University of Nairobi Data Warehouse System Case Study Paper Computer Science Assignment Help

University of Nairobi Data Warehouse System Case Study Paper Computer Science Assignment Help. University of Nairobi Data Warehouse System Case Study Paper Computer Science Assignment Help.


(/0x4*br />

Assignment Instructions:

  1. Perform research to locate a data warehouse system that was used in the telecommunication, transportation, or education industries. Be sure to select one that has been developed and deployed to successfully produce actionable business intelligence.
  2. Write a case study paper that describes:
  • The architecture of this data warehouse
  • The source input systems
  • ETL processing that is required
  • The types of output reporting
  • The types of users
  • The business processes supported by this data warehouse

Be sure to also discuss the unique challenges that were encountered for this data warehouse project and how they were overcome.

Your paper should be three to five pages in length, organized and well-written, and in conformity with the CSU Global Writing Center (Links to an external site.).

In support of your response, cite and integrate at least two credible outside sources, one of which can be your textbook. Place these in a reference page formatted in accordance with APA style. This reference page does not count toward the total page requirement. The CSU Global Library is a great place to find these resources.

University of Nairobi Data Warehouse System Case Study Paper Computer Science Assignment Help[supanova_question]

Alabama Southern Wk 3 Communication, Risk & Human Resources Aspects of a Grocery Store Paper Business Finance Assignment Help

Communication, Risk, and Human Resources.

This course has major project assignments that will be due in Weeks 3 and 5. It will take more than a week’s effort to adequately complete them. Plan time to start the research and other work for those assignments earlier than the week in which they are due.

This week, you will submit the next three parts of the course-length project. The deliverables for Week 3 are:

  • The communications plan: Determine stakeholders from the requirements determination section. Add a new stakeholder and determine the following information for him or her:
    • Information need
    • The messages to be communicated
    • The timing and frequency of communication
    • The person responsible for communication
    • The medium for communication
  • Risk assessment: Determine potential risks that can prevent the project’s objectives from being met on time and within the budget. Develop a risk mitigation plan to manage the risks. The plan should have a severity ranking for each risk. For the most severe risk, develop a risk mitigation strategy that includes risk triggers and the team members responsible for responding to the risk.
  • The organization and human resources plan: Prepare an organizational structure for the project and identify the skills required to perform the work effectively and efficiently. Identify project team members and define their functions, responsibilities, qualifications, and capabilities. Explain where each team member fits into the organizational structure, including the details of the stage of the project where the team member will be assigned. Create a responsibility assignment matrix (RAM).
  • Provide a summary of the key information you have learned in the project so far. What seem to be the most important ideas? What ideas are you still finding challenging? What practical ways can you apply what you are learning?

Submission Details:

  • Submit your answers in a 6- to 8-page Microsoft Word document, using APA style.

[supanova_question]

PSY 250 Stratford University Mindful Leadership Reflection Journals Writing Assignment Help

Must be at least 300 words entry all together

Mindful Leadership

ACTIVITY 1: Beginner’s Mind

Read Chapter 1 of Mindfulness for Beginners, the Beginner’s Mind.

Then, prepare a response to the following questions:

  • In what ways is the “Beginner’s Mind” relevant to leadership?”
  • In what ways does mindful awareness awaken the leader within ourselves?

ACTIVITY 2: Emotional Intelligence

First, in your own words, define emotional intelligence.

Then, using Goleman’s five domains of emotional intelligence, conduct an in-depth assessment of yourself and the ways in which you show up as a leader that you show up as a leader. Be sure to discuss both strengths and weaknesses for each domain. Also, be sure to use proper APA formatting, citations and grammar. Goleman’s domains are depicted below.

https://web.sonoma.edu/users/s/swijtink/teaching/philosophy_101/paper1/goleman.htm

ACTIVITY 3: Self-reflection journal

Part of being a Mindful Leader requires an enhanced sense of awareness, oftentimes done via reflection. Over the next 5 weeks, you will maintain a Self-Reflection Journal of your mindfulness experiences during the week. Weekly typed reflection journals should reflect on course experience and practice of mindfulness, must be at least 300 words for each entry, and should include images, web links and resources utilized over the course of the week to promote reflection or thought.

Image result for Goleman's domains

ASSIGNMENT REQUIREMENTS

Does not engage with topic, failing to recognize any relevant perspective; written entirely off-topic. Assignment does not meet requirements or was not submitted.

0points

Shows minimal engagement with the topic, failing to recognize multiple dimensions/ perspectives; lacking even basic observations. Assignment lacks focus and/or a observable understanding. Some assignment requirements have been met.

12points

Shows some engagement with the topic without elaboration; offers basic observations but rarely original insight. Some intelligible ideas, but overall understanding is weak, unclear, or too broad. Most assignment requirements have been met.

15points

Demonstrates engagement with the topic, recognizing multiple dimensions and/or perspectives; offers some insight. Represents adequate understanding of the assigned topic; minimal irrelevant material. All assignment requirements have been met.

