 1 Topic Selection Worksheet, and make any necessary revisions to form a clear claim for your argument. Use your faculty feedback and the Writing a Thesis Statement Tutorial for tips on revising your thesis statement.
  • APA-formatted level 1 headings for each of the reasons for your position
  • Topic sentence
    • Topic sentences will begin each body paragraph about the particular topic. The topic sentence should focus on one of the reasons for your position.
  • Main points you want to present about each reason for your position
    • Each main point should represent an additional detail in the discussion of each reason for your position.
  • Supporting research for each main point, including the Information source from which the supporting research was retrieved
  • Reference page with an APA formatted reference for each of the peer-reviewed sources used
    • Ensure your Reference page lists the sources in alphabetical order. You may use the Reference and Citation Generator, found in the Center for Writing Excellence, to help generate your references.
    • Below each reference, include a 25- to 50-word justification for why the source is appropriate for use in this paper. Each justification should be based on the evaluation you completed in Part 1 of this assignment.

You do not need to include the introduction and conclusion paragraphs this week, as you will be working on those next week.

I've also attached the week 1 assignment, which includes the topic I used.

Is this the question you were looking for? Place your Order Here

3 different assignements. needed on 3 different files. 

1.

One of the most common data types in all programming languages is Float, which represents decimal values.

Programming declares variables and specifies the data types of these variables at the beginning of a program.

However, depending on the order of operations, the output of an operation involving floating numbers might not necessarily be a floating number.

Input the following in JES or Python IDLE to see the output (hereafter, JES will be used in the course but is interchangeable to Python IDLE, whichever the student downloaded):

  • print 1.0 / 3
  • print 10 + 3 * 7
  • print (10 + 3) * 7

Zip your Python .py file and submit the.zip file so the code can be validated.

Write a 1/2 page on why each of your three inputs resulted in its particular output.

.  a 1/2 page on why each of your three inputs resulted in its partioutputcular 

2.

In Python, there are a few different ways of concatenating strings as explained in Ch. 3, "Creating and Modifying Text," of Introduction to Computing and Programming in Python.

Input the following in JES to see the how strings are concatenated in the output:

  • print "Hi" + "there"
  • print "Hi" + 10
  • print "Hi" * 10

Zip your Python .py file and submit the.zip file so the code can be validated.

Write a1/2 page on why each of your three inputs resulted in its particular output.

3.

This programming assignment will put together everything you learned this week. You will:

  • Create variables and assign them values.
  • Add the variables.
  • Use a conditional statement to determine an appropriate string to print.

Write a program in JES that does the following:

  • Creates two variables: Num_1 and Num_2
  • Assigns the value 50 to Num_1 and 25 to Num_2
  • Creates a third variable Total; Total should add Num_1 and Num_2
  • Determines if Total is greater than 100, between 99 and 50, or less than 50
  • Using If, Elif, or Else statements, do the following:     
    • If Total is greater than 100, print a string that shows the value of Total combined with the string "is too high"
    • If Total is less than 50, print a string that shows the value of Total combined with the string "is too low"
    • If Total is between 99 and 50, print a string that shows the value of Total combined with the string "is in the correct range"

Iteration 1:

Run your program to demonstrate the output.

In this iteration with the variables you provided, the string that is output should state "75 is in the correct range".

If it does not, debug the program until it outputs the correct statement.

Zip your Python .py file and submit the.zip file so the code can be validated.

Iteration 2:

Change the value of Num_1 to a number that will result in an output making Total too high.

Run your program to demonstrate the output.

Zip your Python .py file and submit the.zip file so the code can be validated.

Iteration 3:

Change the value of Num_1 to a number that will result in an output making Total too low.

Run your program to demonstrate the output.

Zip your Python .py file and submit the.zip file so the code can be validated.

