Health Care HQ

Health Care HQ has a client–server network architecture. The chief information officer (CIO) wants to understand the difference between a client–server and a peer-to-peer network. She also wants to know why she should choose one over the other. You have been asked to provide a document that discusses the networks at Health Care HQ.

Comprehensive Analysis and Review

In a document of 2–3 pages, you will provide the following:

  • Explain a peer-to-peer network verses a client–server network. Because your system is strictly Windows, your document should concentrate on the networking features of Windows Server (e.g., file sharing, print sharing, user administration, application server, Dynamic host configuration protocol [DHCP], domain name system [DNS], and backing up data).
  • Include a recommendation about which Microsoft server Health Care HQ should use (i.e., Windows 2008 or Windows 2012), and explain your choice

the impact of telecommuting

The number of American telecommuters is expected to increase by 29 million telecommuters or 43% of the workforce by 2016 as more work gets performed from remote locations. Mobile workers can work from wherever they are and use the IT / IS technology necessary to access co-workers, company or corporate infrastructure, intranets, and other information sources.
 
Write a two to three (2-3) page paper in which you:
  1. Describe the impact of telecommuting on energy conservation, IT operational costs, “green computing”, and shifts in telecommuters’ lifestyles (e.g., parents, disability, etc.).
  2. Describe how the business infrastructure should be designed so that employees will be able to continue to perform business functions in the event of a disaster (i.e., storm, hurricane, or earthquake) that destroys or makes it impossible to access the buildings. 
  3. Determine four (4) advantages and four (4) disadvantages of telecommuting from an IT manager’s point of view. Elaborate on each advantage and disadvantage.
  4. Examine the effect of Bring Your Own Device (BYOD) to the IT infrastructure with regard to security, IT support, knowledge, and data management, green computing, and telecommuting.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 
 
Your assignment must follow these formatting requirements:
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

E-commerce 101 Assignment

Assignment Purposes:

  1. Evaluate the characteristics of e-commerce.
  2. Demonstrate effective use of technology for communication.
  3. Evaluate the effectiveness of an e-commerce Web site.
  4. Explain the security and threats in the e-commerce environment.
  5. Analyze basic concepts of consumer behavior and purchasing decisions.
  6. To apply critical thinking by the students.

Assignment Workload:

􀁸 This assignment is an individual assignment.

􀁸 The word count for this assignment must be between 2500 to 3000 words.

Assignment Objectives & Requirements:

  1. To create a new E-commerce business, which is located in the Kingdom of Saudi Arabia,

which include the followings: (300 400 words)

  1. Introduction about your business.
  2. Product and type of services.
  3. Business statement.
  4. Business vision.
  5. Business objective.
  6. To explain your business E-commerce processes. (100 200 words)
  7. To apply a SWOT analysis to your business. (100 200 words)
  8. Building the E-commerce website. (100 200 words)
  9. How it will look likes in terms of design and format (draft).
  10. Student is required to explain its E-commerce system functionality, such as: (200 300

words)

  1. The product menu will show all the product we have in stoke.
  2. The contact button will have all the company contact details, social media links

Facebook, Instagram, etc.

  1. System design (Picture attachment).
  2. Determine the suitable software and hardware needed with an explanation on why it’s

needed. (300- 400 words)

  1. What type of functionality needed in your website, such as CRM?
  2. What type of hardware needed? Do you need a server or it will be in the cloud?
  3. Identifying security issues as well as how to avoid it. (200 300 words)
  4. What type of security? To whom or to what?
  5. Potential threats to your website?
  6. Recommendation.
  7. Categorize marketing and advertising strategy and method. (300-500 words)
  8. Demographic.
  9. Marketing method.
  10. Social media.
  11. Local marketing.
  12. Multichannel marketing.
  13. Describe what are the ethics and laws within your E-commerce Website. (200 300

words)

  1. Conclude your report. (100 – 200 words)

 

Assignment regulation:

􀁸 All students are encouraged to use their own word.

