Strategic Management in a Globalized Economy

 

Discussion Question 1 – (CLOs covered : CLO 3, CLO 7) 

Describe how some of Porter’s competitive force has an effect on organization relating to the external environment. Explain what factors you would analyze (supplier power, new entrants, etc.)

discussion2

 Discussion Question 1 – (DQ directed at upcoming CLA1) Graduate level 

Prior to reading this DQ, please read the CLA1 assignment and understand what the assignment is asking you to complete. Once you have an understanding of the CLA1 assignment, please continue to the paragraph below to complete DQ1.

Using the Library Information Resource Network (LIRN), JSTOR, or any other electronic journal database, research one (1) peer-reviewed article that can be used to answer your upcoming CLA1 assignment. Your discussion should summarize the article in such a way that it can justify any arguments you may present in your PA1 assignment and should be different than the abstract.  In addition to your researched peer-reviewed article, you must include an example of the article researched as it is applied by industry (company, business entity, etc.).

Please note: This article summary should not be the only article researched for your CLA1 assignment. You may (and should) have several other articles researched in order to fully answer your CLA1 assignment. The concept of this DQ is to allow students to be proactive in the research necessary to complete this assignment. You may use your article summary, partially or its entirety in your CLA1 assignment.

Important: Please ensure that you insert your citation for the article as your reference in your discussion post. Depending on which electronic database you use, you should see a “Cite” selection for your article. In addition, there should be a variety of articles summarized and as such, students should havedifferent articles summarized. Your summary MUST include ALL of the following (include every item in the bullet list below, or you will not receive full credit):

  • Clearly state what the article is about and its purpose
  • How the article and/or author(s) support your argument(s)
  • Most important aspects of the article
  • Any findings and conclusions
  • Approximately 250 to 350 words in length
  • Include the article “Abstract” in your posting (your summary should be original)
  • Include the industry example demonstrating the application of your researched article
  • IMPORTANT” – Include the citation for the article

discussion3

 

DC (QP) – Discussion Question 1 – CLA2 Preparation & Course Learning Outcomes

Welcome to week 5 of your course. This discussion question will help you prepare for your CLA2 paper and final CLA2 PPP and as such, will have a fair amount of detail. Read the CLA2 assignment listed in week 8 of the course. Then, please provide an outline that itemizes the concepts that you will include in your CLA2 paper and final PPt. Please be sure to include concepts learned in the course and information (findings, conclusions) from your PA1, CLA1, and PA2 papers. Provide some brief details for each item that is outlined. Please keep in mind that you should have place-holders for material not yet covered in lecture from week’s 6 and 7. Here is an itemized list that summarizes the requirements of this DQ (include every item in the bullet list below, or you will not receive full credit):

  • Outline that itemizes concepts learned in the course
  • Include information (findings, conclusions) from your PA1 and CLA1
  • Brief details for each item that is outlined
  • Place-holders for material not yet covered

discussion4

 

Prior to reading this DQ, please read the PA2 assignment and understand what the assignment is asking you to complete. Once you have an understanding of the PA2 assignment, please continue to the paragraph below to complete DQ1.

Using the Library Information Resource Network (LIRN), JSTOR, or any other electronic journal database, research one (1) peer-reviewed article that can be used to answer your upcoming PA2 assignment. Your discussion should summarize the article in such a way that it can justify any arguments you may present in your PA2 assignment and should be different than the abstract. In addition to your researched peer-reviewed article, you must include an example of the article researched as it is applied by industry (company, business entity, etc.).

Please note: This article summary should not be the only article researched for your PA2 assignment. You may (and should) have several other articles researched in order to fully answer your PA2 assignment. The concept of this DQ is to allow students to be proactive in the research necessary to complete this assignment. You may use your article summary, partially or its entirety in your PA2 assignment.

