Course Textbooks:
Gamble, J., Peteraf, M., & Thompson,
A. (2023), Essentials of strategic management, McGraw-Hill Course Content
Delivery (8th ed.), New York, NY. ISBN10: ISBN13: 9781266496028.
Keller, T. (2014), Every good endeavor:
Connecting your work to God’s work, Riverhead Books, New York, NY. ISBN:
9781594632822.
Krogerus, M., & Tschäppeler, R.
(2017), The decision book: 50 models for strategic thinking., W.W. Norton &
Co. (Revised ed.), New York, NY. ISBN: 9780393652376.
Rumelt, R. (2011), Good strategy/bad
strategy: The difference and why it matters., Crown Business, New York, NY.
ISBN: 9780307886231.
Discussion Assignment Instructions
Overall
Guidance:
The first six discussions in this class will
focus on a series of questions in the areas of Process (steps to be taken),
Strategic Thinking (current theory), and Decision Models (decision making
methodology. The student should organize their main thread by using the bolded
headings provided and then respond to the question. The student will post a
reply to a single main thread and should organize their reply by using the
bolded headings provided.
Discussion Thread: Internal Environment, Power/Weakness, and Decision Models
Evaluating the internal environment of the company is critical to the process of developing a company’s strategy. When evaluating the internal environment, it is important to understand key sources of power or weakness that exist. Decision models continue to impact strategy development and should continuously be evaluated, and others considered.
For your main thread, perform the following:
Discuss the process of evaluating the internal environment.
Discuss a key source of power or weakness.
Discuss your current decision model(s) and others that are being considered.
Develop an Annotated Bibliography for the additional references used in your discussion.
Support all of your factual assertions with citations.
Minimum of 500 words in the body.
Minimum of 2 sources from the literature
in addition to course texts.
Use bolded headings below in the
discussion.
Current APA format must be used.
Use
the following outline:
·
Introduction
·
Process: Business Strategy Development – What is the
process for developing a business strategy? Discuss the process in no less than
200 words.
·
Strategic Thinking: Key Decisions – What are the key decisions necessary
for making strategy
choices and why are they
important? Discuss the key decisions and their importance in no less than 150 words.
·
Decision Model – What are my current decision models
and how do they aid / hinder this process. Discuss your current decision models
and how they aid / hinder the strategy development process in no less than 150 words.
·
Conclusion
Support your
factual assertions with citations.
Include an
Annotated Bibliography, in current APA format, of the 2 additional Sources:
·
Minimum
of 250 words in each annotation
·
Use
the bolded headings below for each annotation
Use the following
outline:
·
Summary of Key Points
·
Evaluation of the Quality of the Publication
·
Evaluation of the Quality of the Author(s)
·
Where this fits into the discussion
Category: Internet technology (IT)
-
Evaluating the Internal Environment and Decision Models for Business Strategy Development: An Annotated Bibliography and Discussion
-
Title: Enhancing Cloud Management with Lab Experience In the Week 4 labs, I had the opportunity to perform various tasks related to cloud management, such as creating a cluster, restoring files, configuring account lockout policies, and verifying RAM usage
In the Week 4 labs, you performed tasks such as creating a cluster, restoring files, configuring account lockout policies, and verifying RAM usage.
Note: Ensure you have completed all lab exercises from Week 4 before completing this assessment.
Assessment Details
Write a 350- to 700-word summary on your experience completing these labs. Include the following in your summary:
Explain how knowledge gained from the labs can be used for cloud management in a real-life environment.
Describe a situation in which these tasks can be used for security and performance purposes.
Discuss how monitoring disk capacity and RAM usage contributes to achieving optimal performance in a cloud environment. Provide a workplace example where proactive monitoring and management might be essential. -
Creating an Audience Persona for DataNanny Software Design Project
Please follow the uploaded guidelines instructions and rubric. The acitivity is to create an audience persona in 500 words single space. Check the uploaded Defining Audiences and Creating Personas PDF and the uploaded software design document PDF. The software design project I choose is S/W Project 1: DataNanny. I am providing the picture in a jpg format. i do appreciate your help.
Mr. Castillo -
“Using Data Ethically: Improving Representation and Accuracy in the Modern World” Introduction In today’s data-driven society, we are constantly bombarded with information and statistics from various sources, including scientists, researchers, the media, and social media users
You will write a position paper addressing the following questions: How can we better use data to represent the world around us accurately? What should scientists, researchers, the media, and social media users do to present a more accurate picture of the truth?
Your paper will summarize and analyze what you have learned about how data is used and misused this quarter. Complete a critical analysis of some of the challenges with data that we have covered in this class and suggest improvements.
