Identify an innovative technique for managing the company’s e-commerce program better or suggest an improvement for an existing process to improve both efficiency and effectiveness.

Week 5 Comprehensive Learning Assessment 2 Topic & Source List

Comprehensive Learning Assemssment 2 Instructions

Create a detailed plan step by step of how to build an e-commerce business. Since this is a fictional business, you can be creative with your approach. Research business plans to serve as examples of what you need to include in your business plan. At the end of your plan, include a reflection on what you learned throughout this project and discuss how easy or difficult this would be to implement in the real world.

Your Comprehensive Learning Assessment 2 submission must contain the following items in addition to those listed above:

  • Using your free version of Zoom, create a video voicemail for the Chief Technology Officer (CTO) addressing an issue that has arisen from implementing the new e-commerce feature you wrote about in your Comprehensive Learning Assessment 1. In the video voicemail, make sure to include your thoughts and ideas about how to overcome these issues. This should demonstrate your leadership and management skills for the CTO. Make sure to provide the link to this recording in that section of your paper.
  • In a separate section of your Comprehensive Learning Assessment 2 submission, identify and discuss the ethical ramifications of poor e-commerce security and suggest training programs for staff to remediate this type of potential issue.
  • Identify an innovative technique for managing the company’s e-commerce program better or suggest an improvement for an existing process to improve both efficiency and effectiveness.

Your paper should meet the following requirements:

  • A minimum of six pages of content, not including title and reference pages
  • A minimum of five scholarly references to justify your content
  • APA format and referencing

Getting Started:

This week, choose a digital business type for which you want to create a plan. Additionally, find five credible sources that align with this type of business. Cite the sources in APA.

 

Explain Windows 10 deployment methods. Which method or methods you think will be appropriate for the upgrade?

Client Presentation

Version Summary
Recommended version of Windows 10 (e.g., Windows 10 Pro, Enterprise, Pro Workstation) and specific reasons for your choice (e.g., security features, technical and business requirements).

Installation Methods
Explain Windows 10 deployment methods. Which method or methods you think will be appropriate for the upgrade? Consider the hardware specifications outlined in the project scenario.

Security Features
Windows Security, BitLocker, Defender, Local Security Policy

Backup and Recovery Overview
Discuss the importance of backing up and recovery of Windows 10. This can include explaining what types of files and data that can backed up and restored. This should address:

  • The problems encountered when Tetra Shillings Accounting fell victim to a ransomware attack that resulted in the loss of critical data.
  • The concerns that Tetra Shillings Accounting has concerning recovering data that is lost due to deletion, corruption, or media failure.
  • The ability to restore system files and settings without affecting the user’s personal files and data.
  • The concerns that the client has about recovering systems that are negatively impacted by an operating system update.

Backup and Recovery Tools
You will need to explain how to use Windows 10 backup and recovery tools to meet these objectives. Provide a brief overview of each tool and how it can be used to address the company’s concerns. Use screenshots to demo how to configure backups that address the firm’s need to recover from a ransomware attack and restore the system to a state before a Windows update, driver, or application was installed.

Backup to Recover from Ransomware Attack
Describe how to back up and restore individual files using the utilities available in Windows 10. This should provide the client the ability to restore files lost due to ransomware attacks or other potential risks.

Backup and Recover a Restore Point
Research how to protect backup data that is stored on the network. Based on your research, you need to present a strategy to protect backup data that is compromised during a ransomware attack. This will most likely require a strategy to store, copy, or move backups to an offsite location. In this slide, you will need to explain the risks of only having only having a single copy of a backup stored on the network. Think about if the client suffers another ransomware attack and the corrupted data cannot be restored because the backups were also compromised during the attack.

Write a paper that explains how virtualization tools can support ABC University by creating virtual laboratories where software can be installed and accessed by students at a reasonable cost to the organization.

Explain Server-Side and Client-Side Virtualization

Instructions

Scenario:

ABC University offers several degrees in computer science, information technology, and engineering. Students in these technical programs need to use several software programs that are expensive to buy. To avoid added costs, the university has decided to purchase the required software and to provide the students with access to the software via application virtualization.

Instructions:

For this assignment, you must write a paper that explains how virtualization tools can support ABC University by creating virtual laboratories where software can be installed and accessed by students at a reasonable cost to the organization.

Your paper should include the following:

Server-side and client-side application virtualization (include a network diagram)
Ways ABC University can create the client-side application virtualization (include a network diagram)
How ABC University students can access the software using application virtualization (include a network diagram)
Length: 3-5-page paper with original network diagrams

Write an essay on why organizations may not place enough importance on security governance. What might happen to these organizations in the event of a security breach?

Discussion 10 – Security Maintenance

For this week’s discussion, discuss the following:

1. Write an essay on why organizations may not place enough importance on security governance.

2. What might happen to these organizations in the event of a security breach?

Discuss the experiment and discuss the rights violated within the study. Discuss any outcomes or legislature associated with the study. What type of consent would have been needed to make the study ethical and valid?

WWII

Research a historical experiment that impacted or helped shape the development of ethical codes and regulations. The videos from week 1 have already described some of the issues during WWII and Nazi Germany and the Tuskegee Study, avoid using those examples as the ethical issue you select.

-Discuss the experiment and discuss the rights violated within the study.
-Discuss any outcomes or legislature associated with the study.
-What type of consent would have been needed to make the study ethical and valid?