17points

Demonstrates exceptional engagement with the topic, recognizing multiple dimensions and/or perspectives with elaboration and depth; offers exceptional insight beyond the assignment requirement. Represents full understanding of the assignment; every word counts. All assignment requirements have been met.

20points

ORGANIZATION & FORMAT

Assignment does not adhere to appropriate formatting. The work is fully unorganized or written in stream of consciousness. No discernible introduction or conclusion or assignment was not submitted.

0points

Assignment does not adhere to appropriate formatting. Organization is missing both overall and within sentences/paragraphs. Introduction and conclusion may be lacking or illogical.

12points

Assignment has fewer than 5 formatting errors. Organization, overall and/or within paragraphs, is formulaic or occasionally lacking in coherence; few evident transitions. Introduction and/or conclusion may lack logic.

15points

Assignment has fewer than 3 formatting errors. Few organizational problems on any of the 3 levels (overall, paragraph, transitions). Assignment includes introduction and conclusion are effectively written and related to the whole.

17points

Assignment is perfectly formatted. Organization is exceptionally logical and exceeds the assignment prompt expectations; paragraphs/sentences are well-developed and appropriately divided; ideas linked with smooth and effective transitions.

20points

CONTENT DEVELOPMENT

Does not use appropriate content or does not develop any ideas within the assignment or assignment was not submitted.

0points

Uses appropriate and relevant content to develop simple ideas in some parts of the assignment.

12points

Uses appropriate and relevant content to develop and explore ideas throughout most of the assignment.

15points

Uses appropriate, relevant and compelling content to explore ideas within the context of the topic, and shaping the assignment in its entirety.

17points

Uses exceptional, accurate, relevant, and compelling content to illustrate mastery of the subject, adequately conveying understanding, and shaping the assignment in its entirety.

20points

APA FORMATTING AND DOCUMENTATION

Does not cite any sources at all with no obvious sourcing within the document or assignment was not submitted.

0points

Does not cite sources. Fewer than 3 sources and none are peer-reviewed journal articles or scholarly books. Not all web sites utilized are credible, and/or sources are not current.

12points

Cites some data obtained from other sources. Citation style is either inconsistent or incorrect. Fewer than 3 sources, or fewer than 2 of 3 are peer-reviewed journal articles or scholarly books. All web sites utilized are credible.

15points

Cites most data obtained from other sources. APA citation style is used in both text and reference page. Contains 3 current sources, of which at least 2 are peer reviewed journal articles or scholarly books. All web sites utilized are authoritative.

17points

Cites all data obtained from other sources. APA citation style is perfectly used in both text and reference page. More than 5 current sources, of which all are peer-review journal articles or scholarly books. Sources include both general background sources and specialized sources. Special interest sources and popular literature are acknowledged as such if they are cited. All web sites utilized are authoritative.

20points

MECHANICS, SPELLING & GRAMMAR

Uses language that sometimes impedes meaning because of errors in usage or assignment was not submitted.

0points

Uses language that sometimes impedes meaning because of errors in usage.

12points

Uses language that generally conveys meaning to readers with clarity, although writing may include some spelling and grammar errors.

15points

Uses straightforward language that generally conveys meaning to readers. The language in the paper has few spelling and grammar errors.

17points

Uses graceful language that exceptionally communicates meaning to readers with clarity and fluency, and is virtually free of spelling and grammar errors.

20points

[supanova_question]

ITESM Mindfulness and Leadership Essay Humanities Assignment Help

Watch Chade-Meng Tan’s TedTalk on Search Inside Yourself, paying particular attention to information shared about “mindfulness.”

Begin to think about the strengths and weaknesses of the concept of Mindfulness.

Then, watch the segment of 60-Minutes where Anderson Cooper also discusses the concept.

https://youtu.be/ozyr7jVucz0

Next, read Chapter 1 in your “Being Peace” textbook, Suffering is Not Enough. Think about how it resonates with you, personally. Then, reflect on what things you might “suffering” with, and how you can mitigate that suffering.

Conduct some research in search of a peer-reviewed journal article on Mindfulness. Your article does not have to be specifically about Mindful Leadership, however it MUST discuss Mindfulness in general.

Essay:

In a 2-3 page essay, (1) provide a summary of Chade Meng-Tan’s video, explicitly discussing share any strengths and/or weaknesses of the concept of Mindfulness. What does it mean to you? Then, based on your reflection of Suffering is Not Enough, (2) discuss what thing you may currently be suffering from and how you can begin to mitigate them, based on what you’ve learned so far. Finally, from the article you have located, (2) pull out two salient points that resonate most with you, including an explanation of “why”. Your essay should contain properly formatted citations and be free of spelling/grammar errors.

You must use either scholarly or popular sources in your writing. You must use primary sources but may also use secondary sources to bolster your primary source materials. The following link provides an outline of what scholarly, popular, primary and secondary sources are and how to use them: Purdue Owl: Source Materials

DO NOT USE sources such as Wikipedia, Ask.com, Articlebase, businessdictionary.com, eHow, smallbusiness.chron.com, slideshare, referenceforbusiness.com, any term paper websites, prezi, or other similar sources as they are not considered reliable scholarly sources. From time-to-time, the professor may point out other sources that are not reliable academic sources.