Important: Please ensure that you insert your citation for the article as your reference in your discussion post. Depending on which electronic database you use, you should see a “Cite” selection for your article. In addition, there should be a variety of articles summarized and as such, students should have different articles summarized. Your summary MUST include ALL of the following (include every item in the bullet list below, or you will not receive full credit):

  • Clearly state what the article is about and its purpose
  • How the article and/or author(s) support your argument(s)
  • Most important aspects of the article
  • Any findings and conclusions
  • Approximately 250 to 350 words in length
  • Include the article “Abstract” in your posting (your summary should be original)
  • Include the industry example demonstrating the application of your researched article

IMPORTANT” – Include the citation for the article

discussion5

 

  1. Assume you are in charge of developing the strategy for an international company selling products in 50 different countries around the world. One of the issues you face is whether to employ a multi-domestic strategy, a global strategy, or a transnational strategy. 
  2. a. If your company’s product is mobile phones, do you think it would make better strategic sense to employ a multi-domestic strategy, a global strategy, or a transnational strategy? Why? 
  3. b. If your company’s product is dry soup mixes and canned soups, would a multi-domestic strategy seem to be more advisable than a global strategy? Why? 
  4. c. If your company’s product is large home appliances such as washing machines, ranges, ovens, and refrigerators, would it seem to make more sense to pursue a multi-domestic strategy, a global strategy, or a transnational strategy? Why?
  5. If your company’s product is apparel and footwear, would a multi-domestic strategy, a global strategy, or a transnational strategy seem to have more appeal? Why?

discussion6

 

Discussion Question 1 – Summary & Critical Thinking – Week/Course Learning Outcomes

Welcome to the last week of your course. In this discussion question you have the opportunity to be creative and to relate what you have learned to your professional lives. Please explore and critically think about some of the learning outcomes and concepts presented in this course. Please effectively communicate how you would lead an organization (or a group of people within the organization) by applying the knowledge you have learned ethically and responsibly.Your discussion should also include innovative thinking, and information-technology aspects (such as the Internet, social-media, computers, etc.) that may assist you in decision-making. You may frame your discussion around any functional component of business, and in any context; problem-solving, management, leadership, organizational behavior, etc.

 

Professional Assignment 2 – (CLOs covered : 5) 

In a 2 to 3 page APA formatted paper: 

Go to www.google.com, and do a search on “outsourcing.” Identify at least two companies in different industries that have entered into outsourcing agreements with firms with specialized services. In addition, describe what value chain activities the companies have chosen to outsource. Do any of these outsourcing agreements seem likely to threaten any of the companies’ competitive capabilities? Are the companies using strategic alliances to manage their outsourcing?

*Please refer to the Grading Criteria for Professional Assignments on page 10 of the syllabus for specific guidelines and expectations.

 

Professional Assignment 1 – CLO 1, 2

In a 2 to 3 page APA formatted paper:

Open your textbook to Tables 2.2 and 2.3 from chapter 2: Critique the adequacy and merit of the vision statements on page 34 of your textbook, listing effective elements and shortcomings. Rank the vision statements from best to worst once you complete your evaluation.

Wells Fargo: We want to satisfy all of our customers’ financial needs, help them succeed financially, be the premier provider of financial services in every one of our markets, and be known as one of America’s great companies.

Hilton Hotels Corporation: Our vision is to be the first choice of the world’s travelers. Hilton intends to build on the rich heritage and strength of our brands by: 

• Consistently delighting our customers 

• Investing in our team members 

• Delivering innovative products and services 

• Continuously improving performance 

• Increasing shareholder value 

• Creating a culture of pride 

• Strengthening the loyalty of our constituents

BASF: We are “The Chemical Company” successfully operating in all major markets. 

• Our customers view BASF as their partner of choice. 

• Our innovative products, intelligent solutions and services make us the most competent worldwide supplier in the chemical industry. 

• We generate a high return on assets. 

• We strive for sustainable development. 

• We welcome change as an opportunity. 

• We, the employees of BASF, together ensure our success.

 

CLA 2 – CLO 1, CLO 4, CLO 5, CLO 6, CLO 7 

Compare and contrast the strategic management of the following companies: 

  • Walmart, the world’s largest retailer who specializes in being the low-cost provider;
  • Nordstrom, the largest volume fashion retailer in the Western United States. 

While there may be other factors, the most obvious and significant difference between these two retailers is their very different position on price and value. Some aspects of each company that you could consider in your analysis follow. 

