Business intelligence

I’m stuck on a Computer Science question and need an explanation.

Scenario

You are a team of IT professionals working at a Business Intelligence firm. You have been contracted to provide an organization (provide any name you wish for this organization) with a presentation on the benefits that a business intelligence solution could have for the organization. The organization has provided you with access to one or more of the databases to aid in the identification of potential benefits. In addition to providing a presentation on the general benefits of business intelligence and proposing a business intelligence solution (software tool), you will also need to identify one key problem that your team has identified from the data and research as one that you propose a business intelligence solution can solve. You should also provide at least one example of the type of information that your business intelligence solution can provide.

Choose at least one dataset provided to you by the organization. You may use or create any data you like, but here are some resources that may be helpful to you in locating a dataset. The dataset should actually be relevant to the project’s organization (or vice-versa).

https://sqlbelle.wordpress.com/2015/01/16/data-sets-for-bianalyticsvisualization-projects/

You will also need to select an Online Analytical Processing (OLAP) software solution that your team proposes to use. Many OLAP tools are available in a trial version (though some may take you longer than we have to activate).

Your paper should include the following components:

  • A general explanation of what business intelligence is
  • The type(s) of data in your data set
  • How the data is housed and any proposals for potentially consolidating it
  • How the data was, or will need to be prepared
  • The OLAP software solution your team is proposing to use including features it offers (dashboard, “What if” analysis, interactive reports, etc.)
  • How your chosen OLAP software differs from its competitors and why you chose it
  • A model used in your analysis of the data
  • Chicano Responce

    What is the significance of being fluent in history as it relates to critical thinking, e.g. Black history of Mexico?  How do you think not knowing history contributes to un-critical thinking?

    Minimum 150 words.

    How does cultural studies (the study of popular culture) contribute to critical thinking?

    Minimum 150 words.

    List one belief that you hold or someone close to you does that you can analyze and evaluate with the intention of improving it.

    link

     https://www.youtube.com/watch?v=JIzHIRCBtdE

    Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking”

    Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial.

    This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives. In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

    • Introduction – What is an ERM?
    • Why Should an Organization Implement an ERM Application?
    • What are some Key Challenges and Solutions to Implementing an ERM?
    • What is Important for an Effective ERM?
    • Discuss at least one real organization that has been effective with implementing an ERM framework/application.
    • Conclusion – Final thoughts/future research/recommendation

    The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

    Your paper should meet the following requirements:

    • Be approximately seven to ten pages in length, not including the required cover page and reference page.
    • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    • Support your answers with the readings from the course, the course textbook, and at least FIVE scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.  graded in part on the quality of your writing.

    shanki-discussion 3 replies

    I need help with a Computer Science question. All explanations and answers will be used to help me learn.

    please read below student posts and reply accordingly each in 150 words.

    abhilash – Protection Against Possible Threats and Potential Vulnerabilities

    Generally, risks are common for any business entity in their day to day businesses. The different sectors like the private sector and public sector both are struggling for providing secure, efficient and timely services effectively internationally as well. Likewise, these services remain at risk totally from potential attacks through the internet. As a result, everyone wants to minimize the disruptions facing in order to protect the public, they are increasing capabilities to address cyber risks which are associated with these networks and the information systems as well (Damodaran, 2017).

    The potential vulnerabilities can be reduced according to the form of risk and the different factors associated with such risk such as, we have to find and fix the vulnerability process it means to have to take essential steps for this process and the different factors should also be considered, the first step is to know the code means with which we are working with and which software components are being used and the which needs an immediate attention to those processes. Secondly, we have to give priority to the vulnerabilities as well which means we have to prioritize when we have a doubt regarding. After prioritizing the vulnerabilities have to fix the process and have to fix it with a permanent and solution to a security vulnerability (Schia, 2018).

    Likewise, many intrusions can also overcome in the process, as a result, there has been a major change in the system and providing servers as well, for managing intrusions we have to overtake some of the measures as they work effectively in reducing intrusions as well. A network intrusion is an unauthorized activity that enables unwanted activity to enter in many ways. intrusions prevention can be done, intrusions are file comparisons against malware signatures. It is a security policy violation and virus. For preventing intrusions, we have intrusion prevention systems (Wright, 2014).