ASSIGNMENT REQUIREMENTS
Does not engage with topic, failing to recognize any relevant perspective; written entirely off-topic. Assignment does not meet requirements or was not submitted.

0points

Shows minimal engagement with the topic, failing to recognize multiple dimensions/ perspectives; lacking even basic observations. Assignment lacks focus and/or a observable understanding. Some assignment requirements have been met.

12points

Shows some engagement with the topic without elaboration; offers basic observations but rarely original insight. Some intelligible ideas, but overall understanding is weak, unclear, or too broad. Most assignment requirements have been met.

15points

Demonstrates engagement with the topic, recognizing multiple dimensions and/or perspectives; offers some insight. Represents adequate understanding of the assigned topic; minimal irrelevant material. All assignment requirements have been met.

17points

Demonstrates exceptional engagement with the topic, recognizing multiple dimensions and/or perspectives with elaboration and depth; offers exceptional insight beyond the assignment requirement. Represents full understanding of the assignment; every word counts. All assignment requirements have been met.

20points

ORGANIZATION & FORMAT

Assignment does not adhere to appropriate formatting. The work is fully unorganized or written in stream of consciousness. No discernible introduction or conclusion or assignment was not submitted.

0points

Assignment does not adhere to appropriate formatting. Organization is missing both overall and within sentences/paragraphs. Introduction and conclusion may be lacking or illogical.

12points

Assignment has fewer than 5 formatting errors. Organization, overall and/or within paragraphs, is formulaic or occasionally lacking in coherence; few evident transitions. Introduction and/or conclusion may lack logic.

15points

Assignment has fewer than 3 formatting errors. Few organizational problems on any of the 3 levels (overall, paragraph, transitions). Assignment includes introduction and conclusion are effectively written and related to the whole.

17points

Assignment is perfectly formatted. Organization is exceptionally logical and exceeds the assignment prompt expectations; paragraphs/sentences are well-developed and appropriately divided; ideas linked with smooth and effective transitions.

20points

CONTENT DEVELOPMENT

Does not use appropriate content or does not develop any ideas within the assignment or assignment was not submitted.

0points

Uses appropriate and relevant content to develop simple ideas in some parts of the assignment.

12points

Uses appropriate and relevant content to develop and explore ideas throughout most of the assignment.

15points

Uses appropriate, relevant and compelling content to explore ideas within the context of the topic, and shaping the assignment in its entirety.

17points

Uses exceptional, accurate, relevant, and compelling content to illustrate mastery of the subject, adequately conveying understanding, and shaping the assignment in its entirety.

20points

APA FORMATTING AND DOCUMENTATION

Does not cite any sources at all with no obvious sourcing within the document or assignment was not submitted.

0points

Does not cite sources. Fewer than 3 sources and none are peer-reviewed journal articles or scholarly books. Not all web sites utilized are credible, and/or sources are not current.

12points

Cites some data obtained from other sources. Citation style is either inconsistent or incorrect. Fewer than 3 sources, or fewer than 2 of 3 are peer-reviewed journal articles or scholarly books. All web sites utilized are credible.

15points

Cites most data obtained from other sources. APA citation style is used in both text and reference page. Contains 3 current sources, of which at least 2 are peer reviewed journal articles or scholarly books. All web sites utilized are authoritative.

17points

Cites all data obtained from other sources. APA citation style is perfectly used in both text and reference page. More than 5 current sources, of which all are peer-review journal articles or scholarly books. Sources include both general background sources and specialized sources. Special interest sources and popular literature are acknowledged as such if they are cited. All web sites utilized are authoritative.

20points

MECHANICS, SPELLING & GRAMMAR

Uses language that sometimes impedes meaning because of errors in usage or assignment was not submitted.

0points

Uses language that sometimes impedes meaning because of errors in usage.

12points

Uses language that generally conveys meaning to readers with clarity, although writing may include some spelling and grammar errors.

15points

Uses straightforward language that generally conveys meaning to readers. The language in the paper has few spelling and grammar errors.

17points

Uses graceful language that exceptionally communicates meaning to readers with clarity and fluency, and is virtually free of spelling and grammar errors.

20points

CATEGORY

Exceeds Competency

90-100

Competent

80-89

Developing Competency

70-79

Not Competent

69 and below

Introduction/

Thesis

The introduction is inviting. It grabs the reader’s attention and compels him/her to read further. Engaging lead/hook.

The introduction clearly states the main topic and previews the structure of the paper, but is not particularly inviting to the reader.

The introduction states the main topic, but does not adequately preview the structure of the paper nor is it particularly inviting to the reader.

There is no clear introduction of the main topic or structure of the paper.

Content/Body Paragraphs/

Evidence

There is one clear, well-focused conflict/problem to be resolved. Author uses dialogue, action, and description to show not tell the story.

