Read the TLG Solutions case and consider the following questions:  What is the client requesting, and what goal does the client have for this project?  What are the presenting problems?

CLA 1 Comprehensive Learning Assessment 

Case Study: Proposing a Data Gathering Approach at TLG Solutions (pages 171 – 175)

 

Read the TLG Solutions case and consider the following questions:

  1. What is the client requesting, and what goal does the client have for this project?
  2. What are the presenting problems?
  3. What do you believe may be any underlying problems?
  4. Which of these underlying problems is most likely? Why?
  5. What data would illustrate whether these underlying problems are occurring?
  6. Which method of data gathering would you use and why? (Consider using the method of analysis shown in Table 7.2.)
  7. Write a proposal that explains what data you will gather through what means (interviews, surveys, focus groups, observations, and/or unobtrusive measures). Include any questions you might ask, observations you would undertake, and/or documents you would want to gather.
  8. What are the advantages and disadvantages of your data gathering choice(s)?
  9. Include a rationale and proposed timeline for your approach and any details about the data gathering method itself, including possible interview or survey questions, documents to gather, or observations you would conduct.
  10. Finally, ensure that your proposal addresses any additional contracting needs you may have in your relationship with Greenfield.

For this assignment, you will take on the role of a business leader who wishes to analyze if a new product their company has introduced is meeting the expectations. Imagine that you would like to create a post in the company intranet that summarizes your findings in an easy-to-read format for your team.

Overview

To make sense of all the data available to them, business leaders work alongside data scientists who generate data visualizations to understand business questions via analytics. This process gives companies insight on what is working and what is not: for example, whether the products or services offered are meeting expectations, or if a shift in strategy is necessary.

Prompt

For this assignment, you will take on the role of a business leader who wishes to analyze if a new product their company has introduced is meeting the expectations. Imagine that you would like to create a post in the company intranet that summarizes your findings in an easy-to-read format for your team. Pay special attention to creating meaningful data visualizations. You should use techniques that make content easy to follow but that also display charts accurately without distorting or skewing data. Your company’s profit goal is 25% of the cost of goods sold (COGS). Remember, COGS is the cost of manufacturing the product, including labor, materials, and overhead. You will need to build trust and an open channel of communication with other leaders on your team. Pay close attention to the story that data visualizations tell you and others reviewing your post.

The purpose of this analysis is to better understand the cost, revenue, and profit associated with the new product launch. Review the Cost, Revenue, and Profit spreadsheet retrieved from the company’s data center and consider the following while developing your ideas in this assignment.

  • What is the importance of data analysis?
  • What are the results of your analysis?
  • Think about your analysis and its findings, including visuals. Use visuals and text to re-state the purpose of your analysis and summarize your most important findings.
    • What are you trying to represent with this data?
    • What kind of graphic have you selected and why?
  • How did adding visual representations of the data change your analysis?
    • Does the target audience influence the way you display information?

Guidelines for Submission

Complete the Making Data Driven Decisions worksheet in your Soomo webtext, download your completed work, and submit it in Brightspace for instructor feedback. You should write using a professional voice, and any sources should be cited according to APA style. Your assignment must be between 400 and 800 words in length.

  • attachment

Post a summary of your research and recommendations to your colleagues covering the following: • What network security issues could you encounter? • What (if any) data classification issues are there to consider?

Post a summary of your research and recommendations to your colleagues covering the
following:
• What network security issues could you encounter?
• What (if any) data classification issues are there to consider?
• What identity management issues need to be considered?
• How would you share responsibilities for securing your project with the Service
Provider?
• How does Cloud security compare to on-prem security?
• Are there any other potential cloud security issues that you should identify?

1. An automorphism of a group G is a group isomorphism : G ! G. List the automorphisms Z ! Z and prove that these are the only automorphisms. 2. Remember to prove your answers in this problem: (a) Compute the lattice of subgroups of the group Z/45Z and draw the lattice of subgroups.