    Rahul – Safeguarding the national security information of the USA

    National critical infrastructure refers to the system or asset that is located in the Member States and is necessary for the proper maintenance of critical societal functions, safety, and security, health, the social or economic well-being of citizens. Any kind of destruction or disruption to it would have a devastating impact on the country’s national image, public safety and health, national security and defense, government functions and capability and the economic strength of the nation. However, since IT provides both the governmental and private sectors with an effective means of delivering key services across the world, they are constantly under the radar of cyberattackers. Therefore, it is imperative to prevent or mitigate any kind of disruptions to these infrastructures.

    How can potential cyber threats be prevented?

    There are several ways by which these potential vulnerabilities of the national infrastructure can be reduced, intrusion attempts can be checked, and future threats can be detected much earlier and prevented. It is important to note that the efforts to protect the governmental network systems from cyber threats must be collaborative (Amoroso, 2012). First and foremost, it is necessary to ensure that IT security is well-funded and maintained. Developing a National Center for Cybersecurity for the purpose of addressing cyberattacks and vulnerabilities is an effective way to ensure that efforts involved in ensuring cybersecurity are continuously increasing. Another important measure would be to expand the NCIJTF to include the U.S secret Service and many other government agencies (Harrop & Matteson, 2015). Also, the expansion of the EINSTEIN Program to all government agencies and department agencies can aid in the earlier detection of any intrusion or malicious activity, thereby providing a more comprehensive system of the defense of the network. Moreover, this program will also help in the identification of unusual trends and patterns in network traffic which would signal towards unauthorized network traffic. This would alert the security personnel to quickly respond to such intrusion attempts.

    Additional measures to be taken to ensure complete protection

    Besides the steps and measures discussed above, there are more ways through which protection from unauthorized access and early identification of potential threats can be ensured. For example, it would be beneficial if the external connections that are part of OMB are consolidated. This would help in managing and implementing various security measures. Furthermore, the coordination and sharing of information between the private sector and the Federal Government can be facilitated to minimize the probability of cyber risks and threats, distribute information and awareness related to potential threats, sharing and applying the best practices that are highlighted within the NIPP framework (Caplan, 2013).

    Thus, it can be said that the protection and security of the national critical infrastructure is indeed the need of the hour, especially given the rise in the number of cyberattacks. The proper implementation of the above-discussed steps can prove to be of much help in ensuring the same while also securing the privacy and confidentiality of the citizens.

    Jayakrishna – Understanding the concept of CIIP

    CII or Critical Information Infrastructure refers to those interconnected communication and information infrastructures that are extremely essential for maintaining vital functions related to society including health and safety, social and economic well-being and the security of people. If these infrastructures are destroyed or disrupted due to any reason whatsoever, the impact could be disastrous. This necessitates the raising of awareness on the significance of CII protection from highly-sophisticated cyber threats. Therefore, it is the policy of the United States to reduce the possibilities of such attacks on the national infrastructure for protecting and securing the people, economy, federal services and security of the nation.

    Ways to prevent and predict cyber threats

    Several effective ways are designed for ensuring the protection of CII. They are listed below:

    • Facilitating the exchange of information and coordination between the private sector and the government to minimize the chances of cyber risks, spreading information related to cyber threats to increase awareness about them among the public, applying the most effective practices and protective actions that are outlined in the NIPP (Amoroso, 2012). For example, specific tools can be created that would help all sectors of critical infrastructure to evaluate certain already existing policies, procedures and plans to minimize cyber vulnerabilities and make the most out of recognized and acceptable standards.
    • Increase in the funds allocated for IT security, which would guarantee better protection and safeguarding.
    • Building a National Cybersecurity Center that is aimed at addressing the threats and risks associated with cyberattacks and increasing the efforts involved in ensuring security and protection from such cyberattacks (Von Solms & Van Niekerk, 2013).
    • Strengthening the supply chain defense is needed to minimize the opportunities for cyberattackers to manipulate products of IT before they are brought into the U.S.
    • Recruiting more people who would be responsible for supporting the US-CERT is a good way to help the government and the private sector to analyze the various vulnerabilities and threats and respond to them in the best possible way.