Main idea is clear but the supporting information is general. More detail needed to “show not tell” the story.

Main idea is somewhat clear but there is a need for more supporting information. Author mostly tells the story instead of showing it.

The main idea is not clear. There is a seemingly random collection of information.

Organization –

Logical /

Chronological

Details are placed in a logical order and the way they are presented effectively keeps the interest of the reader.

Details are placed in a logical order, but the way in which they are presented/introduced sometimes makes the writing less interesting.

Some details are not in a logical or expected order, and this distracts the reader.

Many details are not in a logical or expected order. There is little sense that the writing is organized.

Grammar/Punctuation /APA Style

Writer makes no errors in grammar or punctuation, so the paper is exceptionally easy to read. Follows APA style.

Writer makes 1 or 2 errors in grammar or punctuation, but the paper is still easy to read. Missing one or two elements of APA style.

Writer makes a few errors in grammar and/or punctuation that catch the reader’s attention and interrupt the flow.

Missing most APA formatting.

Writer makes several errors in grammar and/or punctuation that catch the reader’s attention and greatly interrupt the flow. No APA style.

Vocabulary/Spelling

Writer uses vivid words and phrases that linger or draw pictures in the reader’s mind, and the choice and placement of the words seems accurate, natural and not forced.

Writer uses vivid words and phrases that linger or draw pictures in the reader’s mind, but occasionally the words are used inaccurately or seem overdone.

Writer uses words that communicate clearly, but the writing lacks variety, punch or flair.

Writer uses a limited vocabulary that does not communicate strongly or capture the reader’s interest. Jargon or clichés may be present and detract from the meaning.

Conclusion

Voice/Fluency

The conclusion is strong and leaves the reader with a feeling that they understand what the writer is “getting at.”

Coherence supported by correct pronunciation, confident enunciation and articulation. Pauses are purposeful and enhance fluency. No noticeable fillers.

The conclusion is recognizable and ties up almost all the loose ends. The “so what” a bit cliché.

Tone fits message, rate and volume are appropriate, pitch seems natural. Careful pronunciation supports coherence. Enunciation and articulation are mostly clear. Minimal audience distractions.

The conclusion is recognizable, but does not tie up several loose ends.

Inconsistent use of voice to hold audience. Rate may be too fast or slow, pitch to high or low. Pronunciation mostly correct though enunciation and articulation are tentative. Speaker recovers from pauses

[supanova_question]

EH 1010 CSU Technology Impacts Education Negatively Discussion Humanities Assignment Help

Illustration Essay Draft

Write a 750-1000 word essay about a topic in which you argue for the existence of a particular phenomenon by stating a generalization about the topic. Then you will support that generalization (in the form of a thesis statement) by choosing to write a single-example illustration essay or a multiple-example illustration essay (see Unit V, Lesson 2). The essay should be written in the style and form described within Unit V.

Purpose: Throughout Unit V, we have discussed the conventions of the illustration essay. The purpose of this assignment is to measure your mastery of those conventions by putting your knowledge to practice. In a larger context, the purpose of writing an illustration essay is to convey an idea to the reader by providing illustrations (examples) that will solidify the existence of a topic.

Process: For the illustration essay, you will complete the following steps:

  • Choose a topic: See the methods for developing a topic and the suggested list of topics in Unit V, Lesson 3.
  • Decide if you want to write a single-example or multiple-example essay: See Unit V, Lesson 2, for more instruction on the differences between single-example and multiple-example essays.
  • Collect illustrations: See Unit V, Lesson 1, for more information about different kinds of illustrations. See Unit V, Lesson 4, for more information about how to gather illustrations.
  • Craft your thesis statement: See Unit V, Lesson 5, for more information on how to write a thesis. Note that you want to craft your thesis according to whether you choose to write a single-example or a multiple-example essay.
  • Draft the essay: For each section of the essay, see the following: Unit V, Lesson 6, for the introduction; Unit V, Lesson 7, for the body paragraphs; and Unit V, Lesson 8, for the conclusion.

Stylistic details: All essays must meet the following requirements:

  • 750-1000 words.
  • Write in Times New Roman, 12 pt. font.
  • Include one-inch margins on all sides.
  • Use double spacing (top-to-bottom every page, to include above and below titles and centered words).
  • Include an APA title page (for all essays) and reference list that includes all of the sources used in the essay.
  • Include a header.
  • Include page numbers (upper-right corner only).
  • Adhere to APA convention and documentation style (See the CSU citation guide for assistance.).
  • At least one source is required. All sources used must be cited.

The following document will assist you in creating this assignment:

Information about accessing the grading rubric for this assignment is provided below.

Resources

The following resource(s) may help you with this assignment.

Throughout this unit, we have discussed ways that illustrations can help to convey a point or to exemplify an idea that a writer is trying to communicate. No doubt, you find yourself in situations all the time in which you must use illustrations. Think about a time when you conveyed a point to someone—a friend, relative, coworker, or colleague—and used an exceptionally apt illustration to drive home a point. You can also write about a time that someone provided you with an enlightening example that crystalized an idea for you. You might also choose to write about how you use illustrations in your daily life.

