GG Freightways (GGFRT) IT Decision Paper Assignment
Before you begin this assignment, be sure you have read the “GG Freightways Case Study,” any feedback on your proposed IT project from your ITSP Part 2 assignment, and the previously assigned course materials.
Purpose of this Assignment
This assignment gives you the opportunity to apply the course concepts to develop an IT Decision Paper to explain and defend an IT project at GG Freightways (GGFRT). This assignment specifically addresses the following course outcomes to enable you to:
· Apply best practices in information technology management and governance to make, defend, and justify an IT decision.
IT Decision Paper for Your Proposed IT Project
For your ITSP, Part 2, you proposed an IT project for GGFRT. Lance, the CIO at GGFRT, has asked you to write an IT Decision Paper to explain your proposed project. He wants to use the Paper to gain approval from the Governance Board to move forward with the project. This assignment uses a format for a Decision Paper that has been tailored to the course material covered in this class. You may work for an organization that has a format for IT decision papers, and it would be a good idea for you to look at it, but it will likely be structured a little differently from this one. Each organization develops tools and techniques that will work for them.
Assignment
You will develop an IT Decision Paper, using the outline below. Each of the topics to be included in your outline is covered in the course content readings assigned thus far. In addition to the course materials, at least one external resource (resource other than those provided in the class) must be used. Two or more cited references will earn top credit. Use a separate References page to list just the references you have cited. Remember to use the APA formatting rules and correctly cite and reference your sources with APA format. Use the Grading Rubric to be sure you have covered everything.
Please use this outline to build your IT Decision Paper. Use the numbering and headings shown below.
1. Project Description – In two or three sentences:
(1) describe the IT project you proposed for GGFRT in Part 2 of your ITSP.
(2) Describe what major function(s) the system would perform and who would use it. (Do not provide a technical description with hardware, software, etc.)
2. Strategic Alignment – In a short paragraph:
(1) explain how the proposed project aligns to the business strategic objectives in Part 1 of your ITSP, and,
(2) how the proposed project aligns to the IT strategies in Part 2 of your ITSP.
Your proposed project must be aligned directly with at least one business strategic objective and one IT strategy shown in your ITSP.
3. IT Portfolio Roadmap Alignment – In a short paragraph:
(1) Briefly explain where this project fits into the IT Portfolio Roadmap you included in Part 2 of your ITSP.
(2) What functional area does it support?
(3) W ...
Stage 1 Strategic Use of TechnologyBefore you begin work on.docxsusanschei
Stage 1: Strategic Use of Technology
Before you begin work on this assignment, be sure you have read the Case Study on Maryland Technology Consultants (MTC). MTC is a fictional company created for IFSM 300’s Case Study. It is also recommended that you review the additional Stages (2, 3 and 4) as well as the vendor brochure provided for Stage 4. This will help you understand the overall report and potential solution.
Overview
As a business analyst in the Chief Information Officer’s (CIO's) department of Maryland Technology Consulting (MTC), you have been assigned to conduct an analysis, develop a set of system requirements, evaluate a proposed solution, and develop an implementation plan for an IT solution (applicant tracking or hiring system) to improve the hiring process for MTC. This work will be completed in four stages, and each of these four stages will focus on one section of an overall Business Analysis and System Recommendation (BA&SR) report to be delivered to the CIO.
Section I. Strategic Use of Technology (Stage 1) - The first step is to look at the organization and explain how an IT system could be used to support MTC's strategies and objectives and support its decision-making processes.
Section II. Process Analysis (Stage 2) – Next you will evaluate current processes and workflow and explain how MTC can use IT to improve its processes and workflow.
Section III. Requirements (Stage 3) –Then you will identify key stakeholder expectations for the new technology solution to support MTC’s hiring process and develop a set of requirements.
Section IV. System Recommendation (Stage 4) – Finally, you will review the provided Vendor brochure for a proposed applicant tracking system and explain how it meets the requirements and what needs to be done to implement the system within MTC.
The sections of the BA&SR will be developed and submitted as four staged assignments. For stages 1, 2, and 3, only the material associated with that stage will be graded. The stage 2, 3, and 4 submissions will include the stage that is due, which will be graded according to the assignment requirements and rubric criteria, as well as include all previously submitted stages with any revisions made. It is recommended that when preparing stages 2, 3, and 4, you review any feedback from previous assignments to help improve the effectiveness of your overall report and increase the likelihood of a well-written final submission. For stage 4, the complete BA&SR submission includes grading criteria for evaluating if the document is a very effective and cohesive assemblage of the four sections, is well formatted across all sections and flows smoothly from one section to the next.
Assignment – BA&SR: Introduction and Section I. Strategic Use of Technology
Write an appropriate Introduction to the entire BA&SR Report (guidelines are provided below). Section I of the BA&SR document contains an organizational analysis and identifies ways in which.
75629 Topic prevention measures for vulneranbilitiesNumber of.docxsleeperharwell
75629 Topic: prevention measures for vulneranbilities
Number of Pages: 2 (Double Spaced)
Number of sources: 1
Writing Style: APA
Type of document: Editing
Academic Level:Undergraduate
Category: Computer Science
Language Style: English (U.S.)
Order Instructions: Attached
After identifying your organizations' vulnerabilities through previous weekly assignments, you now need to develop security measures to protect those vulnerabilities.
Create a spreadsheet of vulnerabilities and prevention measures for your organization.
Categorize by people, process, or technology.
Provide 350- to 700-word paper onnext steps for each prevention measure based on the vulnerability, potential incident, environmental and security controls in SDLC.
Submit your spreadsheet and paper using the Assignment Files tab.
Data Flow Diagram (DFD) Tips
Processes: Verbs
Dataflows: Nouns
Data Stores: Nouns
External Entities: Nouns
1) Process’s input & output are different
2) Each data store should have at least
one data flow in and one data flow out
3) Each process should have at least one
data flow in and one data flow out
4) All inputs and outputs should be
labeled
5) Processes should have an identifier
(Ex., 1.0, 2.0, etc.)
Process Process
Process-to-Process
Process Process
Process-to-Process
Process-to-External Entity
Process
External
Entity
Process-to-External Entity
Process
External
Entity
Data S tore
Process-to-Data Store
Process Data S tore
Process-to-Data Store
Process
External Entity-to-External Entity
External
Entity
External
Entity
External Entity-to-External Entity
External
Entity
External
Entity
Data S tore
Data Store-to-Data Store
Data S toreData S tore
Data Store-to-Data Store
Data S tore
External Entity-to-Data StoreExternal Entity-to-Data Store
External
Entity
Data S tore
External
Entity
Data S tore
External
Entity
Data S tore
External Entity-to-Data Store
External
Entity
Data S toreProcess Process
Process-to-Process
Process-to-External Entity
Process
External
Entity
Data S tore
Process-to-Data Store
Process
External Entity-to-External Entity
External
Entity
External
Entity
Data S tore
Data Store-to-Data Store
Data S tore
External Entity-to-Data Store
External
Entity
Data S tore
DFD_Rules.vsdxTop Process
Stage 2: Requirements Specification
Before you begin this assignment, be sure you have read the Case Study and all assignments for this class, especially Stage 4: Final System Report. The feedback you received on your Stage 1 assignment should be reviewed and used as you proceed with Stage 2.
Purpose of this Assignment
This assignment gives you the opportunity to specify clear and concise requirements, including the use of data and process models, for a system that enables a productive change in a way the business is conducted. This assignment specifically addresses the following course outcomes to enable you to:
· apply a systematic approach to .
Before you begin this assignment, be sure you1.Read the UMUC.docxlascellesjaimie
Before you begin this assignment, be sure you:
1.
Read the “UMUC Haircuts Case Study” & review “Walmart Example.”
2.
Review the process you identified in stage one and your instructor’s feedback on all previous assignments.
Purpose of this Assignment
This assignment gives you the opportunity to apply the concepts of this course to address the planning, development, implementation and on-going management of the technology solution you have proposed for the UMUC Haircuts business.
This assignment specifically addresses the following course outcome to enable you to:
·
identify and plan IT solutions that meet business objectives.
Overview of Outline of Next Steps for UMUC Hair Cuts
For your Stage Case Study1, you identified a
strategy for competitive advantage
and
a
business process
that you would improve through the application of technology to a business process for UMUC Haircuts.
For your Stage 2, you identified a
proposed IT solution
to improve that
business process
. Your research included planning for IT and business resources, identifying
solution
components, and
identifying ways the
new technology would improve the business process
and
support the strategy for competitive analysis
. Modeling the AS IS and TO BE Processes helped identify the steps in the business process you are improving for UMUC Haircuts.
In Stage 3, you evaluated
IT considerations
as to their role and importance to the
proposed IT solution
to be implemented to improve the business process for UMUC Haircuts.
In Stage 4, you prepared an
Executive Briefing
of your findings, including project
management
, the
system development life cycle
, and
change management.
In Stage 5, you will prepare an
annotated outline
of the next steps in the Implementation of Your Information Technology
Solution
which also includes next steps in the areas of
project management
, the
system development life cycle
, and
change management.
Outline of Next Steps for UMUC Haircuts
Following your presentation of your Stage 4 project, the owner of UMUC Haircuts has decided to move ahead and implement your proposed solution. Prior to beginning the project, the owner has asked you to prepare an outline explaining the next steps. For this assignment, you will develop an annotated outline that identifies the next steps to implement the solution described in Stages 2-4, addressing a number of areas such as project management, system development life cycle, change management, etc.
Resources:
Annotated Outline:
An annotated outline provides the basic information in
full sentences
, but in outline form rather than in paragraph form.
·
In this case, you will address each aspect of the next steps to be taken to implement your technology solution.
·
You should provide all of the important facts, without the expanded discussions used in full papers.
·
Each of the topics in the assignment list should be explained as they apply to your proposed technology.
Organizational Process AnalysisBackgroundYou are a senior member o.docxalfred4lewis58146
Organizational Process AnalysisBackground
You are a senior member of the IT Management Team for SAI Toys, one of the leading manufacturers of products for Gifted Electrical Engineering Kids (GEEKs). The toys that the company sells are manufactured in-house and shipped to brick-and-mortar retailers, such as Best Buy and Target, as well as e-Commerce-only sites, such as ThinkGeek.com and Buy.com. The company has no direct interaction with the final purchasers (individuals) of their products other than through warranty service.
The company has four distinct IT systems:
· Public Website—provides information about each of the products, locations where someone can purchase them, and information about how to get warranty support. Details of warranty support and defect rates are not tracked, but the staff has anecdotal stories.
· Manufacturing Support System (MSS)—maintains the supply chain information necessary for manufacturing the company's products, such as raw materials, vendors, and prices.
· Human Resources System (HRS)—maintains and tracks personnel and benefits information.
· Sales and Marketing System (SMS)—tracks the sales and marketing efforts of the company’s sales force. Orders from this system are printed and sent daily to the MSS to be filled.
The current IT staff consists of 25 individuals. Five are assigned to maintain and operate each of the current IT systems, (except the HRS—only four work on that system). There are four support staff members that manage the internal help desk and provide network and workstation support for the internal company staff. The department is headed by the vice president of IT and her Deputy Department Manager (you!).
Physically, the company has two buildings. The manufacturing building and warehouse are located on the east side of the city near the docks and the expressway. The executive and business offices, as well as the IT staff, are located in a separate building on the west side of the city. Situation
The board of directors and the CEO have decided that they want to stay on the forefront of geekness, and therefore, the company should integrate all of their IT systems. In addition, they want to develop a more robust web presence and sell their products directly to individual customers in addition to selling through traditional retailers as they currently are doing.Assignment
You are to write a report of about 9 single spaced pages that outlines the situation, weighs various alternatives, and presents a final recommendation as to how the company should go about implementing this executive directive. (If you recommend it should not be done, you should have strong reasons!)
Your report should include the following sections. Please begin each with a heading so that the paper will be organized according to the board’s request and will be easier to follow. 1) Cover Page and Table of Contents (TOC) (5 points)
Provide a cover page with student names, date, course #, session, and professor name. The TO.
Stage 1Strategic Use of TechnologyBefore you begin workChereCheek752
Stage 1:
Strategic Use of Technology
Before you begin work on this assignment, be sure you have read the Case Study on Chesapeake IT Consultants (CIC). CIC is a fictional company created for IFSM 300’s Case Study.
Overview
As a business analyst in the Chief Information Officer’s (CIO's) department of Chesapeake IT Consulting (CIC), you have been assigned to conduct an analysis, develop a set of system requirements and recommend an IT solution (applicant tracking or hiring system) to improve the hiring process for CIC. This work will be completed in four stages, and each of these four stages will focus on one section of an overall
Business Analysis and System Recommendation
(BA&SR) report to be delivered to the CIO.
Section I: Strategic Use of Technology
(Stage 1) - The first step is to look at the organization and explain how an IT system could be used to support CIC's strategies and objectives and support its decision-making processes.
Section II: Process Analysis
(Stage 2) – Next you will evaluate current processes and workflow and explain how CIC can use IT to improve its processes and workflow.
Section III: Requirements
(Stage 3) –Then you will identify key stakeholder expectations for the new technology solution to support CIC’s hiring process and develop a set of requirements.
Section IV: System Recommendation
(Stage 4) – Finally, you will review the provided Vendor brochure for a proposed applicant tracking system and explain how it meets the requirements and what needs to be done to implement the system within CIC.
The sections of the BA&SR will be developed and submitted as four staged assignments. In stages 2, 3 and 4, you will also incorporate any feedback received when the previous stage was graded to improve the effectiveness of your overall report and then add the new section to your report. At the end of the course, you will submit a complete BA&SR document that includes all the sections and changes that resulted from previous feedback. Part of the grading criteria for Stage 4 submission includes addressing previous feedback to improve the final report.
Assignment – BA&SR:
Introduction and Section I – Strategic Use of Technology
Write an appropriate Introduction to the entire BA&SR Report (guidelines are provided below). Section I of the BA&SR document contains an organizational analysis and identifies ways in which an information system to improve the hiring process can help CIC, the organization in the case study, meet its strategic goals and meet the information needs of various levels of management.
Using the case study, assignment instructions, Course Content readings, and external resources, develop your Introduction and Section I: Background and Organizational Analysis. To start, review the Business Perspectives Module (week 1 content), particularly the sections that describe the example of Booz Allen Hamilton, a services company with a business model similar to that of CIC in the case study. The ...
IT 510 Final Project Guidelines and Rubric Overview .docxpriestmanmable
IT 510 Final Project Guidelines and Rubric
Overview
The final project for this course is the creation of a System Proposal Document.
In any modern enterprise, it is crucial that all of the different stakeholders, users, inputs, and outputs that relate to the business’s IT systems coalesce in a logical
and cohesive way for the systems to be effective. As a member of an IT team, your overarching goal is to ensure that the IT systems ultimately do what the
business needs them to do. In this course, you have learned about the key principles and practices underlying the analysis, design, implementation, and
management of IT systems. In this final project, you will apply this knowledge by creating a systems proposal document.
The project is divided into four milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Module Two, Module Four, Module Six, and Module Eight. The final submission will occur in Module Nine.
In this assignment, you will demonstrate your mastery of the following course outcomes:
Assess the relationship of systems analysis, design, implementation, and development processes as they relate to the management of information
technology systems
Communicate the paradigms, processes, and activities of systems development to diverse audiences
Apply structure and object oriented analysis modeling techniques to analyze, design, and manage information technology systems
Construct written and visual representations of the analysis, design, implementation, and management of information technology systems based on the
systems development life cycle
Prompt
You will select your own case study and will apply the content provided, describing the business process to complete the final project. Alternate sources for case
studies include the case studies found in the textbook with the exception of the Personal Trainer Case. You can additionally search the internet for business case
ideas.