    What else can be done?

    The measures and steps are not limited to the ones discussed above. Other alternatives are there as well which can help in serving the same purpose. The EINSTEIN Program which is very useful in identifying unusual and suspicious patterns in the network traffic can be expanded to encompass all government agencies and Federal departments (Merabti, Kennedy & Hurst, 2011). Doing so shall provide an early warning to all government officials regarding an impending attack which would help them to become alert and prepare for countermeasures. Apart from the EINSTEIN Program, the NCIJTF can also be expanded by including members of several government agencies such as the U.S Secret Service. This can act as a national pivot for multiple agencies that would coordinate, integrate and share relevant information related to investigations of cyber threats.

    Therefore, it is understood that critical systems of national information must be protected and secured to maintain the smooth functioning of the country’s administration and governance. And for that, effective measures must be implemented by private sector organizations as well as government agencies at regular intervals.

    Stages

    Go to www.behavioradvisor.com.  go to the website’s homepage and then click on free podcasts and videos. Then scroll down to Dr. Mac’s Mountain. This is a series of videos that are broken down to make the videos downloadable. Watch them in order. You may want to go back to the Dr. Mac homepage www.behavioradvisor.com and click on Intervention Strategies. Then click on the button that says click here and scroll down until you see the heading Basics of Behavior Management. Select Discipline 101: A primer on behavior management. See http://www.behavioradvisor.com/Primer.htmlThis is essentially the same material you will find in the podcast series so it is nice to have something to follow along with.  Consider how the material connects to the textbook readings and models of behavior management.

    When you complete the video series, write an approximate one page paper (1-3 paragraphs) that reflects your thoughts and what you learned from this experience. Be specific about content and follow APA/scholarly conventions.

    1 page

    APA

    USe the following references also:

     Kaplan, S. J. (1995). Beyond behavior modification: A cognitive-behavioral approach to behavior management in the schools (3rd ed.). Austin, TX: Pro-ed.

    Rhode, G., Jenson, W. R., & Reavis, H. K. (1996). The tough kid book: Practical classroom management strategies. Longmont, CO: Sopris West.

    Natural disasters cause death and destruction, but there is an economic oddity about them.

    I need help with a Economics question. All explanations and answers will be used to help me learn.

    Natural disasters cause death and destruction, but there is an economic oddity about them. Because there is so much money put into rebuilding after these catastrophes there can be positive economic outcomes. Why do you think this is so? To further your answer, look up the “broken window fallacy”. What is this fallacy? (NOTE: you must provide a source for where you found your information about the fallacy.) Does destruction actually improve macro measures of production? What flaws do you see with this logic?

    week 3 Assignment

    No need to add details. In one question post write this only: (Week 3 Assignment for Prof. Johnalia Only)

    You are working with the staff-training department of a correctional facility. Your assignment is to help create an orientation program for new employees, explaining the types of correctional faciliti

    You are working with the staff-training department of a correctional facility. Your assignment is to help create an orientation program for new employees, explaining the types of correctional facilities based on custody levels and the standard punishments used at each custody level. In a Microsoft Word document, create a report that describes each custody level and punishment. The report must:

    • Illustrate the security level and facility design of each type of prison that is available in the state and federal correctional systems; include the custody level of inmates living in each type of prison.
    • Describe the programs available for inmates in each type of prison.
    • Describe how corrections officials determine to which facility a convicted offender should be sent.
    • Indicate the types of offenders living in each type of facility, including facilities that house death row inmates.

    PJM440 MOD3 Portfolio MIle Stone 4 Page Essay APA Format

    I need an explanation for this Management question to help me study.

    I have attached the below in a Word DOX. as formatting can be lost. I have also attached the MOD8 Portfolio Project in a Word DOX. for your reference.

    Portfolio Milestone (100 Points)

    Important! Read First

    Choose one of the following two assignments to complete this week. Do not do both assignments. Identify your assignment choice in the title of your submission.

    Option #1: Quality Management and Small Cell Infrastructure Design

    Go to Module 8 and read the expectations for Option 1, then return here for your Module 3 Milestone effort.