Explain specialized terms or concepts to facilitate audience comprehension. Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas. Describe the context surrounding the issue or problem.

Project 2: Desktop Migration Proposal

Instructions
This week, you will submit the second project, the Desktop Migration Proposal. Using the requirements analysis your manager provided and the Internet research you conducted, submit your recommendation to the assignment folder. As you are writing your recommendation, ensure your analysis and recommendations align with your manager’s priorities and concerns.

You should carefully document any assumptions made (e.g., how you analyzed the requirement for upgrading monitors, peripherals devices, etc.).

Refer to the HFA Desktop Migration: Corporate PC Refresh Documentation for the company’s needs (requirements). Your justification should clearly indicate how you bridge the gap between the existing desktop specifications and the new machines you recommend.

How Will My Work Be Evaluated?

For this assignment, you are asked by your manager to research the replacement of 50 aging desktop machines with new laptops. Review the business needs from your manager carefully so that you fully appreciate the requirements you must address in selecting the new laptops.

For example, what is significant about the need for “multiple external monitors”? Ask yourself what it takes to connect a laptop to external monitors. What ports are included on your recommended laptop? What kind of cables are required? Can those ports/cables be used with the external monitors? Does the laptop have sufficient graphics capabilities to drive external displays and if so, how many and at what resolution? Follow this same process for all the business needs.

By documenting your choices and the overall recommendation in an effective background report, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

1.1.3: Present ideas in a clear, logical order appropriate to the task.

1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.

1.4.3: Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas.

2.1.2: Describe the context surrounding the issue or problem.

2.3.3: Explain inferences and deductions that follow logically from the evidence provided.

10.1.3: Define the specifications of required technologies.

13.1.1: Create documentation appropriate to the stakeholder.

13.2.1: Evaluate vendor recommendations in the context of organization requirements.

This project is a three- to four-page business-oriented proposal should contain the following:

at least one high-quality graphic
one or more tables to present information
at least one online configurator
your purchase recommendations, specifications, and justification for your choice
one to two IEEE references

If you didn’t download it last week, download the Desktop Migration Proposal Resources now and follow the instructions in the document.

Delete the instructional text from the template before you submit.

When you are finished, click “add a file” to upload your work, then click the Submit button.

Your boss is not sure whether this decline is due to the weak economy or some other unknown reason. She has asked you to investigate the situation and to submit a report to her, highlighting some possible reasons for the decline. Develop a statement of purpose for your report.

14-17. Planning: Analyzing the Situation [1,0-1]

Each activity is labeled according to the primary skill or skills you will need to use. To review relevant chapter content, you can refer to the indicated Learning Objective. In some instances, supporting information will be found in another chapter, as indicated.

Sales at The Style Shop, a clothing store for men, have declined for the third month in a row. Your boss is not sure whether this decline is due to the weak economy or some other unknown reason. She has asked you to investigate the situation and to submit a report to her, highlighting some possible reasons for the decline. Develop a statement of purpose for your report.

Do you see this study as an accurate picture of the American Dream’s impact on minorities in America? Why?

Week 5 Discussion

Read: Armstrong, Joslyn, et al. “‘A Dream Deferred’: How Discrimination Impacts the American Dream Achievement for African Americans.” Journal of Black Studies, vol. 50, no. 3, Apr. 2019, pp. 227-250. Academic Search Complete. doi:10.1177/0021934719833330.

In reading Joslyn Armstrong et al’s “A Dream Deferred,” some guidance will be helpful. To wade through the research is daunting, so do not read the whole of the document. Read the following sections only to be able to answer the discussion questions:

  • Abstract pp. 227-228 2.
  • Introduction pp. 228-229 3.
  • Conclusion pp. 246-247

These sections will enable you to consider the study’s purpose and its conclusions in order to answer question 1 of this week’s discussion.

1. Do you see this study as an accurate picture of the American Dream’s impact (or lack of it) on minorities in America? Why?

2. What do you propose is the leading issue holding people back from achieving the American Dream? Why?

3. Can you see any way forward that is equitable on all fronts/issues hindering Americans from achieving the American Dream? Describe your plan in detail.

What is a logical network diagram? What is a physical network diagram? What is the difference between the two diagrams? How can they help to manage a network?

Discussion Topic(s):

Network Diagrams

Often, administrators use many artifacts like network diagrams to solve problems or help manage and implement innovative technology.

  1. What is a logical network diagram?
  2. What is a physical network diagram?
  3. What is the difference between the two diagrams?
  4. How can they help to manage a network?

 

Use the plot of the film “The Godfather” and discuss why the definitions of deviance and social stigma are dependent on cultural variations and socially accepted norms.

The Godfather

Using your sociological imagination, watch the below video-clips from the movie “The Godfather,” directed by Francis Ford Coppola and answer the following question:

Q.Use the plot of the film “The Godfather” and discuss why the definitions of deviance and social stigma are dependent on cultural variations and socially accepted norms. In your answer, you must incorporate the film plot to answer the question at hand.

1. https://youtu.be/VC1_tdnZq1A
2. https://youtu.be/0qvpcfYFHcw
3. https://youtu.be/ppjyB2MpxBU
4. https://youtu.be/sJU2cz9ytPQ
5. https://youtu.be/SWAJPB_5rSs
6. https://youtu.be/voNs3aHZmQM
7. https://youtu.be/jYnRBX2Trtk
8. https://youtu.be/8Pf8BkFLBRw
9. https://youtu.be/DvD9OryD6mY