Do you use illustrations to teach others? How have you used examples to win an argument, teach your child a difficult lesson, or to explain a problem? In what ways are illustrations a part of your daily interactions with others?

Your response should be at least 200 words. No references or citations are necessary.

Unit V VIDEO:

https://mega.nz/file/0AdCGQyK#myzb1A5Q26taj3JA8SD5…

[supanova_question]

[supanova_question]

New England College of Business and Finance Become Pci-Dss Compliant Plan Computer Science Assignment Help

Task 1

In at least three pages of content, come up with a plan to become PCI-DSS compliant at your company. Currently, your company, a mid-size online retailer, does have an information security program but is not PCI-DSS compliant. Come up with a plan to bring the company into compliance and what needs to be done to reach that objective.

 

Include at least one quote from each of 3 different articles

Task 2

Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

 

New England College of Business and Finance Become Pci-Dss Compliant Plan Computer Science Assignment Help[supanova_question]

UWSC Business Women Role Through Time Discussion Business Finance Assignment Help

I have added the files you will need to work on the assignment as well as the questions I will also put in some links to some videos to show you what you can see.

Link: https://www.ispot.tv/ad/dnlg/samsung-this-is-family-song-by-layup (Links to an external site.)

Link : Samsung Family Hub | More Than A Fridge (Links to an external site.)

Questions:

1) Cowan argues that despite the introduction of labor saving devices into households during the early stages of industrialization, in the end, these devices led to more work for mother. How come?

2) According the commercials, smart fridge technology offers solutions to contemporary issues such as digital distraction and gender imbalances in housework all while saving time. Using the Wajcman reading, do you think the introduction of “smart” technology into household will fix many of the problems that they are advertised to solve?

[supanova_question]

MMC3407 Rasmussen College Visual Elements at Apple Discussion Business Finance Assignment Help

I am looking for help with a thesis statement and outline please! My assigned company is Apple, and we are to consider the visual elements and how they effect the viewers. The template shared with us is attached!

Thank you so much!!!

  • APA title page, reference page, and formatting.
  • Use at least four academic/scholarly sources.
  • Use properly cited quotes and paraphrases when necessary.
  • Complete, polished, and error-free cohesive sentences.
  • Contains an introduction, body, and conclusion.
  1. Sensory Response – When analyzing the viewer’s
    sensory response to a particular visual, it is important to consider the
    visual elements that attract the eyes. Close your eyes when considering
    a visual. When you open your eyes, what are the first visual elements
    that you see? When analyzing a viewer’s Sensory Response, you may
    consider analyzing at least two of the following effects:
    1. Colors
    2. Lines
    3. Shapes
    4. Balance
    5. Contrast

  2. Perceptual Response – When analyzing a viewer’s
    perception of visuals, it is important to consider the audience.
    Consider who is or is not attracted to this type of visual
    communication. When analyzing a viewer’s Perceptual Response, consider
    at least two of the following effects:
    1. Target audience specifics (age, profession, gender, financial status, etc.)
    2. Cultural familiarity elements (ethnicity, religious preference, social groups, etc)
    3. Cognitive visuals (viewer’s memories, experiences, values, beliefs, etc.)

  3. Technical Response – When analyzing a viewer’s
    response to certain visuals, we need to consider the technical visual
    aspects that may affect perception. Describe how visuals affect the
    interpretation of the intended media communication message. Address
    specific technological elements that impact perception. When analyzing
    the Technical Response, consider the Laws of Perceptual Organization
    (similarity, proximity, continuity, common fate, etc), and at least two
    of the following types of visuals:
    1. Drop-down menus
    2. Hover-over highlighting
    3. Animations
    4. Quality of visuals

  4. Emotional Response – When analyzing a viewer’s
    Emotional Response, it is important to consider the targeted audience
    preferences and emotional intelligence. Discuss what the viewer might
    want to see and what type of visual presentation will set the tone for
    that response. When analyzing the Emotional Response, consider the
    effects of at least two of the following types of visuals:
    1. Mood setting colors
    2. Mood setting lighting
    3. Persuasive images
    4. Positioning of search or purchase buttons
    5. Social media icons and share options

  5. Ethical Response – When analyzing a viewer’s
    Ethical Response, it is important to consider the targeted audience
    values and beliefs. Identify any negative messages about certain ideas,
    groups, or cultures. Describe and pinpoint images that may be
    inappropriate for a variety of viewers. Keep in mind that your website
    can be accessed by all ages and groups. When analyzing the Ethical
    Response, consider at least two of the following types of visuals:
    1. Visual stereotypes
    2. Limitations in diversity
    3. Inappropriate images for all audiences
    4. Digital alterations
    5. False representation or advertising

[supanova_question]

CIS 502 Strayer University Contingencies and Risk Analysis Economics Solved Quiz Computer Science Assignment Help

1.Which of the following statements are validated or verified via risk analysis?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Security is measurable.

B

Security is cost effective.

C

Security is responsive to threat.