Mission Statements: Compare Walmart’s and Nordstrom’s mission statements. What do they say about the companies? How does the mission statement affect your impression/expectation of what the customer experience might be for each store? If you have ever shopped at either, did your experience match your expectation created by the mission statement? Why or why not? Refer to Chapter 2 of the course text for Walmart’s mission statement; for Nordstrom, use the following: 

NORDSTROM’S COMMITMENT 

In store or online, wherever new opportunities arise, Nordstrom works relentlessly to give customers the most compelling shopping experience possible. The one constant? John W. Nordstrom’s founding philosophy: offer the customer the best possible service, selection, quality and value.

Price Points & Positioning: How do the companies’ selected price point affect the following:

Their image to their customer? To competitors? 

Their relationship with their employees? 

The customer experience for purchases? For questions? For problems?

Competitive Strategies: Which of the five generic competitive strategies do each use for their: 

Overall brand? 

For their retail stores? 

For their online stores? 

Why might they use a different strategy for their “bricks-and-mortar” versus their online stores? 

How does each store respond to competitive threats?

Long-term Strategies for Growth and Sustainability: Where are the opportunities for growth for each store? Are these growth opportunities sustainable? What factors affect growth and sustainability for each store? Note growth can refer to sales/revenue, volume of sales, number of locations, market share, number of employees, etc. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

W14-D

 If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

EThical hacking importance

Review the Attached reading material links and summarize one of the scholarly articles listed on the selected websites.

In 2-3 paragraphs, and using your own words, explain why ethical hacking is necessary in today’s complex business environment. It has to be 250+ words. References are must.

https://resources.infosecinstitute.com/the-benefits-of-learning-ethical-hacking/

https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Need help on Summary for below request in APA Format

 Write only SUMMARY discussion and a LINK to the article.  (300 words)

The Department of Health and Human Services (the agency responsible for managing HIPAA compliance among healthcare providers) lists recent breaches at https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf  – think of it as their “Wall of Shame.” Find an article online that discusses a breach or violation of a regulation, such as HIPAA, or of a standard such as PCI-DSS, GLBA, or FERPA. You can also look at Federal Agencies and discuss those that have not had sufficient controls in place (think of the breach that the Office of Personnel Management had). Summarize the article in your own words and address the controls that the organization should have had in place, but didn’t, that facilitated the breach. What were the ramifications to the organization and the individuals involved?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Why do we need OPSEC for the Test Range?

 

Why does Sifers-Grayson need OPSEC — especially at the test range?

This question is expected to be asked at the morning meeting with the Sifers-Grayson executives. As a Nofsinger consultant, it’s your job to have an answer ready. You should focus on identifying critical information & potential sources of threats, e.g. a hacker getting into the RF transmission streams and taking over a test vehicle. (See attached diagram of the test range & communications between it and the Engineering R&D Center.)

Using the Week 5 readings and additional sources found on your own, prepare a 3 to 5 paragraph “talking points” paper that your team leader can use to respond. Post your paper in this forum for discussion with your team mates.

Use at least 3 authoritative sources in your response and document those sources using a reference list at the end of your posting.

Reference and picture will be uploaded shortly.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ONLY FOR MAESTRO: Assessing Information System Vulnerabilities and Risk

The deliverables for this project are as follows:
 

  1. Security Assessment Report (SAR): This should be an 8-10 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
  2. Risk Assessment Report (RAR): This report should be a 5-6 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
  3. In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Threading and file mgmt

LMP1: I/O and Filesystems

=========================

Welcome to LMP1, the first long MP.  LMP1 is the first stage of a project aimed

at creating a simple yet functional networked filesystem.  In this MP, you will

learn about and use POSIX file system calls, while subsequent LMPs will

introduce memory management, messaging, and networking functionality.  If you

implement all parts of this MP correctly, you will be able to reuse your code

for future MPs.

This first LMP concentrates on the file I/O portion of the project.

Specifically, you will implement a custom filesystem and test its performance

using a filesystem benchmark.  A benchmark is an application used to test the

performance of some aspect of the system.  We will be using Bonnie, a real

filesystem benchmark, to test various performance aspects of the filesystem we

implement.