You will complete an analysis of an existing information technology system and make recommendations for updates to meet business goals based on your chosen
case study. Your final submission will include an introduction, systems requirements, systems design specifications, and an implementation plan. All of the
components listed below should be submitted as a single, organized systems proposal document and include screenshots of all relevant diagrams, charts, and
tables.
I. Introduction: Provide an overview of your selected case. Be sure to provide appropriate citations and reference to the case study you have selected.
a) Background: Establish a context for understanding your systems proposal. Specifically, explain any essential paradigms, processes, and activities
of the existing information technology systems.
b) Problem Statement: What is the problem that needs to be solved? Wh ...
Stage 1 Strategic Use of TechnologyBefore you begin work on.docxsusanschei
Stage 1: Strategic Use of Technology
Before you begin work on this assignment, be sure you have read the Case Study on Maryland Technology Consultants (MTC). MTC is a fictional company created for IFSM 300’s Case Study. It is also recommended that you review the additional Stages (2, 3 and 4) as well as the vendor brochure provided for Stage 4. This will help you understand the overall report and potential solution.
Overview
As a business analyst in the Chief Information Officer’s (CIO's) department of Maryland Technology Consulting (MTC), you have been assigned to conduct an analysis, develop a set of system requirements, evaluate a proposed solution, and develop an implementation plan for an IT solution (applicant tracking or hiring system) to improve the hiring process for MTC. This work will be completed in four stages, and each of these four stages will focus on one section of an overall Business Analysis and System Recommendation (BA&SR) report to be delivered to the CIO.
Section I. Strategic Use of Technology (Stage 1) - The first step is to look at the organization and explain how an IT system could be used to support MTC's strategies and objectives and support its decision-making processes.
Section II. Process Analysis (Stage 2) – Next you will evaluate current processes and workflow and explain how MTC can use IT to improve its processes and workflow.
Section III. Requirements (Stage 3) –Then you will identify key stakeholder expectations for the new technology solution to support MTC’s hiring process and develop a set of requirements.
Section IV. System Recommendation (Stage 4) – Finally, you will review the provided Vendor brochure for a proposed applicant tracking system and explain how it meets the requirements and what needs to be done to implement the system within MTC.
The sections of the BA&SR will be developed and submitted as four staged assignments. For stages 1, 2, and 3, only the material associated with that stage will be graded. The stage 2, 3, and 4 submissions will include the stage that is due, which will be graded according to the assignment requirements and rubric criteria, as well as include all previously submitted stages with any revisions made. It is recommended that when preparing stages 2, 3, and 4, you review any feedback from previous assignments to help improve the effectiveness of your overall report and increase the likelihood of a well-written final submission. For stage 4, the complete BA&SR submission includes grading criteria for evaluating if the document is a very effective and cohesive assemblage of the four sections, is well formatted across all sections and flows smoothly from one section to the next.
Assignment – BA&SR: Introduction and Section I. Strategic Use of Technology
Write an appropriate Introduction to the entire BA&SR Report (guidelines are provided below). Section I of the BA&SR document contains an organizational analysis and identifies ways in which.
75629 Topic prevention measures for vulneranbilitiesNumber of.docxsleeperharwell
75629 Topic: prevention measures for vulneranbilities
Number of Pages: 2 (Double Spaced)
Number of sources: 1
Writing Style: APA
Type of document: Editing
Academic Level:Undergraduate
Category: Computer Science
Language Style: English (U.S.)
Order Instructions: Attached
After identifying your organizations' vulnerabilities through previous weekly assignments, you now need to develop security measures to protect those vulnerabilities.
Create a spreadsheet of vulnerabilities and prevention measures for your organization.
Categorize by people, process, or technology.
Provide 350- to 700-word paper onnext steps for each prevention measure based on the vulnerability, potential incident, environmental and security controls in SDLC.
Submit your spreadsheet and paper using the Assignment Files tab.
Data Flow Diagram (DFD) Tips
Processes: Verbs
Dataflows: Nouns
Data Stores: Nouns
External Entities: Nouns
1) Process’s input & output are different
2) Each data store should have at least
one data flow in and one data flow out
3) Each process should have at least one
data flow in and one data flow out
4) All inputs and outputs should be
labeled
5) Processes should have an identifier
(Ex., 1.0, 2.0, etc.)
Process Process
Process-to-Process
Process Process
Process-to-Process
Process-to-External Entity
Process
External
Entity
Process-to-External Entity
Process
External
Entity
Data S tore
Process-to-Data Store
Process Data S tore
Process-to-Data Store
Process
External Entity-to-External Entity
External
Entity
External
Entity
External Entity-to-External Entity
External
Entity
External
Entity
Data S tore
Data Store-to-Data Store
Data S toreData S tore
Data Store-to-Data Store
Data S tore
External Entity-to-Data StoreExternal Entity-to-Data Store
External
Entity
Data S tore
External
Entity
Data S tore
External
Entity
Data S tore
External Entity-to-Data Store
External
Entity
Data S toreProcess Process
Process-to-Process
Process-to-External Entity
Process
External
Entity
Data S tore
Process-to-Data Store
Process
External Entity-to-External Entity
External
Entity
External
Entity
Data S tore
Data Store-to-Data Store
Data S tore
External Entity-to-Data Store
External
Entity
Data S tore
DFD_Rules.vsdxTop Process
Stage 2: Requirements Specification
Before you begin this assignment, be sure you have read the Case Study and all assignments for this class, especially Stage 4: Final System Report. The feedback you received on your Stage 1 assignment should be reviewed and used as you proceed with Stage 2.
Purpose of this Assignment
This assignment gives you the opportunity to specify clear and concise requirements, including the use of data and process models, for a system that enables a productive change in a way the business is conducted. This assignment specifically addresses the following course outcomes to enable you to:
· apply a systematic approach to .
Before you begin this assignment, be sure you1.Read the UMUC.docxlascellesjaimie
Before you begin this assignment, be sure you:
1.
Read the “UMUC Haircuts Case Study” & review “Walmart Example.”
2.
Review the process you identified in stage one and your instructor’s feedback on all previous assignments.
Purpose of this Assignment
This assignment gives you the opportunity to apply the concepts of this course to address the planning, development, implementation and on-going management of the technology solution you have proposed for the UMUC Haircuts business.
This assignment specifically addresses the following course outcome to enable you to:
·
identify and plan IT solutions that meet business objectives.
Overview of Outline of Next Steps for UMUC Hair Cuts
For your Stage Case Study1, you identified a
strategy for competitive advantage
and
a
business process
that you would improve through the application of technology to a business process for UMUC Haircuts.
For your Stage 2, you identified a
proposed IT solution
to improve that
business process
. Your research included planning for IT and business resources, identifying
solution
components, and
identifying ways the
new technology would improve the business process
and
support the strategy for competitive analysis
. Modeling the AS IS and TO BE Processes helped identify the steps in the business process you are improving for UMUC Haircuts.
In Stage 3, you evaluated
IT considerations
as to their role and importance to the
proposed IT solution
to be implemented to improve the business process for UMUC Haircuts.
In Stage 4, you prepared an
Executive Briefing
of your findings, including project
management
, the
system development life cycle
, and
change management.
In Stage 5, you will prepare an
annotated outline
of the next steps in the Implementation of Your Information Technology
Solution
which also includes next steps in the areas of
project management
, the
system development life cycle
, and
change management.
Outline of Next Steps for UMUC Haircuts
Following your presentation of your Stage 4 project, the owner of UMUC Haircuts has decided to move ahead and implement your proposed solution. Prior to beginning the project, the owner has asked you to prepare an outline explaining the next steps. For this assignment, you will develop an annotated outline that identifies the next steps to implement the solution described in Stages 2-4, addressing a number of areas such as project management, system development life cycle, change management, etc.
Resources:
Annotated Outline:
An annotated outline provides the basic information in
full sentences
, but in outline form rather than in paragraph form.
·
In this case, you will address each aspect of the next steps to be taken to implement your technology solution.
·
You should provide all of the important facts, without the expanded discussions used in full papers.
·
Each of the topics in the assignment list should be explained as they apply to your proposed technology.
Organizational Process AnalysisBackgroundYou are a senior member o.docxalfred4lewis58146
Organizational Process AnalysisBackground
You are a senior member of the IT Management Team for SAI Toys, one of the leading manufacturers of products for Gifted Electrical Engineering Kids (GEEKs). The toys that the company sells are manufactured in-house and shipped to brick-and-mortar retailers, such as Best Buy and Target, as well as e-Commerce-only sites, such as ThinkGeek.com and Buy.com. The company has no direct interaction with the final purchasers (individuals) of their products other than through warranty service.
The company has four distinct IT systems:
· Public Website—provides information about each of the products, locations where someone can purchase them, and information about how to get warranty support. Details of warranty support and defect rates are not tracked, but the staff has anecdotal stories.
· Manufacturing Support System (MSS)—maintains the supply chain information necessary for manufacturing the company's products, such as raw materials, vendors, and prices.
· Human Resources System (HRS)—maintains and tracks personnel and benefits information.
· Sales and Marketing System (SMS)—tracks the sales and marketing efforts of the company’s sales force. Orders from this system are printed and sent daily to the MSS to be filled.
The current IT staff consists of 25 individuals. Five are assigned to maintain and operate each of the current IT systems, (except the HRS—only four work on that system). There are four support staff members that manage the internal help desk and provide network and workstation support for the internal company staff. The department is headed by the vice president of IT and her Deputy Department Manager (you!).
Physically, the company has two buildings. The manufacturing building and warehouse are located on the east side of the city near the docks and the expressway. The executive and business offices, as well as the IT staff, are located in a separate building on the west side of the city. Situation
The board of directors and the CEO have decided that they want to stay on the forefront of geekness, and therefore, the company should integrate all of their IT systems. In addition, they want to develop a more robust web presence and sell their products directly to individual customers in addition to selling through traditional retailers as they currently are doing.Assignment
You are to write a report of about 9 single spaced pages that outlines the situation, weighs various alternatives, and presents a final recommendation as to how the company should go about implementing this executive directive. (If you recommend it should not be done, you should have strong reasons!)
Your report should include the following sections. Please begin each with a heading so that the paper will be organized according to the board’s request and will be easier to follow. 1) Cover Page and Table of Contents (TOC) (5 points)
Provide a cover page with student names, date, course #, session, and professor name. The TO.
Stage 1Strategic Use of TechnologyBefore you begin workChereCheek752
Stage 1:
Strategic Use of Technology
Before you begin work on this assignment, be sure you have read the Case Study on Chesapeake IT Consultants (CIC). CIC is a fictional company created for IFSM 300’s Case Study.
Overview
As a business analyst in the Chief Information Officer’s (CIO's) department of Chesapeake IT Consulting (CIC), you have been assigned to conduct an analysis, develop a set of system requirements and recommend an IT solution (applicant tracking or hiring system) to improve the hiring process for CIC. This work will be completed in four stages, and each of these four stages will focus on one section of an overall
Business Analysis and System Recommendation
(BA&SR) report to be delivered to the CIO.
Section I: Strategic Use of Technology
(Stage 1) - The first step is to look at the organization and explain how an IT system could be used to support CIC's strategies and objectives and support its decision-making processes.
Section II: Process Analysis
(Stage 2) – Next you will evaluate current processes and workflow and explain how CIC can use IT to improve its processes and workflow.
Section III: Requirements
(Stage 3) –Then you will identify key stakeholder expectations for the new technology solution to support CIC’s hiring process and develop a set of requirements.
Section IV: System Recommendation
(Stage 4) – Finally, you will review the provided Vendor brochure for a proposed applicant tracking system and explain how it meets the requirements and what needs to be done to implement the system within CIC.
The sections of the BA&SR will be developed and submitted as four staged assignments. In stages 2, 3 and 4, you will also incorporate any feedback received when the previous stage was graded to improve the effectiveness of your overall report and then add the new section to your report. At the end of the course, you will submit a complete BA&SR document that includes all the sections and changes that resulted from previous feedback. Part of the grading criteria for Stage 4 submission includes addressing previous feedback to improve the final report.
Assignment – BA&SR:
Introduction and Section I – Strategic Use of Technology
Write an appropriate Introduction to the entire BA&SR Report (guidelines are provided below). Section I of the BA&SR document contains an organizational analysis and identifies ways in which an information system to improve the hiring process can help CIC, the organization in the case study, meet its strategic goals and meet the information needs of various levels of management.
Using the case study, assignment instructions, Course Content readings, and external resources, develop your Introduction and Section I: Background and Organizational Analysis. To start, review the Business Perspectives Module (week 1 content), particularly the sections that describe the example of Booz Allen Hamilton, a services company with a business model similar to that of CIC in the case study. The ...
IT 510 Final Project Guidelines and Rubric Overview .docxpriestmanmable
IT 510 Final Project Guidelines and Rubric
Overview
The final project for this course is the creation of a System Proposal Document.
In any modern enterprise, it is crucial that all of the different stakeholders, users, inputs, and outputs that relate to the business’s IT systems coalesce in a logical
and cohesive way for the systems to be effective. As a member of an IT team, your overarching goal is to ensure that the IT systems ultimately do what the
business needs them to do. In this course, you have learned about the key principles and practices underlying the analysis, design, implementation, and
management of IT systems. In this final project, you will apply this knowledge by creating a systems proposal document.
The project is divided into four milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Module Two, Module Four, Module Six, and Module Eight. The final submission will occur in Module Nine.
In this assignment, you will demonstrate your mastery of the following course outcomes:
Assess the relationship of systems analysis, design, implementation, and development processes as they relate to the management of information
technology systems
Communicate the paradigms, processes, and activities of systems development to diverse audiences
Apply structure and object oriented analysis modeling techniques to analyze, design, and manage information technology systems
Construct written and visual representations of the analysis, design, implementation, and management of information technology systems based on the
systems development life cycle
Prompt
You will select your own case study and will apply the content provided, describing the business process to complete the final project. Alternate sources for case
studies include the case studies found in the textbook with the exception of the Personal Trainer Case. You can additionally search the internet for business case
ideas.
You will complete an analysis of an existing information technology system and make recommendations for updates to meet business goals based on your chosen
case study. Your final submission will include an introduction, systems requirements, systems design specifications, and an implementation plan. All of the
components listed below should be submitted as a single, organized systems proposal document and include screenshots of all relevant diagrams, charts, and
tables.
I. Introduction: Provide an overview of your selected case. Be sure to provide appropriate citations and reference to the case study you have selected.
a) Background: Establish a context for understanding your systems proposal. Specifically, explain any essential paradigms, processes, and activities
of the existing information technology systems.
b) Problem Statement: What is the problem that needs to be solved? Wh ...
Capstone Project Report Guidelines
The Capstone Project represents a culminating experience in our Bachelor of Science in Information Science curriculum. It is an opportunity for students to showcase what they have learned from our program and to demonstrate that they are on their way for achieving our program’s key student learning outcomes. Specifically there are six areas that we would like students to address in their end of semester Capstone Project Reports.
1. Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
2. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program's discipline.
3. Communicate effectively in a variety of professional contexts.
4. Recognize professional responsibilities and make informed judgements in computing practice based on legal and ethical principles.
5. Functional effectively as a member or leader of a team engaged in activities appropriate to the program's discipline.
6. Support the planning, acquisition, delivery, and monitoring of information systems and their associated technologies within an organization’s environment.
Rubrics for each of these areas have been developed to help students assess what is expected for each of these areas. Students are encouraged to talk with their faculty and client mentors to think through what each of these areas mean to their projects. Questions are welcome!
The following are some guidelines to help you put together your Capstone Project Report. Since every project is different, feel free to amend as needed to best showcase the work you have done this year and to demonstrate your abilities to meet the learning goals of a computing program accredited by the Accreditation Board for Engineering and Technology (ABET).