D

Security completely protects an environment.

2.Which of the following represents accidental or intentional exploitations of vulnerabilities?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Breaches

B

Threat agents

C

Risks

D

Threat events

3.Question 3 :

STRIDE is often used in relation to assessing threats against applications or operating systems. Which of the following is not an element of STRIDE?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Spoofing

B

Disclosure

C

Repudiation

D

Elevation of privilege

4.Which of the following information does a business case include?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Risks and contingencies

B

Methods and assumptions

C

Recommendations

D

Testing strategies

5.Which of the following are the cost functions that are related to quantitative risk analysis?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Annualized loss expectancy

B

Annualized rate of occurrence

C

Double profit gain

D

Single loss expectancy

6.Question 6 :

Which of the following access controls includes the hardware or software mechanisms used to manage access and provide protection for resources and systems?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Administrative

B

Technical

C

Physical

D

Corrective

7.Question 7 :

Which of the following elements of risk management eliminates vulnerabilities and protects the system against threats?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Exposure

B

Risk

C

Asset

D

Safeguard

8.Risk analysis provides to the higher management details necessary to determine risks that should be mitigated, transferred, and accepted. Which of the following statements are true of risk analysis?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

It uses public key cryptography to digitally sign records for a DNS lookup.

B

It facilitates slave DNS servers in transferring records from the master server to a slave server.

C

It recognizes risks, quantifies the impact of threats, and supports budgeting for security.

D

It adjusts the requirements and objectives of the security policy with business o

9.Which of the following is a software testing technique that provides invalid, unexpected, or random data to the inputs of a program?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Timing

B

Stress

C

Fuzz

D

Recovery

10.Vulnerabilities and risks are evaluated based on their threats against which of the following?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

One or more of the CIA Triad principles

B

Data usefulness

C

Due care

D

Extent of liability

11.Which of the following contains the primary goals and objectives of security?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

The CIA Triad

B

A network’s border perimeter

C

The internet

D

A stand-alone system

12.Which of the following steps are included in the RMF (risk management framework)?

Each correct answer represents a part of the solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Select an initial set of baseline security controls for the information system.

B

Implement the security controls and explain how the controls are employed within the information system.

C

Document any exceptions to the classification policy that are discovered, and integrate them into the evaluation criteria.

D

Categorize the information system and the information processed, stored, and transmitted.

13.Question 13 :

When an employee is to be terminated, which of the following should be done?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Inform the employee a few hours before they are officially terminated.

B

Disable the employee’s network access just as they are informed of the termination.

C

Send out a broadcast email informing everyone that a specific employee is to be terminated.

D

Wait until you and the employee are the only people remaining in the building before ann

14.Question 14 :

Which of the following are tactical documents that specify steps or methods to accomplish the goals and overall direction defined by security policies?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Standards

B

Guidelines

C

Procedures

D

Baselines

15.

Question 15 :

Which of the following would generally not be considered an asset in a risk analysis?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Users’ personal files

B

A development process

C

An IT infrastructure

D

A proprietary system r

16.Mark receives an e-mail in his inbox that reads “All employees should attend phone training in the seminar hall before using their newly installed digital phones.” Which of the following is this email an example of?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Procedure

B

Security policy

C

Regulatory policy

D

Company guideline

17.Auditing is a required factor to sustain and enforce what?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Accountability

B

Redundancy

C

Accessibility

D

Confidentiality

18._______________ refers to keeping information confidential that is personally identifiable or that might cause harm, embarrassment, or disgrace to someone if revealed.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Concealment

B

Privacy

C

Criticality

D

Seclusion

19.Which of the following is not considered a violation of confidentiality?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Social engineering

B

Stealing passwords

C

Eavesdropping

D

Hardware destruction

20.Question 20 :

Qualitative risk analysis enables an individual to identify potential risks, and assets and resources which are susceptible to these risks. Which of the following statements are true of qualitative risk analysis?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

It provides useful and meaningful results.

B

It supports automation.

C

It includes judgment, intuition, and experience.

D

It depends more on scenarios rather than calculations.

21.Question 21 :

Separation of duties comes under which of the following access controls?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Directive

B

Preventive

C

Corrective

D

Detective

22.Which of the following is not considered an example of data hiding?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Preventing an authorized reader of an object from deleting that object

B

Keeping a database from being accessed by unauthorized visitors

C

Restricting a subject at a lower classification level from accessing data at a higher classification level

D

Preventing an application from accessing hardware directly

23.What element of data categorization management can override all other forms of access control?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Taking ownership

B

Classification

C

Physical access

D

Custodian responsibilities

24.A portion of the __________________ is the logical and practical investigation of business processes and organizational policies. This process/policy review ensures that the stated and implemented business tasks, systems, and methodologies are practical, efficient, and cost-effective, but most of all (at least in relation to security governance) that they support security through the reduction of vulnerabilities and the avoidance, reduction, or mitigation of risk.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Documentation review

B

Countermeasure selection

C

Risk aversion process

D

Hybrid assessment

25.Question 25 :