LMP1 consists of four steps:

1. Read the code; run the Bonnie benchmark and the LMP1 test suite.

2. Implement Test Suite 1 functionality, encompassing basic file I/O operations.

3. Implement Test Suite 2-4 functionality (directory operations, file

creation/deletion, and recursive checksumming).

4. Modify Bonnie to use your client-server file I/O methods.

Code structure

————–

The code for this project is structured according to the client-server

model.  The client code (filesystem benchmark) will interact with the

server (filesystem) only through interface functions defined in

fileio.h:

int file_read(char *path, int offset, void *buffer, size_t bufbytes);

int file_info(char *path, void *buffer, size_t bufbytes);

int file_write(char *path, int offset, void *buffer, size_t bufbytes);

int file_create(char *path,char *pattern, int repeatcount);

int file_remove(char *path);

int dir_create(char *path);

int dir_list(char *path,void *buffer, size_t bufbytes);

int file_checksum(char *path);

int dir_checksum(char *path);

These functions represent a simple interface to our filesystem.  In Steps 2 and

3 of this MP, you will write the code for functions implementing this interface,

replacing the stub code in fileio.c.  In Step 4, you will modify a Bonnie method

to use this interface, rather than calling the normal POSIX I/O functions

directly.  The purpose of Step 4 is to help test our implementation.

Step 1: Understanding the code

——————————

1. Compile the project, execute Bonnie and the test framework.

Note: you may need to add execute permissions to the .sh files using

the command “chmod +x *.sh”.

Try the following:

make

./lmp1

(this runs the Bonnie benchmark – it may take a little while)

./lmp1 -test suite1

(run Test Suite 1 – this has to work for stage1)

make test

(run all tests – this has to work for stage2)

2. Read through the provided .c and .h files and understand how this

project is organized:

bonnie.c – a version of the filesystem benchmark

fileio.c – file I/O functions to be implemented

fileio.h – declaration of file I/O functions

restart.c – restart library (available for use in fileio.c)

restart.h – declaration of restart library functions

util.c – useful utility functions

util.h – declaration of useful utility functions and macros

In particular, pay close attention to the comments in fileio.h and

bonnieb.c.  You should understand what each of the following functions

in bonnie.c does before undertaking the remainder of the MP:

fill_file_char()

file_read_rewrite()

file_read_rewrite_block()

fill_file_block()

fill_read_getc()

file_read_chunk()

newfile()

Step 2: Basic I/O operations

—————————-

Implement file_read, file_write and file_info operations in fileio.c.

If done correctly, your code should pass all suite1 tests:

./lmp1 -test suite1

Running tests…

 1.read                ::pass

 2.info                ::pass

 3.write               ::pass

Test Results:3 tests,3 passed,0 failed.

IMPORTANT: fileio.c is the only file you should modify for this step.

Step 3: More filesystem operations

———————————-

Implement file and directory operations for suite2 (dir_create and

dir_list), suite3 (file_create and file_remove), and suite4

(file_checksum and dir_checksum).

You can test each operation and test suite individually:

./lmp1 -test dirlist

./lmp1 -test suite2

All tests should now pass:

make test

Running tests…

 1.read                ::pass

 2.info                ::pass

 3.write               ::pass

 4.dirlist             ::pass

 5.dircreate           ::pass

 6.remove              ::pass

 7.create              ::pass

 8.filechecksum        ::pass

 9.dirchecksum         ::pass

Test Results:9 tests,9 passed,0 failed.

Step 4: Performance testing

—————————

In this step, we will change parts of Bonnie to use our filesystem

interface.

Make the function file_read_rewrite_block() in bonnie.c to call your

fileio.c functions instead of POSIX I/O operations.  When answering the

questions below, use this modified version of bonnie.c.

Before making this change, it’s a good idea to write pseudocode comments

for what each part of file_read_rewrite_block() does, so that you

understand the code and can perform the change correctly.  There may

not be an exact one-to-one correspondence between our filesystem

interface and the POSIX commands.

Note: In future LMPs, we will be using the fileio.h interface in a

similar manner, but we will call the functions remotely, via a message

queue.

Questions

———

Q1.  Briefly explain what the following code from bonnie.c does:

if ((words = read(fd, (char *) buf, Chunk)) == -1) …

Q2. Is the above an example of a block read or a character read?  What

is the value of the variable ‘words’ if the read succeeds?  Fails?