1. Title Page (Note: It is okay to include logos or other clip art on the Title Page)
a. Project / Team Name
b. Sponsoring Organization / Contact Information
c. Team Member Names
d. Date
2. Table of Contents
3. Introduction / Organization Background
a. Describe the organization that your team is working for. What is their history? What is the mission (purpose) of this organization?
b. Explain the challenges facing the organization.
4. Description of Analysis Work Performed - Here are the areas that you should address in this section of the report (Capstone Project I), but feel free to include others as needed. See the Analysis Rubric for additional details.
a. Question 1: Describe the Problem or Challenge Facing the Client and their Stakeholders.
b. Question 2: Evaluate the Current State (Data, Process, People, and Technology in Use) surrounding the problem or issue.
c. Question 3: Assess Client’s Desired Future State (e.g., Data, Process, People, and Technical Improvements)
d. Question 4: Analyze the Options available for getting your Client to their desired future state and Recommend a
So.
IT 510 Final Project Guidelines and Rubric Overview .docxvrickens
IT 510 Final Project Guidelines and Rubric
Overview
The final project for this course is the creation of a System Proposal Document.
In any modern enterprise, it is crucial that all of the different stakeholders, users, inputs, and outputs that relate to the business’s IT systems coalesce in a logical
and cohesive way for the systems to be effective. As a member of an IT team, your overarching goal is to ensure that the IT systems ultimately do what the
business needs them to do. In this course, you have learned about the key principles and practices underlying the analysis, design, implementation, and
management of IT systems. In this final project, you will apply this knowledge by creating a systems proposal document.
The project is divided into four milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Module Two, Module Four, Module Six, and Module Eight. The final submission will occur in Module Nine.
In this assignment, you will demonstrate your mastery of the following course outcomes:
Assess the relationship of systems analysis, design, implementation, and development processes as they relate to the management of information
technology systems
Communicate the paradigms, processes, and activities of systems development to diverse audiences
Apply structure and object oriented analysis modeling techniques to analyze, design, and manage information technology systems
Construct written and visual representations of the analysis, design, implementation, and management of information technology systems based on the
systems development life cycle
Prompt
You will select your own case study and will apply the content provided, describing the business process to complete the final project. Alternate sources for case
studies include the case studies found in the textbook with the exception of the Personal Trainer Case. You can additionally search the internet for business case
ideas.
You will complete an analysis of an existing information technology system and make recommendations for updates to meet business goals based on your chosen
case study. Your final submission will include an introduction, systems requirements, systems design specifications, and an implementation plan. All of the
components listed below should be submitted as a single, organized systems proposal document and include screenshots of all relevant diagrams, charts, and
tables.
I. Introduction: Provide an overview of your selected case. Be sure to provide appropriate citations and reference to the case study you have selected.
a) Background: Establish a context for understanding your systems proposal. Specifically, explain any essential paradigms, processes, and activities
of the existing information technology systems.
b) Problem Statement: What is the problem that needs to be solved? Wh ...
HomeInformation Systems homework helpReport Issuesorayan5ywschuit
Home
Information Systems homework help
Report Issue
Stage 1:
Strategic Use of Technology
Before you begin work on this assignment, be sure you have read the Case Study on Chesapeake IT Consultants (CIC). CIC is a fictional company created for IFSM 300’s Case Study.
Overview
As a business analyst in the Chief Information Officer’s (CIO's) department of Chesapeake IT Consulting (CIC), you have been assigned to conduct an analysis, develop a set of system requirements and recommend an IT solution (applicant tracking or hiring system) to improve the hiring process for CIC. This work will be completed in four stages, and each of these four stages will focus on one section of an overall
Business Analysis and System Recommendation
(BA&SR) report to be delivered to the CIO.
Section I: Strategic Use of Technology
(Stage 1) - The first step is to look at the organization and explain how an IT system could be used to support CIC's strategies and objectives and support its decision-making processes.
Section II: Process Analysis
(Stage 2) – Next you will evaluate current processes and workflow and explain how CIC can use IT to improve its processes and workflow.
Section III: Requirements
(Stage 3) –Then you will identify key stakeholder expectations for the new technology solution to support CIC’s hiring process and develop a set of requirements.
Section IV: System Recommendation
(Stage 4) – Finally, you will review the provided Vendor brochure for a proposed applicant tracking system and explain how it meets the requirements and what needs to be done to implement the system within CIC.
The sections of the BA&SR will be developed and submitted as four staged assignments. In stages 2, 3 and 4, you will also incorporate any feedback received when the previous stage was graded to improve the effectiveness of your overall report and then add the new section to your report. At the end of the course, you will submit a complete BA&SR document that includes all the sections and changes that resulted from previous feedback. Part of the grading criteria for Stage 4 submission includes addressing previous feedback to improve the final report.
Assignment – BA&SR:
Introduction and Section I – Strategic Use of Technology
Write an appropriate Introduction to the entire BA&SR Report (guidelines are provided below). Section I of the BA&SR document contains an organizational analysis and identifies ways in which an information system to improve the hiring process can help CIC, the organization in the case study, meet its strategic goals and meet the information needs of various levels of management.
Using the case study, assignment instructions, Course Content readings, and external resources, develop your Introduction and Section I: Background and Organizational Analysis. To start, review the Business Perspectives Module (week 1 content), particularly the sections that describe the example of Booz Allen Hamilton, a services company with a b ...
Over the next two years, your organization needs to shift its busi.docxkarlhennesey
Over the next two years, your organization needs to shift its business model and widen its technology exploitation in order to expand in its existing market, expand into new markets, facilitate new products and services, and reduce costs. Your mission is to provide the CTO or CIO with technical recommendations on how to accomplish these goals.
Your assignment is to prepare a presentation for the CTO or CIO, describing a technology you believe should be adopted, describing the benefits, costs and risks of adoption, and recommending how to proceed. However, all work and ideas not your own should be clearly acknowledged in the PowerPoint notes in accordance with academic standards. Use your own words and do research to back up your assertions!
Use the PowerPoint “Notes” section for comments that you would supply verbally at the presentation. Also use it for explanations to your facilitator.
Address (in order) the sections described below in at most 15 PowerPoint slides with Notes sections. You may follow this with appendices if you wish. Appendices will be read only as-needed. You need not address every point mentioned within each section – just those most significant for your organization and the technology, and which result in a clear, coherent overall presentation. Give approximately equal space to the sections.
Hints:
A. This presentation is designed to convince your CTO or CIO. The slides should steer a course between the extremes of wordiness (remember that you can talk to add content) and bare-bones meaninglessness (viewers need words with meaning). Vary bullet slides, figures, and tables to maintain attention.
B. You have limited space. Edit extensively because every word counts.
1. Organizational Background
This section of the presentation demonstrates to the CTO/CIO that you clearly understand your organization's background enough to advocate the technology you propose. Emphasize the basis on which it competes with similar organizations (or for organizations where there is no relevant basis for competition, describe the organization's mission). Include mention of technology that your organization uses, but only to the extent that it is relevant or needed to understand this presentation. This will probably differ somewhat from assignment 1 in that it describes the background for the proposals you are making in this presentation: However, you are free to cut and paste from assignment 1 if you wish. The section in this week’s notes on SWOT may help too.
2. Technology Description
Identify and describe a technology (e.g., virtualization) that your organization should adopt, along with its key capabilities and characteristics. The specifics of “how” the technology would be implemented are not required in this section. If it is to replace technology your organization currently uses, consider summarizing key technology differences. Focus on the here on the essential technology description,as well as on the problems y ...
Over the next two years, your organization needs to shift its busi.docxhoney690131
Over the next two years, your organization needs to shift its business model and widen its technology exploitation in order to expand in its existing market, expand into new markets, facilitate new products and services, and reduce costs. Your mission is to provide the CTO or CIO with technical recommendations on how to accomplish these goals.
Your assignment is to prepare a presentation for the CTO or CIO, describing a technology you believe should be adopted, describing the benefits, costs and risks of adoption, and recommending how to proceed. However, all work and ideas not your own should be clearly acknowledged in the PowerPoint notes in accordance with academic standards. Use your own words and do research to back up your assertions!
Use the PowerPoint “Notes” section for comments that you would supply verbally at the presentation. Also use it for explanations to your facilitator.
Address (in order) the sections described below in at most 15 PowerPoint slides with Notes sections. You may follow this with appendices if you wish. Appendices will be read only as-needed. You need not address every point mentioned within each section – just those most significant for your organization and the technology, and which result in a clear, coherent overall presentation. Give approximately equal space to the sections.
Hints:
A. This presentation is designed to convince your CTO or CIO. The slides should steer a course between the extremes of wordiness (remember that you can talk to add content) and bare-bones meaninglessness (viewers need words with meaning). Vary bullet slides, figures, and tables to maintain attention.
B. You have limited space. Edit extensively because every word counts.
1. Organizational Background
This section of the presentation demonstrates to the CTO/CIO that you clearly understand your organization's background enough to advocate the technology you propose. Emphasize the basis on which it competes with similar organizations (or for organizations where there is no relevant basis for competition, describe the organization's mission). Include mention of technology that your organization uses, but only to the extent that it is relevant or needed to understand this presentation. This will probably differ somewhat from assignment 1 in that it describes the background for the proposals you are making in this presentation: However, you are free to cut and paste from assignment 1 if you wish. The section in this week’s notes on SWOT may help too.
2. Technology Description
Identify and describe a technology (e.g., virtualization) that your organization should adopt, along with its key capabilities and characteristics. The specifics of “how” the technology would be implemented are not required in this section. If it is to replace technology your organization currently uses, consider summarizing key technology differences. Focus on the here on the essential technology description,as well as on the problems y.
System Proposal TemplateCSC 545 System Design When preparing a.docxssuserf9c51d
System Proposal Template
CSC 545 System Design
When preparing a systems proposal, systems analysts should arrange the following items in order:
Ten Main Section of your System Proposal
1. Cover Letter
List of people who did the study and summarize the objectives of the study are provided in your cover letter. Also, prearranged time and place for oral presentation of the system proposal can be included. Keep your cover letter concise (one page maximum) and friendly.
2. Title Page of project
Include the name of the project, the names of the systems analysis team members, and the date the proposal is submitted.
3. Table of Contents
If the proposal is very short (less than ten pages), you can omit the table of contents since it is unnecessary on such a short document. The purpose of your table of contents is to indicate the contents of your proposal.
4. Executive Summary (including recommendations)
Usually, the executive summary is 250 to 375 words and can answer the questions such as who, what, when, where, why and how of the proposal. It should also include recommendation of the system analysts since some people will only have time to read the summary.
5. Outline of system study with appropriate documentation
Provides information about all the methods used in the study, and who or what was studied.
6. Detailed results of systems study
The details what the system analyst has found out about the system through all of the methods described are included in this section. It also presents problems with the system
7. Systems alternatives (3 or 4 possible solutions)
The analyst will present two or three alternative solutions that directly address the aforementioned problems. Each alternative should be explored separately. Describe the costs and benefits of each situation.
8. System’s analysts’ recommendations
After the systems analysis team has weighed the alternatives, it will have a definite professional opinion about which solution is most workable and best to solve the problem. It expresses the recommended solution.
9. Summary
It is brief statement that mirrors the content of your executive summary. It gives the objectives of the study and the recommended solution. Also, it allows the analyst one more chance to stress the project’s importance and feasibility along with the value of the recommendations.
10. Appendices
It might include pertinent correspondence, a summary of phases completed in the study, detailed graph for analyses purposes, or even previously done systems studies.
Source: http://sampleproposal.net
Project Design Document Template
CSC 845
Project Title
[Give your project a short but meaningful title]
Problem Definition
[In one or two paragraphs, describe the problem that you are trying to solve. For some projects in business this may be something that needs to be fixed but for the class project, you will be describing a brand new mobile application here. Mention what you application is, why your application will he ...
IT 600 Final Project Milestone Two Template Analytical Organi.docxpriestmanmable
IT 600 Final Project Milestone Two Template: Analytical Organizational Profile
Directions: Insert your answers directly in the Student Analysis column below by doing the following:
· In each of the “Tech Description” fields, describe the GPOS feature using relevant technical terms and topic-related details.
· In each of the “Business Requirement” fields, describe (in business terms) how the absence of this GPOS feature impacts a business such as TSI.
Note: Consider the work you did for Milestone One as you populate the table.
GPOS Feature
Profile Criteria
Student Analysis
Multiprogramming
Tech Description
Business Requirement
Multiprocessing
Tech Description
Business Requirement
Multithreading
Tech Description
Business Requirement
Virtual Memory
Tech Description
Business Requirement
System Call Interface
Tech Description
Business Requirement
Security
Tech Description
Business Requirement
Device Drivers
Tech Description
Business Requirement
Fault Tolerance
Tech Description
Business Requirement
IT 600 Final Project Guidelines and Rubric
Overview
IT professionals are often called upon to make decisions, provide recommendations, and perform analyses that require an in-depth understanding
of the inner workings of an operating system. This summative assessment will provide students with the knowledge and skills required to achieve
and maintain this level of understanding throughout their careers. For the summative assessment, students will perform a technical evaluation of
an operating system. Students will be offered a choice of operating systems to analyze. Students will use real-time and log-based tools, empirical
observation, and scholarly research to analyze the core subsystems of the operating system. For each subsystem, students will research and
describe the technology used in that subsystem and compare it to other available technologies. For the final report, students will assess the results
of their analyses and perform an overall evaluation of the operating system, with recommendations for how it might be improved.
For the summative assessment you will perform an in-depth technical evaluation of an operating system. The evaluation will be made in terms of
the ability of the system and its supporting hardware to meet a set of organizational needs and technical requirements. The organization is a global
enterprise that provides premium technical support to other enterprise businesses.
Management will use your evaluation as one element among several in their assessment of options for future technology adoption. You will define
the technical requirements, based on tasks performed by the organization, the applications used, system loads, security, system management,
maintenance, and performance. The scope of the evaluation will include analyses and assessments of the hardware-software interface, the
techniques used to implement processes and threads, the file systems supported by ...
You have been asked to explain the differences between certain categ.docxshericehewat
You have been asked to explain the differences between certain categories of crimes. For each of the following categories of crime, provide a general definition of the category of crime and give at least two detailed examples of specific crimes that fall into each category:
Crimes against persons
Crimes against property
Crimes of public morality
White-collar crime
Cyber crime
Then for the following scenarios, discuss the categories of crimes involved in each scenario and explain the specific criminal charges that you would apply to each scenario. You can utilize the Library, Internet and other resources to research the criminal statutes of a state of your choice in order to help you determine which criminal charges should be applied:
David S. was running around a public park without his clothes on, singing and shouting loudly, at 3 in the morning. Police arrived after neighbors called to complain. They saw David S. tipping over a garbage can and when they shouted for him to stop, he threw the garbage can into a car, breaking one of its side windows. The police arrested David S, His blood alcohol level was twice the legal limit.
Gary M. was arrested by the FBI when he showed up at a local mall to meet a "14 year old girl" for a date, which he arranged over the Internet. He didn't know that the "14 year old girl" was actually a 35-year old male FBI agent.
Elaine R. was an accountant working for a large corporation. She had been falsifying the accounting records and sending some of the corporate funds to her own bank accounts in an offshore bank. The corporation found out what she had been doing and reported her to the police.
Please submit your assignment.
.
You have been asked to help secure the information system and users .docxshericehewat
You have been asked to help secure the information system and users against hacking attempts. Complete the following:
Take this opportunity to describe the 4 different approaches and techniques a hacker would use to steal the organization's data.
