MKT-6

 

1.  What are some of the primary reasons people resist change? What are some of the ways a team leader can ensure that change is accepted or at least not resisted? 

Read chapter 10. Based on case 10-1 on page 343 as reproduced below, answer the following question.

THE QUIET MEETING:Debbie Ronson, sales supervisor, was just opening a meeting she had called for members of her department. Debbie did most of the talking for the first five minutes, recounting her group’s performance over the past week. Then she asked, “Are there any questions?” No one responded. Debbie then changed subjects. “As you know, in two weeks we’ll be going to a new format for scheduling our calls. This was outlined in the memo from the vice president, copies of which I sent to each of you. This is going to alter your calling schedules and significantly change the way we’ve been doing things. I have some ideas on how we can best work into this new system. But before getting into that, I’d like to see if anyone here has any ideas … [pause]. Anyone care to contribute anything?” No one in the group responded. Debbie continued, “Well, here’s what I think we should do. …” She then spent eight minutes outlining her plan. After the meeting was over, Debbie discussed it with one of her fellow supervisors. “I don’t know what it is,” she said, “but I can never get my people to say much at meetings. I try to give them a chance, but I always end up doing most of the talking. It seems they’re either shy or disinterested, but I really don’t know if that’s the reason or not. I just wish they’d contribute their ideas.”2. What might be some reasons for participants not saying much at Debbie’s meetings? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Digital Forensics – 14

Review the material on routers.

It is sometimes said that information extracted from a router or switch does not necessarily provide specific evidence of a particular crime. What is meant by that?  If true, what then is the most useful information collected from these devices in an investigation?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data Visualization

Part 1

Andy Kirk, of Visualising data,  believes that data visualisation is a mixture of art and science,  creativity, analysis and project management. He sees 8 “hats” in the  data visualisation process, which can either be worn by different  members of a team, or can be deliberate mindsets adopted by a solo  professional.  Understanding how each contributes to the finished  product is perhaps the key to creating great data visualisation designs…

Think  about the role you played in creating a presentation or working on a  project using data visualizations. Choose two of the 8 hats and explain  your roles (in relation to these hats) in creating the presentation or  finishing the project.

At least 250 words

References: At least two 

https://www.visualisingdata.com/2012/06/article-the-8-hats-of-data-visualisation-design/

Part 2: 

1. Describe TQM, Six Sigma and CMM (CMMI).
2. What is a Structured Walk-thru?
3. What are Service-Oriented Architectures?

Minimum 15 lines – 5 lines /question

Two references

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

rfp final

 

Module 06 Content

  1. Module 06 Course Project – Final RFP Submission
    Working off the same Request for Proposal.docx, continue to use your imagination and the fictional website hosting service provider you previously created to complete the following sections of the RFP Response Template.docx that you were developing in the previous week.

    Request for Proposal.docx

    RFP Response Template.docxWith this fictional business in mind, compile any changes recommended by your instructor in previous weeks on a final draft of the RFP to be submitted to XYZ Technology Services.

    Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.

    Save your assignment as a Microsoft Word document. (Mac users, please remember to append the “.docx” extension to the filename.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:
    Jstudent_exampleproblem_101504

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Benchmark – Professional Ethics

  

Research a professional organization for your chosen discipline. Find the code of ethics for the organizations. In a Microsoft Word document of 750 to 1,000 words, write a paper that includes the following:

1. A brief description of the organization/society for your chosen field.

2. An overview of the code of ethics for the organization/society.

3. Highlight at least two ethical principles that you think are the most important for the work you want to do.

4. Explain how the code of ethics relates to the Christian worldview. Many of the codes of ethics were founded with Biblical principles; explain this relationship.

 Prepare this assignment according to the guidelines found in the APA Style Guide.

