Categories
Computer Science

What are some of the environmental challenges MNCs face?

Complete this discussion by selecting one of the Case Studies from Module 1- 5 in MindTap (this can any of the Case Studies in your MindTap book). Answer the questions and then post a summary along with your responses. *Do not submit to MindTap post to the discussion here. Your summary should be paragraph written responses that reflects your understanding- NOT a simple 1 sentence response. No more than 300 words. Use APA citations/references. Case Study1 An efficient and effective supply chain plays a major role in the success of a multinational corporation (MNC). MNCs deal with a myriad of issues, including quality of raw materials, scarcity of materials, the locations where the materials’ ingredients or components are grown or manufactured, and the counterfeiting of materials (especially in the pharmaceutical industry). MNCs also face environmental challenges, such as tsunamis in the Philippines, monsoons in Thailand, and volcanos in Indonesia. Piracy and theft of intellectual properties are yet another set of issues that MNCs must deal with. Because supply chains, in many cases, are outsourced and subcontracted, controlling each point of the supply chain becomes a challenge. Although IT cannot solve all of these problems, it can provide timely information that executives in MNCs can use to quickly respond to any of these issues. MNCs are using data warehouses and analytics to analyze, pinpoint, and quickly deliver key information related to parts of the supply chain. RFIDs, GPSs, and QR codes have significantly improved the efficiency of these supply chains. Ports America, for example, uses optical character recognition cameras to scan each container, RFID tags to match the contents with the trucks, and GPS sensors to identify equipment locations and cargo movements. Computer networks and the Internet have created unparalleled connections throughout the world. Major logistics companies such as UPS and FedEx are using state-of-the-art information technologies to efficiently deliver products and services around the globe. Answer the following questions in a Microsoft® Word document and save the file on your computer with your last name in the file. (Example: module_09_case1_Jones.doc) 1.What are some of the challenges that MNCs face as far as intellectual properties are concerned? 2.What are some of the environmental challenges MNCs face? 3.How can information technology assist with the counterfeit problem? 4.How can information technology assist with logistics? Case Study2 The Toyota Motor Company is a global automobile manufacturer that operates on five different continents. In the United States, it runs five major assembly plants. To manage its operations efficiently and effectively around the globe, Toyota uses several types of information systems. It uses the Internet and global networks to communicate with its offices, plants, and dealerships around the globe. Toyota is one of the founders of the Toyota Production System, an early version of the Just In Time (JIT) inventory system. This system allows Toyota to have on hand the exact number of components needed at any time in order to continue its operations, given that waste often occurs when components are inventoried and stored. To use a JIT inventory system, Toyota’s GIS must be capable of managing real-time inventory, not only within its own manufacturing facilities but in all of its suppliers’ facilities. Because of this, Toyota requires all of its suppliers to have a system capable of interfacing with the one Toyota uses for its own operations. Toyota worked with Dell, Microsoft, and WorldCom to develop a “Dealer Daily” system that offers a centralized data center for the more than 1,100 Toyota and Lexus dealers in the United States. This system allows dealers to spend more time focusing on selling cars and less time on paperwork. For example, the system is capable of providing a response to a financing application in 15 seconds. Using Oracle E-Business Suite 12.1, Toyota Motor Europe (TME) implemented Toyota’s Vehicle Order Management (VOM) system. This system, which encompasses 13 countries, enables TME to improve its European operations by reducing delivery time to customers and managing inventory more efficiently. As a result, the system reduces operating costs. Answer the following questions in a Microsoft® Word document and save the file on your computer with your last name in the file. (Example: module_09_case1_Jones.doc) 1.What role do global networks play in the effective implementation of JIT? 2.What role does the Dealer Daily system play in Toyota’s implementation of a GIS? 3.What is the function of Vehicle Order Management (VOM)? 4.How many countries will be impacted by VOM and in which part of the world?

Categories
Computer Science

How scope is established and why the agreement of the scope is important?