For each approach, discuss what methods can be used to circumvent the attack, prevent it, or minimize the disruption caused by the event.
Include 2–3 pages of material covering the 3 discussion areas in Section 5 of your Key Assignment document (including the completed previous 4 sections).
social engineering,dumpster diving,identify theft,cyberterrorist
.
You have been asked to participate in a local radio program to add.docxshericehewat
You have been asked to participate in a local radio program to address the role of corrections in the community. The audience is specifically interested in discussing whether corrections should be focused on one or all of the following functions:
Rehabilitation of offenders
Punishment of offenders
Isolation of chronic offenders
After carefully considering available information and points of view on the subject, decide which role you believe should be the focus of the community's corrections policy. To prepare for the program, create 5 questions you believe callers may ask. Explain your point of view on the role of corrections in the criminal justice system to each of the questions asked, and draw a connection to the topic you are researching for this course. How do issues in corrections correlate with the topic you are researching?
.
Y
o
u
h
a
v
e
bee
n
h
i
r
e
d
a
s
a c
on
s
u
l
t
an
t
b
y
y
ou
r
t
o
w
n’
s
e
m
e
r
gen
cy
m
anage
m
en
t
c
oo
r
d
i
na
t
o
r
t
o
h
e
l
p
d
e
v
e
l
o
p
e
m
e
r
gen
cy
a
c
t
i
o
n
p
l
an
s
.
O
n
e
o
f
t
h
e
r
ea
s
o
n
s
y
o
u
w
e
re
s
e
l
e
c
t
e
d
i
s
y
ou
r
e
x
pe
r
t
i
s
e
i
n
u
s
i
n
g
t
h
e
G
ene
r
a
l
B
eh
a
v
io
r
M
od
e
l
(
G
E
BM
O
)
t
o
a
s
s
e
ss
r
i
s
k
s
.
Y
ou
r
f
i
r
s
t
t
a
s
k
i
s
t
o
a
ss
e
ss
t
h
e
ha
z
a
r
dou
s
m
a
t
e
r
i
a
l
r
i
s
ks
a
t
a
l
o
c
a
l
ga
s
s
t
a
t
i
on
.
T
h
e
s
t
a
t
i
o
n
ha
s
on
e
30
,
000
-
ga
ll
o
n
unde
r
g
r
ou
n
d
s
t
o
r
ag
e
t
an
k
c
o
m
pa
r
t
m
en
t
a
l
i
z
e
d
t
o
h
o
l
d
10
,
00
0
gal
l
on
s
ea
ch
o
f
t
h
e
t
h
r
e
e
ga
s
o
li
n
e
g
r
ade
s
,
and
t
he
re
i
s
on
e
add
i
t
i
ona
l
10
,
00
0
-
gal
l
o
n
t
an
k
f
o
r
d
i
e
s
e
l
f
u
e
l
.
T
h
e
s
t
a
t
i
o
n
ha
s
f
ou
r
p
u
m
p
s
,
an
d
ea
ch
on
e c
a
n
deli
v
e
r
al
l
f
ou
r
p
r
odu
c
t
s
.
A
l
s
o
o
n
s
i
t
e
i
s
a
2
,
50
0
s
q
.
f
t
.
c
on
cr
e
t
e
b
l
o
ck
b
u
il
d
i
n
g
u
s
e
d
f
o
r
t
h
e
c
a
s
h
i
e
r
an
d r
e
t
ai
l
s
a
l
e
s
o
f
s
e
r
v
i
ce
s
t
a
t
i
o
n
an
d c
o
n
v
en
i
en
ce
s
t
o
re
i
t
e
m
s
.
T
h
e
s
t
a
t
i
o
n
i
s
l
o
c
a
t
e
d
a
t
a
bu
s
y
i
n
t
e
r
s
e
c
t
i
o
n
nea
r
t
h
e c
e
n
t
e
r
o
f
t
o
w
n
.
I
t
i
s
ad
j
a
c
en
t
t
o
s
e
v
e
r
a
l
o
t
he
r
l
o
c
a
l
bu
s
i
ne
s
s
e
s
t
ha
t
d
o a
b
r
i
s
k
bu
s
i
ne
ss
du
r
i
n
g
t
h
e
da
y.
Acr
o
s
s
t
h
e
s
t
r
ee
t
f
r
o
m
t
h
e
s
t
a
t
i
o
n
i
s
a
l
a
r
g
e
hou
s
i
n
g
d
e
v
e
l
o
p
m
en
t
w
i
t
h
a
n
e
l
e
m
en
t
a
ry
s
c
hoo
l
.
B
eh
i
n
d
t
h
e
s
t
a
t
i
o
n
i
s
a
c
i
t
y
pa
rk
w
i
t
h
p
l
a
y
g
r
ou
n
d
s
,
ba
s
e
ba
l
l
f
i
e
l
d
s
,
an
d a
l
a
r
g
e
w
oode
d
a
r
ea
.
U
s
e
t
h
e
G
EB
M
O
f
r
a
m
e
w
o
rk
t
o
a
ss
e
ss
t
h
e r
i
s
ks
r
e
l
a
t
e
d
t
o
t
h
e
f
u
e
l
s
i
n
t
h
e
unde
r
g
r
oun
d
t
an
k
s
.
Con
s
i
de
r
ph
y
s
i
c
a
l
,
c
h
e
m
i
c
al
,
an
d
na
t
u
r
a
l
ha
z
a
r
d
s
t
ha
t
m
a
y
c
on
t
r
i
bu
t
e
t
o
t
h
e
r
i
s
k
s
.
1
.
D
i
s
c
u
ss
h
o
w
y
o
u
app
li
e
d
ea
ch
o
f
t
h
e
s
t
ep
s
i
n
t
h
e
G
EB
MO
p
r
o
c
e
s
s
an
d
w
h
a
t
r
i
s
ks
y
o
u
i
den
t
i
f
i
ed
.
2
.
Pr
o
v
i
d
e r
e
c
o
mm
enda
t
i
on
s
f
o
r
p
r
e
v
en
t
i
n
g
s
pi
ll
s
o
r
r
e
l
e
a
s
e
s
.
3
.
D
i
s
c
u
ss
r
e
s
p
o
n
s
e
a
c
t
i
on
s
r
equ
i
r
e
d
i
n
t
h
e
e
v
en
t
o
f
a
s
p
i
l
l
o
r
r
e
l
ea
s
e
.
S
uppo
rt
y
ou
r
d
i
s
c
u
ss
i
o
n
w
i
t
h
app
r
op
r
i
a
t
e r
e
f
e
r
en
c
e
s
an
d
i
n
-
t
e
xt
c
i
t
a
t
i
on
s
.
.
You have been appointed as a system analyst in the IT department of .docxshericehewat
You have been appointed as a system analyst in the IT department of a selected university in Malaysia. You are responsible to develop an online admission system for the university. For this reason, you have to do an analysis and design to model the online system that could be developed later. Identify the requirements for the system and produce a software requirement specification (SRS) to document all the details.
.
You choose one and I will upload the materials for u.Choose 1 of.docxshericehewat
You choose one and I will upload the materials for u.
Choose 1 of the following 3 questions, and answer it in a paper of no more than 1000 words. Submit that paper by
November 4
at midnight PST in the appropriate IICS515 Moodle dropbox.
4. Monday October 27 lecture
Themes: Global Media Governance and Regulation; The Internet and Digital Media
Readings: Chapter 5, “The Medium: Global Technologies and Organizations,” and Chapter 6, “The Internet”
In this lecture, we discussed the definition and history of communication rights as one element or dimension of communication policy, and used it to bring to life a subject—policy—that sometimes seems abstract and technical in nature.
In doing so, we noted the evolution from a “negative” rights view of communication rights, as expressed in Article 19 of the United Nations Universal Declaration of Human Rights in 1948, to the more “positive” definition of communication rights explained in the lecture content derived from the work of Marc Raboy (and Jeremy Shtern).
Remember that “negative” does not mean “bad” here nor “positive” good. “Negative” and “positive” rights—which are ways of thinking about all human rights, not just communication rights—are instead ways of characterizing the orientation of rights toward individuals and society. Negative rights are defined in terms of freedom
from
things, and positive rights in terms of freedom
to
have or do certain things. Both negative and positive rights derive their legitimacy from fundamental and universal consideration of what it means to be human and to be treat people as human beings.
In our case study at the end of the lecture, we then discussed how a “positive” approach to communication rights could help us better understand and perhaps act against cyberbullying.
In your paper, and in your own words, define “communication rights,” and then briefly explain the evolution from the negative to the positive rights approach to communication rights.
Once you have done that, and with reference to the cyberbullying pamphlet from the Canadian government attached to your lecture notes, demonstrate how a “positive” rights approach to communication rights can help us better understand and prevent cyberbullying. In other words, what are the limitations of approaching cyberbullying from a “negative” rights perspective, and what does a “positive” approach to communication rights do to help us understand and perhaps act against cyberbullying?
Cyberbullying is a problem in international communication that affects many, especially vulnerable teenagers, as illustrated in the case of the late Amanda Todd (from British Columbia).
You do not need to use the McPhail chapter here, as it is not directly relevant to this question. Rather, draw on the lecture notes and the podcast as your sources here.
5. Wednesday October 29 lecture
Themes: Global Media Case Study in Media and the Arab World; Orientalism
Readings: Said, Edward (1978)..
You are Incident Commander and principal planner for the DRNC even.docxshericehewat
You are Incident Commander and
principal planner for the DRNC event. As you commence the planning process, consider the two fundamental types of error committed by policy makers in their reliance on intelligence reports to formulate policy. What would you do to minimize these errors from occurring and adversely affecting your policy decisions?
Min 500 words, In text references, APA format
.
You DecideCryptographic Tunneling and the OSI ModelWrite a p.docxshericehewat
You Decide
Cryptographic Tunneling and the OSI Model
Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model (Review the OSI Simulation in the Week 3 Lecture).
Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) that may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).
.
You are working as a behavioral health specialist in a neurological .docxshericehewat
You are working as a behavioral health specialist in a neurological research center and are responsible for participant education. There are three participants to choose from: Stephanie has experienced a stroke; Jamie has experienced an amputation; and Robert has experienced a traumatic brain injury. Choose one participant to work with.
We are chosing Robert and his traumatic brain injury
Prepare
a 1,000- to 1,200-word paper that explains the functions and limitations of neural plasticity in the participant's recovery process.
Include
two to three peer-reviewed sources.
.
You are to write up a reflection (longer than 2 pages) that discusse.docxshericehewat
You are to write up a reflection (longer than 2 pages) that discusses what happened in the prisoner's dilemma activity we did in class on Monday, April 20. Some points to cover include why you took the action you took, what you thought others were going to do and why, and what actually happened. And what implications this has for situations in the work place where individuals may take different actions than might be the most beneficial for the team as a whole.
.
You can only take this assignment if you have the book Discovering t.docxshericehewat
You can only take this assignment if you have the book Discovering the Humanities. This homework needs to be done by reading Chapter Nine. It needs to be a minimum of 150 to 200 words. It needs citations and referances.
Western art and architecture has influenced and been influenced by cultures in India, China, and Japan.
Part I:
Using examples provided from this unit's reading, discuss how the artistic culture in either India, China, or Japan (select one) exhibits influence from Western cultures. Discuss, too, the reciprocal connection, specifically explaining how India, China, or Japan influenced Western art and architecture.
Part II:
Add to your post by discussing the similarities and differences between art from your selected culture (India, China, or Japan) and ancient Greek sculpture. Use examples and images to support your ideas.
.
You are to interview a woman 50 and older and write up the interview.docxshericehewat
You are to interview a woman 50 and older and write up the interview
in a 5 page MLA paper. You ask questions intended to elicit information about her life
and how it relates to the history of women in the late 20th century. Your paper
should be normal margins, 10-12 pt. font, typed and double-spaced. It should
include the approximate age of your interviewee—it does not have to include her
name.
EXAMPLE QUESTIONS ..........
What’s your first, most vivid memory? Going to my grandma and grandpa’s farm and making grandma walk me out to the outhouse for fear of a mean bannie rooster would peck me to death. He was afraid of grandma.
What was the apartment or house like that you grew up in? How many bedrooms did it have? Bathrooms? I lived with my mother and father mostly in a house in the city that had 2 bedrooms, 1 bathroom. I had to share a room with my older brother that was upstairs.
What was your bedroom like? Very simple. It had 2 beds made of feathers, a desk with a lamp and one dresser for our clothes. Dallas (my brother got the bottom 2 and I got the top 2)
Can you describe the neighborhood you grew up in? Not really. Every chance I got I went to grandma and grandpas and spent time with them. They lived deep in the country. I had one friend out there that lived about 3 miles away on the next farm. His name was Carl.
Tell me about your parents. Where were they born? When were they born? What memories do you have of them? Both parents were born in Richmond, IN. Memories include more of my mother than my father. He was a drunk that stayed out all the time. He only came home when he was ready to pass out or to beat us.
Who was more strict: your mother or your father? Do you have a vivid memory of something you did that you were disciplined for? Since mom was the main one around I would say that she was more strict. I remember one instance when I was about 16 and mom had kicked me out of the house because she was forced to work with dad being gone all the time and I was telling her that I no longer wanted to take care of my little brother because I felt like I was his mother rather than her and that I didn’t want to do anymore of the house work. It was her house she should have to clean it. She kicked me out. I was sitting on the porch crying and dad came home (sober for once) and sat on the porch with me, got me calmed down and offered to give me a ride to grandma and grandpa’s.
Did your parents have a good marriage? No they had a horrible marriage.
How did your family earn money? How did your family compare to others in the neighborhood – richer,
poorer, the same? My family earned money from my mother working in a diner. Dad worked in a mill but we rarely saw his money. We did alright but I would say that we were on the poorer end of society.
What kinds of things did your family spend money on? The necessities and that was it.
How many brothers and sisters do you have? When were they born? What memories do yo.
You are to complete TWO essays and answer the following questions. .docxshericehewat
You are to complete TWO essays and answer the following questions. Here are your questions:
1) How has the information provided in this class changed or reinforced your perspective on an issue(S). Please provide details.
2) What do you believe is the biggest challenge facing our nation and why? Be specific and detailed. What can be done to address this challenge? Be realistic and detailed in your responses.
750 - 800 words each essay
no plagiarism
.
You are the vice president of a human resources department and Susan.docxshericehewat
You are the vice president of a human resources department and Susan has been your executive assistant for one (1) year. She effectively completes her given assignments, sometimes ahead of schedule. Susan has a welcoming personality and is commended on her willingness to help when asked. As a result of her efficiency, Susan often has spare time on her hands.
In several conversations, you have spoken with Susan about taking a proactive stance and involving herself in the business to increase her knowledge base. You have suggested she attend strategic planning meetings, shadow other Business Partners, and take professional development courses geared towards human resources. Susan has not incorporated any of these suggestions.
The organization promotes and encourages employee development and has a requirement of 24 professional development (PD) hours for each employee per annual review cycle. As VP of the department, you have offered to mentor Susan; yet she has not taken advantage of the offer. Given Susan’s capabilities and potential, you want to mutually establish future performance goals and developmental opportunities to enhance her effectiveness and maximize her organizational contributions.
Susan’s professional appearance and interaction with co-workers is superb. When asked to complete a task, she fulfills the assignment willingly and with very few errors. She is well liked and respected by her peers. She has impeccable oral and written communication skills. Overall, you are pleased with her performance but want to see Susan take initiative to seek out tasks to complete rather than waiting to be told what to do.
As the VP of HR, you have been tasked with a two part assignment. In part one of this assignment you will explain the importance of performance appraisals, analyze the essential elements which should be included and describe how performance appraisals can be used to promote employee growth. In part two of this assignment you will create a performance appraisal for Susan.