What process or event is typically hosted by an organization and is targeted to groups of employees with similar job functions?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Awareness

B

Training

C

Termination

D

Education

26.Which of the following concepts represent the three fundamental principles of information security?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Privacy

B

Integrity

C

Confidentiality

D

Availability

27.While performing a risk analysis, you identify a threat of fire and a vulnerability because there are no fire extinguishers. Based on this information, which of the following is a possible risk?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

System malfunction

B

Damage to equipment

C

Virus infection

D

Unauthorized access to confidential information

28.Question 28 :

Which of the following is a primary purpose of an exit interview?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

To evaluate the exiting employee’s performance

B

To cancel the exiting employee’s network access accounts

C

To return the exiting employee’s personal belongings

D

To review the nondisclosure agreement

29.Which type of security plan is designed to be a forwarding looking document pointing out goals to achieve in a five-year time frame?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Operational

B

Tactical

C

Strategic

30.Which policy discusses activities and behaviors that are acceptable and defines consequences of violations, within an organization?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Acceptable use

B

Informative

C

Advisory

D

Regulatory

31.Which of the following focuses on verifying compliance with stated security objectives, requirements, regulations, and contractual obligations?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Ownership

B

Data classification

C

Third-party governance

D

Procedure

32.When a safeguard or a countermeasure is not present or is not sufficient, what remains?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Penetration

B

Risk

C

Exposure

D

Vulnerability

33.When evaluating safeguards, what is the rule that should be followed in most cases?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

The annual costs of safeguards should not exceed 10 percent of the security budget.

B

The expected annual cost of asset loss should not exceed the annual costs of safeguards.

C

The annual costs of safeguards should equal the value of the asset.

D

The annual costs of safeguards should not exceed the expected annual cost of asset loss.

34.Which of the following is defined as the cost related to only one realized risk against a particular asset?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Exposure factor

B

Annualized rate of occurrence

C

Single loss expectancy

D

Annualized loss expectancy

35.The exposure factor is defined as the percentage of loss experienced by an organization when a specific asset is violated by a realized risk. Which of the following statements are true of the exposure factor?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Its value is small for assets that can be easily replaced, for example hardware.

B

Its value is large for assets that cannot be replaced, for example product designs, or a database of customers.

C

It is the expected frequency of occurrence of a particular threat or risk in a single year.

D

It is also known as the loss potential.

36.Mark reads the following lines in the document from his workstation:

  1. Access the Aspen Bridge by telnet.
  2. Enter into privileged mode.
  3. Execute command 6 and press Enter.
  4. Load the config file.
  5. Hit Run.

What type of document is Mark reading?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Security policy

B

Procedure

C

Guideline

D

Regulatory policy

37.A security policy is defined as the document that describes the scope of an organization’s security requirements. Which of the following statements are true of a security policy?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

It provides security solutions to provide necessary protection against security threats.

B

It includes assets that are to be protected.

C

It uses public key cryptography to digitally sign records for a DNS lookup.

D

It facilitates slave DNS servers to transfer records from the master server to a slave server.

38.Question 40 :

Which of the following is not an element of the risk analysis process?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Creating a cost/benefit report for safeguards to present to upper management

B

Selecting appropriate safeguards and implementing them

C

Evaluating each threat event as to its likelihood of occurring and cost of the resulting damage

D

Analyzing an environment for risks

39.

Question 41 :

By using which analysis does a group reach an anonymous consensus while all members of that group are in the same room?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Survey

B

Delphi technique

C

Brainstorming

D

Storyboarding

40.Which of the following approaches should you consider while preparing and conducting a risk assessment?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Create a business continuity plan.

B

Create a regulatory policy.

C

Identify a consistent risk assessment methodology.

D

Perform the risk and vulnerability assessment as per the defined standard.

41.Question 43 :

Which commercial business/private sector data classification is used to control information about individuals within an organization?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Confidential

B

Private

C

Sensitive

D

Proprietary

42.Qualitative risk analysis includes judgment, intuition, and experience. Which of the following methods are used to perform qualitative risk analysis?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Checklists

B

All of these

C

Delphi technique

D

Brainstorming

43.Which of the following is the most important and distinctive concept in relation to layered security?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Parallel

B

Filter

C

Multiple

D

Seri

44.Question 46 :

What ensures that the subject of an activity or event cannot deny that the event occurred?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

CIA Triad

B

Hash totals

C

Nonrepudiation

D

Abstraction

45.Which of the following defines the expected behavior from a security mechanism?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Instant messaging

B

Security function

C

Provisioning

D

Encapsulation

46.Question 48 :

When seeking to hire new employees, what is the first step?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Set position classification.

B

Create a job description.

C

Request résumés.