1. An automorphism of a group G is a group isomorphism : G ! G. List the automorphisms Z ! Z and prove that these are the only automorphisms.
2. Remember to prove your answers in this problem:
(a) Compute the lattice of subgroups of the group Z/45Z and draw the lattice of subgroups.
(b) Compute the lattice of subgroups of Z/2nZ?
3. We know that every subgroup of Z is cyclic. Find the generators of the following subgroups and prove your answers.
(a) aZ + bZ
(b) aZ \ bZ
4. Let (G, ?) be a group. Fix an element a in G. The centralizer of a in G consists of all
the elements of G that commute with a. Namely,
C(a) = {g 2 G: g ? a = a ? g}.
(the set of all elements x in G that commute with a).
(a) Compute the centralizer of 3 in (Z, +).
(b) Compute the centralizer of the element r 2 D6; and the centralizer of the element
r 2 D8.
(c) Show that for every group G and every element a in G, C(a) is a subgroup of G.
(d) In general, which one is bigger, Z(G) and C(a)? Is one a subgroup of the other?
5. Consider the set H = { 2 S5 : (1) = 1 and (3) = 3}. (Recall that S5 consists of
bijective functions from {1, 2, 3, 4, 5} to {1, 2, 3, 4, 5}.)
(a) Show that H is a subgroup of S5.
(b) Show that H is isomorphic to S3.
6. Write down a an isomorphism from Z/2Z ⇥ Z/2Z to a subgroup of S4. You don’t need
to prove that the map you wrote is an isomorphism.
7. Let ↵ =

12345678
23451786 !
, =

12345678
13876524 !
.
(a) Compute ↵1, ↵
(b) Compute ↵, and ↵ as product of disjoint cycles
(c) Compute ↵ and as product of 2-cycles.
8. Find the order of the following permutations:
(a) (145)(2345) 2 S5.
(b) (154)(254)(1234) 2 S5.
(c) (1574)(324)(3256) 2 S7.
1
(d) : Z ! Z where (n) = n + 3, as an element of SZ, the group of bijective maps
Z ! Z with composition as the operation.
9. What is the maximum order of an element in each of the groups S4, S5, S6, S7, S8? Exhibit
such an element in each case.

The purpose of this project is to compare and contrast a significant work of historical architecture (before 1500 CE) and a significant modern or contemporary work of architecture in Los Angeles.

The purpose of this project is to compare and contrast a significant work of historical architecture (before 1500 CE) and a significant modern or contemporary work of architecture in Los Angeles.

The research paper will be 2000 words in length, plus diagrams, images and a list of works cited.

The Colosseum, Rome and the SoFi Stadium, Inglewood

  1. Exterior Photograph
  2. Interior Photograph
  3. Site Context
  4. Site Plan
  5. Plan
  6. Section
  7. Front Elevation
  8. Organization – axis, symmetry, module
  9. Circulation – approach, threshold, program and path
  10. Structure
  • Where appropriate all diagrams must have the following:
  • North Arrow
  • Scale
  • Scale Figure
  • Descriptive Caption and source

Read Goodman and Lilti, and summarize their key arguments and where they disagree. Find one primary source that you believe can say something important about this question. Provide all relevant details on the source – author, date, provenance (eg. a museum, a book, an archive) and explain why it is relevant to the discussion

Discussion 9 – Women and Enlightenment 46 46
Search entries or author
 Reply
Watch: Ridicule
https://drive.google.com/open?id=1uujMiitWTV4pow0xY4h2ux8kXx0mfSfd
(https://drive.google.com/open?id=1uujMiitWTV4pow0xY4h2ux8kXx0mfSfd)

Blog reading: Dena Goodman, “Enlightenment Salons: The Convergence of Female and
Philosophic Ambition” Eighteenth-Century Studies, Vol. 22, No. 3, Special Issue: The
French Revolution in Culture (Spring, 1989), pp. 329-350

(https://canvas.eee.uci.edu/courses/35456/files/13479461/download?download_frd=1)
Antoine Lilti, “The Kingdom of Politesse: Salons and the Republic of Letters in
Eighteenth Century Paris” Republics of Letters: A Journal for the Study of Knowledge,
Politics, and the Arts 1, no. 1 (2009): http://rofl.stanford.edu/node/38.
(https://canvas.eee.uci.edu/courses/35456/files/13479462/download?download_frd=1)

Blog question: Read Goodman and Lilti, and summarize their key arguments and where they
disagree. Find one primary source that you believe can say something important about this
question. Provide all relevant details on the source – author, date, provenance (eg. a museum,
a book, an archive) and explain why it is relevant to the discussion.

Include a link to the
text/image/object/musical piece if possible in your post. Comment on your classmate’s posts
and check that they’ve provided all the details needed for us to establish this is a primary
source that can offer evidence this historical question.
Background Reading: Carla Hesse, The Other Enlightenment: How French Women
Became Modern (Princeton UP, 2001) Ch 1.
(https://canvas.eee.uci.edu/courses/35456/files/13479463/download?download_frd=1)

A valid password consists of up to 7 characters and must contain one lowercase letter, at one uppercase letter, and one digit from 0-9. You are a security consultant for company XYZ. Your job is to assess the security of their password protected network. To enter their network, the user must pass the password checker.