Your paper should be 8-10 pages in length incorporating both parts I and II. You can either design a performance appraisal document or use an existing template. The performance appraisal should be no more than 3 pages of the total page count for the assignment. Be sure your paper addresses all of the following components:
Part I: Importance of Performance Appraisals:
Explain how performance appraisals can be used as part of employee development.
Explain why rankings are given to employees and the advantages and disadvantages of including rankings.
Address why organizations should deliver appraisals in a timely manner to employees.
Discuss the advantages and disadvantages of three different types of performance appraisals. Make a recommendation of which type of performance appraisal is most appropriate for Susan.
Provide suggestions on how the manager can give feedback on a continual basis to the employee to encourage continual development.
Part II: Sus.
You are the purchasing manager of a company that has relationships w.docxshericehewat
You are the purchasing manager of a company that has relationships with many different suppliers. All information about orders, shipments, etc. is still manually exchanged. You have discussed incorporating Internet technologies to help manage the supply chain.
In 1-2 pages, summarize the advantages of using Internet technologies versus traditional methods in supply chain management.
.
More Related Content
Similar to GG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docx
Capstone Project Report Guidelines
The Capstone Project represents a culminating experience in our Bachelor of Science in Information Science curriculum. It is an opportunity for students to showcase what they have learned from our program and to demonstrate that they are on their way for achieving our program’s key student learning outcomes. Specifically there are six areas that we would like students to address in their end of semester Capstone Project Reports.
1. Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
2. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program's discipline.
3. Communicate effectively in a variety of professional contexts.
4. Recognize professional responsibilities and make informed judgements in computing practice based on legal and ethical principles.
5. Functional effectively as a member or leader of a team engaged in activities appropriate to the program's discipline.
6. Support the planning, acquisition, delivery, and monitoring of information systems and their associated technologies within an organization’s environment.
Rubrics for each of these areas have been developed to help students assess what is expected for each of these areas. Students are encouraged to talk with their faculty and client mentors to think through what each of these areas mean to their projects. Questions are welcome!
The following are some guidelines to help you put together your Capstone Project Report. Since every project is different, feel free to amend as needed to best showcase the work you have done this year and to demonstrate your abilities to meet the learning goals of a computing program accredited by the Accreditation Board for Engineering and Technology (ABET).
1. Title Page (Note: It is okay to include logos or other clip art on the Title Page)
a. Project / Team Name
b. Sponsoring Organization / Contact Information
c. Team Member Names
d. Date
2. Table of Contents
3. Introduction / Organization Background
a. Describe the organization that your team is working for. What is their history? What is the mission (purpose) of this organization?
b. Explain the challenges facing the organization.
4. Description of Analysis Work Performed - Here are the areas that you should address in this section of the report (Capstone Project I), but feel free to include others as needed. See the Analysis Rubric for additional details.
a. Question 1: Describe the Problem or Challenge Facing the Client and their Stakeholders.
b. Question 2: Evaluate the Current State (Data, Process, People, and Technology in Use) surrounding the problem or issue.
c. Question 3: Assess Client’s Desired Future State (e.g., Data, Process, People, and Technical Improvements)
d. Question 4: Analyze the Options available for getting your Client to their desired future state and Recommend a
So.
IT 510 Final Project Guidelines and Rubric Overview .docxvrickens
IT 510 Final Project Guidelines and Rubric
Overview
The final project for this course is the creation of a System Proposal Document.
In any modern enterprise, it is crucial that all of the different stakeholders, users, inputs, and outputs that relate to the business’s IT systems coalesce in a logical
and cohesive way for the systems to be effective. As a member of an IT team, your overarching goal is to ensure that the IT systems ultimately do what the
business needs them to do. In this course, you have learned about the key principles and practices underlying the analysis, design, implementation, and
management of IT systems. In this final project, you will apply this knowledge by creating a systems proposal document.
The project is divided into four milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Module Two, Module Four, Module Six, and Module Eight. The final submission will occur in Module Nine.
In this assignment, you will demonstrate your mastery of the following course outcomes:
Assess the relationship of systems analysis, design, implementation, and development processes as they relate to the management of information
technology systems
Communicate the paradigms, processes, and activities of systems development to diverse audiences
Apply structure and object oriented analysis modeling techniques to analyze, design, and manage information technology systems
Construct written and visual representations of the analysis, design, implementation, and management of information technology systems based on the
systems development life cycle
Prompt
You will select your own case study and will apply the content provided, describing the business process to complete the final project. Alternate sources for case
studies include the case studies found in the textbook with the exception of the Personal Trainer Case. You can additionally search the internet for business case
ideas.
You will complete an analysis of an existing information technology system and make recommendations for updates to meet business goals based on your chosen
case study. Your final submission will include an introduction, systems requirements, systems design specifications, and an implementation plan. All of the
components listed below should be submitted as a single, organized systems proposal document and include screenshots of all relevant diagrams, charts, and
tables.
I. Introduction: Provide an overview of your selected case. Be sure to provide appropriate citations and reference to the case study you have selected.
a) Background: Establish a context for understanding your systems proposal. Specifically, explain any essential paradigms, processes, and activities
of the existing information technology systems.
b) Problem Statement: What is the problem that needs to be solved? Wh ...
HomeInformation Systems homework helpReport Issuesorayan5ywschuit
Home
Information Systems homework help
Report Issue
Stage 1:
Strategic Use of Technology
Before you begin work on this assignment, be sure you have read the Case Study on Chesapeake IT Consultants (CIC). CIC is a fictional company created for IFSM 300’s Case Study.
Overview
As a business analyst in the Chief Information Officer’s (CIO's) department of Chesapeake IT Consulting (CIC), you have been assigned to conduct an analysis, develop a set of system requirements and recommend an IT solution (applicant tracking or hiring system) to improve the hiring process for CIC. This work will be completed in four stages, and each of these four stages will focus on one section of an overall
Business Analysis and System Recommendation
(BA&SR) report to be delivered to the CIO.
Section I: Strategic Use of Technology
(Stage 1) - The first step is to look at the organization and explain how an IT system could be used to support CIC's strategies and objectives and support its decision-making processes.
Section II: Process Analysis
(Stage 2) – Next you will evaluate current processes and workflow and explain how CIC can use IT to improve its processes and workflow.
Section III: Requirements
(Stage 3) –Then you will identify key stakeholder expectations for the new technology solution to support CIC’s hiring process and develop a set of requirements.
Section IV: System Recommendation
(Stage 4) – Finally, you will review the provided Vendor brochure for a proposed applicant tracking system and explain how it meets the requirements and what needs to be done to implement the system within CIC.
The sections of the BA&SR will be developed and submitted as four staged assignments. In stages 2, 3 and 4, you will also incorporate any feedback received when the previous stage was graded to improve the effectiveness of your overall report and then add the new section to your report. At the end of the course, you will submit a complete BA&SR document that includes all the sections and changes that resulted from previous feedback. Part of the grading criteria for Stage 4 submission includes addressing previous feedback to improve the final report.
Assignment – BA&SR:
Introduction and Section I – Strategic Use of Technology
Write an appropriate Introduction to the entire BA&SR Report (guidelines are provided below). Section I of the BA&SR document contains an organizational analysis and identifies ways in which an information system to improve the hiring process can help CIC, the organization in the case study, meet its strategic goals and meet the information needs of various levels of management.
Using the case study, assignment instructions, Course Content readings, and external resources, develop your Introduction and Section I: Background and Organizational Analysis. To start, review the Business Perspectives Module (week 1 content), particularly the sections that describe the example of Booz Allen Hamilton, a services company with a b ...
Over the next two years, your organization needs to shift its busi.docxkarlhennesey
Over the next two years, your organization needs to shift its business model and widen its technology exploitation in order to expand in its existing market, expand into new markets, facilitate new products and services, and reduce costs. Your mission is to provide the CTO or CIO with technical recommendations on how to accomplish these goals.
Your assignment is to prepare a presentation for the CTO or CIO, describing a technology you believe should be adopted, describing the benefits, costs and risks of adoption, and recommending how to proceed. However, all work and ideas not your own should be clearly acknowledged in the PowerPoint notes in accordance with academic standards. Use your own words and do research to back up your assertions!
Use the PowerPoint “Notes” section for comments that you would supply verbally at the presentation. Also use it for explanations to your facilitator.
Address (in order) the sections described below in at most 15 PowerPoint slides with Notes sections. You may follow this with appendices if you wish. Appendices will be read only as-needed. You need not address every point mentioned within each section – just those most significant for your organization and the technology, and which result in a clear, coherent overall presentation. Give approximately equal space to the sections.
Hints:
A. This presentation is designed to convince your CTO or CIO. The slides should steer a course between the extremes of wordiness (remember that you can talk to add content) and bare-bones meaninglessness (viewers need words with meaning). Vary bullet slides, figures, and tables to maintain attention.
B. You have limited space. Edit extensively because every word counts.
1. Organizational Background
This section of the presentation demonstrates to the CTO/CIO that you clearly understand your organization's background enough to advocate the technology you propose. Emphasize the basis on which it competes with similar organizations (or for organizations where there is no relevant basis for competition, describe the organization's mission). Include mention of technology that your organization uses, but only to the extent that it is relevant or needed to understand this presentation. This will probably differ somewhat from assignment 1 in that it describes the background for the proposals you are making in this presentation: However, you are free to cut and paste from assignment 1 if you wish. The section in this week’s notes on SWOT may help too.
2. Technology Description
Identify and describe a technology (e.g., virtualization) that your organization should adopt, along with its key capabilities and characteristics. The specifics of “how” the technology would be implemented are not required in this section. If it is to replace technology your organization currently uses, consider summarizing key technology differences. Focus on the here on the essential technology description,as well as on the problems y ...
Over the next two years, your organization needs to shift its busi.docxhoney690131
Over the next two years, your organization needs to shift its business model and widen its technology exploitation in order to expand in its existing market, expand into new markets, facilitate new products and services, and reduce costs. Your mission is to provide the CTO or CIO with technical recommendations on how to accomplish these goals.
Your assignment is to prepare a presentation for the CTO or CIO, describing a technology you believe should be adopted, describing the benefits, costs and risks of adoption, and recommending how to proceed. However, all work and ideas not your own should be clearly acknowledged in the PowerPoint notes in accordance with academic standards. Use your own words and do research to back up your assertions!
Use the PowerPoint “Notes” section for comments that you would supply verbally at the presentation. Also use it for explanations to your facilitator.
Address (in order) the sections described below in at most 15 PowerPoint slides with Notes sections. You may follow this with appendices if you wish. Appendices will be read only as-needed. You need not address every point mentioned within each section – just those most significant for your organization and the technology, and which result in a clear, coherent overall presentation. Give approximately equal space to the sections.
Hints:
A. This presentation is designed to convince your CTO or CIO. The slides should steer a course between the extremes of wordiness (remember that you can talk to add content) and bare-bones meaninglessness (viewers need words with meaning). Vary bullet slides, figures, and tables to maintain attention.
B. You have limited space. Edit extensively because every word counts.
1. Organizational Background
This section of the presentation demonstrates to the CTO/CIO that you clearly understand your organization's background enough to advocate the technology you propose. Emphasize the basis on which it competes with similar organizations (or for organizations where there is no relevant basis for competition, describe the organization's mission). Include mention of technology that your organization uses, but only to the extent that it is relevant or needed to understand this presentation. This will probably differ somewhat from assignment 1 in that it describes the background for the proposals you are making in this presentation: However, you are free to cut and paste from assignment 1 if you wish. The section in this week’s notes on SWOT may help too.
2. Technology Description
Identify and describe a technology (e.g., virtualization) that your organization should adopt, along with its key capabilities and characteristics. The specifics of “how” the technology would be implemented are not required in this section. If it is to replace technology your organization currently uses, consider summarizing key technology differences. Focus on the here on the essential technology description,as well as on the problems y.
System Proposal TemplateCSC 545 System Design When preparing a.docxssuserf9c51d
System Proposal Template
CSC 545 System Design
When preparing a systems proposal, systems analysts should arrange the following items in order:
Ten Main Section of your System Proposal
1. Cover Letter
List of people who did the study and summarize the objectives of the study are provided in your cover letter. Also, prearranged time and place for oral presentation of the system proposal can be included. Keep your cover letter concise (one page maximum) and friendly.
2. Title Page of project
Include the name of the project, the names of the systems analysis team members, and the date the proposal is submitted.
3. Table of Contents
If the proposal is very short (less than ten pages), you can omit the table of contents since it is unnecessary on such a short document. The purpose of your table of contents is to indicate the contents of your proposal.
4. Executive Summary (including recommendations)
Usually, the executive summary is 250 to 375 words and can answer the questions such as who, what, when, where, why and how of the proposal. It should also include recommendation of the system analysts since some people will only have time to read the summary.
5. Outline of system study with appropriate documentation
Provides information about all the methods used in the study, and who or what was studied.
6. Detailed results of systems study
The details what the system analyst has found out about the system through all of the methods described are included in this section. It also presents problems with the system
7. Systems alternatives (3 or 4 possible solutions)
The analyst will present two or three alternative solutions that directly address the aforementioned problems. Each alternative should be explored separately. Describe the costs and benefits of each situation.
8. System’s analysts’ recommendations
After the systems analysis team has weighed the alternatives, it will have a definite professional opinion about which solution is most workable and best to solve the problem. It expresses the recommended solution.
9. Summary
It is brief statement that mirrors the content of your executive summary. It gives the objectives of the study and the recommended solution. Also, it allows the analyst one more chance to stress the project’s importance and feasibility along with the value of the recommendations.
10. Appendices
It might include pertinent correspondence, a summary of phases completed in the study, detailed graph for analyses purposes, or even previously done systems studies.
Source: http://sampleproposal.net
Project Design Document Template
CSC 845
Project Title
[Give your project a short but meaningful title]
Problem Definition
[In one or two paragraphs, describe the problem that you are trying to solve. For some projects in business this may be something that needs to be fixed but for the class project, you will be describing a brand new mobile application here. Mention what you application is, why your application will he ...
IT 600 Final Project Milestone Two Template Analytical Organi.docxpriestmanmable
IT 600 Final Project Milestone Two Template: Analytical Organizational Profile
Directions: Insert your answers directly in the Student Analysis column below by doing the following:
· In each of the “Tech Description” fields, describe the GPOS feature using relevant technical terms and topic-related details.
· In each of the “Business Requirement” fields, describe (in business terms) how the absence of this GPOS feature impacts a business such as TSI.
Note: Consider the work you did for Milestone One as you populate the table.
GPOS Feature
Profile Criteria
Student Analysis
Multiprogramming
Tech Description
Business Requirement
Multiprocessing
Tech Description
Business Requirement
Multithreading
Tech Description
Business Requirement
Virtual Memory
Tech Description
Business Requirement
System Call Interface
Tech Description
Business Requirement
Security
Tech Description
Business Requirement
Device Drivers
Tech Description
Business Requirement
Fault Tolerance
Tech Description
Business Requirement
IT 600 Final Project Guidelines and Rubric
Overview
IT professionals are often called upon to make decisions, provide recommendations, and perform analyses that require an in-depth understanding
of the inner workings of an operating system. This summative assessment will provide students with the knowledge and skills required to achieve
and maintain this level of understanding throughout their careers. For the summative assessment, students will perform a technical evaluation of
an operating system. Students will be offered a choice of operating systems to analyze. Students will use real-time and log-based tools, empirical
observation, and scholarly research to analyze the core subsystems of the operating system. For each subsystem, students will research and
describe the technology used in that subsystem and compare it to other available technologies. For the final report, students will assess the results
of their analyses and perform an overall evaluation of the operating system, with recommendations for how it might be improved.
