Artificial Intelligence ( Computer Science, Python) assignment Help

Artificial Intelligence ( Computer Science, Python) assignment Help

Homework 2 (10% of total course weight) – Multiagent Search

California State University San Bernardino, School of Computer Science and Engineering (CSE)

 

Date of Issue: February 24, 2020, Date of submissionMarch 10, 2021 – 11:59 pm (PST)

Module: CSE 5120 Introduction to Artificial Intelligence

Assessment brief: The code and resources provided in this homework are drawn from UC Berkeley which are part of their recent offering. Thanks, and credit to the authors (particularly Dan Klein, Pieter Abbeel, John DeNero, and others) at UC Berkeley for making these projects available to the public.

Pacman lives in a shiny blue world of twisting corridors and tasty round treats. Navigating this world efficiently will be Pacman’s first step in mastering his domain.

The code for this project consists of several Python files, some of which you will need to read and understand in order to complete the assignment, and some of which you can ignore. You can download all the code and supporting files as a zip folder from homework 2 link given on Blackboard (multiagent.zip).

Your homework is based on two parts as given below:

1. Code implemented for multiagent algorithms in given multiAgents.py file (in specific sections as indicated in detail below)

2. A brief report on what you did for each algorithm (i.e., how you implemented with screenshots from autograder script given in the folder)

 

File Name Description
multiAgents.py Where all of your multi-agent search agents will reside.
pacman.py The main file that runs Pacman games. This file describes a Pacman GameState type, which you use in this project.
game.py The logic behind how the Pacman world works. This file describes several supporting types like AgentState, Agent, Direction, and Grid.
util.py Useful data structures for implementing search algorithms.

 

After downloading the code, unzipping it, and changing to the directory, you should be able to play a game of Pacman by running the following command.

python pacman.py

pacman.py supports a number of options (e.g. –layout or -l). You can see the list of all options and their default values via python pacman.py -h.

You can use Spyder (installed through Anaconda from week 1 Thursday’s lecture) or other IDE for this work.

Files to Edit and Submit: You will need to edit and submit (multiAgents.py) file to implement your algorithms. Once you have completed the homework, you are welcome to run automated tests using an autograder.py given in the folder before you submit them for accuracy. You do not need to submit autograder.py file in your code submission but will need to test your algorithms with autograder.py to copy screenshots in your report. Please do not change the other files in this distribution or submit any of the original files other than these files.

 

Academic Dishonesty: Your code will be checked against other submissions in the class for logical redundancy. If you copy someone else’s code and submit it with minor changes, they will be detected easily, so please do not try that and submit your own work only. In case of cheating, the University’s academic policies on cheating and dishonesty will strictly apply which may result from the deduction in your grade to expulsion.

 

Getting Help: If you are having difficulty in implementing the algorithms from the pseudocodes provided in this homework, contact the course staff for help. Office hours and Slack are there for your support. If you are not able to attend office hours, then please inform your instructor to arrange for additional time. The intent is to make these projects rewarding and instructional, not frustrating and demoralizing. You can either complete this homework on your own or discuss the problem and collaborate with another member of the class (or different section). Please clearly acknowledge and mention your group member in your homework report submission who you will collaborate with in this homework. Your report and program (search.py file) will be separately submitted by yourself on Blackboard irrespective of your collaboration with your group member. Group discussions are encouraged but copying of programs is NOT recommended. Programming based on your own skills is encouraged.

 

Tasks for homework 2

 

1. Minimax search (3%)

Write an adversarial agent in the provided MinimaxAgent class in multiAgents.py. Your minimax agent should work with any number of ghosts, so your algorithm should be a more generalized version of the standard Minimax algorithm that we have studied in the class. Your minimax tree will have multiple min layers (one for each ghost) for each max layer. Your code should also be able to expand the tree to an arbitrary depth which can be accessed from self.depth and score your nodes with the supplied self.evaluationFunction. Make sure your Minimax program refers to these variables since these are populated in response to the command line options.

Important:  A single search ply is considered to be one Pacman move and all the ghosts’ responses, so depth 2 search will involve Pacman and each ghost moving two times. For further reading and understanding of Minimax (including alpha-beta pruning), please see this short video tutorial with pseudo code.

Hints and Observations

· Hint: Implement the algorithm recursively using helper function(s).

· The correct implementation of minimax will lead to Pacman losing the game in some tests. This is not a problem: as it is correct behavior, it will pass the tests.

· The evaluation function for the Pacman test in this part is implemented for you (self.evaluationFunction). You should not change this function but recognize that now we are evaluating states rather than actions, as compared to the reflex agent. Look-ahead agents evaluate future states whereas reflex agents evaluate actions from the current state.

· Pacman is always agent 0, and the agents move (take turns) in order of increasing agent index.

· All states in minimax should be GameStates, either passed in to getAction or generated via GameState.generateSuccessor. In this project, you will not be abstracting to simplified states.

Evaluation: Your code will be checked to determine whether it explores the correct number of game states. This is the only reliable way to detect some very subtle bugs in implementations of minimax. As a result, the autograder will be very picky about how many times you call GameState.generateSuccessor. If you call it any more or less than necessary, the autograder will complain. Please note that q1 relates to ReflexAgent which is not a part of this homework and can be skipped. We will start with q2 in this homework. To test and debug your code, run

python autograder.py -q q2

This will show what your algorithm does on a number of small trees, as well as a pacman game. To run it without graphics, use:

python autograder.py -q q2 –no-graphics

Figure 1: Pseudo-code for the implementation of Minimax algorithm. Please use this as a guide only. You will still need to carefully read multiAgents.py file for helper functions given in the comments and think/reason about the implementation of Minimax in Pacman scenario.

 

Figure 2: Pseudo-code for general-purpose implementation of Minimax algorithm. Please use this as a guide only. You will still need to carefully read multiAgents.py file for helper functions given in the comments and think/reason about the implementation of Minimax in Pacman scenario.

 

2. Alpha-beta pruning (2%)

write an adversarial agent in the provided AlphaBetaAgent class in multiAgents.py to more efficiently explore the minimax tree. Your agent should work with any number of ghosts, so your algorithm should be a generalized version of the standard Alpha-Beta Pruning algorithm. The AlphaBetaAgent minimax values should be identical to the MinimaxAgent minimax values, although the actions it selects can vary because of different tie-breaking behavior.

Note: The correct implementation of alpha-beta pruning will lead to Pacman losing some of the tests. This is not a problem: as it is correct behavior, it will pass the tests.

Evaluation: Your code will be checked to determine whether it explores the correct number of game states. Therefore, it is important that you perform alpha-beta pruning without reordering children. In other words, successor states should always be processed in the order returned by GameState.getLegalActions. Again, do not call GameState.generateSuccessor more than necessary. Additionally, in order to match the set of states explored by the autograder, you must not prune on equality: that is, stop generating children for a max (min) node only if a child’s value is strictly greater than (less than) β (α). To test and debug your code, run

python autograder.py -q q3

This will show what your algorithm does on a number of small trees, as well as a pacman game. To run it without graphics, use:

python autograder.py -q q3 –no-graphics

Figure 3: Pseudo-code for the implementation of the algorithm you should implement for this question. Please use this as a guide only. You will still need to carefully read multiAgents.py file for helper functions given in the comments and think/reason about the implementation of Minimax in Pacman scenario.

3. Expectimax Search (2%)

Implement the ExpectimaxAgent, which is useful for modeling probabilistic behavior of agents who may make suboptimal choices. As with the search and constraint satisfaction problems covered in CSE 5120, the impressive feature of this algorithm is its general applicability.

Note: The correct implementation of expectimax will lead to Pacman losing some of the tests. This is not a problem: as it is correct behavior, it will pass the tests.

 

Evaluation: You can debug your implementation on small the game trees using the command:

python autograder.py -q q4

Debugging on these small and manageable test cases is recommended and will help you to find bugs quickly. Once your algorithm is working on small trees, you can observe its success in Pacman. Random ghosts are not optimal minimax agents, and so modeling them with minimax search may not be appropriate. ExpectimaxAgent, does not take the min over all ghost actions, but the expectation according to the agent’s model of how the ghosts act. To simplify your code, assume you will only be running against an adversary which chooses amongst their getLegalActions uniformly at random (read about uniform distribution for further understanding). To see how the ExpectimaxAgent behaves in Pacman, run:

python pacman.py -p ExpectimaxAgent -l minimaxClassic -a depth=3

You should now observe a more cavalier approach in close quarters with ghosts. In particular, if Pacman perceives that he could be trapped but might escape to grab a few more pieces of food, he will at least try. Investigate the results of these two scenarios:

python pacman.py -p AlphaBetaAgent -l trappedClassic -a depth=3 -q -n 10

python pacman.py -p ExpectimaxAgent -l trappedClassic -a depth=3 -q -n 10

You should find that your ExpectimaxAgent wins about half the time, while your AlphaBetaAgent always loses. Make sure you understand why the behavior here differs from the minimax case.

4. Constraint satisfaction problems (3%)

1. (1.5%) Consider the problem of placing k knights on an n×n chess board such that no two knights are attacking each other, where k is given and k ≤ n2.

· Choose a CSP formulation. What are the variables in your formulation?

· What are the possible values of each variable in your formulation?

· What sets of variables are constrained, and how?