Note: I am studying IT 

Make sure to use each question as a sub-heading

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Personal Perspective and the History of Applied Science Fields

  

Describe the historical background of your chosen field. Select a person you feel made significant contributions to society, your field of study, and who has influenced you personally. In a Microsoft Word document, in a minimum of 500 words, write a paper that includes the following:

1. Describe one of the common problems that a professional in your chosen field would be working on.

2. Research a scientist who contributed to the advancement of your chosen profession and describe their contributions within the discipline according to the Christian worldview.

3. Describe how your own view of vocation, and how your future contributions would be informed by the values of the Christian worldview. Discuss how a calling to the sciences could be a service to God and benefit mankind.

4. The paper should include a professional generated graphic model created by you, the student, that describes the evolution of your chosen discipline. The graphical model must include a timeline that shows the history of the applied science.

 Prepare this assignment according to the guidelines found in the APA Style Guide 

Note: I am studying IT 

Make sure to use each question as a sub-heading

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Errors Failures and Risks

 Answer each of these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

  1. Give an example from the book where insufficient testing was a factor in a program error or system failure.
  2. What was one cause of the delay in the completion of the Denver Airport?
  3. Why didn’t the healthcare.gov website work at first?
  4. What is one characteristic of high-reliability organizations?
  5. Describe the potential risks of alert fatigue in EHR systems.
  6. What were 2 common factors in both the Thorac-25 case and the space shuttle disaster?
  7. What does design for failure mean?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Prepare a Presentation on How Data Loss Prevention(DLP) will help organizations Hybrid Work Force data Security Challenges

explain:

What are the problems with Current DLP solutions that not able to support HYybrid work force?

why do we need to rethink DLP approach?

How to choose the right DLP solution that supports Hybrid Workforce?

How the new DLP solution will help the Hybrid work force data security challenges?

prepare 4 to 5 slides with detailed speaker notes

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

600 words – Interaction design

In Preece’s text, the discussion of What, How, and Why is covered as part of the requirements gathering process for a usability study. Which of these questions do you believe influences interaction design the most? Provide at least 3 citable examples.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cataloging Threats and Vulnerabilities

You have been hired as an information security analyst at a small company called Astounding Appliances. The company sells appliances online. Astounding Appliances owns and hosts all of its IT assets and forward-facing web applications on site. The assets are about 5 years old. The company is seeking to expand its operations in the next 5 years. 

Your manager asks you to help her document the threats and vulnerabilities to the company’s IT operations. In addition to what you already know about the company, you learn the following during your interviews and inspections for this project.

The Astounding Appliances company and all of its IT operations are located in New Orleans, Louisiana. The data center is located on the ground floor of the company’s building. There is no basement. No one can come into the data center without a smart card scan. However, there is a physical key system that can override the smart card scanner and access. There is no inventory of who has keys to the data center, although the company’s vice president for operations doesn’t think that too many people have keys.

Because New Orleans is vulnerable to hurricanes, all of the equipment in the data center is stored in elevated racks that sit on a raised floor. Pumps have also been installed to remove water. The pumps are attached to a generator, which has not been inspected in several years. You learn that it has not been inspected in a timely manner because making sure the generator is functional is not on the organization’s disaster recovery checklist.

From the director of human resources, you learn that any Astounding Appliances employee with a valid smart card can enter the data center; access is not granted based on a need to enter the data center. You also learn that smart card access is not always terminated promptly when employees leave Astounding Appliances. The director of human resources tries to audit smart card validity regularly, but this is a low-priority task for her. You also learn that it is not part of the regular employment process for new employees to complete information security training or to sign the company’s IT acceptable use policy.

Answer below:

1. Identify 6-10 vulnerabilities to Astounding Appliances information systems and data. Be sure to include the asset that is affected by the vulnerability.

2. For each vulnerability that you have already identified, document potential threats associated with it. Be sure to list the relevant information security concern (i.e., confidentiality, integrity, or availability) for the vulnerability-threat pair.

3. For each vulnerability-threat pair, identify the relevant information security concern(s) (i.e., confidentiality, integrity, or availability).

4. For each vulnerability-threat pair, identify the vulnerability category.

5. For each vulnerability-threat pair, identify the threat category.

500 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now