    In Module 3, you are asked as a first step, to familiarize yourself with the Small Cell Infrastructure Design Guidelines. Note that two contract firms were instrumental in the development of the guidelines: Clanton & Associates, Inc. and Jacobs Engineering Group. After your review of the guidelines, you are asked to provide your input to the following:

    • Are the current Small Cell Infrastructure Design Guidelines (SCIDG) ones that promote high quality? If yes, how? If no, why not and what should change to promote quality? Support your position with specific references to the SCIDG or current scholarly documentation.
    • What do you interpret to be meant by “quality” from the perspective of the public works personnel, communications companies deploying small cell infrastructure, the contract companies involved, and the public both now and in the future? What support do you have for your position with specific references to the SCIDG or current scholarly documentation?
    • What are the drivers for change, and the barriers to change from the perspective of the public works personnel and the public? Are there competing drivers for change that may impact quality from the public’s perspective? Support your position with specific references to the SCIDG or current scholarly documentation.

    Submission:

    • Write a paper addressing the Module 3 Milestone questions for the case of The Department of Public Works, Engineering Division for the City and County of regarding the Small Cell Infrastructure Design Guidelines and quality management. Your paper should be 3-4 pages in length, not including the required title and references pages and any appendix if required. For more information see “How do I do an Appendix in APA style?” (Links to an external site.)
    • Support the Milestone paper with a minimum of three current (published in the most recent five years) scholarly sources from the CSU-Global Library. This is in addition to any course textbooks, lecture material you decide to use, or the case itself. Of course, you may always exceed the minimum number of sources.
    • Format the paper according to the CSU-Global Guide to Writing & APA (Links to an external site.).
    • Be clear, concise, and focused.

    Option #2: Total quality management and the Office of Personnel Management (OPM) on Federal Retirements

    Go to Module 8 and read the expectations for Option 2, then return here for your Module 3 Milestone effort.

    In Module 3, you are asked as a first step, to familiarize yourself with the Government Accounting Office (GAO), Office of Personnel Management (OPM) May of 2019, publication of the Federal Retirement: OPM Actions Needed to Improve Application Processing Times. After your review of the guidelines, you are asked to provide your input to the following:

    • Is the current Federal Retirement: OPM Actions Needed to Improve Application Processing Times document one that promotes high quality? If yes, how? If no, why not and what should change to promote quality? Support your position with specific references to the GAO report or current scholarly documentation.
    • What do you interpret to be meant by “quality” from the perspective of the GAO OPM, retirees, Congressional leaders, and the public both now and in the future? What support do you have for your position with specific references to the GAO report or current scholarly documentation?
    • What are the drivers for change, and the barriers to change from the perspective of the GAO OPM, retirees, Congressional leaders, and the public? Are there competing drivers for change that may impact quality from the public’s perspective? Support your position with specific references to the GAO report or current scholarly documentation.

    Submission:

    • Write a paper addressing the Module 3 Milestone questions for the case of federal employee retirement situation and quality management. Your paper should be 3-4 pages in length, not including the required title and references pages and any appendix if required. For more information see “How do I do an Appendix in APA style?” (Links to an external site.)
    • Support the Milestone paper with a minimum of three current (published in the most recent five years) scholarly sources from the CSU-Global Library. This is in addition to any course textbooks, lecture material you decide to use, the GAO report or the case itself. Of course, you may always exceed the minimum number of sources.
    • Format the paper according to the CSU-Global Guide to Writing & APA (Links to an external site.).
    • Be clear, concise, and focused.

    Rubric

    PJM440 Mod 3 PM

    PJM440 Mod 3 PM

    Criteria Ratings Pts

    This criterion is linked to a Learning Outcome Requirements

    30.0 to >24.0 pts Meets Expectation

    Includes all of the required components, as specified in the assignment.

    24.0 to >18.0 pts Approaches Expectation

    Includes most of the required components, as specified in the assignment.

    18.0 to >12.0 pts Below Expectation

    Includes some of the required components, as specified in the assignment.

    12.0 to >0 pts Limited Evidence

    Includes few of the required components, as specified in the assignment.

    30.0 pts

    This criterion is linked to a Learning Outcome Content

    30.0 to >24.0 pts Meets Expectation

    Demonstrates strong or adequate knowledge of the materials; correctly represents knowledge from the readings and sources.