Q3.  Explain the meaning of the flag value (O_CREAT | O_WRONLY |

O_APPEND) for the POSIX function open().

Q4. Run Bonnie. What is being measured by each test function?

Q5. Look at the summary results from the Bonnie run in Q4. Does Bonnie

measure latency, throughput or something else?  Justify your answer.

Q6. Compare character reads with block reads using Bonnie.  Which is

faster?  Why do you think this is the case?

Q7. Copy and paste the performance measures output when running Bonnie

benchmarks in a local directory and again in an NFS-mounted directory.

Is one kind of disk access noticeably slower over the network, or are

all tests significantly slower?

Your home directory may be an NFS mount, whereas /tmp and /scratch are local

disks.  To test your code in /tmp, do the following:

mkdir /tmp/your_username

cp lmp1 /tmp/your_username

cd /tmp/your_username

./lmp1

(record the output)

cd

rm -fr /tmp/your_username

Q8. How does Bonnie handle incomplete reads, e.g., due to interruptions

from signals?  Justify why Bonnie’s approach is good or bad for a

filesystem benchmark program.

Q9. By now you should be very familiar with the self-evaluation test

harness we provide for the MPs.  Examine the function test_file_read()

in lmp1_tests.c, which tests your file_read() function from Step 2.

What does this test check for, specifically?  You may want to copy and

paste the code for this function in your answer, and annotate each

quit_if or group of related quit_ifs with a comment.

LMP2: Memory Management

=======================

This machine problem will focus on memory.  You will implement your own

version of malloc() and free(), using a variety of allocation strategies.

You will be implementing a memory manager for a block of memory.  You will

implement routines for allocating and deallocating memory, and keeping track of

what memory is in use.  You will implement four strategies for selecting in

which block to place a new requested memory black:

  1) First-fit: select the first suitable block with smallest address.

  2) Best-fit: select the smallest suitable block.

  3) Worst-fit: select the largest suitable block.

  4) Next-fit: select the first suitable block after

     the last block allocated (with wraparound

     from end to beginning).

Here, “suitable” means “free, and large enough to fit the new data”.

Here are the functions you will need to implement:

initmem():

  Initialize memory structures.

mymalloc():

  Like malloc(), this allocates a new block of memory.

myfree():

  Like free(), this deallocates a block of memory.

mem_holes():

  How many free blocks are in memory?

mem_allocated():

  How much memory is currently allocated?

mem_free():

  How much memory is NOT allocated?

mem_largest_free():

  How large is the largest free block?

mem_small_free():

  How many small unallocated blocks are currently in memory?

mem_is_alloc():

  Is a particular byte allocated or not?

We have given you a structure to use to implement these functions.  It is a

doubly-linked list of blocks in memory (both allocated and free blocks).  Every

malloc and free can create new blocks, or combine existing blocks.  You may

modify this structure, or even use a different one entirely.  However, do not

change function prototypes or files other than mymem.c.

IMPORTANT NOTE: Regardless of how you implement memory management, make sure

that there are no adjacent free blocks.  Any such blocks should be merged into

one large block.

We have also given you a few functions to help you monitor what happens when you

call your functions.  Most important is the try_mymem() function.  If you run

your code with “mem -try <args>”, it will call this function, which you can use

to demonstrate the effects of your memory operations.  These functions have no

effect on test code, so use them to your advantage.

Running your code:

After running “make”, run

1) “mem” to see the available tests and strategies.

2) “mem -test <test> <strategy>” to test your code with our tests.

3) “mem -try <args>” to run your code with your own tests

   (the try_mymem function).

You can also use “make test” and “make stage1-test” for testing.  “make

stage1-test” only runs the tests relevant to stage 1.

As in previous MPs, running “mem -test -f0 …” will allow tests to run even

after previous tests have failed.  Similarly, using “all” for a test or strategy

name runs all of the tests or strategies.  Note that if “all” is selected as the

strategy, the 4 tests are shown as one.

One of the tests, “stress”, runs an assortment of randomized tests on each

strategy.  The results of the tests are placed in “tests.out” .  You may want to

view this file to see the relative performance of each strategy.