For the summative assessment you will perform an in-depth technical evaluation of an operating system. The evaluation will be made in terms of
the ability of the system and its supporting hardware to meet a set of organizational needs and technical requirements. The organization is a global
enterprise that provides premium technical support to other enterprise businesses.
Management will use your evaluation as one element among several in their assessment of options for future technology adoption. You will define
the technical requirements, based on tasks performed by the organization, the applications used, system loads, security, system management,
maintenance, and performance. The scope of the evaluation will include analyses and assessments of the hardware-software interface, the
techniques used to implement processes and threads, the file systems supported by ...
Similar to GG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docx (7)
You have been asked to explain the differences between certain categ.docxshericehewat
You have been asked to explain the differences between certain categories of crimes. For each of the following categories of crime, provide a general definition of the category of crime and give at least two detailed examples of specific crimes that fall into each category:
Crimes against persons
Crimes against property
Crimes of public morality
White-collar crime
Cyber crime
Then for the following scenarios, discuss the categories of crimes involved in each scenario and explain the specific criminal charges that you would apply to each scenario. You can utilize the Library, Internet and other resources to research the criminal statutes of a state of your choice in order to help you determine which criminal charges should be applied:
David S. was running around a public park without his clothes on, singing and shouting loudly, at 3 in the morning. Police arrived after neighbors called to complain. They saw David S. tipping over a garbage can and when they shouted for him to stop, he threw the garbage can into a car, breaking one of its side windows. The police arrested David S, His blood alcohol level was twice the legal limit.
Gary M. was arrested by the FBI when he showed up at a local mall to meet a "14 year old girl" for a date, which he arranged over the Internet. He didn't know that the "14 year old girl" was actually a 35-year old male FBI agent.
Elaine R. was an accountant working for a large corporation. She had been falsifying the accounting records and sending some of the corporate funds to her own bank accounts in an offshore bank. The corporation found out what she had been doing and reported her to the police.
Please submit your assignment.
.
You have been asked to help secure the information system and users .docxshericehewat
You have been asked to help secure the information system and users against hacking attempts. Complete the following:
Take this opportunity to describe the 4 different approaches and techniques a hacker would use to steal the organization's data.
For each approach, discuss what methods can be used to circumvent the attack, prevent it, or minimize the disruption caused by the event.
Include 2–3 pages of material covering the 3 discussion areas in Section 5 of your Key Assignment document (including the completed previous 4 sections).
social engineering,dumpster diving,identify theft,cyberterrorist
.
You have been asked to participate in a local radio program to add.docxshericehewat
You have been asked to participate in a local radio program to address the role of corrections in the community. The audience is specifically interested in discussing whether corrections should be focused on one or all of the following functions:
Rehabilitation of offenders
Punishment of offenders
Isolation of chronic offenders
After carefully considering available information and points of view on the subject, decide which role you believe should be the focus of the community's corrections policy. To prepare for the program, create 5 questions you believe callers may ask. Explain your point of view on the role of corrections in the criminal justice system to each of the questions asked, and draw a connection to the topic you are researching for this course. How do issues in corrections correlate with the topic you are researching?
.
Y
o
u
h
a
v
e
bee
n
h
i
r
e
d
a
s
a c
on
s
u
l
t
an
t
b
y
y
ou
r
t
o
w
n’
s
e
m
e
r
gen
cy
m
anage
m
en
t
c
oo
r
d
i
na
t
o
r
t
o
h
e
l
p
d
e
v
e
l
o
p
e
m
e
r
gen
cy
a
c
t
i
o
n
p
l
an
s
.
O
n
e
o
f
t
h
e
r
ea
s
o
n
s
y
o
u
w
e
re
s
e
l
e
c
t
e
d
i
s
y
ou
r
e
x
pe
r
t
i
s
e
i
n
u
s
i
n
g
t
h
e
G
ene
r
a
l
B
eh
a
v
io
r
M
od
e
l
(
G
E
BM
O
)
t
o
a
s
s
e
ss
r
i
s
k
s
.
Y
ou
r
f
i
r
s
t
t
a
s
k
i
s
t
o
a
ss
e
ss
t
h
e
ha
z
a
r
dou
s
m
a
t
e
r
i
a
l
r
i
s
ks
a
t
a
l
o
c
a
l
ga
s
s
t
a
t
i
on
.
T
h
e
s
t
a
t
i
o
n
ha
s
on
e
30
,
000
-
ga
ll
o
n
unde
r
g
r
ou
n
d
s
t
o
r
ag
e
t
an
k
c
o
m
pa
r
t
m
en
t
a
l
i
z
e
d
t
o
h
o
l
d
10
,
00
0
gal
l
on
s
ea
ch
o
f
t
h
e
t
h
r
e
e
ga
s
o
li
n
e
g
r
ade
s
,
and
t
he
re
i
s
on
e
add
i
t
i
ona
l
10
,
00
0
-
gal
l
o
n
t
an
k
f
o
r
d
i
e
s
e
l
f
u
e
l
.
T
h
e
s
t
a
t
i
o
n
ha
s
f
ou
r
p
u
m
p
s
,
an
d
ea
ch
on
e c
a
n
deli
v
e
r
al
l
f
ou
r
p
r
odu
c
t
s
.
A
l
s
o
o
n
s
i
t
e
i
s
a
2
,
50
0
s
q
.
f
t
.
c
on
cr
e
t
e
b
l
o
ck
b
u
il
d
i
n
g
u
s
e
d
f
o
r
t
h
e
c
a
s
h
i
e
r
an
d r
e
t
ai
l
s
a
l
e
s
o
f
s
e
r
v
i
ce
s
t
a
t
i
o
n
an
d c
o
n
v
en
i
en
ce
s
t
o
re
i
t
e
m
s
.
T
h
e
s
t
a
t
i
o
n
i
s
l
o
c
a
t
e
d
a
t
a
bu
s
y
i
n
t
e
r
s
e
c
t
i
o
n
nea
r
t
h
e c
e
n
t
e
r
o
f
t
o
w
n
.
I
t
i
s
ad
j
a
c
en
t
t
o
s
e
v
e
r
a
l
o
t
he
r
l
o
c
a
l
bu
s
i
ne
s
s
e
s
t
ha
t
d
o a
b
r
i
s
k
bu
s
i
ne
ss
du
r
i
n
g
t
h
e
da
y.
Acr
o
s
s
t
h
e
s
t
r
ee
t
f
r
o
m
t
h
e
s
t
a
t
i
o
n
i
s
a
l
a
r
g
e
hou
s
i
n
g
d
e
v
e
l
o
p
m
en
t
w
i
t
h
a
n
e
l
e
m
en
t
a
ry
s
c
hoo
l
.
B
eh
i
n
d
t
h
e
s
t
a
t
i
o
n
i
s
a
c
i
t
y
pa
rk
w
i
t
h
p
l
a
y
g
r
ou
n
d
s
,
ba
s
e
ba
l
l
f
i
e
l
d
s
,
an
d a
l
a
r
g
e
w
oode
d
a
r
ea
.
U
s
e
t
h
e
G
EB
M
O
f
r
a
m
e
w
o
rk
t
o
a
ss
e
ss
t
h
e r
i
s
ks
r
e
l
a
t
e
d
t
o
t
h
e
f
u
e
l
s
i
n
t
h
e
unde
r
g
r
oun
d
t
an
k
s
.
Con
s
i
de
r
ph
y
s
i
c
a
l
,
c
h
e
m
i
c
al
,
an
d
na
t
u
r
a
l
ha
z
a
r
d
s
t
ha
t
m
a
y
c
on
t
r
i
bu
t
e
t
o
t
h
e
r
i
s
k
s
.
1
.
D
i
s
c
u
ss
h
o
w
y
o
u
app
li
e
d
ea
ch
o
f
t
h
e
s
t
ep
s
i
n
t
h
e
G
EB
MO
p
r
o
c
e
s
s
an
d
w
h
a
t
r
i
s
ks
y
o
u
i
den
t
i
f
i
ed
.
2
.
Pr
o
v
i
d
e r
e
c
o
mm
enda
t
i
on
s
f
o
r
p
r
e
v
en
t
i
n
g
s
pi
ll
s
o
r
r
e
l
e
a
s
e
s
.
3
.
D
i
s
c
u
ss
r
e
s
p
o
n
s
e
a
c
t
i
on
s
r
equ
i
r
e
d
i
n
t
h
e
e
v
en
t
o
f
a
s
p
i
l
l
o
r
r
e
l
ea
s
e
.
S
uppo
rt
y
ou
r
d
i
s
c
u
ss
i
o
n
w
i
t
h
app
r
op
r
i
a
t
e r
e
f
e
r
en
c
e
s
an
d
i
n
-
t
e
xt
c
i
t
a
t
i
on
s
.
.
You have been appointed as a system analyst in the IT department of .docxshericehewat
You have been appointed as a system analyst in the IT department of a selected university in Malaysia. You are responsible to develop an online admission system for the university. For this reason, you have to do an analysis and design to model the online system that could be developed later. Identify the requirements for the system and produce a software requirement specification (SRS) to document all the details.
.
You choose one and I will upload the materials for u.Choose 1 of.docxshericehewat
You choose one and I will upload the materials for u.
Choose 1 of the following 3 questions, and answer it in a paper of no more than 1000 words. Submit that paper by
November 4
at midnight PST in the appropriate IICS515 Moodle dropbox.
4. Monday October 27 lecture
Themes: Global Media Governance and Regulation; The Internet and Digital Media
Readings: Chapter 5, “The Medium: Global Technologies and Organizations,” and Chapter 6, “The Internet”
In this lecture, we discussed the definition and history of communication rights as one element or dimension of communication policy, and used it to bring to life a subject—policy—that sometimes seems abstract and technical in nature.
In doing so, we noted the evolution from a “negative” rights view of communication rights, as expressed in Article 19 of the United Nations Universal Declaration of Human Rights in 1948, to the more “positive” definition of communication rights explained in the lecture content derived from the work of Marc Raboy (and Jeremy Shtern).
Remember that “negative” does not mean “bad” here nor “positive” good. “Negative” and “positive” rights—which are ways of thinking about all human rights, not just communication rights—are instead ways of characterizing the orientation of rights toward individuals and society. Negative rights are defined in terms of freedom
from
things, and positive rights in terms of freedom
to
have or do certain things. Both negative and positive rights derive their legitimacy from fundamental and universal consideration of what it means to be human and to be treat people as human beings.
In our case study at the end of the lecture, we then discussed how a “positive” approach to communication rights could help us better understand and perhaps act against cyberbullying.
In your paper, and in your own words, define “communication rights,” and then briefly explain the evolution from the negative to the positive rights approach to communication rights.
Once you have done that, and with reference to the cyberbullying pamphlet from the Canadian government attached to your lecture notes, demonstrate how a “positive” rights approach to communication rights can help us better understand and prevent cyberbullying. In other words, what are the limitations of approaching cyberbullying from a “negative” rights perspective, and what does a “positive” approach to communication rights do to help us understand and perhaps act against cyberbullying?
Cyberbullying is a problem in international communication that affects many, especially vulnerable teenagers, as illustrated in the case of the late Amanda Todd (from British Columbia).
You do not need to use the McPhail chapter here, as it is not directly relevant to this question. Rather, draw on the lecture notes and the podcast as your sources here.
5. Wednesday October 29 lecture
Themes: Global Media Case Study in Media and the Arab World; Orientalism
Readings: Said, Edward (1978)..
You are Incident Commander and principal planner for the DRNC even.docxshericehewat
You are Incident Commander and
principal planner for the DRNC event. As you commence the planning process, consider the two fundamental types of error committed by policy makers in their reliance on intelligence reports to formulate policy. What would you do to minimize these errors from occurring and adversely affecting your policy decisions?
Min 500 words, In text references, APA format
.
You DecideCryptographic Tunneling and the OSI ModelWrite a p.docxshericehewat
You Decide
Cryptographic Tunneling and the OSI Model
Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model (Review the OSI Simulation in the Week 3 Lecture).
Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) that may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).
.
You are working as a behavioral health specialist in a neurological .docxshericehewat
You are working as a behavioral health specialist in a neurological research center and are responsible for participant education. There are three participants to choose from: Stephanie has experienced a stroke; Jamie has experienced an amputation; and Robert has experienced a traumatic brain injury. Choose one participant to work with.
We are chosing Robert and his traumatic brain injury
Prepare
a 1,000- to 1,200-word paper that explains the functions and limitations of neural plasticity in the participant's recovery process.
Include
two to three peer-reviewed sources.
.
You are to write up a reflection (longer than 2 pages) that discusse.docxshericehewat
You are to write up a reflection (longer than 2 pages) that discusses what happened in the prisoner's dilemma activity we did in class on Monday, April 20. Some points to cover include why you took the action you took, what you thought others were going to do and why, and what actually happened. And what implications this has for situations in the work place where individuals may take different actions than might be the most beneficial for the team as a whole.
.
You can only take this assignment if you have the book Discovering t.docxshericehewat
You can only take this assignment if you have the book Discovering the Humanities. This homework needs to be done by reading Chapter Nine. It needs to be a minimum of 150 to 200 words. It needs citations and referances.
Western art and architecture has influenced and been influenced by cultures in India, China, and Japan.
Part I:
Using examples provided from this unit's reading, discuss how the artistic culture in either India, China, or Japan (select one) exhibits influence from Western cultures. Discuss, too, the reciprocal connection, specifically explaining how India, China, or Japan influenced Western art and architecture.
Part II:
Add to your post by discussing the similarities and differences between art from your selected culture (India, China, or Japan) and ancient Greek sculpture. Use examples and images to support your ideas.
.
You are to interview a woman 50 and older and write up the interview.docxshericehewat
You are to interview a woman 50 and older and write up the interview
in a 5 page MLA paper. You ask questions intended to elicit information about her life
and how it relates to the history of women in the late 20th century. Your paper
should be normal margins, 10-12 pt. font, typed and double-spaced. It should
include the approximate age of your interviewee—it does not have to include her
name.
EXAMPLE QUESTIONS ..........
What’s your first, most vivid memory? Going to my grandma and grandpa’s farm and making grandma walk me out to the outhouse for fear of a mean bannie rooster would peck me to death. He was afraid of grandma.
What was the apartment or house like that you grew up in? How many bedrooms did it have? Bathrooms? I lived with my mother and father mostly in a house in the city that had 2 bedrooms, 1 bathroom. I had to share a room with my older brother that was upstairs.
What was your bedroom like? Very simple. It had 2 beds made of feathers, a desk with a lamp and one dresser for our clothes. Dallas (my brother got the bottom 2 and I got the top 2)
Can you describe the neighborhood you grew up in? Not really. Every chance I got I went to grandma and grandpas and spent time with them. They lived deep in the country. I had one friend out there that lived about 3 miles away on the next farm. His name was Carl.
Tell me about your parents. Where were they born? When were they born? What memories do you have of them? Both parents were born in Richmond, IN. Memories include more of my mother than my father. He was a drunk that stayed out all the time. He only came home when he was ready to pass out or to beat us.
Who was more strict: your mother or your father? Do you have a vivid memory of something you did that you were disciplined for? Since mom was the main one around I would say that she was more strict. I remember one instance when I was about 16 and mom had kicked me out of the house because she was forced to work with dad being gone all the time and I was telling her that I no longer wanted to take care of my little brother because I felt like I was his mother rather than her and that I didn’t want to do anymore of the house work. It was her house she should have to clean it. She kicked me out. I was sitting on the porch crying and dad came home (sober for once) and sat on the porch with me, got me calmed down and offered to give me a ride to grandma and grandpa’s.
Did your parents have a good marriage? No they had a horrible marriage.