Develop a vulnerability assessment / penetration plan that describes the 5 phases of the ethical hacking methodology. Please review the template. You are to provide a 3 page MS Word document that contains a cover page and references, and a completed vulnerability assessment following the format provided below. All citations should also be properly referenced using APA style. Note the cover page and references are not included in the page count.
You have been asked to develop a vulnerability assessment/penetration testing plan and describe the hacking process. After all, the goal of white hat hacking is to ensure the security of the company resources, and documentation is always part of the process. In a 3-page MS Word document, develop a vulnerability assessment for an organization that has a single data center with 3 Unix servers, 3 Windows Servers, an IIS server for website and e-commerce traffic, and an email server.
The network infrastructure is made up of Cisco routers and switches and there are 500 end user host computers running Windows 10, 1 host computer running Windows 95, 100 WIFI 802.11ac routers with WPA2 encryption, and 10 WIFI 802.11b routers running WEP. Develop your paper using the vulnerability assessment template below and also include answers to the following questions:
What is the hacking methodology and what are its phases?
How scope is established and why the agreement of the scope is important?
How ethics come into play when conducting ethical hacking?
Vulnerability Assessment Template
How
One of the first items to consider is the type of test to be performed, internal or external. An internal test focuses on systems that reside behind the firewall. This would probably be a white box test. An external test focuses on systems that exist outside the firewall, such as a web server. This would, more than likely, be a black box test.
Who
Determine if the penetration tester is allowed to use social engineering attacks that target users. It’s common knowledge that users are generally the weakest link in any security system. Often, a penetration test can target users to gain access. You should also pre-determine who will know when the test is taking place.
What
The organization and the penetration tester need to agree on which systems will be targeted. The penetration tester needs to know exactly which systems are being tested, and as they cannot target any area that isn’t specified by documentation. For example, the organization may have a website they do not want targeted or tested. Some other systems that need to look at include wireless networks and applications.
When
Scheduling the test is very important. Should the test be run during business hours? If so, this may result in an interruption of normal business procedures. Running the tests when the business is closed (during weekends, holidays, or after-hours) may be better, but might limit the test.
Where
Finally, will the test be run on site, or remotely? An on-site test allows better testing results, but may be more expensive than a remote test.
Cover page and reference page are not included in page count. Document formatting, citations, and references must follow APA format. The AIU APA Guide includes sections for paper formatting, as well as reference and citation examples. For example, 250 words equals one page of content.

Categories
Computer Science

Based on the output, analyze the data and the relationships revealed about the variables of interest.

You will document in a report the results of each step of the mining process, analyze and interpret the results. Suggest the characteristics to use when determining if a mushroom is safe to eat. Make recommendations for additional analysis and variables to examine to build other classifications such as use of the mushrooms that are not poisonous.
The report should include the following:
Code walk through: in this section provide a step by step explanation of how the code is interacting with and/or transforming the data. Provide examples from the output to support your explanations.
Analysis: Based on the output, analyze the data and the relationships revealed about the variables of interest. Explains the insights provided by the output. Use visualizations to support your analysis.
Interpretation and Recommendations: Interpret the results of your analysis and explain what the results mean for the data owner. Provide recommendations for actions to be taken based on your interpretation. Support those with the data. Explain why and what explicit variables you suggest incorporating. For example, median income by city and state from the census.gov website might be useful for examining home ownership.
Both the r-code file and the word file are required.

Categories
Computer Science

Identify a cyber related issue that requires closer examination.

