Thursday 28 October 2021

BUS 430 QuikTrip Case Study

 

BUS 430 QuikTrip Case Study

 

QuikTrip Case Study

Overview

Complete an analysis of QuikTrip. Assess the organizational layout, performance metrics, and the technology that is used to measure performance and connect with consumers.

Instructions












Using the QuikTrip case study, write a 6–7 page paper in which you:
  1. Evaluate QuikTrip's operations strategy and explain how the organization seeks to gain a competitive advantage in terms of sustainability.
  2. Analyze how operation management activities affect the customer experience. Select two operation management challenges and provide the solutions for confronting them.
  3. Examine QuikTrip's value chain and evaluate its effectiveness to operations in terms of quality, value creation, and customer satisfaction.
  4. Determine the different types of performance measurements that can be used to measure QuikTrip's service-delivery system design. Select at least two types that can be applied and provide justifications for the selection.
  5. Examine the different types of technologies applied to QuikTrip's service operations and evaluate how the technologies strengthen the value chain.
  6. Use at least two quality resources in this assignment that do not include the initial case study. Note: Wikipedia and similar websites do not qualify as quality resources.

Week 4 Assignment - The Stages of Cyber Operations

 

Week 4 Assignment - The Stages of Cyber Operations

Week 4 Assignment - The Stages of Cyber Operations

Introduction

Cyber operations have a long and storied history that has evolved tremendously over the last few decades. Cyber operations, and in particular its subset of cyber warfare, came into realization during the 1980s, took-off as an information-gathering mechanism during the late 1990s and early 2000s, then became militarized and still is to this day. Two major incidents that characterize the late 1990s and early 2000s are the Moonlight Maze and the Stuxnet incidents, respectively. Cyber operations were performed throughout each of these incidents.
In this assignment, you will describe the goals and objectives of cyber operations, examine the Moonlight Maze and Stuxnet incidents, and identify the regulations or laws that were instituted in the U.S. because of these incidents.
The specific course learning outcome associated with this assignment is:
  • Evaluate the stages and motivating factors of a cyber operation in network traffic.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.












Instructions

Write a 3- to 5-page paper in which you:
  • Describe the goals and objectives of each of the seven stages of cyber operations, defined for this assignment as:
    • Target recognition.
    • Reconnaissance.
    • Gaining access.
    • Hiding presence.
    • Establishing persistence.
    • Execution.
    • Assessment.
Moonlight Maze Incident
  • Explain how each cyber operations stage of the Moonlight Maze incident was implemented and what motivated the activities during each stage.
  • Describe the regulations or laws that were instituted in the U.S. because of the Moonlight Maze incident, citing specific, credible sources.
Stuxnet Incident
  • Explain how each cyber operations stage of the Stuxnet incident was implemented and what motivated the activities during each stage.
  • Describe the regulations or laws that were instituted in the U.S. because of the Stuxnet incident, citing specific, credible sources.
Source Citations and Writing
  • Support your main points, assertions, arguments, or conclusions with at least three specific and credible academic references synthesized into a coherent analysis of the evidence.
    • Cite each source listed on your references page at least one time within your assignment.

 

 

MAT 210 Week 3 Assignment 1 The Foundation of Data-Driven Decisions

 

Week 3 Assignment 1 The Foundation of Data-Driven Decisions

 

Week 3 Assignment 1 The Foundation of Data-Driven Decisions

 

 

  1. Explain the difference between descriptive and inferential statistical methods and give an example of how each could help you draw a conclusion in the real world.
  1. You would like to determine whether eating before bed influences your sleep patterns. Describe the steps you would take to conduct a statistical study on this topic.

What is your hypothesis on this issue?






https://hwacer.com/Tutorial/week-3-assignment-1-the-foundation-of-data-driven-decisions/

 

What type of data will you be looking for?

 

What methods would you use to gather information?

 

How would the results of the data influence decisions you might make about eating and sleeping?

 

A company that sells tea and coffee claims that drinking two cups of green tea daily has been shown to increase mood and well-being. This claim is based on surveys asking customers to rate their mood on a scale of 1–10 after days they drink/do not drink different types of tea. Based on this information, answer the following questions:

 

How would we know if this data is valid and reliable?

 

What questions would you ask to find out more about the quality of the data?

 

Why is it important to gather and report valid and reliable data?

 

  1. Identify two examples of real world problems that you have observed in your personal, academic, or professional life that could benefit from data driven solutions. Explain how you would use data/statistics and the steps you would take to analyze each problem. You may also choose topics below (or examples from the weekly content) to help support your response:

How does analyzing data on these real world problems aid in problem solving and drawing conclusions? Be sure to note the value and benefits of data-driven decision making.

Friday 15 October 2021

Week 2 Assignment 2 - Access Control Strategies

 

Week 2 Assignment 2 - Access Control Strategies

 

Week 2 Assignment 2 - Access Control Strategies

Introduction

In this assignment, you will develop strategies to protect the data and file systems of a fictitious software development company.

The specific course learning outcome associated with this assignment is:

  • Determine an access control strategy based on existing documents.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

Scenario



Hwacer.com

Independent Software Incorporated (ISI) is a small software development company with eight employees that work at the home office. Their primary accounts are associated with major market retailers, the federal government, and large state governments. The computer environment for ISI contains a Linux file and print server, a Linux Web server, and ten heterogeneous workstations running multiple operating systems. ISI's coding development projects often encompass classified information and personally identifiable information (PII).

Instructions

Write a 2- to 4-page paper in which you:

  • Explain why ISI needs an access control plan and the goals of the plan, citing specific, credible sources that support your assertions and conclusions.
  • Develop at least three layered access security strategies that can be used to protect ISI's data at rest, data in motion, and file systems; citing specific, credible sources that support your proposed strategies.
  • Explain a best practice process and procedures for implementing ISI's access security strategies and the overall framework in which they will reside, citing specific, credible sources that support your assertions and conclusions.
  • Describe the verification process that can be used to ensure that ISI's access control plan is effective, citing specific, credible sources that support your assertions and conclusions.
  • Explain how ISI's verification process will be maintained and updated in response to future changes in access requirements.
  • Support your main points, assertions, arguments, or conclusions with at least three specific and credible academic references synthesized into a coherent analysis of the evidence.
    • Cite each source listed on your source page at least one time within your assignment.

FIN 317 Financing an Expansion Assignment

  FIN 317 Financing an Expansion Assignment   Financing an Expansion Overview After 12 years, your business is wildly successful, with multi...