2. (1.5%) Class scheduling (items to answer are at the end in green font)

You are given a problem of class scheduling for the computer science department at CSUSB. The class timings are Tuesdays, Thursdays, and Fridays. There are 5 different classes on these given days and 3 professors who are qualified for teaching these classes.

Problem constraint: Each professor can teach only one class at a time.

Classes:

C1 – CSE 5120 Introduction to Artificial Intelligence: Time: 1:00 – 2:15pm

C2 – CSE 4600 Operating Systems: Time: 9:00 – 10:15am

C3 – CSE 4550 Software Engineering: Time: 10:30-11:45am

C4 – CSE 5720 Database Systems: Time: 10:30 – 11:45am

C5 – CSE 5160 Machine Learning: Time: 2:30 – 3:45pm

Professors:

Professor A: Qualified to teach Classes 1, 2, and 5.

Professor B: Qualified to teach Classes 3, 4, and 5.

Professor C: Qualified to teach Classes 1, 3, and 4.

1. Formulate this problem as a CSP where there is one variable per class, reporting the domains and constraints (e.g., for each class, the entry in the table should be <class number (e.g., C1)> <Domains (unary constraints)>). Also, list binary constraints on the classes . Your constraints should be specified formally which can be implicit rather than explicit

2. Draw the constraint graph for your problem in item 1

3. Make sure your CSP looks nearly tree-structure. Provide a one paragraph description of why the solution to CSP via tree structured CSPs is preferred. Review lecture slides and videos for help.

 

 

1

 

Homework 2 (10%)

 

 

 

 

 

CSE 5120 (Section ##) – Introduction to Artificial Intelligence – Spring 2021

 

 

 

 

 

 

Submitted to 

 

Department of Computer Science and Engineering California State University, San Bernardino, California

 

 

by

 

Student name (CSUSB ID)

(Your collaborator in this homework (if any))

 

 

 

 

 

Date: Month Day, Year

 

 

 

 

 

 

Email:

· Your email

· Your collaborator’s email (if you collaborated with any)

 

 

Report

Brief description of your work here acknowledging your collaboration with your class fellow (or a friend from other CSE 5120 section), and the capacity at which he/she collaborated with you, followed by the algorithms you implemented.

1. Minimax algorithm

Your brief explanation of the problem, your code solution, and any documentation with screenshots of your code Evaluation (results from autograder.py)

2. Alpha-beta pruning

Your brief explanation of the problem, your code solution, and any documentation with screenshots of your code Evaluation (results from autograder.py)

3. Expectimax Search

Your brief explanation of the problem, your code solution, and any documentation with screenshots of your code Evaluation (results from autograder.py)

4. Constraint satisfaction problems

Your explanation and drawings, wherever necessary, numbered according to how the questions are defined in the questions.

 

α-βImplementationdef min-value(state, α, β):initialize v = +∞for each successor of state:v = min(v, value(successor, α, β))if v ≤ αreturn vβ = min(β, v)return vdef max-value(state, α, β):initialize v = -∞for each successor of state:v = max(v, value(successor, α, β))ifv ≥ βreturn vα= max(α, v)return vα: MAX’s best option on path to rootβ:MIN’s best option on path to root

Minimax Implementationdef value(state):if the state is a terminal state: return the state’s utilityif the next agent is MAX: return max-value(state)if the next agent is MIN: return min-value(state)def min-value(state):initialize v = +∞for each successor of state:v = min(v, value(successor))return vdef max-value(state):initialize v = -∞for each successor of state:v = max(v, value(successor))return v

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Lab5 – Legal Regulations, Compliance, And Investigation

Lab5 – Legal Regulations, Compliance, And Investigation

35

 

Introduction

When consumers provide personal information for a product or service, the assumption is the

receiving company will exercise due diligence to protect their information. Bear in mind there is

no all-purpose federal law mandating personal data should be protected, only certain industry-

specific laws, for example, health care and financial. But even without an overarching mandate,

most companies will attempt to protect your personal data just to avoid a charge of negligence

should a privacy breach occur.

One nonprofit organization that monitors how well companies guard personal data—among

other missions—is the Electronic Frontier Foundation (EFF). EFF’s purpose is to defend free

speech, privacy, innovation, and consumer rights. This lab takes a look at a class-action lawsuit

filed by EFF.

In this lab, you will explain the privacy issues related to an EFF case study, you will identify

U.S. privacy law violations and their implications, and you will assess the impact of those

violations on consumer confidential information.

Learning Objectives

Upon completing this lab, you will be able to:

Explain the mission statement of the Electronic Frontier Foundation (EFF).

Relate privacy issues in the case study to any personal or individual laws in the United

States.

Identify U.S. citizen privacy law violations and their implications for privacy and

confidential information in the case study.

Assess the impact of these violations on consumers’ confidential information from a legal,

ethical, and information systems security perspective.

Lab #5 Case Study on Issues Related to Sharing Consumers’ Confidential Information

 

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

36 | LAB #5 Case Study on Issues Related to Sharing Consumers’ Confidential Information

 

Deliverables

Upon completion of this lab, you are required to provide the following deliverables to your

instructor:

1. Lab Report file; 2. Lab Assessments file.

Instructor Demo

The Instructor will present the instructions for this lab. This will start with a general discussion

about privacy law and how this is different from information systems security as well as how

they are related. The Instructor will then present an overview of the Electronic Frontier

Foundation (EFF) and the case study in this lab.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

37

 

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Student Lab Manual

 

 

Hands-On Steps

Note: This is a paper-based lab. To successfully complete the deliverables for this lab, you will need access to Microsoft® Word or another compatible word processor. For some labs, you may also need access to a graphics line drawing application, such as Visio or PowerPoint. Refer to the Preface of this manual for information on creating the lab deliverable files.

 

1. On your local computer, create the lab deliverable files.

2. Review the Lab Assessment Worksheet. You will find answers to these questions as you proceed through the lab steps.

3. Review the following case study on issues related to sharing consumers’ confidential information. Note that this information originated from the following Electronic Frontier

Foundation Web pages: https://www.eff.org/about, https://www.eff.org/cases/hepting, and

https://www.eff.org/nsa/hepting.

From the Internet to the iPod, technologies transform society and empower us as

speakers, citizens, creators, and consumers. When freedoms in the networked world come

under attack, the Electronic Frontier Foundation (EFF) is the first line of defense. EFF

broke new ground when it was founded in 1990—well before the Internet was on most

people’s radar—and continues to confront cutting-edge issues defending free speech,

privacy, innovation, and consumer rights today. From the beginning, EFF has

championed the public interest in every critical battle affecting digital rights.

Blending the expertise of lawyers, policy analysts, activists, and technologists, EFF

achieves significant victories on behalf of consumers and the general public. EFF fights

for freedom primarily in the courts, bringing and defending lawsuits even when that

means taking on the U.S. government or large corporations. By mobilizing more than

61,000 concerned citizens through the Action Center, EFF beats back bad legislation. In

addition to advising policymakers, EFF educates the press and public.

EFF is a donor-funded nonprofit and depends on support to continue successfully

defending digital rights. Litigation is particularly expensive. Because two-thirds of EFF’s

budget comes from individual donors, every contribution is critical to helping EFF

fight—and win—more cases (https://www.eff.org/about).

EFF Case Study Information

The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on

January 31, 2006, accusing the telecom giant of violating the law and the privacy of its

customers by collaborating with the National Security Agency (NSA) in its massive, illegal

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

38 | LAB #5 Case Study on Issues Related to Sharing Consumers’ Confidential Information

 

program to wiretap and data-mine Americans’ communications. In May 2006, many other

cases were filed against a variety of telecommunications companies. Subsequently, the

Multi-District Litigation Panel of the federal courts transferred approximately 40 cases to

the Northern District of California federal court.

In Hepting v. AT&T, EFF sued the telecommunications giant on behalf of its customers

for violating privacy law by collaborating with the NSA in the massive, illegal program

to wiretap and data-mine Americans’ communications. Evidence in the case includes

undisputed evidence provided by former AT&T telecommunications technician Mark

Klein showing AT&T routed copies of Internet traffic to a secret room in San Francisco

controlled by the NSA.

In June of 2009, a federal judge dismissed Hepting and dozens of other lawsuits against

telecoms, ruling that the companies had immunity from liability under the controversial

Foreign Intelligence Surveillance Act Amendments Act (FISAAA), which was enacted in

response to court victories in Hepting. Signed by President Bush in 2008, the FISAAA

allows the attorney general to require the dismissal of the lawsuits over the telecoms’

participation in the warrantless surveillance program if the government secretly certifies

to the court that the surveillance did not occur, was legal, or was authorized by the

president—certification that was filed in September of 2008.

Note: To read the full order from the federal judge who dismissed the many EFF lawsuits, the order is available here: http://www.eff.org/files/filenode/att/orderhepting6309_0.pdf.

 

EFF plans to appeal the decision to the 9th U.S. Circuit Court of Appeals, primarily

arguing that FISAAA is unconstitutional in granting to the president broad discretion to

block the courts from considering the core constitutional privacy claims of millions of

Americans (http://www.eff.org/cases/hepting; https://www.eff.org/nsa/hepting).