Is this the question you were looking for? Place your Order Here

I have another power point due in my Health information class don`t worry about the voice part I just need the power point done on the health device I have been assigned I need this power point by Friday 12/21/2018.the instructions are below and the device I need the power point on.Dexcom (diabetes monitor) Wanda Spell

that is my device that the power point needs to be on the instructions are below.

  • In this Unit, you are expected to:
     
    1. Research and gather information about an assigned medical app/device.
    2. Present findings to class via a voice over powerpoint.
    3. Respond to one classmate with feedback and/or contributions.
    4. Develop a presentation and deliver the presentation via voice over power point according to the assignment instructions
  •   Unit 6 Assignment: voice over presentation
      Attached Files:
    • File PresentationChecklist for students (15.355 KB) 
    • File Medical Apps Search (20.813 KB) 
    • Complete the voice over presentation according to the instructions provided in the linked documents. Also listed in this document, your assigned medical/app or device.

      The Presentation Checklist for students is just one way you can double check that all criteria is being met.

        

  •   Unit 6 DB: Hot Topics – Medical Apps/Devices
       Submit the completed voice over powerpoint presentation here with the name of your app/device in the subject line

  

Objective: To expose students to emerging medical technology

Directions: 

1)  Each of you have been assigned a technology below. If you find another technology not listed here, please let me know and if it meets the criteria, you may do that technology instead.

2) Review your assigned technology website and use alternate search options (suggested below) to further explore the product. 

3) Prepare a power point presentation (minimum of five slides and a max of 10 minutes in length) following the components listed below.

4) When your PowerPoint is completed, create a voice over (instructions on how to do that are posted further down on this document, if needed), to go along with your slide presentation.

5) When that is complete, submit it for the unit 6 assignment as well as in the Unit 6 discussion board.

6) Remember to comment on one classmate’s presentation as well with feedback and/or contributions.

Components of the power point should include (also check rubric attached to the assignment for more detail of the requirements):

· Name of device

· Name of company/developer

· What does the product do/for what is it designed

· Component parts? (How is the sent/data received?)

· Cost

· Developer or other promotional video/demo? (check YouTube, Google, etc.) 

· Privacy/Security issues or limitations that you see?

· Interesting facts/research

Assigned technology:

1. go talk now (augmented and alternative communication) 

2. Dexcom (diabetes monitor) Wanda Spell

  •  

Is this the question you were looking for? Place your Order Here

 This assignment consists of two (2) sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. In the day-to-day operations of information security, security professionals often focus the majority of their time dealing with employee access issues, implementing security methods and measures, and other day-to-day tasks. They often neglect legal issues that affect information security. As a result, organizations often violate security-related regulations and often have to pay heavy fines for their non-compliance.  Thus, as a Chief Information Officer in a government agency, you realize the need to educate for senior leadership on some of the primary regulatory requirements, and you realize the need to ensure that the employees in the agency are aware of these regulatory requirements as well. Section 1: Written Paper1. Write a six to eight (6-8) page paper in which you:

a. Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including:

i. FISMA
ii. Sarbanes-Oxley Act
iii. Gramm-Leach-Bliley Act
iv. PCI DSS
v. HIPAA
vi. Intellectual Property Law

b. Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements.c. Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements.d. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your written paper must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.

Section 2: PowerPoint Presentation2. Create an eight to ten (8-10) slide security awareness PowerPoint presentation that will be presented to the agency’s employees, in which you:

a. Include an overview of regulatory requirements and employee responsibilities, covering:

i. FISMA
ii. Sarbanes-Oxley Act
iii. Gramm-Leach-Bliley Act
iv. PCI DSS
v. HIPAA
vi. Intellectual Property Law

Your PowerPoint presentation must follow these formatting requirements:

  • Include a title slide, six to eight (6-8) main body slides, and a conclusion slide. 

The specific course learning outcomes associated with this assignment are:

  • Explain the concept of privacy and its legal protections. 
  • Describe legal compliance laws addressing public and private institutions. 
  • Analyze intellectual property laws.
  • Examine the principles requiring governance of information within organizations.
  • Use technology and information resources to research legal issues in information security.
  • Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.