Assembly assignment

A valid password consists of up to 7 characters and must contain one lowercase letter, at one uppercase letter, and one digit from 0-9. You are a security consultant for company XYZ. Your job is to assess the security of their password protected network. To enter their network, the user must pass the password checker. This is accomplished by calling a function and passing into the function a password string:

int check_password(char *passwd);

check_password returns a 7-digit integer of 0s and 1s to indicate which character was correct (0 to indicate a character was incorrect, 1 to indicate it is correct, and 2 to indicate it was not used). If the password entered is “aB2” and the passwd is “a11”, then check_password returns the integer 2222100. If passwd entered is “ab2”, then check_password returns the integer 2222101.

Your assignment is to write an assembly function “hack_password” that will find the secret password stored in “check_password” by iterating through all possible combinations of a-z, A-Z, and 0-9 according to password rule given above and calling the function check_password to determine when the return value is all 1’s and 2’s (e.g., 2211111, 1111111, 2222111, etc…). Note that the correct password decoder returns indicator that a character was not used as well. hack_password will print out the correct password.

You may write the main driver in C as follow:

int main()

{

hack_password();

return 0;

}

Create a high-level proposal for a compliance program for BallotOnline that enables the organization and its employees to conduct itself in a manner that is in compliance with legal and regulatory requirements. Management has asked you to model the proposal on existing compliance programs for other companies that have migrated to the cloud.

Create a Proposal for a Compliance Program
In previous steps, you have identified potential legal and compliance requirements that
BallotOnline may face in migrating to a cloud computing model. Now, you need to determine
how BallotOnline can comply with those requirements.
Create a high-level proposal for a compliance program for BallotOnline that enables the
organization and its employees to conduct itself in a manner that is in compliance with legal and
regulatory requirements. Management has asked you to model the proposal on existing
compliance programs for other companies that have migrated to the cloud.
Use the Proposal for Compliance Program template to record your work .
Length: 2 pages , Proposal for Compliance Program template

Write an essay analyzing the advantages and disadvantages of deficit spending and the effects of federal government borrowing on the economy i.e., the “crowding out” effect.

Assignment 1: Deficit Spending

During the Great Recession, like any other economic downturns, as unemployment rises, aggregate income declines causing a major decline in tax collections. On the other hand, with the rise in unemployment, spending on safety net programs rise. So, there are not too many good options available to resort the health of the national economy. It will be very difficult to defend cuts in the federal government programs and especially the programs geared to sustain the minimum of the standard of living for the recent “poor.” So, government needs to increase its borrowing. Deficit spending refers to government spending exceeding what it brings in federal income and corporate taxes during a certain period. Deficit spending hence increases government debt. Most economists accept that deficit spending is desirable and necessary as part of countercyclical fiscal policy. In such a case, government increases its borrowing and hence its deficit to compensate for the shortfall in aggregate demand. This is derived from Keynesian economics, and has been the mainstream economics view. Following John Maynard Keynes, many economists recommend deficit spending to moderate or end a recession, especially a severe one. When the economy has high unemployment, an increase in government purchases creates a market for business output, creating income and encouraging increases in consumer spending, which creates further increases in the demand for business output. (This is the multiplier effect). This raises the real gross domestic product (GDP) and the level of employment and lowers the unemployment rate. Government borrowing under such circumstances increases the demand for borrowing and thus pushes interest rates up. Rising interest rates can “crowd out” (discourage) fixed private investment spending, canceling out some of the demand stimulus arising from the deficit

Write an essay analyzing the advantages and disadvantages of deficit spending and the effects of federal government borrowing on the economy i.e., the “crowding out” effect.

Complete this essay in a Microsoft Word document, and in APA format. Note your submission will automatically be submitted through “TurnItIn” for plagiarism review. Please note that a minimum of 700 words for your essay is required.

Your paper should be structured as follows

  1. Cover page with a running head
  2. Introduction: What is deficit spending and how does it work.

2.1. Advantages

2.2. Disadvantages

  1. Crowding-out Effect
  2. Conclusions: Do you believe that deficit spending helps or hinders short-term and long-term economic growth?
  3. References

 

Morris, a Kent Jr, was a 16-year-old African American male in 1961 when he was charged with housebreaking, robbery, and rape. Read the assigned case, use the 7 steps “case brief template,” and discuss in the analysis section whether you think DMC had a role in how Kent was treated in the Juvenile Justice System.

Morris, a Kent Jr, was a 16-year-old African American male in 1961 when he was charged with housebreaking, robbery, and rape. Read the assigned case, use the 7 steps “case brief template,” and discuss in the analysis section whether you think DMC had a role in how Kent was treated in the Juvenile Justice System.