Note: Public proof regarding the case study came in June 2013 when British newspaper The Guardian first published news of massive electronic data collection by the NSA, a U.S. spy agency. Revelations from former NSA contractor and whistleblower Edward Snowden have detailed the extensiveness of data collection.

 

4. In your Lab Report file, describe the EFF’s mission statement.

5. In your Lab Report file, explain the privacy issues in the case study.

6. In your Lab Report file, identify the U.S. citizen privacy law violations in the case study and the implications those violations have on privacy and confidential information.

Note: This completes the lab. Close the Web browser, if you have not already done so.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

39

 

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Student Lab Manual

 

 

Evaluation Criteria and Rubrics

The following are the evaluation criteria for this lab that students must perform:

1. Explain the mission statement of the Electronic Frontier Foundation (EFF). – [25%] 2. Relate privacy issues in the case study to any personal or individual laws in the United

States. – [25%]

3. Identify U.S. citizen privacy law violations and their implications for privacy and confidential information in the case study. – [25%]

4. Assess the impact of these violations on consumers’ confidential information from a legal, ethical, and information systems security perspective. – [25%]

 

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

40 | LAB #5 Case Study on Issues Related to Sharing Consumers’ Confidential Information

 

Lab #5 – Assessment Worksheet

Case Study on Issues Related to Sharing Consumers’ Confidential Information

Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________

Overview

In this lab, you explained the privacy issues related to an EFF case study, you identified U.S.

privacy law violations and their implications, and you assessed the impact of those violations on

consumer confidential information.

Lab Assessment Questions & Answers

1. What is the Electronic Frontier Foundation’s mission statement?

 

2. Did the U.S. government violate the constitutional rights of U.S. citizens by ordering the NSA to review consumer confidential privacy information?

 

 

3. Why is the Hepting v. AT&T case crucial to the long-term posture of how the U.S. government can or cannot review consumer confidential information?

 

 

4. If Hepting v. AT&T results in “Big Brother” being allowed to eavesdrop and/or review the local and toll telephone dialing and bills of individuals, will U.S. citizens and consumers have any

privacy rights left regarding use of communication technologies?

 

 

5. What are the legal implications of consumer privacy information being shared?

 

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

41

 

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Student Lab Manual

 

 

6. What are the ethical implications of consumer privacy information being shared?

 

7. What are the information systems security implications of consumer information being shared?

 

8. What law allowed a federal judge to dismiss Hepting v. AT&T and other lawsuits against telecommunication service providers participating in the warrantless surveillance program

authorized by the president?

 

 

9. True or false: EFF claimed that the ruling set forth by FISAAA was unconstitutional.

 

 

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

Adjust your audio

This is a narrated slide show. Please adjust your audio so you can hear the lecture.

If you have problems hearing the narration on any slide show please let me know.

 

1

 

Chapter 1 The Information Systems Strategy Triangle

2

 

Kaiser Permanente (KP) Opening Case

What was KP’s business strategy in 2015?

On what were bonuses to doctors based under the “fix me” system?

What would the new idea be called instead of a “fix me” system?

What is the new basis for end-of-year bonuses?

What goal alignment has helped KP’s success?

What IS components are part of this?

Could only the IS components be changed to achieve their success?

Could only the strategy be changed to achieve their success?

© 2016 John Wiley & Sons, Inc.

3

To promote better health care at lower cost

Billings

Proactive health system

Improved health of patients

Alignment between business strategy, organizational design, and information systems strategy

Fast communication with patients outside of face-to-face appointments; automatic email reminders to patients for exercise or medications

No, the business strategy must be aligned with the IS, in addition to incentives

No, without the new incentives and new IS, employees would not wish to cooperate, nor would they be able to do so.

3

4

The Information Systems Strategy Triangle

These need to be balanced.

 

Business Strategy

Organizational Strategy

Information Strategy

© 2016 John Wiley & Sons, Inc.

4

 

What is a “Strategy?”

Coordinated set of actions to fulfill objectives, purposes, or goals

It sets limits on what the organization seeks to accomplish

Starts with a mission

Company Mission Statement
Zappos To provide the best customer service possible. Internally we call this our WOW philosophy.
Amazon We seek to be Earth’s most customer-centric company for three primary customer sets: consumer customers, seller customers and developer customers.
L.L. Bean Sell good merchandise at a reasonable profit, treat your customers like human beings and they will always come back for more.

© 2016 John Wiley & Sons, Inc.

5

What is a business strategy?

It is where a business seeks to go and how it expects to get there

It is not a business model, although it includes business models as one component of a business strategy

Business models include subscriptions, advertising, licenses, etc.

Business models do not include where the business seeks to go, and only the revenue portion of how it expects to get there

 

© 2016 John Wiley & Sons, Inc.

6

Generic Strategies Framework

Michael Porter: How businesses can build a competitive advantage

Three primary strategies for achieving competitive advantage:

Cost leadership – lowest-cost producer.

Differentiation – product is unique.

Focus – limited scope – can accomplish this via cost leadership or differentiation within the segment

7

© 2016 John Wiley & Sons, Inc.

7

 

Three Strategies for Achieving Competitive Advantage

Strategic Advantage
Strategic Target Uniqueness Perceived by Customer Low Cost Position
Industry Wide Differentiation Cost Leadership
Particular Segment Only Focus

© 2016 John Wiley & Sons, Inc.

8

Three Strategies for Achieving Competitive Advantage Examples

Strategic Advantage
Strategic Target Uniqueness Perceived by Customer Low Cost Position
Industry Wide Differentiation Cost Leadership
Particular Segment Only Focus

Apple

Wal-Mart

Marriott

Ritz Carlton

© 2016 John Wiley & Sons, Inc.

9

Dynamic Strategies

Beware of Hypercompetition

Can lead to a “red ocean” environment

Cutthroat competition – zero sum game

Every advantage is eroded—becoming a cost.

Sustaining an advantage can be a deadly distraction from creating new ones.

D’Avenis says: Goal of advantage should be disruption, not sustainability

Initiatives are achieved through series of small steps. Get new advantage before old one erodes.

Better to adopt a “blue ocean” strategy

Change the industry; create new segments/products

10

© 2016 John Wiley & Sons, Inc.

10

 

Creative Destruction

GE’s Approach under Jack Welch

Ask people to imagine how to destroy and grow your business

DYB: Imagine how competitors would want to destroy your business.

GYB: Counteract that by growing the business in some way to:

Reach new customers/markets

Better serve existing customers

© 2016 John Wiley & Sons, Inc.

11

Summary

Strategic Approach Key Idea Application to Information Systems
Porter’s generic strategies Firms achieve competitive advantage through cost leadership, differentiation, or focus. Understanding which strategy is chosen by a firm is critical to choosing IS to complement the strategy.
Dynamic environment strategies Speed, agility, and aggressive moves and countermoves by a firm create competitive advantage. The speed of change is too fast for manual response making IS critical to achieving business goals.

© 2016 John Wiley & Sons, Inc.

12

Organizational Strategy

What is organizational strategy?

Organizational design and

Choices about work processes

How do you manage organizational, control, and cultural variables?

Managerial Levers

13

© 2016 John Wiley & Sons, Inc.

13

 

14

Managerial Levers

© 2016 John Wiley & Sons, Inc.

14

 

IS Strategy

What is an IS Strategy? – The plan an organization uses in providing information services.

Four key IS infrastructure components

15

© 2016 John Wiley & Sons, Inc.

15

 

16

Information systems strategy matrix.

What Who Where
Hardware The physical devices of the system System users and managers Physical location of devices (cloud, datacenter, etc.)
Software The programs, applications, and utilities System users and managers The hardware it resides on and physical location of that hardware
Networking The way hardware is connected to other hardware, to the Internet and to other outside networks. System users and managers; company that provides the service Where the nodes, wires, and other transport media are
Data Bits of information stored in the system Owners of data; data administrators Where the information resides

© 2016 John Wiley & Sons, Inc.

16

 

What Who Where
Hardware Laptops, servers to store info and back up laptops Consultants have laptops, managed by the IS Dept. Laptops are mobile; servers are centralized
Software Office suite; collaboration tools Software is on consultants’ laptops but managed centrally Much resides on laptops; some only resides on servers
Networking Internet; hard wired connections in office; remote lines from home, satellite, or client offices ISP offers service; Internal IS group provides servers and access Global access is needed; Nodes are managed by ISPs
Data Work done for clients; personnel data Data owned by firm but made available to consultants as needed Resides on cloud and copies “pulled” into laptops as needed.

17

Illustration in a Consulting Firm

© 2016 John Wiley & Sons, Inc.

17

 

One IS Strategy: Social Strategy

Collaboration

Extend the reach of stakeholders to find and connect with one-another

Engagement

Involve stakeholders in the business via blogs; communities

Innovation

Identify, describe, prioritize new ideas

© 2016 John Wiley & Sons, Inc.

18

Summary

After you have listened to this lecture and read Chapter 1 of your text

Go to Discussion Board 2 and answer the discussion prompt

Finally complete Quiz 1

© 2016 John Wiley & Sons, Inc.

19

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Personal Reflection Assignment

Personal Reflection Assignment

Provide a reflection of at least 600 words (or 2 pages double spaced ) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

 

Requirements:

Provide a 600 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

 

Share a personal connection that identifies specific knowledge and theories from this course.