How did your family earn money? How did your family compare to others in the neighborhood – richer,
poorer, the same? My family earned money from my mother working in a diner. Dad worked in a mill but we rarely saw his money. We did alright but I would say that we were on the poorer end of society.
What kinds of things did your family spend money on? The necessities and that was it.
How many brothers and sisters do you have? When were they born? What memories do yo.
You are to complete TWO essays and answer the following questions. .docxshericehewat
You are to complete TWO essays and answer the following questions. Here are your questions:
1) How has the information provided in this class changed or reinforced your perspective on an issue(S). Please provide details.
2) What do you believe is the biggest challenge facing our nation and why? Be specific and detailed. What can be done to address this challenge? Be realistic and detailed in your responses.
750 - 800 words each essay
no plagiarism
.
You are the vice president of a human resources department and Susan.docxshericehewat
You are the vice president of a human resources department and Susan has been your executive assistant for one (1) year. She effectively completes her given assignments, sometimes ahead of schedule. Susan has a welcoming personality and is commended on her willingness to help when asked. As a result of her efficiency, Susan often has spare time on her hands.
In several conversations, you have spoken with Susan about taking a proactive stance and involving herself in the business to increase her knowledge base. You have suggested she attend strategic planning meetings, shadow other Business Partners, and take professional development courses geared towards human resources. Susan has not incorporated any of these suggestions.
The organization promotes and encourages employee development and has a requirement of 24 professional development (PD) hours for each employee per annual review cycle. As VP of the department, you have offered to mentor Susan; yet she has not taken advantage of the offer. Given Susan’s capabilities and potential, you want to mutually establish future performance goals and developmental opportunities to enhance her effectiveness and maximize her organizational contributions.
Susan’s professional appearance and interaction with co-workers is superb. When asked to complete a task, she fulfills the assignment willingly and with very few errors. She is well liked and respected by her peers. She has impeccable oral and written communication skills. Overall, you are pleased with her performance but want to see Susan take initiative to seek out tasks to complete rather than waiting to be told what to do.
As the VP of HR, you have been tasked with a two part assignment. In part one of this assignment you will explain the importance of performance appraisals, analyze the essential elements which should be included and describe how performance appraisals can be used to promote employee growth. In part two of this assignment you will create a performance appraisal for Susan.
Your paper should be 8-10 pages in length incorporating both parts I and II. You can either design a performance appraisal document or use an existing template. The performance appraisal should be no more than 3 pages of the total page count for the assignment. Be sure your paper addresses all of the following components:
Part I: Importance of Performance Appraisals:
Explain how performance appraisals can be used as part of employee development.
Explain why rankings are given to employees and the advantages and disadvantages of including rankings.
Address why organizations should deliver appraisals in a timely manner to employees.
Discuss the advantages and disadvantages of three different types of performance appraisals. Make a recommendation of which type of performance appraisal is most appropriate for Susan.
Provide suggestions on how the manager can give feedback on a continual basis to the employee to encourage continual development.
Part II: Sus.
You are the purchasing manager of a company that has relationships w.docxshericehewat
You are the purchasing manager of a company that has relationships with many different suppliers. All information about orders, shipments, etc. is still manually exchanged. You have discussed incorporating Internet technologies to help manage the supply chain.
In 1-2 pages, summarize the advantages of using Internet technologies versus traditional methods in supply chain management.
.
You are to briefly describe how the Bible is related to the topics c.docxshericehewat
You are to briefly describe how the Bible is related to the topics covered in the course. An integration of the Bible must be explicitly shown, in relation to a course topic, in order to receive points. In addition, at least two other outside scholarly sources (the text may count as one) should be used to substantiate the group’s position.
.
You are the manager of an accounting department and would like to hi.docxshericehewat
You are the manager of an accounting department and would like to hire another managerial accountant to focus on internal accounting. The chief executive officer (CEO) is not convinced that a managing accountant position is needed. Prepare a 2-page memo for the CEO on the following:
Explain the objectives and characteristics of an internal accounting system.
.
You are the new chief financial officer (CFO) hired by a company. .docxshericehewat
You are the new chief financial officer (CFO) hired by a company. The chief executive officer (CEO) indicates that in the past, there was little rhyme or reason for the prior CFO to approve or disapprove of large capital projects or investments that various managers proposed. You mentioned to the CEO that there are three primary methods of capital budgeting, and they are as follows:
Simple payback method
Net present value method
Internal rate of return (IRR) method
Discuss the following topics on the Group Discussion Board and write a group paper between 700–850 words. Assign topics to be written by each group member and compile it all together before submitting your group paper:
A company's cost of capital and how it is calculated
What the marginal cost of capital is and how it differs from the weighted average cost of capital
.
You are the manager of a team of six proposal-writing professionals..docxshericehewat
You are the manager of a team of six proposal-writing professionals. You are tasked with completing one 50 page formal proposal as well as a 1-2 page summary advocating funding for a new sports arena. Your supervisor, a member of the senior leadership team, wants to know how you plan to successfully accomplish the assignment. Prepare a PowerPoint Presentation to your supervisor that conveys the following information:
As manager, how will you organize the work to prepare a proposal?
What tasks will each professional be assigned and why?
What three or four communication tools will you propose be used to effectively articulate the proposal and why? (For example, formal paper-based, PowerPoint Presentation, blog, Twitter, Facebook, LinkedIn, etc.)
.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
1.4 modern child centered education - mahatma gandhi-2.pptx
GG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docx
1. GG Freightways (GGFRT) IT Decision Paper Assignment
Before you begin this assignment, be sure you have read the
“GG Freightways Case Study,” any feedback on your proposed
IT project from your ITSP Part 2 assignment, and the previously
assigned course materials.
Purpose of this Assignment
This assignment gives you the opportunity to apply the course
concepts to develop an IT Decision Paper to explain and defend
an IT project at GG Freightways (GGFRT). This assignment
specifically addresses the following course outcomes to enable
you to:
· Apply best practices in information technology management
and governance to make, defend, and justify an IT decision.
IT Decision Paper for Your Proposed IT Project
For your ITSP, Part 2, you proposed an IT project for GGFRT.
Lance, the CIO at GGFRT, has asked you to write an IT
Decision Paper to explain your proposed project. He wants to
use the Paper to gain approval from the Governance Board to
move forward with the project. This assignment uses a format
for a Decision Paper that has been tailored to the course
material covered in this class. You may work for an
organization that has a format for IT decision papers, and it
would be a good idea for you to look at it, but it will likely be
structured a little differently from this one. Each organization
develops tools and techniques that will work for them.
Assignment
You will develop an IT Decision Paper, using the outline below.
Each of the topics to be included in your outline is covered in
the course content readings assigned thus far. In addition to the
course materials, at least one external resource (resource other
than those provided in the class) must be used. Two or more
cited references will earn top credit. Use a separate References
page to list just the references you have cited. Remember to use
2. the APA formatting rules and correctly cite and reference your
sources with APA format. Use the Grading Rubric to be sure
you have covered everything.
Please use this outline to build your IT Decision Paper. Use the
numbering and headings shown below.
1. Project Description – In two or three sentences:
(1) describe the IT project you proposed for GGFRT in Part 2
of your ITSP.
(2) Describe what major function(s) the system would
perform and who would use it. (Do not provide a technical
description with hardware, software, etc.)
2. Strategic Alignment – In a short paragraph:
(1) explain how the proposed project aligns to the business
strategic objectives in Part 1 of your ITSP, and,
(2) how the proposed project aligns to the IT strategies in Part
2 of your ITSP.
Your proposed project must be aligned directly with at least one
business strategic objective and one IT strategy shown in your
ITSP.
3. IT Portfolio Roadmap Alignment – In a short paragraph:
(1) Briefly explain where this project fits into the IT Portfolio
Roadmap you included in Part 2 of your ITSP.
(2) What functional area does it support?
(3) Where should it be included in the timeline – i.e., should it
take priority or be done before another project in the IT
Portfolio?
4. IT Architecture – In a short paragraph:
(1) Briefly explain how this project fits in with other systems
in place or in development at GGFRT.
(2) Explain whether it should interface with (share data of any
kind with) other systems either in place or in development, what
information is being shared, and its purpose.
3. (3) Explain whether it replaces another system or multiple
systems in use at GGFRT.
Refer to the Inventory of Current IT Projects in Part 1 of your
ITSP and the IT Portfolio in Part 2 of your ITSP.
5. Benefits: Describe at a high level three (3) benefits the
project provides to GGFRT. The benefits should correspond to
the business strategies and the strategic alignment discussed in
section 2 above. State the Business Strategic Objective. Then,
discuss this relationship/alignment for each benefit to the
Business Strategic Objective. Refer to course content readings
from Week 4 on Value Attainment. External research may also
be beneficial.
Please copy/paste the following table into your paper and
complete it:
Benefit (Spring 2019)
Business Strategic Objective/Explanation of Alignment of
Benefit to Business Strategic Objective
Example: do not use but leave it in the table when completing
this section.
If the project is updating the Route Optimization/Freight
Tracking System to include a package tracking feature: Better
visibility for GGFRT and its customers into the delivery status
of packages.
Tracking freight to provide customers with better delivery dates
& times
This real-time feature of package status will allow both
customers and GGFRT employees to see where the package is,
while in transit. This will allow the customer to know
where/when the package will be delivered.
1.
4. 2.
3.
6. Requirements – List and briefly explain the high-level
requirements for the project. First, explain the primary driver of
the project (major need of the business area related to the
project you have chosen), in a well-written introductory
paragraph. Refer to course content readings regarding
requirements (Week 7). External research may also be
beneficial. Requirements were also covered in IFSM 300 (the
prerequisite to be taken prior to this course; in Stage 3
requirements you noted requirements; refer to this assignment
for examples). Develop ten (10) requirements for the project
and include what category of the requirements below your
presented requirements fit into:
a. Business/user requirements
b. IT/system requirements
c. At least one system performance requirement
Defining Requirements - The next step is to identify the
essential requirements for your chosen project. User
requirements express specifically what the user needs the
system to do. This can be in terms of tasks/processes the users
need to perform, data they need to input, what the system might
do with that data input, and output required. System
performance requirements express how the system will perform
in several performance areas and security. IT/System
requirements present what the system will do, the functions it
must perform.They include characteristics that a product must
have to meet the needs of the stakeholders and can include
function or nonfunction requirements.As a member of the CIO's
organization, you will use your professional knowledge to
5. ensure all 3 types of requirements are covered (User/Business,
IT/System and System Performance. Refer to Week 7 content
on requirements. Additional research can expand your
knowledge of these areas.
Once you have identified the 10 requirements, evaluate each one
using the criteria below and create 10 well-written requirements
statements for your chosen project.
The requirement statement:
· Is a complete sentence, with a subject (system) and predicate
(intended result or action)
· Identifies only one requirement; does not include the words
"and," "also," "with," and "or."
· For User Requirements, states what tasks/processes the system
will support or perform.
· For System Performance Requirements, states how the system
will perform.
· For IT/System Requirements, states what the system will do.,
the functions it must perform.
· Includes a measure or metric that can be used to determine
whether the requirement is met (time or quantity), where
appropriate.
· Is stated in positive terms and uses "must" (not "shall," "may"
or "should"); "the system must xxxx" not "the system must not
xxx".
· Avoids the use of terms that cannot be defined and measured,
such as "approximately," "robust," "user friendly," etc.
· Is achievable and realistic; avoids terms such as "100%
uptime," or "no failures".
Do not provide generic statements but relate to the needs of
GGFRT and your project.
Please copy/paste the following table into your paper and
complete it:
6. Requirement/Explanation of the Requirement (explanation
should refer to the case study) (Spring 2019)
Business/User; IT/System or System Performance (state one or
more of these categories)
Example: do not use but leave it in the table when completing
this section. The Route Optimization/Freight Tracking System
package status must be available to users 24/7/365.
System Performance
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
7. Cost Estimation - During the Assessment Phase, Cost
Estimation consists of estimating the size and complexity of the
project, not the effort required or the actual projected dollar
costs. Copy the table below and place an X (or other
indication) in the box that most closely describes the size and
7. complexity of your proposed solution. Use your judgment and
then write a short paragraph to introduce and explain the
assessments in your table. Refer to course content readings
from Week 4 on Cost Estimation, especially the Assessment
Phase.
Assessment of Project Size and Complexity (Spring 2019)
Size/Complexity
Small
Medium
Large
Very Complex
Moderately Complex
Straightforward
8. Performance Measures – This section explains how GGFRT
will know whether the project is achieving the benefits
identified above in section 5. First, present the table with a
brief paragraph discussing the solution, table that follows, and
to properly evaluate benefits, they should be
measurable/quantifiable. Review the benefits, and look at the
requirements you identified, and come up with three (3)
performance measures that will indicate the extent to which the
projected benefits have been achieved. (For example, if you
had identified a benefit that the project would result in more
repeat customers, then a measurement for that would be the
number of repeat customers with the goal that the number would
8. increase.) Refer to course content readings on Performance
Measurement. This may be a good area to do some web
research. The measures should be presented in a table with an
introductory sentence or two:
Benefit to Business (stated from section #5) (Spring 2019)
Measure (quantifiable)
Example: do not use but leave it in the table when completing
this section.
Better visibility for GGFRT and its customers into the delivery
status of packages.
Reduction in the number of packages returned for next-day
delivery because of more efficient scheduling as customers can
also reschedule packages when they see delivery status; or,
Increase in the number on same-day deliveries due to better
communication between GGFRT dispatchers, drivers and
customers.
1.
2.
3.
9. System Development - Describe how you will use the System
Development Life Cycle (SDLC) process to approach this
project. Include only the following 5 stages: Plan, Design,
Build, Test, Launch. List the stage followed by a colon, then in
two to three sentences each, explain how each stage would be
handled by Lance’s IT team and who else in GGFRT should be
involved in each stage. Refer to course content materials on
SDLC in Week 8.
Formatting Your Assignment
9. · In the CIO Memo assignment, you are preparing the document
based on the feedback from the second assignment and scoring
rubric.
· Continue to use a title page from the ITSP #1 assignment that
includes: The company name, title of assignment, your name,
Course and Section number and date.
· Use the outline format in the assignment instructions above,
for these sections:
1. Project Description
2. Strategic Alignment
3. IT Portfolio Roadmap Alignment
4. IT Architecture
5. Benefits
6. Requirements
7. Cost Estimation
8. Performance Measures
9. System Development
a. Plan:
b. Design:
c. Build:
d. Test:
e. Launch:
· Write a short concise paper: Use the recommendations
provided in each area for length of response. It’s important to
value quality over quantity.
· Content areas should be double spaced; table entries should be
single spaced.
· To copy a table: Move your cursor to the table, then click on
the small box that appears at the upper left corner of the table to
highlight the table; right click and COPY the table; put the
cursor in your paper where you want the table and right click
and PASTE the table.
· Ensure that each of the tables is preceded by an introductory
sentence that explains what is contained in the table, so the
reader understands why the table has been included.
1. Use at least two resources with APA formatted citation and
10. reference. Any course content should be from the class reading
content, not the assignment instructions or case study itself.
For information on APA format, refer to Content>Course
Resources>Writing Resources.
· Begin a Reference Page for resources required for this
assignment. Use APA format for your reference page.
· Running headers are not required for this report.
· Writing should always be in third person.
· Compare your work to the Grading Rubric below to be sure
you have met content and quality criteria.
· Submit your paper as a Word document, or a document that
can be read in Word. Keep tables in Word format – do not paste
in graphics.
· Your submission should include your last name first in the
filename: Lastname_Firstname_IT Decision
The "right" and "wrong" answers have to do with if you
correctly incorporated the course concepts from the course
content and addressed all parts of the assignment. You need to
do some external research on at least one aspect of the
assignment - your choice - and incorporate it and cite/reference
it in APA format in your response. The project you propose is
not as important as that it makes sense considering the course
content and the Case Study. Use the Rubric below to be sure
you have covered all aspects of the assignment.