Is this the question you were looking for? Place your Order Here

questions: 

1) You’re working for a local coffee shop that offers free wireless access to customers. Your supervisor has asked you to create a flyer for patrons that warns them of the potential dangers of surfing the Internet in public places. Conduct research on the Internet about using public hotspots to access the Internet. Prepare a list of specific steps that customers can take to protect their data when surfing on publicly accessible networks.

2)  With the arrival of reliable, fast, networked digital information, businesses can track the location and status of all kinds of objects, such as cars and bicycles. This is introducing a new business model different from individual ownership—now, using a car can become a “subscription” service. What options are there for “subscribing” to a car instead of owning one? How about for a bicycle? Are there other businesses you can identify that would be able to take advantage of digital information and become subscription services instead of vendors of a physical product? What are the advantages to the consumer of subscription over ownership? What are the drawbacks?

3)   Computer security professionals are among the highest-paid employees in information technology organizations. Using employment sites such as Monster.com, computerjobs.com, and dice.com, research computer security jobs available in the state where your school is located (try searching “computer security”). Select three entry-level computer security jobs from different employers and prepare a document comparing the following: What are the educational requirements? What job skills are required? How much prior work experience are firms looking for? Are programming skills required?

4)   You work in the information technology group of a chain of sporting goods stores. The company operates 40 locations in seven states. The 40 locations are organized into four regions (north, south, east, and west) with 10 stores each. Regional managers are responsible for inventory management, procurement of inventory, sales, and marketing for their particular region. The company has been processing all transactions electronically (with customers and suppliers), and it has captured all the data in a large data warehouse. Unfortunately, the regional managers are complaining that there is so much information in the data warehouse that extracting meaningful data has become difficult. You’ve just been placed on the team that will be designing a new data strategy for the company.
 

a. Setting up data marts would probably help with the accessibility of information. What type of data marts would you suggest setting up? Make sure you explain who will benefit from the data marts you suggest.
 

b. For the data marts you identified, list the data that should be stored in each data mart and explain how the regional managers could make use of that information to manage their group of stores.

Note:  => 4 references for each question.

              =>  Each question should be answered not less than 300 words. 

Is this the question you were looking for? Place your Order Here

 

  • 1 Commitment: A Cautionary Tale and provide an example of this issue which has happened to you 250 words
  • 2 Students are to observe two or more adults unknown to the observer. The student must not be able to hear the subjects being observed and those being observed must not be wearing a uniform of any kind as this would provide information about their occupation to the observer. Students must describe the environment and the people being observed, i.e., age, gender, dress, etc. Discuss the nonverbal communication, i.e. eye contact, body position and any other nonverbal behavior. Provide your interpretation of the relationship between those being observed. Be very discrete and do not have a conversation with those being observed. 350 words and references
  • 3 discusses four types of perceptual distortions: stereotyping, halo effects, selective perception, and projection. Define each of these and provide an example.250 words
  • 4 Each of us perceives "ethics” from our own point of reference as to what is or is not ethical. This assignment asks you to consider ethics and whistleblowers. Select one of the behaviors listed below for your discussion posting. Base your posting on your relationship with the "unethical person” and any risk involved in "whistle blowing”.  1. Stealing from an employer  2. Falsifying a time sheet  3. Padding an expense account  4. Falsifying any document or record  5. Lying about the conduct of a co-worker
  • 5 In a hostage crises, is it ethical for a government to agree to grant a terrorist immunity if he releases the hostages, even though the government has every intention of capturing and prosecuting the terrorist once his hostages are released
  • 6  Your state has a forthcoming referendum concerning no smoking in public places including bars and restaurants. Follow the ten steps on page 137 on negotiation planning. A 200-250 word response must be posted to the discussion forum. The post must be submitted by Wednesday at midnight. Each student is to post a reply to another students' posting (minimum 100 words) and must be posted by 9:00pm on Sunday. 
  • 7  

I.        Understanding the Flow of Negotiations: Stages and Phases

A.  The typical steps or flow in a negotiation can be found in the phase models of negotiation:

 1.   Initiation.

2.   Problem solving.

3.   Resolution.

Defines these three phases and give a thorough example of each.