 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

 

You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

The assignment will be graded using the following criteria:

(Maximum # of Points Per Area)

Grammar/Spelling/Citation: Make sure all work is grammatically correct, spelling is 100% accurate, and cite all sources in-text/at the end of the paper where applicable.

 

Technical Connection: Make the paper relevant to the course and its connection with your current classwork. Discuss how what you have learned can be applied to your work or future work.

 

Word Count: The minimum word count is 600 words. 350-500 will receive 50% credit. Anything below will receive a minimum number of points.

 

Personal Connection – 4 Points: How does this course and the experiences you have been taught in BLCN-635 ONLY impact your personal work.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Project On Access 2013 Assignment Help

Project On Access 2013 Assignment Help

Access 2013 Chapter 3 Creating and Using Queries Last Updated: 2/27/15 Page 1

USING MICROSOFT ACCESS 2013 Independent Project 3-5

Independent Project 3-5 The State of New York Department of Motor Vehicles wants to create three queries. The first query provides summary data on the number of tickets by city and violation. The second query summarizes the total tickets by violation. The third query provides summary data for the total fines assessed against each driver who has had a ticket. To ensure consistency, the starting file is provided for you. Use Design view to create the summary queries. Edit the queries to add fields, aggregate functions, and sorting. Finally, save and run the queries.

Skills Covered in This Project  Create a summary query in Design view.

 Edit a query in Design view.

 Add fields to a query.

 Execute a query.

 Save a query.

 Sort query results.

 Add aggregate functions.

 

 

1. Open the NewYorkDMV-03.accdb start file.

2. The file will be renamed automatically to include your name. Change the project file name if

directed to do so by your instructor, and save it.

3. If needed, enable content in the security warning.

4. Create a new summary query in Design view. The

query counts the number of tickets issued by city

and violation.

a. Add the Ticket table into the Query

Design window.

b. Increase the size of the table object to

display all of the fields.

c. Add the following fields into the query: City,

PrimaryFactor, and TicketNumber.

d. Add the Total row to the query.

e. Group By the City and PrimaryFactor fields

and Count the TicketNumber field.

5. Save the query as

TicketCountByCityAndFactor.

6. Run the query. The datasheet should display

20 records.

7. Widen the field column widths to the Best Fit

(Figure 3-104).

8. Save the changes to the query.

9. Save a copy of the query as

TicketCountByFactor.

10. Edit the TicketCountByFactor query in Design

view. The query should show the total tickets

issued for each violation factor, sorted in

descending order by count.

a. Delete the City field.

b. Sort the TicketNumber field in

descending order.

11. Save and run the query. The datasheet should

match Figure 3-105.

Step 1

Download start file

 

 

 

Access 2013 Chapter 3 Creating and Using Queries Last Updated: 2/27/15 Page 2

USING MICROSOFT ACCESS 2013 Independent Project 3-5

12. Close the query.

13. Create a new summary query in Design view. The query provides summary data on the total fines

assessed against

each driver.

a. Add both tables into the Query

Design window.

b. Increase the size of the table

objects to display all of the fields.

c. Add the following fields into the

query: LicenseNumber,

FirstName, LastName, Fine, and

TicketNumber.

d. Add the Total row to the query.

e. Group By the LicenseNumber,

FirstName, and LastName fields,

Sum the Fine field and Count the

TicketNumber field.

f. Sort the Fine field in descending

order.

14. Save the query as TicketsByDriver.

15. Run the query. The datasheet should

display 21 drivers who have received

tickets, sorted in descending order

by the total dollar amount of their

fines (Figure 3-106).

16. Save and close the database.

17. Upload and save your project file.

18. Submit project for grading. Step 3

Grade my Project

Step 2

Upload & Save

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Python 3.6 Assignment

Python 3.6 Assignment

Hello,

Hope this email finds you well.

I have an important assignment worth 100% of my grade that I really need your help with. Kindly find below the set of questions:

Assignment
Answer all parts of the following question. Marks allocated to each part in square
brackets.
Data source for Questions 2 through 5 needs to be the same, and has to be mentioned at
the beginning of your report
1) Many people find it difficult to understand blockchain because it requires the
coordination of many components for it to function, and it’s hard to see the full picture
until all the individual components are fully understood. In brief, please explain the
following from a technological standpoint: What are the basics of interaction of
cryptography and economics? What is your fundamental understanding of blockchain
technology? [10]
2) What were the key events for Cryptocurrencies from January 31, 2018 till January 31,
2019? Create and present a graphical timeline with the key dates and the key events.
What was the reaction in Bitcoin trading (BTC) on these dates? Did the BTC price go up
or down? By how much? What was the mean return on key events dates? What was the
median return? What was the standard deviation? Plot the distribution of the daily
percentage change on key events dates. Create a variable that takes the value 0 on days
without key events and 1 on days with key events. Calculate the correlation matrix on key
events dates and non-key events dates between the behaviour of Bitcoin, Ethereum
(ETH), Ripple (XRP) and Nasdaq. Perform a regression analysis between the previous
variables and briefly comment on the results.
[25]
3) Create a function called assess_portfolio() that takes as input an asset allocation of a
cryptocurrency asset portfolio and computes important statistics about the portfolio. You
are given the following inputs for analysing a portfolio:
• A date range to select the historical data to use (specified by a start and end date).
You should consider performance from close of the start date to close of the end
date on a daily basis, if you choose intraday data then please use daily median
price.
• Symbols for each cryptocurrency asset (e.g., BTC, ETH, XRP, LTC).
• Portfolio allocations for each asset at the beginning of the simulation (e.g., 0.2,
0.3, 0.4, 0.1) which should sum to 1.0.
• Total starting value of the portfolio (e.g. $1,000,000)
Your goal is to create a programme to compute and visualise the daily portfolio value
over the given date range within a sample period from: February 15, 2017 to February 15,
2019, and then the following statistics for the overall portfolio:
• Cumulative return for the chosen date range from the sample period
• Plot the average period return (if sampling frequency == 252 trading days then
this is average daily return for the portfolio)
• Calculate the standard deviation of daily returns
• Calculate the annualised Sharpe ratio of the daily returns of the portfolio, given
daily risk-free rate (usually average of overnight LIBOR rate), and yearly
sampling frequency (usually 252 days, the number of trading days in a year)
• Plot the moving historical volatility with a minimum rolling period of 30 days
(i.e. moving historical standard deviation of the log returns)
• Ending value of the portfolio
Are these returns all positive? Or not? What is your explanation for what you observe?
[25]
4) Create an event study profile of a specific market event in the Cryptocurrency market,
and compare its impact on two relatively liquid cryptocurrencies. The event is defined as
when the daily median price / daily close price of the cryptocurrency is 10% lower than
the previous day. Evaluate this event for the time period: February 15, 2017 to February
15, 2019. Create and describe your own trading strategy based on the findings, to include
writing the code for your trading strategy and execution of the strategy with relevant
visual output in plots for this sample period. [20]
5) Now that you’ve got your trading strategy at hand, it’s a good idea to also backtest it and
optimise its performance. However, when you’re backtesting, it’s a good idea to keep in
mind that there are some pitfalls. For example, external events such as market regime
shifts, which are regulatory changes or macroeconomic events. Also, liquidity constraints,
could affect your backtesting heavily. Create your own ‘market event’ and experiment
with it using your trading strategy developed in the previous question for a
cryptocurrency portfolio. Consider answering these questions:
? Explain why the event chosen is a relevant ‘market event’ for cryptocurrency assets?
? Is it possible to make money using your event?
? If it is possible, what is your trading strategy? Think about details of entry (buy), exit
(sell) and how many days would you hold?
? Is this a risky strategy?
? How much do you expect to make on each trade?
? How many times do you expect to be able to act on this opportunity each year?
? Is there some way to reduce the risk? [20]
For questions 2, 3, 4 and 5, you will need to write code in Python 3.6 using Python functions, libraries
and classes. You will need to respect the good programming practices such as commenting your code
so that it is clear (to you and other programmers that might read it) as to what it attempts to execute.
Assessment Criteria
Your work will be assessed in terms of how well you have carried out the various parts of the
assignment, in terms of: appropriate understanding of key concepts / principles discussed in class
(programming code, functions, classes, commenting); correctness, clarity, completeness and
relevance of your interpretations and commentaries.
The marks assigned to each part of the assignment are given in square brackets at the end of each part.

Kindly reply to me the soonest if you could help me out.
you need to use   python 3.6

Many thanks

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

MatLab Program Project

MatLab Program Project

**Begin with typing in the Live Script:

format Comment by Wadlington, Julie: I do not see this at all. Just copy paste it in the code

format compact

 

syms x

F = @(x) atan(x) + x – 1

F1 = eval([‘@(x)’ char(diff(F(x)))])

 

G=@(x) x.^3-x-1

G1=eval([‘@(x)’ char(diff(G(x)))])

 

Notes: (1) a MATLAB command syms x defines a symbolic variable x;

(2) F and G are the function handles and F1 and G1 are the function handles for the first derivatives of F and G, respectively.

 

 

**Next, we create and output 2-D plots of the functions F, G, and y=0 on the interval [-2, 2] in order to visualize the x-intercepts and choose initial approximations. An initial value should be chosen close to the x-intercept which we are approximating. Comment by Wadlington, Julie: I see a graph I see F I do not see G, y=0 [-2,2]

**Type in the Live Script the code given below – it will output the graphs of F and G together with the function y=0 after you Run the section.