D

Screen candidates

47.What is the primary objective of data classification schemes?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

To control access to objects for authorized subjects

B

To manipulate access controls to provide for the most efficient means to grant or restrict functionality

C

To establish a transaction trail for auditing accountability

D

To formalize and stratify the process of securing data based on assigned labels of importance and sensitivity

48.Which of the following is typically not a characteristic considered when classifying data?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

National security implications

B

Useful lifetime

C

Size of object

D

Value

49.You work as a security manager for an organization. Your organization has been facing network and software security threats in the last few months. You want to make a new security policy to enhance the safety of your information system. Which of the following features should your security policy support?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

It should define the acceptable risk levels.

B

It should define the security goals and practices that are necessary to protect the crucial interests of your organization.

C

It should define the configuration items.

D

It should define the overall security strategy.

50.If a security mechanism offers availability, then it offers a high level of assurance that authorized subjects can _____________________ the data, objects, and resources.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Control

B

Audit

C

Access

D

Repudiate

51.Which of the following involves reading the exchanged materials and verifying them against standards and expectations?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Regulatory policy

B

Documentation review

C

Procedure

D

Security poli

52.

Question 55 :

Which of the following BIA terms identifies the amount of money a business expects to lose to a given risk each year?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

EF

B

ALE

C

SLE

D

ARO

53.What is the primary goal of change management?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Keeping users informed of changes

B

Allowing rollback of failed changes

C

Preventing security compromises

D

Maintaining documentation

54.What is the primary goal of change management?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Keeping users informed of changes

B

Allowing rollback of failed changes

C

Preventing security compromises

D

Maintaining documentation

55.Question 57 :

Who has the authority to grant access to a subject in the discretionary access control method?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Owner

B

Auditor

C

Custodian

D

User

56.What process or event is typically hosted by an organization and is targeted to groups of employees with similar job functions?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Training

B

Awareness

C

Education

D

Termination

58.Which of the following is the lowest military data classification for classified data?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Sensitive

B

Private

C

Proprietary

D

Secret

59.Question 60 :

How is the value of a safeguard to a company calculated?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

ALE before safeguard – ALE after implementing the safeguard – annual cost of safeguard

B

Total risk – controls gap

C

ALE after implementing safeguard + annual cost of safeguard – controls gap

D

ALE before safeguard * ARO of safeguard

60.

Question 61 :

What are the two common data classification schemes?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Military and private sector

B

Classified and unclassified

C

Private sector and unrestricted sector

D

Personal and government

61.How is the value of a safeguard to a company calculated?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

ALE before safeguard – ALE after implementing the safeguard – annual cost of safeguard

B

ALE before safeguard * ARO of safeguard

C

ALE after implementing safeguard – annual cost of safeguard – controls gap

D

Total risk – controls gap

62.Single loss expectancy (SLE) is defined as the cost related to a single realized risk against a particular asset. Which of the following statements relates to single loss expectancy?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

It represents the possible yearly cost of all instances of a particular realized threat against a particular asset.

B

It represents the percentage of loss experienced by an organization when a specific asset is violated by a realized risk.

C

It represents the exact amount of loss that an organization experiences when an asset gets damaged by a particular threat.

D

It represents expected frequency of occurrence of a particular threat or risk within a single year.

63.Which of the following makes sure that all parties involved are in agreement with all the issues of concern?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Open document exchange

B

Data classification

C

Ownership

D

Procedure

[supanova_question]

Grossmont College Argentina In 1983 Reflections on The Language of The Military and George Orwell Essay Humanities Assignment Help

The due date for this review is Tuesday, July 28 at 11:59 PM. No late papers will be accepted, all reviews must be submitted by July 28. The report is to be 5-6 pages in length. Please be sure to use both a title page and works cited page. (title and works cited pages do not count toward the overall page count of your review) You are also encouraged to follow the MLA or Chicago formats to develop this report. Please double-space your review. This review will count as 20% toward your final grade. And in your works cited page, please list the name of the article that you will be summarizing and analyzing. This an example of the type of the format you should follow:

“Argentina in 1983: Reflections on the Language of the Military and George Orwell,” by Alberto Ciria. Canadian Journal of Latin American and Caribbean Studies, Vol. 11, No. 21 (1986), pp. 57-69.

In terms of the content of the report, I am looking for two main points of discussion. First, you should devote the first half of the report to a summary of the main points that the author is trying to convey to the reader. To help you to address this issue, consider some of these questions: What type of article is this? Is the author presenting an original feature, or is he/she conducting a book review? If this is a book review, what book (or books) is being reviewed? What is the author’s purpose for writing this article? What is the author’s academic or professional background?

As for the second point of discussion, this is where you provide your opinion or perceptions of the article. In other words, what did you think about it? What were the strengths or weaknesses of the article? How did the article relate to the class? You are definitely encouraged to write in first person singular (I feel that…, I think..) as you provide your opinions. As a general rule of thumb, your JSTOR review should be about 60% summary and 40% commentary. Thus a 5-page review with about 3 & 1⁄2 pages summary and 1 & 1⁄2 pages commentary is an ideal proportion.

PreviousNext

[supanova_question]

University of Nairobi Data Warehouse System Case Study Paper Computer Science Assignment Help

University of Nairobi Data Warehouse System Case Study Paper Computer Science Assignment Help

× How can I help you?