8  As a junior congress person you have been asked to help promote a bill to allow casino gambling in your state. There is much opposition to this bill. Using distributive bargaining, discuss the pros and cons which might arise toward the passing or defeating of this bill 

9  What are four important tactical tasks for a negotiator in a distributive situation to consider? 

i need each one like 320 words superate with references 

Is this the question you were looking for? Place your Order Here

 

Now that you have outlined your paper, it is time to start your rough draft. A rough draft should expand on the ideas you included in your outline, and should include introduction and conclusion paragraphs as well as transitional statements between topics in your body paragraphs. This rough draft will compile all the content for your paper in a cohesive manner, and present your full argument.

It is important to think about how to integrate the research you have gathered into your paper. You have a voice, and your voice matters. The research you have found should be used to provide support to your voice and your argument. Extensive quotations or even paraphrased text are not always appropriate or helpful. You should try to limit these to no more than three to five instances throughout your paper. Use the learning activities, discussions, and resources from the Center for Writing Excellence to assist you with appropriately creating and using in-text citations to acknowledge where you have integrated your research within your rough draft.

Write your Argument Paper Rough Draft using the APA Paper Template. Your paper should be 700 to 1,050 words.

Create robust body paragraphs to present your full argument by expanding on the topics in your outline.

  • Ensure each body paragraph has a topic sentence.
  • Incorporate the research you have gathered to support your argument.
  • Make your best attempt at formatting in-text citations and a reference page, which you will learn more about in Week 4. You may use the Reference and Citation Generator to help you construct your citations and references.

Create an introduction paragraph that includes your thesis statement and introduces your reader to the main topics included in your paper.

Create a conclusion paragraph to bring your paper to a close.

Ensure your paper includes the following elements prior to submission:

  • A title page
  • An introduction paragraph with a thesis statement that clearly states your argument.
  • APA-formatted level 1 headings for each main topic
  • A topic sentence to begin each body paragraph under each main topic
  • No more than three to five instances of paraphrased or directly quoted material integrated throughout the paper, followed by the appropriate APA-formatted citation
  • A conclusion paragraph
  • A reference page with a reference listing for a minimum of three peer-reviewed sources

Access the Center for Writing Excellence on eCampus and utilize the Grammar Checking Tools and the Plagiarism Checker to review your paper. Review and apply any recommended changes.

Refer to the Argument Paper Rough Draft Grading Guide for additional details on how this assignment is graded.

Submit your Argument Paper Rough Draft to the Assignment Files tab..

I have attached the outline from last week. Please let me know if you have questions.

Is this the question you were looking for? Place your Order Here

Early one morning at work, CEO Alice Johnson asks if you have a moment to chat. I nee  d your expertise and advice on a complicated situation for the company regarding an international hacking lawsuit. In her office, Alice explains that CyberTech is serving as t  he cyber forensics consultant for a law firm handling the suit from a 2015 hack of the Office of Personnel Management, OPM.  The OPM hack compromised background information on millions of workers. In a 

related case Anomalous, a non-US gray hat hacking group suspected in the OPM breach case,is claiming that US-based Equation Set attempted to hack its facilities. So we have a nonUS and a US set of test hacker groups involved. With Anomalous, the non-US group, being a client plantiff in one case against Equation Set, the US group, and as a suspect in the OPM breach.  But Alice then outlines why the case is problematic. Along with the OPM victims, CyberTech represents clients from some of the OPM breach suspect companies in unrelated cases, which could appear to be a conflict of interest. This could affect the way our company is perceived by others. We need to maintain our image as an unbiased cyber security consultant.  Should CyberTech remain on both the OPM breach investigation and the overseas case at the same time? Or should we drop one of the cases? Apply your critical thinking and analytical skills to figure out what happened what we know and don't know, and how the company might remedy this situation. I'd like a paper by the end of the week with 

your recommendations. 