 

yzero=@(x) 0.*x.^(0)

x=linspace(-2,2); Comment by Wadlington, Julie: Copy past this code in after the top code

plot(x,F(x),x,yzero(x));

plot(x,G(x),x,yzero(x));

Note: here we have created another symbolic function yzero.

 

It is obvious from the properties of the function F(x) that it has only one real zero, which we will approximate. Concerning the function G, which is a polynomial of the third degree (we will denote it p), we are going to verify that it has only one real zero. In order to do that, we find all zeros of the polynomial p using MATLAB built-in functions sym2poly and roots: the function sym2poly(p) outputs the vector of the coefficients of the polynomial p (in descending order according to the degree), and the composition of two functions roots(sym2poly(p))outputs all zeros of the polynomial p. Comment by Wadlington, Julie: I don’t see this

**Type in the Live Script:

syms x

p=x^3-x-1;

roots(sym2poly(p))

 

After you Run Section, this part of the code will output the three zeros of the polynomial p – two of them are complex conjugate numbers and one is a real zero that we will approximate.

 

Next, we proceed with constructing a function in the file that approximates a real zero.

**Create a function called newtons. It begins with: Comment by Wadlington, Julie: Or this

function root=newtons(fun,dfun,x0)

format long

The inputs fun and dfun are the function and its first derivative, respectively, and x0 is the initial approximation. The output root will be our approximation of the real zero of a function. We will program consecutive iterations according to the Newton’s method, and we will assign to root the iteration which will be the first one falling within a margin of 10^(-12) from the MATLAB approximation x of that zero – the last is delivered by a built-in MATLAB function fzero. The details are below:

**Type the line

x=fzero(fun,x0) Comment by Wadlington, Julie: I do not see this

in your function newtons and output x with a message that it is a MATLAB approximation of the real zero of the function.

 

**Then, your function newtons will calculate consecutive iterations , using Newton’s Method (see Theory above). You can employ a “while loop” here. The loop will terminate when, for the first time, abs(-x)<10^(-12) for some consecutive iteration . Output with a corresponding message the number of iterations N, and assign the last iteration, , to the output root. This will be the end of your function newtons. Comment by Wadlington, Julie: Or this

 

**Print the function newtons in your Live Script.

**Next, proceed with the following tasks in the Live Script:

Part (a)

You will work with the function F in this part. Using the graph of the function F, choose three different values of the initial approximation x0 of the zero of F.

**Then, input the function handles:

fun=F;

dfun=F1;

and run the function root=newtons(fun,dfun,x0) for each of your three choices of x0 – one at a time.

 

Part (b)

You will work with the function G in this part.

**First, input the corresponding function handles.

**Then, run root=newtons(fun,dfun,x0) for each of the initial approximations (1)-(8) of the real zero of G:

(1) x0=1.3;

(2) x0=1;

(3) x0=0.6;

(4) x0=0.577351;

(5) Pick the initial value x0 to be the positive zero of the derivative of G(x). Type

x0=1/sqrt(3)

(display x0) and run the function root=newtons(fun,dfun,x0).

(6) x0=0.577;

(7) x0=0.4;

(8) x0=0.1;

 

 

1

 

0

x

,0:

n

xnN

=

N

x

N

x

N

x

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Payroll | Excel Chapter 2 ML1 Payroll Assignment Help 

Payroll | Excel Chapter 2 ML1 Payroll Assignment Help

Exp19_Excel_Ch02_ML1_Payroll | Excel Chapter 2 ML1 Payroll

 

Start Excel. Download and open the file named Exp19_Excel_Ch02_ML1_Payroll.xlsx. Grader has automatically added your last name to the beginning of the filename.

2  Use IF functions to calculate the regular pay and overtime pay based on a regular 40-hour workweek in cells E5 and F5. Pay overtime only for overtime hours. In cell G5, calculate the gross pay based on the regular and overtime pay. Abram’s regular pay is $398. With 8 overtime hours, Abram’s overtime pay is $119.40.

3.  Create a formula in cell H5 to calculate the taxable pay. Multiply the number of dependents (column B) by the deduction per dependent (B24) and subtract that from the gross pay. With two dependents, Abram’s taxable pay is $417.40.

4. Use a VLOOKUP function in cell I5 to identify and calculate the federal withholding tax. Use the tax rates from the range D21:E25. The VLOOKUP function returns the applicable tax rate, which you must then multiply by the taxable pay.

5. Calculate FICA in cell J5 based on gross pay and the FICA rate (cell B23), and calculate the net pay in cell K5. Copy all formulas down their respective columns to row 16.

6. With the range E5:K16 selected, use Quick Analysis tools to calculate the total regular pay, overtime pay, gross pay, taxable pay, withholding tax, FICA, and net pay on row 17.

Note, Mac users, with the range selected, on the Home tab, in the Editing group, click AutoSum.

7. Apply Accounting Number Format to the range C5:C16. Apply Accounting Number Format to the first row of monetary data and to the total row. Apply the Comma style to the monetary values for the other employees. Apply the Total cell styles format to the range E17:K17.

8. Insert appropriate functions to calculate the average, highest, and lowest values in the Summary Statistics area (the range I21:K23) of the worksheet. Format the # of hours calculations as Number format with one decimal and the remaining calculations with Accounting number format.

9. Insert a footer with your name on the left side, the sheet name code in the center, and the file name code on the right side of the worksheet.

10. Save and close the workbook. Submit the file as directed.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

Question 1
1. Main memory is called ____.

read only memory

random access memory

read and write memory

random read only memory

3 points
Question 2
1. The ____ is the brain of the computer and the single most expensive piece of hardware in your personal computer.

MM

ROM

RAM

CPU

3 points
Question 3
1. The ____ carries out all arithmetic and logical operations.

IR

ALU

CU

PC

3 points
Question 4
1. The ____ holds the instruction currently being executed.

CU

IR

PC

ALU

3 points
Question 5
1. When the power is switched off, everything in ____ is lost.

main memory

secondary storage

hard disks

floppy disks

3 points
Question 6
1. ____ programs perform a specific task.

Application

System

Operating

Service

3 points
Question 7
1. The ____ monitors the overall activity of the computer and provides services.

Central Processing Unit

operating system

arithmetic logic unit

control unit

3 points
Question 8
1. Which of the following is NOT an output device?

monitor

printer

CPU

secondary storage

3 points
Question 9
1. ____ represent information with a sequence of 0s and 1s.

Analog signals

Application programs

Digital signals

System programs

3 points
Question 10
1. A sequence of eight bits is called a ____.

binary digit

byte

character

double

3 points
Question 11
1. The digit 0 or 1 is called a binary digit, or ____.

bit

bytecode

Unicode

hexcode

3 points
Question 12
1. The term GB refers to ____.

giant byte

gigabyte

group byte

great byte

3 points
Question 13
1. ____ consists of 65,536 characters.

ASCII-8

ASCII

Unicode

EBCDIC

3 points
Question 14
1. A program called a(n) ____ translates instructions written in high-level languages into machine code.

assembler

decoder

compiler

linker

3 points
Question 15
1. A program called a(n) ____ combines the object program with the programs from libraries.

assembler

decoder

linker

compiler

3 points
Question 16
1. Consider the following C++ program.

#include <iostream>
using namespace std;

int main()
{
cout << “Hello World ”
return 0;
}

In the cout statement, the missing semicolon in the code above will be caught by the ____.

compiler

editor

assembler

control unit

3 points
Question 17
1. A program that loads an executable program into main memory is called a(n) ____.

compiler

loader

linker

assembler

3 points
Question 18
1. A step-by-step problem-solving process in which a solution is arrived at in a finite amount of time is called a(n) ____.

algorithm

linker

analysis

design

3 points
Question 19
1. To develop a program to solve a problem, you start by ____.

analyzing the problem

implementing the solution in C++

designing the algorithm

entering the solution into a computer system

3 points
Question 20
1. In C++, the mechanism that allows you to combine data and operations on the data into a single unit is called a(n) ____.

object

class

function

algorithm

3 points
Question 21
1. Which of the following is a legal identifier?

program!

program_1

1program

program 1

3 points
Question 22
1. All of the following are examples of integral data types EXCEPT ____.

int

char

double

short

3 points
Question 23
1. Which of the following is a valid char value?

-129

-128

128

129

3 points
Question 24
1. The value of the expression 17 % 7 is ____.

1

2

3

4

3 points
Question 25
1. The expression static_cast<int>(9.9) evaluates to ____.

9

10

9.9

9.0

3 points
Question 26
1. The length of the string “computer science” is ____.

14

15

16

18

3 points
Question 27
1. Suppose that count is an int variable and count = 1. After the statement count++; executes, the value of count is ____.