identify a cyber-related issue that requires a solution. In
this case, you will select a topic or issue as it relates to cyber space. This will form as the basis
for developing a Cyber Research Proposal (Assignment #2) and Cyber Issue Paper that focuses
on your selected cyber topic (Assignment #3).
You are encouraged to refer to Belcher, Wendy Laura. 2009. “Editing Your Sentences” In
Writing Your Journal Article in 12 Weeks. A Guide to Academic Publishing Success. Sage. This
resource has an excellent step-by-step process for enhancing your writing.
The goal of this assignment is to present a clear white paper. Your white paper should be
between 4-5 pages in length not including your references.
You will need to:
1) Identify a cyber related issue that requires closer examination.
2) Clearly state the problem.
3) Explain why this is an important issue. How will further research and solution assist with
mitigating the effects of this issue?
4) Offer a set of solutions, with an optimal solution for recommendation.
Format. Your paper should have a 1-inch border on all four sides, use Times New Roman-12
point font, be double spaced, and not have an extra space in between paragraphs. All references
and citations are in Chicago Turabian format.
Introduction/Synopsis. Identify and introduce your key issue. Provide a succinct synopsis of the
problem and why the issue merits further discussion and resolution.
Background/Problems. Outline the scope of the issue and provide background information to
orient your audience. The focus of this section is to orient a decision-maker to key issues in order
to facilitate the resolution of the problem on an understanding of the facts that you identify. This
section should be supported by evidence—as opposed to opinion. It is imperative that you do not
shift from the main topic and pose issues that cannot be resolved.
Solution. Propose a set of solutions with pro’s and con’s to each. Recommend the optimal
solution.
Conclusion. Write a conclusion in order to wrap up the white paper and enhance your readers’
understanding.
References. Include any references in a separate Reference Page

Categories
Computer Science

Explain key considerations for identifying an internet service provider for the new location and recommend the appropriate provider to match the business case.

Explain key considerations for identifying an internet service provider for the new location and recommend the appropriate provider to match the business case.
Address considerations and make recommendations regarding hardware and software selection, printer configurations, and bandwidth that address business needs.
Illustrate these considerations graphically in a network diagram (using Word, Draw.io, Visio, or Lucidchart).

Categories
Computer Science

Discuss potential safeguards and remediation actions that could be implemented for each finding to reduce the risk.

Using a fictitious organization and the vulnerability assessment tool “Nmap” perform a mock vulnerability assessment against one target server in the environment, and report the findings. The information should include:
A descriiption of the tool (Nmap) used to perform the scan.
A list of identified hosts (Obfuscate any specific/fake IP addresses).
The list of serious (on a scale of 1-5 (1 being the highest) report the 1 and 2 issues)
Describe or list any false positive information.
Discuss potential safeguards and remediation actions that could be implemented for each finding to reduce the risk.

Categories
Computer Science

How may the paper be revised and improved if you were to revisit the problem today?

Describe your experience in reviewing a scientific research paper, literature search or finding limitations (e.g., knowledge gaps) of state of the art. Demonstrate your skills by reading and critiquing a recent computer science journal (e.g., IEEE Transactions) paper from this group ( DBLP, Google Scholar ) . How may the paper be revised and improved if you were to revisit the problem today? https://scholar.google.com/citations?user=p26NfLgAAAAJ&hl=en

Categories
Computer Science

How to leverage cloud computing for government-wide adoption in the delivery of public goods to achieve e-government.

RESEARCH QUESTION – How to leverage cloud computing for government-wide adoption in the delivery of public goods to achieve e-government.
You must produce a 14–16-page literature review, based on your dependent variable/research question. The lit review must be grounded in prominent peer-reviewed work on your particular dependent variable/research question. The paper must illustrate why your research question is meaningful and theoretically significant. To do this, you must provide the reader with a strong sense of the state of the established literature in their chosen sub-field and must identify areas where they can make a substantial contribution to existing theory and scholarly discourse.
Start by briefly introducing your topic, providing your research question, and specifying your dependent variable. This should all be accomplished on page one of your lit review. Then, identify the peer-reviewed sources which represent the most prominent work done to date on your particular question. Describe key information from your reviewed sources in a manner that clearly connects to your specific research problem and helps you conceptualize how you will eventually study/tackle your problem. Steer away from describing this relevancy in general terms. Instead, describe the specific contribution the author(s) makes to ongoing scholarly conversations. Speaking of conversations, a good literature review will put scholars into discussions with one another. Use these conversations to illuminate how the key findings, research designs/methods and strengths/weaknesses of arguments and research approaches.
Finally, a good literature review will move seamlessly from this in-depth discussion of specific contributions/gaps up to the macro level, where the reader is provided with a sense of key advancements/setbacks and themes running throughout an entire body of literature. It takes practice and skill to effortlessly move your reader from specific contributions to a broad assessment of the state of an entire body of literature. But that is your goal.