    24.0 to >18.0 pts Approaches Expectation

    Some significant but not major errors or omissions in demonstration of knowledge.

    18.0 to >12.0 pts Below Expectation

    Major errors or omissions in demonstration of knowledge.

    12.0 to >0 pts Limited Evidence

    Fails to demonstrate knowledge of the materials.

    30.0 pts

    This criterion is linked to a Learning Outcome Critical Analysis

    20.0 to >16.0 pts Meets Expectation

    Provides a strong critical analysis and interpretation of the information given.

    16.0 to >12.0 pts Approaches Expectation

    Some significant but not major errors or omissions in analysis and interpretation.

    12.0 to >8.0 pts Below Expectation

    Major errors or omissions in analysis and interpretation.

    8.0 to >0 pts Limited Evidence

    Fails to provide critical analysis and interpretation of the information given.

    20.0 pts

    This criterion is linked to a Learning Outcome Demonstrates college-level proficiency in organization, grammar and style.

    10.0 to >8.0 pts Meets Expectation

    Project is clearly organized, well written, and in proper format as outlined in the assignment. Strong sentence and paragraph structure; few errors in grammar and spelling.

    8.0 to >6.0 pts Approaches Expectation

    Project is fairly well organized and written, and is in proper format as outlined in the assignment. Reasonably good sentence and paragraph structure; significant number of errors in grammar and spelling.

    6.0 to >4.0 pts Below Expectation

    Project is poorly organized; does not follow proper paper format. Inconsistent to inadequate sentence and paragraph development; numerous errors in grammar and spelling.

    4.0 to >0 pts Limited Evidence

    Project is not organized or well written, and is not in proper paper format. Poor quality work; unacceptable in terms of grammar and spelling.

    10.0 pts

    This criterion is linked to a Learning Outcome Demonstrates proper use of APA style

    10.0 to >8.0 pts Meets Expectation

    Project contains proper APA formatting, according to the CSU-Global Guide to Writing and APA, with no more than one significant error.

    8.0 to >6.0 pts Approaches Expectation

    Few errors in APA formatting, according to the CSU-Global Guide to Writing and APA, with no more than two to three significant errors.

    6.0 to >4.0 pts Below Expectation

    Significant errors in APA formatting, according to the CSU-Global Guide to Writing and APA, with four to five significant errors.

    4.0 to >0 pts Limited Evidence

    Numerous errors in APA formatting, according to the CSU-Global Guide to Writing and APA, with more than five significant errors.

    10.0 pts

    Total Points: 100.0

    6 pages of reading to answer 2 questions

    I’m studying for my Business class and need an explanation.

    (looks big questions but he is just telling you how to do them)

    2 page paper minimum answering the following questions from the Electro Logic case in chapter 6

    CHap 6: ELECTRO LOGIC

    Complete Set of Questions (Revised and Unrevised)

    To help you focus on the right issues in the Electro Logic case, I have revised question #1 by simply removing the reference to the behavioral guidelines.

    The new question is provided below:

    1. Using Figure 6.5 as a diagnostic aid, what are the strengths and weaknesses of Electro Logic from a motivational perspective?

    2. Same as book. The best way to organize your analysis is by discussing the strengths and weaknesses in terms of Figure 6.5. Specifically, discuss issues of motivation in jobs at Electro Logic in terms of the following:

    •the motivation-to-performance link

    •the performance-to-outcomes link

    •the outcomes-to-satisfaction link

    The links are the boxes in the middle of the model. In each of those links, you have the different elements of the model that you can discuss. You should discuss any problems you see in the motivation-to-performance link by mentioning issues relating to goal setting and ability. You should discuss any problems you see in the performance-to-outcomes link by mentioning issues relating to reinforcement concepts like discipline and rewards as well as issues relating to concepts like intrinsic motivation. You should discuss problems with the outcomes-to-satisfaction link by mentioning issues relating to equity, salient rewards, and timeliness of rewards.

    Please note that you do not need to find a strength for each area of the model. It may be that you find few motivational strengths in the jobs at Electro Logic. There will definitely be many, many more weaknesses than strengths in this case.