1

2

3

4

3 points
Question 28
1. Suppose that alpha and beta are int variables. The statement alpha = –beta; is equivalent to the statement(s) ____.

alpha = 1 – beta;

alpha = beta – 1;

beta = beta – 1;
alpha = beta;

alpha = beta;
beta = beta – 1;

3 points
Question 29
1. Suppose that alpha and beta are int variables. The statement alpha = beta++; is equivalent to the statement(s) ____.

alpha = 1 + beta;

alpha = alpha + beta;

alpha = beta;
beta = beta + 1;

beta = beta + 1;
alpha = beta;

3 points
Question 30
1. Suppose that alpha and beta are int variables. The statement alpha = ++beta; is equivalent to the statement(s) ____.

beta = beta + 1;
alpha = beta;

alpha = beta;
beta = beta + 1;

alpha = alpha + beta;

alpha = beta + 1;

3 points
Question 31
1. Choose the output of the following C++ statement:
cout << “Sunny ” << ‘\n’ << “Day ” << endl;

Sunny \nDay

Sunny \nDay endl

Sunny
Day

Sunny \n
Day

3 points
Question 32
1. Which of the following is the new line character?

\r

\n

\l

\b

3 points
Question 33
1. Consider the following code.

// Insertion Point 1

using namespace std;
const float PI = 3.14;

int main()
{
//Insertion Point 2

float r = 2.0;
float area;
area = PI * r * r;

cout << “Area = ” << area <<endl;
return 0;
}
// Insertion Point 3

In this code, where does the include statement belong?

Insertion Point 1

Insertion Point 2

Insertion Point 3

Anywhere in the program

3 points
Question 34
1. ____ are executable statements that inform the user what to do.

Variables

Prompt lines

Named constants

Expressions

3 points
Question 35
1. The declaration int a, b, c; is equivalent to which of the following?

inta , b, c;

int a,b,c;

int abc;

int a b c;

3 points
Question 36
1. Suppose that sum and num are int variables and sum = 5 and num = 10. After the statement sum += num executes, ____.

sum = 0

sum = 5

sum = 10

sum = 15

3 points
Question 37
1. Suppose that alpha is an int variable and ch is a char variable and the input is:

17 A

What are the values after the following statements execute?

cin >> alpha;
cin >> ch;

alpha = 17, ch = ‘ ‘

alpha = 1, ch = 7

alpha = 17, ch = ‘A’

alpha = 17, ch = ‘a’

3 points
Question 38
1. Suppose that x is an int variable, y is a double variable, z is an int variable, and the input is:

15 76.3 14

Choose the values after the following statement executes:

cin >> x >> y >> z;

x = 15, y = 76, z = 14

x = 15, y = 76, z = 0

x = 15, y = 76.3, z = 14

x = 15.0, y = 76.3, z = 14.0

3 points
Question 39
1. Suppose that x and y are int variables, ch is a char variable, and the input is:

4 2 A 12

Choose the values of x, y, and ch after the following statement executes:

cin >> x >> ch >> y;

x = 4, ch = 2, y = 12

x = 4, ch = A, y = 12

x = 4, ch = ‘ ‘, y = 2

This statement results in input failure

3 points
Question 40
1. Suppose that ch1, ch2, and ch3 are variables of the type char and the input is:

A B
C

Choose the value of ch3 after the following statement executes:

cin >> ch1 >> ch2 >> ch3;

‘A’

‘B’

‘C’

‘\n’

3 points
Question 41
1. Suppose that ch1 and ch2 are char variables, alpha is an int variable, and the input is:

A 18

What are the values after the following statement executes?

cin.get(ch1);
cin.get(ch2);
cin >> alpha;

ch1 = ‘A’, ch2 = ‘ ‘, alpha = 18

ch1 = ‘A’, ch2 = ‘1’, alpha = 8

ch1 = ‘A’, ch2 = ‘ ‘, alpha = 1

ch1 = ‘A’, ch2 = ‘\n’, alpha = 1

3 points
Question 42
1. Suppose that ch1, ch2, and ch3 are variables of the type char and the input is:

A B
C

What is the value of ch3 after the following statements execute?

cin.get(ch1);
cin.get(ch2);
cin.get(ch3);

‘A’

‘B’

‘C’

‘\n’

3 points
Question 43
1. When you want to process only partial data, you can use the stream function ____ to discard a portion of the input.

clear

skip

delete

ignore

3 points
Question 44
1. Suppose that alpha, beta, and gamma are int variables and the input is:

100 110 120
200 210 220
300 310 320

What is the value of gamma after the following statements execute?

cin >> alpha;
cin.ignore(100, ‘\n’);
cin >> beta;
cin.ignore(100,’\n’);
cin >> gamma;

100

200

300

320

3 points
Question 45
1. Suppose that ch1 and ch2 are char variables and the input is:

WXYZ

What is the value of ch2 after the following statements execute?

cin.get(ch1);
cin.putback(ch1);
cin >> ch2;

W

X

Y

Z

3 points
Question 46
1. Suppose that ch1 and ch2 are char variables and the input is:

WXYZ

What is the value of ch2 after the following statements execute?

cin >> ch1;
ch2 = cin.peek();
cin >> ch2;

W

X

Y

Z

3 points
Question 47
1. In C++, the dot is an operator called the ____ operator.

dot access

member access

data access

member

3 points
Question 48
1. Suppose that x = 25.67, y = 356.876, and z = 7623.9674. What is the output of the following statements?

cout << fixed << showpoint;
cout << setprecision(2);
cout << x << ‘ ‘ << y << ‘ ‘ << z << endl;

25.67 356.87 7623.96

25.67 356.87 7623.97

25.67 356.88 7623.97

25.67 356.876 7623.967

3 points
Question 49
1. Suppose that x = 1565.683, y = 85.78, and z = 123.982. What is the output of the following statements?
cout << fixed << showpoint;
cout << setprecision(3) << x << ‘ ‘;
cout << setprecision(4) << y << ‘ ‘ << setprecision(2) << z << endl;

1565.683 85.8000 123.98

1565.680 85.8000 123.98

1565.683 85.7800 123.98

1565.683 85.780 123.980

3 points
Question 50
1. What is the output of the following statements?
cout << setfill(‘*’);
cout << “12345678901234567890” << endl
cout << setw(5) << “18” << setw(7) << “Happy”
<< setw(8) << “Sleepy” << endl;

12345678901234567890
***18  Happy  Sleepy

12345678901234567890
***18**Happy**Sleepy

12345678901234567890
***18**Happy  Sleepy

12345678901234567890
***18**Happy  Sleepy**

3 points
Question 51
1. What is the output of the above statements?
cout << “123456789012345678901234567890” << endl
cout << setfill(‘#’) << setw(10) << “Mickey”
<< setfill(‘ ‘) << setw(10) << “Donald”
<< setfill(‘*’) << setw(10) << “Goofy” << endl;

123456789012345678901234567890
####Mickey    Donald*****Goofy

123456789012345678901234567890
####Mickey####Donald*****Goofy

123456789012345678901234567890
####Mickey####Donald#####Goofy

23456789012345678901234567890
****Mickey####Donald#####Goofy

3 points
Question 52
1. Consider the following program segment.
ifstream inFile;        //Line 1
int x, y;              //Line 2

…                    //Line 3
inFile >> x >> y;        //Line 4

Which of the following statements at Line 3 can be used to open the file progdata.dat and input data from this file into x and y at Line 4?

inFile.open(“progdata.dat”);

inFile(open,”progdata.dat”);

open.inFile(“progdata.dat”);

open(inFile,”progdata.dat”);

3 points
Question 53
1. In a ____ control structure, the computer executes particular statements depending on some condition(s).

looping

repetition

selection

sequence

3 points
Question 54
1. What does <= mean?

less than

greater than

less than or equal to

greater than or equal to

3 points
Question 55
1. Which of the following is a relational operator?

=

==

!

&&

3 points
Question 56
1. Which of the following is the “not equal to” relational operator?

!

|

!=

&

3 points
Question 57
1. Suppose x is 5 and y is 7. Choose the value of the following expression:

(x != 7) && (x <= y)

false

true

0

null

3 points
Question 58
1. The expression in an if statement is sometimes called a(n) ____.

selection statement

action statement

decision maker

action maker

3 points
Question 59
1. What is the output of the following C++ code?
int x = 35;
int y = 45;
int z;

if (x > y)
z = x + y;
else
z = y – x;

cout << x << ” ” << y << ” ” << z << endl;

35 45 80

35 45 10

35 45 –10

35 45 0

3 points
Question 60
1. When one control statement is located within another, it is said to be ____.

blocked

compound

nested

closed

3 points
Question 61
1. What is the output of the following code?

if (6 > 8)
{
cout << ” ** ” << endl ;
cout << “****” << endl;
}
else if (9 == 4)
cout << “***” << endl;
else
cout << “*” << endl;

*

**

***

****

3 points
Question 62
1. The conditional operator ?: takes ____ arguments.

two

three

four

five

3 points
Question 63
1. What is the value of x after the following statements execute?

int x;
x = (5 <= 3 && ‘A’ < ‘F’) ? 3 : 4

2

3

4

5

3 points
Question 64
1. Assume you have three int variables: x = 2, y = 6, and z. Choose the value of z in the following expression: z = (y / x > 0) ? x : y;.