GRADING RUBRIC:
Criterion
90-100%
Far Above Standards
80-89%
Above Standards
70-79%
Meets Standards
60-69%
Below Standards
< 60%
11. Well Below Standards
Possible Points
Project Description
5 Points
Description of the project is clear and concise, covers functions
and users, and sets the stage for the remainder of the paper;
demonstrates understanding of course concepts, analysis and
critical thinking.
4 Points
Description of the project is clear and concise, covers functions
and users, and sets the stage for the remainder of the paper.
3.5 Points
Description of the IT Project includes what it does (functions it
performs) and who uses it.
3 Points
Description of the project is unclear, not concise, and/or does
not set the stage for the remainder of the paper.
0-2 Points
Little or no description of the proposed IT project is included.
5
Strategic Alignment
9-10 Points
Explanation of proposed project includes clear and well-
supported alignment to at least one (1) business objective in
Part 1 of the ITSP 1 assignment and one (1) IT strategy from
Part 1 of the ITSP 2 assignment; explanation is very appropriate
to the Case Study and clearly tied to the proposed IT project.
8 Points
12. Explanation of proposed project includes clear alignment to at
least one (1) business objective in Part 1 of the ITSP 1
assignment and one (1) IT strategy from Part 1 of the ITSP 2
assignment; explanation is appropriate to the Case Study and
tied to the proposed IT project.
7 Points
Explanation of proposed project includes direct alignment to at
least one (1) business strategic objective in Part 1 of the ITSP 1
assignment and one (1) IT strategy from Part 1 of the ITSP 2
assignment.
6 Points
Explanation of business objectives and/or IT strategies are
incomplete; and/or are only partially appropriate to the Case
Study or the proposed IT project.
0-5 Points
Explanation of Strategic Alignment is minimal or not included.
10
IT Portfolio Roadmap Alignment
9-10 Points
This section thoroughly explains the relationship of the
proposed IT project to the IT Portfolio Roadmap in Part 2 of the
ITSP, including a full explanation of the functional area
supported, and where this project fits in the timeline.
8 Points
This section clearly explains the relationship of the proposed IT
project to the IT Portfolio Roadmap in Part 2 of the ITSP,
including a good explanation of the functional area supported,
and where this project fits in the timeline.
7 Points
This section has an explanation of the relationship of the
13. proposed IT project to the IT Portfolio Roadmap in Part 2 of the
ITSP, including:
where the proposed project fits into the IT Portfolio roadmap;
identification of the functional area it supports; and where it
should be included in the timeline in the ITSP.
6 Points
This section includes only part of the required information on
the relationship of the proposed IT project to the IT Portfolio
Roadmap in Part 2 of the ITSP (where it fits, the functional area
supported, and the timeline); and/or is not relevant to Case
Study.
0-5 Points
This section minimally covers the relationship of the proposed
IT project to the IT Portfolio Roadmap in Part 2 of the ITSP, or
does not cover it at all.
10
IT Architecture
9-10 Points
A correct and convincing explanation of the IT Architecture
includes how the project fits with, interfaces with and/or
replaces other systems; explanation is clearly relevant to the
Case Study and the proposed project; demonstrates thorough
understanding of course concepts, analysis and critical thinking.
8 Points
An accurate explanation of the IT Architecture includes how the
project fits with, interfaces with and/or replaces other systems;
explanation is relevant to the Case Study and the proposed
project; demonstrates understanding of course concepts,
analysis and critical thinking.
7 Points
14. Explanation of the IT Architecture includes: how the proposed
IT project fits in with other systems in place or in development
at the business in the Case Study; whether it should interface
with other systems either in place or in development; and
whether it replaces another system or multiple systems in use at
the business in the Case Study.
6 Points
IT Architecture explanation partially covers how the project fits
with, interfaces with and/or replaces other systems; is not
relevant to the Case Study or the proposed project.
0-5 Points
IT Architecture explanation is minimal or not included.
10
Benefits
9-10 Points
Three (3) or more business benefits are thoroughly and
convincingly explained; are clearly stated and aligned to the
business objectives and IT strategies noted above in section 2;
benefits are highly applicable to and appropriate for the
proposed solution and the Case Study.
8 Points
Three (3) or more business benefits are fully explained; are
stated and aligned to the business objectives and IT strategies
noted above in section 2; benefits are clearly applicable to and
appropriate for the proposed solution and the Case Study.
7 Points
At least two (2) business benefits that the proposed IT project
provides to the organization in the Case Study are stated and
described at a high level. The benefits correspond to the
business objectives and the IT strategies discussed in section 2
15. above.
6 Points
Fewer than two (2) business benefits are shown; benefits are not
aligned to business objectives and IT strategies above; are not
applicable to or appropriate for the proposed solution and/or the
Case Study.
0-5 Points
Business benefits are minimally addressed or not included.
10
Requirements
9-10 Points
This section includes an effective and well-written introduction
that is applicable to the Case Study and thoroughly and
convincingly explains the primary business driver for the
proposed IT project. At least ten (10) unique requirements are
identified and discussed, clearly applicable to the Case Study;
requirements cover items a-c in the assignment; demonstrates
thorough understanding of course concepts, analysis and critical
thinking.
8 Points
This section includes a well-written introduction that is
applicable to the Case Study and fully explains the primary
business driver for the proposed IT project. At least nine (9)
unique requirements are identified and discussed, clearly
applicable to the Case Study; requirements cover items a-c in
the assignment; demonstrates understanding of course concepts,
analysis and critical thinking.
7 Points
This section includes an introduction that explains the primary
driver behind the system (major business need). Then, at least
eight (8) requirements are listed and briefly explained,
16. applicable to the Case Study and include: (a) business/user
requirements, (b) IT/system requirements; and (c) at least one
system performance requirement.
6 Points
This section does not include an introduction identifying the
primary driver for the system; eight (8) or fewer requirements
are identified; requirements are not applicable to the Case
Study; and/or items a-c in the assignment are not covered.
0-5 Points
This section minimally addresses requirements, or requirements
are not included.
10
Cost Estimation
9-10 Points
This section includes an effective and well-written introductory
paragraph that is applicable to the Case Study and thoroughly
and convincingly justifies the assessments in the table that
follows. Cost estimation table is included, with appropriate
selection for size and complexity.
8 Points
This section includes an appropriate introductory paragraph that
is applicable to the Case Study and provides a good explanation
of the assessments in the table that follows. Cost estimation
table is included, with appropriate selection for size and
complexity.
7 Points
This section includes an introductory paragraph that explains
the assessments and applies to the Case Study. Cost estimation
table is included; selections are made for size and complexity.
6 Points
17. This section does not include an introductory paragraph; and/or
cost estimation table is included, but selection for size and
complexity are not appropriate or adequately justified.
0-5 Points
This section provides little or no information on the cost
estimation; cost estimation table is missing; and/or information
presented does not apply to the Case Study.
10
Performance Measures
9-10 Points
This section includes an effective and well-written introductory
paragraph that is applicable to the Case Study, the proposed
solution and the table that follows. The completed table
contains all required information, accurately reflecting the Case
Study and the proposed solution; demonstrates thorough
understanding of course concepts, analysis and critical thinking.
8 Points
This section includes an appropriate introductory paragraph that
is applicable to the Case Study, the proposed solution and the
table that follows. The completed table contains all required
information, accurately reflecting the Case Study and the
proposed solution; demonstrates understanding of course
concepts, analysis and critical thinking.
7 Points
This section includes at least one or two sentences that
introduce the table. Performance Measures Table is included
showing three (3) benefits and three (3) measures that are
appropriate to the proposed solution and the Case Study.
6 Points
This section includes fewer than three (3) benefits and
associated performance measures; measures do not align to
benefits; benefits and measures are not appropriate to the Case
18. Study and the proposed solution; and/or introduction is missing.
0-5 Points
This section provides little or no information on Performance
Measures; table is missing; and/or information presented does
not apply to the Case Study.
10
System Development
9-10 Points
The five (5) stages of the SDLC are thoroughly covered;
explanation is tied directly to the project and to the case study;
includes IT team responsibilities and appropriate involvement
of others at the business in the Case Study; demonstrates
thorough understanding of course concepts and vocabulary.
8 Points
The five (5) stages of the SDLC are fully covered; explanation
includes discussion of the project and the case study; includes
IT team responsibilities and appropriate involvement of others
at the business in the Case Study; demonstrates understanding
of course concepts and vocabulary.
7 Points
The five (5) stages of the SDLC are covered:
Plan, Design, Build, Test, Launch. Two to three sentences are
used to explain how each stage would be handled by the team
and identify others who need to be involved at the business in
the Case Study.
6 Points
The five (5) stages of the SDLC are not all covered;
explanations are not appropriate to the project and the Case
Study; and/or do not include IT team responsibilities and/or
appropriate involvement of others at the business in the Case
19. Study.
0-5 Points
The stages of the SDLC are minimally addressed or are not
included.
10
External Research
5 Points
Two (2) or more sources other than the course materials are
incorporated in two or more sections of the paper and are used
effectively. Sources used are relevant and timely and contribute
to the analysis. References are appropriately incorporated and
cited using APA style.
4 Points
At least one (1) source other than the course materials is
incorporated and used effectively. Source(s) are relevant and
contribute to the analysis. References are appropriately
incorporated and cited using APA style.
3.5 Points
At least one (1) source other than the course materials is used
and properly incorporated into the text. Reference is cited using
APA style.
3 points
A source other than the course materials may be used, but is not
properly incorporated or used and/or is not effective or
appropriate and/or is not relevant or timely; and/or does not
follow APA style for references and citations.
0-2 Points
No external research is incorporated or reference listed is not
20. cited within text.
5
Report Format
9-10 Points
Report is very well organized and is easy to read. Very few or
no errors in sentence structure, grammar, and spelling;
presented in a professional format.
8 Points
Report reflects effective organization; has few errors in
sentence structure, grammar, and spelling; presented in a
professional format.
7 Points
Report has some organization; may have some errors in
sentence structure, grammar and spelling.
6 Points
Report is not well organized, and/or contains several grammar
and/or spelling errors.
0-5 Points
Report is extremely poorly written, has many grammar and/or
spelling errors, or does not convey the information.
10
TOTAL
Possible Points
100
2
21. November 23, 2019
When working on Major Project 1 please choose an approach
you are most comfortable with.
Excel template (in a separate file) is intended to help you. If it
confuses you instead, please disregard it completely or modify
it the way you see necessary.
The following checklist is intended to help you verify that your
work covers all major calculations and points necessary for
successful completion of the projectProject 1 submission
checklist
Basic Analysis
Future Electricity prices downloaded and converted into $/kWh
after adjustment for regional discount
Depreciation using both methods is calculated, comparison is
made and a justified recommendation is given
Direct and Fixed Cost are properly identified and net income is
calculated. Attention is paid to finding fixed cost based on
allocation numbers and capacity
Lost after-tax profit from Monza's cannibalized sales is properly
calculated
OCF is calculated based on approach used in earlier homework
Opportunity costs are identified and properly calculated
FCFs are calculated, combining together OCF, CapEx,
investment in NWC, and opportunity costs
NPV and IRR are properly calculated (attention to NPV formula
use – check Excel mistakes screencast). For preliminary check,
22. if WACC is not calculated yet, 8% can be used. For final
submission, WACC calculated in WACC tab should be used
WACC
Assumptions about risk-free rate, MRP, tax rates and peer
companies are made. Sources of information are provided in
pink cells
Data about peer companies downloaded from recommended
sources (Yahoo Finance, EDGAR, Morning Star et al.) – levered
beta, market value of equity, value of debt (book value of debt
can be used instead), and possibly actual tax rates (unless
assumption is made)
D/E, E/Total Value ratios, and unlevered beta are calculated
Mean and median of unlevered beta are found
Zeta's relevered beta is estimated with proper Zeta's D/E ratio
used
Cost of equity is calculated using CAPM formula, calculated
beta, and downloaded numbers for risk-free and MRP.
After-tax cost of debt is calculated
WACC is calculated
Scenarios
Electricity scenario summary is created by repeating basic
analysis when using six different scenarios of electricity prices
23. Sales volume scenario summary is created by repeating basic
analysis when using three different scenarios of future sales
volumes
Electricity Breakeven
Arbitrary year 1 electricity cost is chosen and electricity costs
in subsequent years are made dependent on this initial cost
EBIT is calculated either by using a complicated formula or by
inserting extra rows and redoing calculations from basic
analysis, but now as dependent on new electricity prices. DO
NOT COPY VALUES of Body Materials electricity costs from
Basic Analysis
Investment in NWC is calculated either by using a complicated
formula or by using already inserted extra rows
FCF is calculated
NPV is calculated by properly using NPV function
Break-even year 1 electricity cost (making NPV = 0) is found
either by trial and error or by using Excel Goal Seek
Crystal Ball (Optional, extra 5% bonus)
Assumptions cells are set at least for variables described in the
project (Investment, Debt Financing %, interest rate, NWC
Investment %, number of cannibalized cars, sales volume for
each year, and electricity costs for each year). Averages should
be the same as in the base case scenario. Additional
assumptions can be made
24. Simulation is run for NPV and IRR as forecast cells
Probability of positive NPV is found based on NPV distribution
chart
Tornado chart is created
Report
Report starts from executive summary with your main
conclusions and recommendations put there!
Main part:
· Very briefly describes work performed
· Presents results
· Analyzes results, focusing on risk analysis (different
scenarios, sensitivities,
breakeven etc.).
· If simulation was performed, results are analyzed and
discussed
· Conclusions are drawn
All sources used are properly cited and put in a reference list at
the end. Remember that your instructor will submit your report
to Turnitin. If you have your own access to Turnitin, I
recommend submitting the report yourself and notify the
instructor
Formatting, spelling and grammar are checked. Proof reading
helps to catch typos missed by software.
Basic AnalysisZeta Spenza ProjectGivenMonza's
sales10,000MACRS Schedule
25. Solution
LegendMonza's price$65,000year 133%Value given in
problemMonza Cost structure per caryear
245%Formula/Calculation/Analysis requiredBody
materials$11,000year 315%Assumptions, Qualitative analysis or
Short answer requiredEngine$4,000year 47%Goal Seek,
Scenario or Data Table cellDrivetrain$6,000Crystal Ball
InputBattery Pack$20,000Crystal Ball
OutputElectronics$5,000Labor (allocated)
Dima Leshchinskii: Dima Leshchinskii:
based on 10,000 Monzas sold annually$4,000Overhead
(allocated)
Dima Leshchinskii: Dima Leshchinskii:
based on 10,000 Monzas sold annually$2,000Consulting
Fees$50,000Spenza Price$80,000Spenza Sales projections
(number of cars)Year 1Year 2Year 3Year 4Year 5Base Case
Scenario5,0007,0006,0004,0003,000Optimistic
Scenario5,5007,5006,5004,5003,500Pessimistic
Scenario4,5006,5005,5003,5002,500Plant
Investment250000000Alternative Land Use15000000Plant
26. Capacity10,000 carsProject life4 yearsPercentage of Debt
Financing50%Interest Rate7%Tax rate21%NWC as % of direct
manufacturing costs4.75%Monza Sales Cannibalization1,000
carsHistorical Electricity Cost$0.07 per kWh70% of national
averageCarbon Body Cost per Car$14,000Percentage of
electricity80%Electricity used per carOther Spenza direct
costsBody materials
(other than electricity)Engine$4,000Drivetrain$6,000Battery
Pack$15,000Electronics$5,000