You are welcome and encouraged to address the points brought up in Chapters 12 and 13 of The Art of Statistics: How to Learn from Data. If you use the class textbook as a source in your paper, list the book on the reference page and cite it properly using an in-text citation (Spiegehalter, 2019).
Lastly (and this is the most essential part of this paper), you should include three recommendations about presenting data ethically in the workplace and beyond. Outside sources must support each recommendation.
You must include at least five sources, three of which support your recommendations. Ensure each source listed on your reference page has at least one corresponding in-text citation within the paper.
The paper should be 5-8 pages and follow APA 7th edition Student format. The page count does NOT include the title, abstract, or reference pages. -
“Designing a Database for Book and Author Relationships” a. Entities: 1. Book 2. Author b. Attributes: 1. Book: – ISBN (primary key) – Title – Publication Date – Genre – Publisher
Consider the relationships between Books and Authors. A book can have a number of authors
and an author can have many books to his/her name. Taking into account this particular
example, you are required to carry out the below tasks to design a database:
a. Identify all the ENTITIES. Give each ENTITY a suitable name.
b. Identify all the ATTTRIBUTES associated with each ENTITY. Make sure that each
ENTITY has a proper PRIMARY KEY which is underlined. A minimum of 3 attributes is
required for each
ENTITY.
c. Draw an ENTITY RELATIONSHIP DIAGRAM (ERD) clearly stating the relationships
between the ENTITIES, the CARDINALITIES and ATTRIBUTES with correct notations.
d. Convert the ERD (drawn in “c”) into a relational schema. The PRIMARY KEY and
FOREIGN KEY must be clearly shown for each relation.
e. Produce sample records (3 records at least per ENTITY) to represent the relational
schema.
The records can be presented in the form of a table for each entity. -
Title: The Impact of Mobile Computing on Multimedia Consumption and Creation: A Case Study of Multimedia Content and Mobile Applications 1. The Impact of Mobile Computing on Multimedia Consumption and Creation The rise of mobile computing has greatly influenced the way in which multimedia
As mobile devices have grown in popularity and general use, the demand for mobile
computing has increased, necessitating the availability of desktop features on these devices.
Multimedia is one sort of content that can be accessed or created using a mobile device.
Smartphones with cameras, wireless content streaming, and the capacity to play back
videos
and music are the only instances where mobile computing in multimedia has
become mainstream.
Discuss the following information:
1. How does mobile computing affect the consumption and creation of multimedia
content? Support your discussion with RELEVANT and RECENT journal articles.
2. Provide one example of multimedia content AND one mobile application. Discuss
how the multimedia content and application offered are designed to meet the unique
requirements and restrictions of mobile computing. -
Title: Network Security Assessment: Methodology and Tools
The key to this assignment is to demonstrate your understanding of the topics, not to re-word the text or reference material. Please see Appendix A for the grading rubric on all written assignments.
Please complete the scenario below following these guidelines for your deliverable.
Your assignment must be a minimum of 2 pages double spaced, plus a title page
and a reference page for a total of 4 pages.
Make sure you are using at least two (2) academic references.
There is a 10 point penalty for late submissions (See Syllabus for Details).
You have been hired as a consultant to perform a network security assessment for a large firm. You will utilize network Footprinting and automated vulnerability scanning to assess the organization. Footprinting and vulnerability scanning apply to an IT infrastructure or network. Footprinting (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools (ex. Nmap) and technologies to scan a network to acquire IP addresses, computer names, etc. This information is very useful to a hacker who is trying to crack a whole system. Scanning refers to security scans of a network. A security or vulnerability scan uses a variety of automated software tools (ex. Nessus Tenable, Retina, etc.), typically performing hundreds of routine tests and checks. These tools identify vulnerabilities or weaknesses in the network that may result in unauthorized access such as lack of up-to-date patches.
1. Describe the methodology and tools you would use to conduct your assessment.
2. Give a rationale for each step in your methodology.
******(Note: You are not limited to following the methodology/tools described in your textbook. If there are additional steps you would take in conducting your assessment, please list them and explain why you are taking them.)
Submission Instructions:
This submission should be created following APA 6th edition guidelines.
The paper is to follow the APA style guide, Sixth Edition (available via bookstores).
Also refer to APA’s online resources
and the APUS web site
Submit your assignment as a MS Word attachment.
The assignment will automatically be checked by TurnInIn.
Rubric for grading:
Methodology and Tools 50%
Rationale for Each Step 30%
Writing Conventions (Grammar and Mechanics)10%
Source 10% -
Title: Hardware Configuration Options for a Gaming Computer
Scenario:
Your friend wants to buy a computer
for gaming. They don’t know what hardware they need and they aren’t sure if
they want a PC or a MAC, so they have asked you for help.