2

3

4

6

3 points
Question 65
1. What is the output of the following code?

char lastInitial = ‘S’;

switch (lastInitial)
{
case ‘A’:
cout << “section 1” <<endl;
break;
case ‘B’:
cout << “section 2” <<endl;
break;
case ‘C’:
cout << “section 3” <<endl;
break;
case ‘D’:
cout << “section 4” <<endl;
break;
default:
cout << “section 5” <<endl;
}

section 2

section 3

section 4

section 5

3 points
Question 66
1. What is the output of the following code?

char lastInitial = ‘A’;

switch (lastInitial)
{
case ‘A’:
cout << “section 1” <<endl;
break;
case ‘B’:
cout << “section 2” <<endl;
break;
case ‘C’:
cout << “section 3” <<endl;
break;
case ‘D’:
cout << “section 4” <<endl;
break;
default:
cout << “section 5” <<endl;
}

section 1

section 2

section 3

section 5

3 points
Question 67
1. What is the output of the following code fragment if the input value is 4?
int num;
int alpha = 10;
cin >> num;
switch (num)
{
case 3:
alpha++;
break;
case 4:
case 6:
alpha = alpha + 3;
case 8:
alpha = alpha + 4;
break;
default:
alpha = alpha + 5;
}
cout << alpha << endl;

13

14

17

22

3 points
Question 68
1. What is the output of the following C++ code?
int x = 55;
int y = 5;

switch (x % 7)
{
case 0:
case 1:
y++;
case 2:
case 3:
y = y + 2;
case 4:
break;
case 5:
case 6:
y = y – 3;
}
cout << y << endl;

2

5

8

10

3 points
Question 69
1. A(n) ____-controlled while loop uses a bool variable to control the loop.

counter

sentinel

flag

EOF

3 points
Question 70
1. Consider the following code. (Assume that all variables are properly declared.)

cin >> ch;

while (cin)
{
cout << ch;
cin >> ch;
}

This code is an example of a(n) ____ loop.

sentinel-controlled

flag-controlled

EOF-controlled

counter-controlled

3 points
Question 71
1. What is the next Fibonacci number in the following sequence?

1, 1, 2, 3, 5, 8, 13, 21, …

34

43

56

273

3 points
Question 72
1. Which of the following is the initial statement in the following for loop? (Assume that all variables are properly declared.)

int i;
for (i = 1; i < 20; i++)
cout << “Hello World”;
cout << “!” << endl;

i = 1;

i < 20;

i++;

cout << “Hello World”;

3 points
Question 73
1. What is the output of the following C++ code?
int j;
for (j = 10; j <= 10; j++)
cout << j << ” “;
cout << j << endl;

10

10 10

10 11

11 11

3 points
Question 74
1. Suppose sum, num, and j are int variables, and the input is 4 7 12 9 -1. What is the output of the following code?

cin >> sum;
cin >> num;
for (j = 1; j <= 3; j++)
{
cin >> num;
sum = sum + num;
}
cout << sum << endl;

24

25

41

42

3 points
Question 75
1. Suppose j, sum, and num are int variables, and the input is 26 34 61 4 -1. What is the output of the code?

sum = 0;
cin >> num;
for (int j = 1; j <= 4; j++)
{
sum = sum + num;
cin >> num;
}
cout << sum << endl;

124

125

126

127

3 points
Question 76
1. Which executes first in a do…while loop?

statement

loop condition

initial statement

update statement

3 points
Question 77
1. What is the value of x after the following statements execute?

int x = 5;
int y = 30;

do
x = x * 2;
while (x < y);

5

10

20

40

3 points
Question 78
1. What is the output of the following loop?

count = 5;
cout << ‘St’;
do
{
cout << ‘o’;
count–;
}
while (count <= 5);

St

Sto

Stop

This is an infinite loop.

3 points
Question 79
1. Which of the following loops does not have an entry condition?

EOF-controlled while loop

sentinel-controlled while loop

do…while loop

for loop

3 points
Question 80
1. Which of the following is a repetition structure in C++?

if

switch

while…do

do…while

3 points
Question 81
1. Which of the following is true about a do…while loop?

The body of the loop is executed at least once.

The logical expression controlling the loop is evaluated before the loop is entered.

The body of the loop may not execute at all.

It cannot contain a break statement.

3 points
Question 82
1. Which of the following is not a function of the break statement?

To exit early from a loop

To skip the remainder of a switch structure

To eliminate the use of certain bool variables in a loop

To ignore certain values for variables and continue with the next iteration of a loop

3 points
Question 83
1. Which executes immediately after a continue statement in a while and do-while loop?

loop-continue test

update statement

loop condition

the body of the loop

3 points
Question 84
1. When a continue statement is executed in a ____, the update statement always executes.

while loop

for loop

switch structure

do…while loop

3 points
Question 85
1. The heading of the function is also called the ____.

title

function signature

function head

function header

3 points
Question 86
1. Given the following function prototype: int test(float, char); which of the following statements is valid?

cout << test(12, &);

cout << test(“12.0”, ‘&’);

int u = test(5.0, ‘*’);

cout << test(’12’, ‘&’);

3 points
Question 87
1. A variable or expression listed in a call to a function is called the ____.

formal parameter

actual parameter

data type

type of the function

3 points
Question 88
1. A variable listed in a function call is known as a(n) ____ parameter.  A variable list in a header is known as a(n) ____ parameter.

actual; actual

formal; formal

actual; formal

formal; actual

3 points
Question 89
1. What value is returned by the following return statement?
int x = 5;

return x + 1;

0

5

6

7

3 points
Question 90
1. Given the following function
int strange(int x, int y)
{
if (x > y)
return x + y;
else
return x – y;
}

what is the output of the following statement:?

cout << strange(4, 5) << endl;

-1

1

9

20

3 points
Question 91
1. Given the following function

int next(int x)
{
return (x + 1);
}

what is the output of the following statement?

cout << next(next(5)) << endl;

5

6

7

8

3 points
Question 92
1. Given the function prototype:

float test(int, int, int);

which of the following statements is legal?

cout << test(7, test(14, 23));

cout << test(test(7, 14), 23);

cout << test(14, 23);

cout << test(7, 14, 23);

3 points
Question 93
1. Given the following function prototype: double tryMe(double, double);, which of the following statements is valid? Assume that all variables are properly declared.

cin >> tryMe(x);

cout << tryMe(2.0, 3.0);

cout << tryMe(tryMe(double, double), double);

cout << tryMe(tryMe(float, float), float);

3 points
Question 94
1. Given the function prototype: double testAlpha(int u, char v, double t); which of the following statements is legal?

cout << testAlpha(5, ‘A’, 2);

cout << testAlpha( int 5, char ‘A’, int 2);

cout << testAlpha(‘5.0’, ‘A’, ‘2.0’);

cout << testAlpha(5.0, “65”, 2.0);

3 points
Question 95
1. Which of the following function prototypes is valid?

int funcTest(int x, int y, float z){}

funcTest(int x, int y, float){};

int funcTest(int, int y, float z)

int funcTest(int, int, float);

3 points
Question 96
1. Which of the following function prototypes is valid?

int funcExp(int x, float v);

funcExp(int x, float v){};

funcExp(void);

int funcExp(x);

3 points
Question 97
1. Given the following function prototype: int myFunc(int, int); which of the following statements is valid? Assume that all variables are properly declared.

cin >> myFunc(y);

cout << myFunc(myFunc(7, 8), 15);

cin >> myFunc(‘2’, ‘3’);

cout << myFunc(myFunc(7), 15);

3 points
Question 98
1. The statement: return 8, 10; returns the value ____.

8

10

18

80

3 points
Question 99
1. The statement: return 37, y, 2 * 3; returns the value ____.

2

3

y

6

3 points
Question 100
1. The statement: return 2 * 3 + 1, 1 + 5; returns the value ____.

2

3

6

7

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

FXT Task 1 , Turnitin Originality Checking Assignment Help

FXT Task 1 , Turnitin Originality Checking Assignment Help

FXT Task 1

University’s Disaster Recovery Plan(DRP)/Enterprise Continuity Plan (ECP)

 

 

Student name:

Lecturer:

Date:

 

 

1

 

Presentation Summary :

The Presentation is created for University DRP ( Disaster Recovery Plan) / ECP ( Enterprise Continuity Plan) and it includes different areas of coverage.

 

DRP/ECP members Roles

Six resilience layers

Type of training a DRP team will need

How university should choose outside expertise

Best method for developing awareness campaign

Best way for implementing the awareness campaign

Area to improve Resilience to Catastrophic Evens

Employee awareness Campaign

 

Presenter Notes:

 

 

2

 

What The Presentation Is About?

Below are several areas which will benefit the university to be prepared for emergency and catastrophic event by applying for a national security agency’s center of academic excellence

 

Areas covered:

Disaster Recovery and Emergency Continuity Plan personal roles.

Area to properly address resilience to operational disturbance

DRP/ECP training

Emergency plan to improve inputs by outside vendors.

Employee awareness training and their roles in DRP/ECP Plan

Best methods of implementing the awareness campaign

Presenter Notes:

 

 

3

 

Q1: Roles of DRP/ECP Members

TEAMS RESPONSIBLE ARE

Below Teams are responsible for the Role of DRP/ECP members.

Damage Assessment Team

Restoration Team

Operation Team

Customer Support Team

Salvage/Reclamation Team

Administrative Support Team

Emergency Management Team (EMT)

 

Presenter Notes:

 

 

4

 

Answer: Roles of DRP/ECP Members

Emergency Management Team (EMT) : Is responsible to coordinate with series of other teams in university and make sure all Emergency Team Members know their responsibilities

EMT Leader: Should communicate with Senior management to report status , Request for Decisions and problem resolution. EMT will have to declare Emergency , Coordinate EMT activities and contact University EMT Members. They will also be responsible to maintain documentations for DRP/ECP and keep them up to date. Once documentation is in place they will have to make a Plan of Action for all new emergency situations they have faced and was new.