       There are six steps that will lead you through this project. Most  steps of this project should take no more than two hours to complete.  Begin by watching the video above, which introduces the project you will  be doing as it might occur in the workplace, and then continue with  Step 1: Prepare to Think Critically.     

When  you submit your project, your work will be evaluated using the  competencies listed below. You can use the list below to self-check your  work before submission.

    1.1: Organize document or  presentation clearly in a manner that promotes understanding and meets  the requirements of the assignment.

    1.2: Develop coherent  paragraphs or points so that each is internally unified and so that each  functions as part of the whole document or presentation.

    1.4: Tailor communications to the audience.

    1.5: Use sentence structure appropriate to the task, message and audience.

    1.6: Follow conventions of Standard Written English.

    2.1: Identify and clearly explain the issue, question, or problem under critical consideration.

    2.2: Locate and access sufficient information to investigate the issue or problem.

    2.4: Consider and analyze information in context to the issue or problem.

    2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks. 

Is this the question you were looking for? Place your Order Here

 

Competency

  • Create a plan to deploy technology solutions in alignment with strategic business needs.

Scenario

North American Transport (NAT) is a fast growing long-haul trucking company that specializes in the delivery of fresh foods to many of the leading fresh-food retail chains across the United States. NAT is based out of Kansas City, Kansas and employees 75 drivers, loaders, mechanics, communications technicians, business developers and managers. NAT’s business plan includes 20% growth per year or 225 employees within 5 years. NAT is also planning on adding additional Fleet Resource Centers in California and Virginia. Fleet Resource Centers are NAT owned service facilities used to maintain the fleet of trucks, vans, trailers, refrigeration etc. Fleet Resource Centers also offer growth and will require resources.

Business Goals for the MIS Architecture:

  • An architecture that is flexible and scalable; Company growth is projected to be 20% per year
  • An architecture that can rapidly deploy/employ new systems and technology; Agile system development
  • An architecture that meets the demands of evolving business processes; Information Technology cannot “hold up” any business process, IT must be adaptable
  • An architecture that is easily understood and easy to manage; Minimize IT department footprint. Take advantage of cloud services
  • An architecture that is secure; Deploy state-of-the-art security software/hardware

MIS Architecture

Current MIS Architecture Capabilities:

  • One 12 port 10 Mb/s switch
  • Laptop computers used to support administration with various operating systems
  • 1 shared printer
  • MS Office 2007
  • Exchange Server 2007
  • MS SQL on a stand-alone computer
  • ADSL broadband Internet 8 Mb/s

Instructions

Create an MIS Architecture Plan

  • You will use Microsoft Word to develop a MIS architecture plan that analyzes the current capabilities, lists available resources, aligns capabilities with business objectives in order to identify gaps and recommends IT solutions.
  • Your plan must include a Table of Contents and Headers.
  • Analyze and explain the current MIS architecture: Discuss bandwidth, speed of service, reliability, scalability, mobility and security.
  • Create a list that identifies and outlines existing resources being utilized in the company.
  • Discuss the operational objectives of the company using assumptions gained from the scenario.
  • Develop a recommendation plan for an improved MIS architecture. Your plan should examine whether or not the current architecture meets the business needs and if not, identify those gaps. Be sure to consider the businesses’ goals and objectives.
  • Using software of your choosing (Ex. Power Point or Visio), construct a revamped architecture diagram that meets the needs of the company. Attach your architecture diagram as an appendix.

Is this the question you were looking for? Place your Order Here