IT Project Management

1) project, and  its main attributes

2) day-to-day jobs

Provide examples to illustrate the importance of these items and Discuss the unique challenges that an IT project presents.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

wk 13

Which blockchain technology do you believe will survive and become the defacto industry standard, not as a crypto-currency but as a security-based technology. Why?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

BI

Identify a difference between blockchain apps and legacy applications

Explain how the chosen difference from the previous point would result in a risk and how that risk could be realized. (Provide at least 2 examples.)

Briefly describe how you would address this risk in your blockchain app design.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Most airlines practice overbooking. That is, they are willing to ma ke more reservations than they have seats on an airplane. Why would they do this? The basic reason is simple; on any given flight a few passengers are likely to be “no-shows.” If

  

Most airlines practice overbooking. That is, they are willing to ma ke more reservations  than they have seats on an airplane. Why would  they  do this?  The basic reason  is simple; on any given flight a few passengers are likely  to  be  “no-shows.”  If the airline overbooks slightly, it still may be able to fill the airplane. Of course, this policy  has its risks. If more  passengers arrive to claim their  reservations  than there are seats availa ble, the airline must  “bump” some of  its passengers.  Often this is done by asking for volunteers. If a passenger with a reserved seat is willing to give up his or her seat, the airline typically  will provide incentives of some sort. The fundamenta l trade-off  is whether  the additional  expected  revenue  gained  by flying an airplane that is nearer  to capacity on average is worth  the additional expected cost of  the incentives. To study the overbooking  policy, let us look  at a hypothetical  situation.  Mockingbird  Airlines  has  a small  commuter  airplane  that seats  16 passengers.  The airline uses Lhis jel uu a ruule fur which iL chaq;es $225 for a one-way fare. Every flight has a fixed cost of $900 (for  pilot’s salary, fuel, airport fees, and so on). Each passenger  costs Mockingbird  an  additional  $100.

Finally, the no-show rate is 4%. That is, on average approximately 4% of those passengers holding confirmed reservations do not show up. If Mockingbird must bump a passenger, the passenger receives a refund on his or her ticket ($225) plus a $100 voucher toward another ticket.

How many reservations should Mockingbird sell on this airplane? The strategy will be to calculate the expected profit for a given number of reservations. For example, suppose tha t the Mockingbird manager decides to sell 18 reservations. The revenue is $225 times the number of reservations:

R = $225(18)

= $4050

  

The cost consists of two components. The first is

the cost of flying the plane and hauling the passengers who arrive (but not more than the airplane ‘s capacity of 16):

C1 = $900 +$100 x M in(Arrivals, 16)

The second component is the cost of refunds and

free tickets that must be issued if 17 or 18 passengers arnve:

C2 = ($225 + $100) x Max( O, Arrivals – 16)

In this expression for C2, the $225 represents the refund for the purchased ticket, and the $100

represents  the cost of the free ticket. The Max ( ) expression calculates the number  of excess passengers who show up (zero if the number  of arrivals is

16 or less.

   

Questions

1. Find the probability that more than 16 passengers will arrive if Mockingbird sells 17 reservations (Res = 17). Do the same for 18 and 19.

2. Find:

E (RI Res = 16) E(C1IRes = 16)

E(C2IRes = 16)

Finally, calculate

E (Profit j Res = 16) = E( R I Res = 16)

– E(C1IRes = 16) – E(C2 IRes = 16)

3.  Repeat Question 2 for 17, 18, and 19 reservations. What is your conclusion? Should Mockingbird overbook? By how much?

  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Benchmark – Small to Medium-Sized Business

 

IT risk management relies on end-user and administrative compliance with the rules, regulations, and polices set up as a means of protecting information assets within the environment. Comprehension of the consequences and rewards of policy adherence is necessary if security professionals are expected to implement security, and risk management strategies that rely on the strength of policy management and distribution.

In a 750- to 1,250-word paper, evaluate the implications of Internet use (including, but not limited to, basic web presence, online shopping, vendor unique portals, vendor specific portals, “IOT,” social media, and/or VPN use) within a SMB, as well as data protection for intellectual property. Make sure to address third-party vendors, cloud technology, and technology trends.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

This benchmark assignment assesses the following programmatic competencies:

MS Cybersecurity

3.4: Evaluate the implications of Internet use within Small to Medium-Sized Business (SMB) and data protection for Intellectual Property.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Activity- 13 Exe Project

Case 13.3 “Dear Mr. President—Please Cancel our Project!”: The Honolulu Elevated Rail ProjectThis case is a great current example of a very expensive project that was kicked off because of an assumed need—to relieve congestion in downtown Honolulu through an elevated urban rail system.  Critics argue that in addition to having a ballooning cost, the actual planning was poorly conceived, leaving Honolulu with an intrusive and ugly rail system through the downtown area, ruining panoramic views, and impeding traffic.  Additionally, advocates underestimated the power needs for the rail system, requiring the transport authority to renegotiate electricity fees for the system.  Finally, the original costs that were assumed for the project were calculated during an economic downturn and with the economy booming again, the costs of the project have gone up dramatically.  All of these elements points to a state Governor who is anxious to be rid of the project and hoping that President Trump will deny additional federal funding, in which case the project will likely be cancelled.Questions

  1. Why are public works projects like the Honolulu Rail project nearly impossible to stop once they have been approved, even if later cost estimates skyrocket? 
  2. Project Management researchers have charged that many large infrastructure projects, like this one, suffer from “delusion” and “deception” on the parts of their advocates.  Explain how “delusion” might be a cause of ballooning budgets in this project.  How does “deception” affect the final project budget overruns?

Text

Title: Project Management 

ISBN: 9780134730332 

Authors: Pinto 

Publisher: Pearson 

Edition: 5TH 19

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Legislated Privacy Concerns

Go  to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.

  • Summarize the case
  • Give your opinion of the decision.
  • Describe how the case deals with the material in this chapter

Using WORD, in your OWN WORDS, write an ORIGINAL brief essay of 300 words or more 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

300 words

 According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (2-4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. Be sure to use your own words. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussioon 250 words

 

Many believe that cloud computing can reduce the total cost of computing and enhance “green computing” (environmental friendly). Why do you believe this to be correct? If you disagree, please explain why?

A Discussion Board rubric clearly communicates expectations for participation, please see the NEC Grading Matrix for Discussion Board Postings as an example.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

questions

 

  • 5.1 Provide a brief definition of network access control.
  • 5.2 What is an EAP?
  • 5.3 List and briefly define four EAP authentication methods.
  • 5.4 What is EAPOL?
  • 5.5 What is the function of IEEE 802.1X?
  • 5.6 Define cloud computing.
  • 5.7 List and briefly define three cloud service models.
  • 5.8 What is the cloud computing reference architecture?
  • 5.9 Describe some of the main cloud-specific security threats.

Complete your answers on a WORD Document

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now