Operations Team: Operations Manager notifies business Continuity Team (BCP) Leaders in university that Emergency has been declared. Operations Manager will have to communicate with university BCP team leaders to request/status reports to EMT, Co-ordinate all BCP team activities and handle personnel issues.

Communication Team: University Communication Manager will have to take responsibility for Media and external communications. Communication Team will also be responsible for internal communications. Security Team: Security Team will be responsible to maintain physical security of university and make sure the property is safe during the emergency.

 

 

Presenter Notes:

 

 

5

 

Answer: Roles of DRP/ECP Continued

IT Infrastructure Team: IT Infrastructure team will fall in to different other teams each of the team member will be responsible based on their roles.

 

Infrastructure Technical Support Team: Will be responsible to maintain all information stored in university systems. The must define operational procedures to create preparedness for an emergency and make sure all information in still in right and safe place during emergency. Technical Support team will also make sure backups are working properly and they have healthy restoration point. They must also make sure that there is an alternative recovery in case if disaster happens at university Datacenter.

Infrastructure IT Security Team: Will be responsible to make sure all information is accessed in secure environment and will coordinate with all other departments to maintain physical security and safe access to all important data during their operation.

Executive Management Team: Will be responsible to prepare and coordinate procedures and processes that all employees and vendors should use during Emergency.

Presenter Notes:

 

 

6

 

Answer: Roles of DRP/ECP Continued

Training Team: Will be responsible to provide awareness trainings to all employees on what do they need to do in Emergency situations and what will be their role within the DRP/ECP.

Presenter Notes:

 

 

7

 

Q2: Resilience Layers

Resilience layers will address all area and help prepare university for emergency and catastrophic events. The Six Resilience layers includes.

 

Strategy

Organization

Processes

Data/Applications

Technology

Facilities and Security

 

Strategy: The first resilience layer is strategy. The layer will help university accomplish their goals as an entity, the objective directing its operation and the standards it must abide by. This layer, the below components will assessed and examined.

Vulnerabilities

Risks

Competitive Edge

Baseline organizational culture

Example of Strategy: Unauthorized Student tried to hack and accessed university exam papers to pass the exam with better marks.

Presenter Notes:

 

 

8

 

Q2: Resilience Layers Continued

University immediately took action and created a strategic plan to implement its DRP/ECP as well as maintaining the baseline objective of continuing to secure data systems.

 

Organization: The second resilience layers deals with the structure of university. The role of DRP/ECP is generated in this layer, for example who will be responsible for managing personnel when there is emergency. The second example is who will be responsible to take control and manage data access during a catastrophic event and role’s responsibilities. Another example in this layer will be the rules that will govern communication during an emergency, for example how each member will communicate with other employees in university and what technologies will be used for these communications; and finally what skills are required to comply with DRP/ECP defined goals.

 

Processes: The third layer is important to continue operating during an emergency. For example all employees will need access to vital information during emergency and this layer will help us to create plans. The emergency team management will be generating processes for ECP/DRP. There will be a need for processes update to reflect changes or new information such as changing personnel links within a department.

Presenter Notes:

 

 

9

 

Q2: Resilience Layers Continued

In this layer alternative process is needed so if the primary process fails there is alternative processes in place. A good example can be if university Wide Area Network connection fails satellite communication can take over university primary W.A.N connection.

 

Data / Application: The fourth layer is to examine data and applications for university. This layer include things such as testing emergency solutions from the initial creation to the point of post deployment reviewing. DRCP/ECP plans such as using two types of data links to ensure connectivity. Determining fault tolerance, to what degree failures may occur before operation cease. Last is Providing reliable data to emergency and executive management team members to create a consensus in DRP/ECP program.

 

Technology: The fifth resilience layer is technology which addresses several points. First the university databases administration team will determine which hardware and software are critical to DRP/ECP. An example would be a server that must be constantly powered to provide access to the company’s database. The next thing to consider is alternative site which will help include site selection, preparation and arranging for maintenance. Once the plan is in place then emergency management team would identify single point of failure that could cause DRP/ECP.

 

 

Presenter Notes:

 

 

10

 

Q2: Resilience Layers Continued

Failures in this layer is both technical resources such a server to personnel such as a member of upper management needed to provide consents for emergency deployments. The other steps will be that Information Technology team members must evaluate and align I.T investments to the objective outlined within the DRP/ECP to optimize the use of financial resources. Technology with in the DRP/ECP must be flexible in providing more then one function or service helping to create failsafe solution. At last upper management and emergency team members should agree to standards of resiliency.

 

Physical Layer: The last layer is Physical layer where university will have to build a plan to secure all areas and limit access. Anyone entering university should have ID or should have permission to enter and in order to access company servers they should be authorized and have access permission. One other important concern is to ensure adequate heating/cooling as well as steady power source for equipment. Then a testing of all systems at the operating location is performed to ensure readiness. Keeping precautionary measures in mind such as arranging alternative backup power should with the DRP/ECP is started within documentation.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Presenter Notes:

 

 

11

 

Q2(a): Provide one example for each of the six resilience layers related to this enterprise.

Six resilience layers Example:

 

Strategy: The university is going to define protocols that will allow it to continue during the catastrophic event.

Organization: The university created roles for all personnel and defines the responsibilities of each role with in ERP/DRP program.

Rules that will govern emergency communication once ERP/DRP deploys is also defined.

 

Processes: the university defines processes within DRP/ECP and steps to consider when reflecting future conditions during the event.

 

Data/Application: The university provides data access stored on server rack through satellite communication. The university also design a secondary means of accessing the data if primary link is down.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Presenter Notes:

 

 

12

 

Q2(a): Provide one example for each of the six resilience layers related to this enterprise Continued.

Technology: The university defines technologies/equipment required during DRP/ECP. It then selects a recovery site for operations in case of failure according to DRP/ECP outline.

 

Physical Security: University limits the access permission physically when entering to site thru the control of gates and doors and restrict permission to access racked servers and also making sure cooling and heating system is on correct temperature.

 

Q3. Outline the type of training a DRP team will need.

The first step is to determine and evaluate skills that Information Technology department have which will help emergency team for the selection and roles to be assigned to each employee. The best way is going to take an online training through test engine which will save time rather then interviewing or taking tests on paper. There will be a testing score 300 to 1000. The personnel who score in the higher will then be given more prominent role with in the ECP/DRP.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Presenter Notes:

 

 

13

 

 

Q3. Outline the type of a typical DRP team will need continued.

IT databases team are trained for emergency steps to ensure safety, security and functionality or company servers. As the database are more important to university the training for database team completes through classes, training materials and hand on labs. All personnel receive training on ECP/DRP regarding infrastructure such as location of emergency. Personnel receive training when they are hired through live mentor or training application with animated examples. Later, once individual team assignment are complete, each person will train via online simulation software tailored to their team responsibilities.

 

Q4. Outline how the university should go about choosing outside expertise to assist with the development of a DRP.

There are chances where university may use outside expertise if Internal staffs are not capable to full fill ECP/DRP requirements.

A consultant that would create long lasting solution, act as a facilitator when needed, act to further university missions and help train personnel where appropriate.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Presenter Notes:

 

 

14

 

 

Q4. Outline how the university should go about choosing outside expertise to assist with the development of a DRP continued.

 

The outside vendors are experts and have experience to deal with such situations. They are familiar with the scope of DRP/ECP project from initial design to final implementation. Vendors will receive evaluation score during the phase of determination. Vendors with more experience in DRP/ECP are assigned. As a next step then the vendor is assigned based on cost estimates.

The university must be careful when choosing vendor and weigh cost benefits to return on investment with DRP/ECP. It should not exceed 10 percent of their select budget for DRP/ECP.

Qualification for outside vendor includes familiarity with complex databases, experience with database security and server environment, deploying systems during emergency events, experience with project budget and timeline and awareness campaign.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Presenter Notes:

 

 

15

 

 

Q5.Best method for developing a DRP/ECP awareness campaign.

 

The best method would be to collect, develop and use experience of all personnel to contribute to a rough DRP/ECP outline. This way the emergency response team will be able to develop strong DRP/ECP. Once the DRP/ECP is in place testing it thru real life simulations of the solution proposed. The tested solution that are successful when executed made a part of the final ECP/DRP.

 

Q5(a). Evaluate one best method for implementing a DRP/ECP awareness campaign.

 

Best method that will help all employees and students understand their role with DRP/ECP is fire drill where it will bring stark attention to the DRP/ECP plan by creating a situation in which every one should perform their roles learned via ECP/DRP training.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Presenter Notes:

 

 

16

 

 

References

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

17

 

Disaster Recovery / Business Continuity – Resilient Infrastructure. (n.d) Retrieved Jan 12, 2016 from

http://campconferences.com/events/2015/disaster.htm

Risk Management and Business Continuity: Improving Business Resiliency . (n.d) Retrieved Jan

12, 2016 from http://www.riskmanagementmonitor.com/risk -management-and-business-

continuity-improving-business-resiliency/

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!