Categories
Computer Science

Why do some flavors of Linux favor the use of sudo while others allow you access to the root user?

This is just a discussion board post!
Why do some flavors of Linux favor the use of sudo while others allow you access to the root user? What are the pros/cons of each?

Categories
Computer Science

How do shipping costs effect Amazon on an annual basis?

Watch the video How Amazon Works (https://www.youtube.com/watch?v=BZU2jjhjQhU) Based on your knowledge of process analysis, diagram the process for sellers to sell items on amazon.? You will need to go to https://Amazon.com and create a process using the following instructions only: • Think about the process for searching and then placing your order in a shopping cart. • Do NOT go any further than searching and placing in your cart. • There are many more processes, but for this one we will create a simple high-level view first of adding an item to purchase in a shopping cart. • You will need to think about who is doing the searching (in this case it is you), all possible steps in the ordering process (for example, you should include opening a web browser and opening the Amazon site to searching the site. • Think about the processes in the previous part to apply these concepts to this part. Steps: Steps to include in your activity 1. Identify all steps in the process to searching and then placing your item in your shopping cart 2. Develop a table with the following headers (labels- use excel or word tables but the table needs to be included in your word document) a. Actor in the process i. This is who is doing the activity b. Major steps i. General high-level view of the steps c. Minor- detailed steps i. Detailed steps in the ordering process d. Data type i. This would be specifically what the data is you are looking at/ collecting ii. For example: email; text or database; integer iii. How is data used (are you doing any of the below?) 1. For example: writing, reading, updating, processing 3. Your diagrams on the processes for above For example: Actor Major Steps Minor-Steps Data Type Customer (checkout) Checkout at Amazon Search product Text Text Field Place in cart integer (for add) checkout Integer (creditcard) Actor 2 (could be employee) Package/shipping ***If you need an example of a business process see here: https://opentextbook.site/informationsystems2019/chapter/chapter-8-business-processes-information-systems-introduction/ ; note you can use Lucid Chart to diagram your process. Next Watch Behind the Scenes of an Amazon Warehouse I. How are robots used in an amazon fulfillment center? Are they effective? Explain. II. How do humans and robots exist alongside each other in an Amazon Fulfillment Center? Are they working in coordination or competition with each other? III. What is “SLAM”? How does SLAM organize processes? Is SLAM a process or an organizational mechanism? Explain. IV. Why is flow of packages more important than speed for Amazon? Explain. Do you think this is sound business practice? V. Compare this amazon warehouse video with the following?video about a?company in China:?Alibaba’s Warehouse is run almost Entirely by Robots VI. As Amazon Air expands a. Define “bottleneck” in business supply chain management and explain what the b. “bottleneck” was for amazon and how it was addressed through Amazon Air.? c. Diagram the supply chain process that best captures how Amazon functions once an order is placed online and the package is ready to leave the warehouse.? d. How do shipping costs effect Amazon on an annual basis??Cite an example from the video and explain the significance of the costs in the decision to lease planes for Amazon Air.? e. What benefits does Amazon Air offer suppliers? How does this effect the customers? Explain.? f. Define “hybrid network” and what it means for the company.? g. How does Amazon challenge the United States Postal Service to be more creative to withstand the competition of Amazon’s delivery services to survive? Is this challenge good for?sellers? consumers? Explain. For this discussion, post your step processes and answer the questions. In response to a classmate, provide additional insight to their developed process. Do you agree or disagree with the steps presented by your classmate? What about the responses to the videos? Can you identify another organization that is similar to Amazon and Alibaba? Remember: Provide citations and references for any direct/indirect citations. Use APA style.