􀁸 Student must apply Harvard Referencing Style within their reports.

􀁸 Student is allowed to cite 10% from the word limit (2000-3000 word limit means 200-300 words

can be cited).

􀁸 A mark of zero will be given for any submission that includes copying from other

resource without referencing it.

Divide the assignments

 

Total 10 items, (1,2,3,4 together)

5,6,7,8 together

9,10,11 together

Compiled Business Continuity Plan

The Structured External Assignment for this class will be the compilation of a completed Business Continuity Plan from the materials produced through the block.  The Business Continuity Plan will be organized as follows and is worth 20% of your final grade:

 

  • Management overview
  • Business Continuity Plan deployment instructions
  • Maintenance log
  • Contact list
  • Index
    • An index page
    • One section for each scenario covered in the Business Continuity Plan
  • Supporting documentation
    • BCP Policies
    • Completed Business Impact Analysis
    • Preventive Control recommendations
    • Test Plan
    • Change control process

The final Business Continuity Plan will be in a format presentable to management.  Instructions contained in the document should be clear, simple, and usable by people responsible for implementing the plan.

presentation

This assignment will help you to gain greater insight into Hindu spirituality and devotional practices. You will also have the opportunity to explore the various Hindu gods and select one to study.

Review the Sanatan Society website and select one deity to research.

Prepare an 8- to 12-slide Microsoft® PowerPoint® presentation that addresses the following:

  • Provide a brief history of Hinduism.
  • Summarize the mythology and functions of one Hindu god or goddess.
  • What is the role of the sacred texts in Hinduism?
  • Define these concepts in Hinduism: maya, karma, moksha, samsara, and atman.
  • What are the primal questions that inform these teachings?
  • What does the Hindu moral life consist of?

Format your presentation consistent with course-level APA guidelines.

Models for Competitive Dynamics

Competition has, since the 90s, led to wider gaps between industry leaders and laggards. There are more “winner-take-all” environments and greater churns among industry sector rivals. We have witnessed sharp increases in quality and quantity of IT (Information Technology) investments. We’ve seen striking competitive dynamics, particularly in sectors that spend the most on IT. Some of the competitive dynamics models include the Destroy Your Business (DYB) strategy, the Grow Your Business (GYB) strategy, the Information Systems (IS) and strategic advantage, and the social business strategy.

 

Write a four to five (4-5) page paper in which you:

  1. Compare and contrast the DYB and GYB strategies in terms of the ability to sustain a business in the marketplace over the long term, to be competitive against rivals, and profitability.
  2. Examine the “cannibalization” strategy and determine if it is or is not a better strategy compared to the DYB strategy for growth, competitiveness, and market leadership. Provide two (2) business examples.
  3. Determine whether or not changes in business strategy should entail reassessment of IS. Provide three (3) reasons to support your position.
  4. Examine how firms can use social IT in alignment with organizational strategy and IS strategy. Consider collaborative capabilities, what, how, and who should use social IT for a social business strategy.
  5. Use at three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Assignment 2: Assets and Risk Management

 

In order to successfully manage risk, one must understand risk itself and the assets at risks. The way one goes about managing risk will depend on what needs to be protected, and from what to protect it.

 

Write a three to four (3-4) page paper in which you:

 

  1. Explain at least two (2) different risk assessment methodologies.
  2. Describe the key approaches to identifying threats relevant to a particular organization.
  3. Describe different types of assets that need protection.
  4. Explain the relationship between access and risk, and identify the tradeoffs of restricting access to the organization’s assets.
  5. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

 

Your assignment must follow these formatting requirements:

 

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

The specific course learning outcomes associated with this assignment are:

 

  • Describe the components of an effective organizational risk management program.
  • Use technology and information resources to research issues in IT risk management.
  • Write clearly and concisely about topics related to IT risk management using proper writing mechanics and technical style conventions.