Instructions:
For this assignment, you must create
a table with two hardware configuration options for a Windows-based,
Linux-based, or MAC-based gaming computer with the following components:
Processor
CPU
Motherboard
RAM
Hard Drive
Screen
Graphics Card
Sound Card
Network
adapter
Ports
Do not select a complete
computer system that is available in the market.
You must then write a report
explaining the rationale you used to select each of the hardware components.
Embed the table into your report.
Length: 2-3 pages
The completed assignment should
address all of the assignment requirements, exhibit evidence of concept
knowledge, and demonstrate thoughtful consideration of the content presented
in the course. The writing should integrate scholarly resources, reflect academic
expectations and current APA standards, and adhere to Northcentral
University’s Academic Integrity Policy.
When applicable, conduct a Turnitin
pre-check and then upload your completed assignment and click the Submit
to Dropbox button.
Due on May 12,
2024 11:59 PM -
Title: Developing and Implementing Effective Business Strategy: The Importance of Process, Strategic Thinking, and Decision Models
Course Textbooks:
Gamble, J., Peteraf, M., & Thompson, A. (2023), Essentials of strategic management, McGraw-Hill Course
Content Delivery (8th ed.), New York, NY. ISBN10: ISBN13: 9781266496028.
Keller, T. (2014), Every good endeavor: Connecting your work to God’s work, Riverhead Books, New York, NY.
ISBN: 9781594632822.
Krogerus, M., & Tschäppeler, R. (2017), The decision book: 50 models for strategic thinking., W.W. Norton &
Co. (Revised ed.), New York, NY. ISBN: 9780393652376.
Rumelt, R. (2011), Good strategy/bad strategy: The difference and why it matters., Crown Business, New
York, NY. ISBN: 9780307886231.
Discussion Assignment Instructions
Overall
Guidance:
The first six discussions in this class will
focus on a series of questions in the areas of Process (steps to be taken),
Strategic Thinking (current theory), and Decision Models (decision making
methodology. The student should organize their main thread by using the bolded
headings provided and then respond to the question. The student will post a
reply to a single main thread and should organize their reply by using the
bolded headings provided.
Discussion Thread: Strategy Development, Strategy Decisions, and
Decision Models
Developing strategy begins with thinking
strategically and knowing what the key decisions are. The decision models that
you employ will directly impact the quality of the decisions you make so
understanding them is critical.
Minimum of 500 words in the body.
Minimum of 2 sources from the literature
in addition to course texts.
Use bolded headings below in the
discussion.
Current APA format must be used.
Use
the following outline:
·
Introduction
·
Process: Business Strategy Development – What is the
process for developing a business strategy? Discuss the process in no less than
200 words.
·
Strategic Thinking: Key Decisions – What are the key decisions necessary
for making strategy
choices and why are they
important? Discuss the key decisions and their importance in no less than 150 words.
·
Decision Model – What are my current decision models
and how do they aid / hinder this process. Discuss your current decision models
and how they aid / hinder the strategy development process in no less than 150 words.
·
Conclusion
Support your
factual assertions with citations.
Include an
Annotated Bibliography, in current APA format, of the 2 additional Sources:
·
Minimum
of 250 words in each annotation
·
Use
the bolded headings below for each annotation
Use the following
outline:
·
Summary of Key Points
·
Evaluation of the Quality of the Publication
·
Evaluation of the Quality of the Author(s)
·
Where this fits into the discussion -
Title: “Disruptive Digital Innovation: Developing, Embedding, and Measuring in Organizations – A Report and Business Case”
1. Report :
The report must show an evaluation of how disruptive digital innovation is developed, embedded, and measured in the selected organisation. It should: • explain what is meant by ‘digital innovation’; • determine the importance of digital innovation to organisations by a direct comparison with digital inventions; • explain how organisational vision, leadership, culture and teamwork can exploit the digital innovation you have chosen; • analyse different sources of digital innovations explaining how your chosen innovation came about; • how organisations can foster and develop an environment and culture of disruptive innovation; The report information should feed into the production of a business case.
2. Business Case:
Develop a detailed business case for the adoption of the selected transformative digital innovation of your choice. Explain how this integrates digital technologies into the business to meet the market and changing business requirements. The business case should include: • an explanation of the requirements for a successful digital transformation process and the various sources of funding that can be utilised; • the different ways to access funding for the transformation case; • a range of techniques that can be used to measure the business case’s overall effectiveness and which can be tested, iterated, and improved; • evidence-based evaluation of tools used to retain and protect innovation and intellectual property (IP) that can be deployed as part of the digital transformation strategy; • an evidence-based evaluation of the different tools for protecting ideas in the context of the wider business environment; • evidence-based judgements on how organisations can overcome challenges to develop successful, digital transformation frameworks. This will need to include well-chosen examples from your research.