Stage 1

——-

Implement all the above functions, for the first-fit strategy.  Use “mem -test

all first” to test your implementation.

Stage 2

——-

A) Implement the other three strategies: worst-fit, best-fit, and next-fit.  The

strategy is passed to initmem(), and stored in the global variable “myStrategy”.

Some of your functions will need to check this variable to implement the

correct strategy.

You can test your code with “mem -test all worst”, etc., or test all 4 together

with “mem -test all all”.  The latter command does not test the strategies

separately; your code passes the test only if all four strategies pass.

Questions

=========

1) Why is it so important that adjacent free blocks not be left as such?  What

would happen if they were permitted?

2) Which function(s) need to be concerned about adjacent free blocks?

3) Name one advantage of each strategy.

4) Run the stress test on all strategies, and look at the results (tests.out).

What is the significance of “Average largest free block”?  Which strategy

generally has the best performance in this metric?  Why do you think this is?

5) In the stress test results (see Question 4), what is the significance of

“Average number of small blocks”?  Which strategy generally has the best

performance in this metric?  Why do you think this is?

6) Eventually, the many mallocs and frees produces many small blocks scattered

across the memory pool.  There may be enough space to allocate a new block, but

not in one place.  It is possible to compact the memory, so all the free blocks

are moved to one large free block.  How would you implement this in the system

you have built?

7) If you did implement memory compaction, what changes would you need to make

in how such a system is invoked (i.e. from a user’s perspective)?

8) How would you use the system you have built to implement realloc?  (Brief

explanation; no code)

9) Which function(s) need to know which strategy is being used?  Briefly explain

why this/these and not others.

10) Give one advantage of implementing memory management using a linked list

over a bit array, where every bit tells whether its corresponding byte is

allocated.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion Question and PPT in full APA Format – NO PLAGIARISM

 

Note: Discussion question and PPT are independent tasks. Please provide them separately.

1. Discussion Question:

Answer the below discussion question in 1 full page and list out references.

a. Explain the difference between managerial contingency and task contingency.

Provide significant discussion information with APA citations for quotes or paraphrases and provide the research link that you have used to help you understand the question

2. PPT in full APA format:

Case Study 8.1 The Hidden Costs of Infrastructure Projects—The Case of Building Dams, Page 286 of attached file

Please describe about the case and answer the below questions

Questions

1. Write briefly about the history of large cost overruns associated with megadam construction.

2. Why do you believe they are so popular, especially in the developing world?

PPT Requirements:

  • PowerPoint presentation (10 slides with notes – 5 Slides each for above questions)
  • Use APA 6th edition format to complete the assignment
  • Include Proper Citations and References
  • No Plagiarism

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Hair Factor Analysis

 

Dear Participants,

Please refer to the Project video for complete context about the “Advance Statistics” problem.

The objective of the project is to use the dataset ‘Factor-Hair-Revised.csv‘ to build an optimum regression model to predict satisfaction. You are expected to 

  • Perform exploratory data analysis on the dataset. Showcase some charts, graphs. Check for outliers and missing values (8 marks)
  •  Is there evidence of multicollinearity ? Showcase your analysis(6 marks)
  • Perform  simple linear regression for the dependent variable with every independent variable (6 marks)
  • Perform PCA/Factor analysis by extracting 4 factors. Interpret the output and name the Factors (20 marks)
  • Perform Multiple linear regression with customer satisfaction as dependent variables and the four factors as independent variables. Comment on the Model output and validity. Your remarks should make it meaningful for everybody
    (20 marks)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

BI Portfolio Assignment

 

Portfolio Project: This week discuss a current business process in a specific industry.  Note the following:

-The current business process itself.

-The industry the business process is utilized in.

After explaining the current situation, take the current learning from the course and:

  • Explain a new technology that the business should deploy.  Be specific, don’t only note the type of technology but the specific instance of technology.  (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).
  • Note the pros and cons of the technology selected.
  • Note various factors the business should consider prior to deploying the new technology

The above submission should be three pages in length.  Remember the total length does not include the APA approved cover page or the references.  There should be at least three APA approved references to support your work. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now