Saving For Retirement

In this discussion, you will have an opportunity to make connections between your prior knowledge and the new content you are learning this week. Use your results from this week’s Build Your Proficiency Diagnostic to provide context for your prior knowledge and consider the new content about paying for college, repaying student loans, and planning and saving for retirement as you respond to the discussion prompt. Also, review the iGrad resources for content about paying for college and repaying loans.Respond to at least three of the following questions in a minimum of 175 words:Identify one concept from the Build Your Proficiency diagnostic from Chapters 10 and 11 that you scored lowest in. How might this concept be important to your personal finances? Why would you want to know more about this?Enter your information into this Retirement Income Calculator from Bankrate to estimate how much monthly income you may have during retirement (be sure to expand the “Investment returns” section to edit those fields as needed). Enter your current savings information or what you plan to do after graduation. What did the results show you about your retirement? What steps can you take to save and invest in your future now?In the Wk 4 Learning Path, complete Interactive Figure: How Risk Averse Are You? in WileyPLUS. What did the results showIn the Wk 4 Learning Path, complete Interactive Figure: Behavioral Biases and Retirement Planning in WileyPLUS. Which biases did you find influence your decisions?If you are using federal student loans to pay for college, what will your standard monthly payment be? If that amount is not affordable, what options are available to reduce or postpone payments?How might a college education affect your long-term financial plan? Consider future income and loan repayment in your response.

Read more

Journal Citations

Write a discussion post on following three topics. Each one should be in a separate file, each post should have 2 (scholarly) journal citations, min 300 words each, additional requirements also specified below:Discussion 1:Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.Identify one cryptographic attack and how you can protect against it.?Discussion 2):Excel is probably the most popular spreadsheet software for PCs. Why? What can we do with this package that makes it so attractive for modeling efforts?Discussion 3):What are the common business problems addressed by Big Data analytics? In the era of Big Data, are we about to witness the end of data warehousing? Why?Please make your posts substantive. A substantive post will do at least two of the following:· Ask an interesting, thoughtful question pertaining to the topic· Answer a question (in detail) posted by another student or the instructor· Provide extensive additional information on the topic· Explain, define, or analyze the topic in detail· Share an applicable personal experience· Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)· Make an argument concerning the topic.Run you submission through grammar check before submitting.At least 2 (scholarly) journal source should be used for each post.Make your references in correct APA 7 format and cite each reference at least once, but as many times as you rely on it. Citations support each sentence relying on a reference, not an entire paragraph. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations. Initial posts need to be 300 words minimum .

Read more

People with Special Needs

Examine IoT systems and how they may assist people with special needs. Special needs individuals is a broad term that could encompass a wide variety of individuals ranging from those who are deaf/hard of hearing, have vision issues, or have other different abilities that will affect how they use computing devices.Part A)You should begin by reading the work by Ferati et al. that discusses requirements gathering for users with special needs. For this first part of this assignment, you will take a position on the arguments made in this paper, and examine the following:What position does the paper take? What are some of the primary arguments they are making, and what reasons do they have for backing up these claims?Do you agree with the position taken in this paper? Use external sources to back up your argument.How could the paper be improved? How could you expand upon this work?This assignment will serve to help acclimate you to some of the challenges faced by special needs computing users.Part B)For the second part of this week’s assignment, you should propose a new way in which IoT devices can help a group of users with special needs. Your proposal should include:What group(s) of special needs users do you intend to target? Define the group(s) and the challenges encountered by the group(s).How will the IoT device assist this special needs group?Demonstrate a development plan. How will you accomplish your goals?What risks will you encounter, and how will you overcome them?How will you measure the effectiveness of this proposal?Be sure to include external references (at least 5) to support your proposal.Lengths: Position paper: 2-3 pages; New IoT proposal: 1-2 pages; Total: 3-5 pages, not including title page and referencesYour paper should demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards. Be sure to adhere to Northcentral University’s Academic Integrity Policy.

Read more

Commercial Databases

1. What is privacy?2. What risks, if any, does facial recognition software raise?3. How much information about you can be found on-line with a simple google search?4. How much information about you can be found by searching government and commercial databases?5. Describe informed consent.6. Should secondary use of consumer provided data be available without notice to the consumer?7. How do data mining and predictive analytics work?8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will?9. Should Facebook be regulated, at least as far as it’s privacy and data policies?10. How many public cameras is too many?

Read more

Desired Work Environment.

Practical Connection :Subject Name: Emerging Threats & Countermeasit is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own IT career.Assignment:Provide a reflection of (or 3 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.Requirements:Provide a (or 3 pages double spaced) minimum reflection.Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.Share a personal connection that identifies specific knowledge and theories from this course.Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).

Read more

Marketing Technology

Read the attached PDF article entitled, “How Blockchain Technology Can Benefit Marketing: Six Pending Areas Research Areas”After reading the article in full, select one of the mentioned six areas of research and write an article reflection minimum 8-9 maximum page paper identifying the following;1) Describe and provide the overall research area mentioned in the article in a synopsis2) What did the article state in how Blockchain can benefit that marketing area overall?3) What further research did the article recommend?4) What do you think can be the approach to further research the topic? What approach would you recommend to take and what type of research method would make sense?5) What is an example of a company that you believe would benefit from this type of research and why?6) Outside of Blockchain, what other pieces of marketing technology can help this area?7) What do you recommend is the best way to approach for a company to implement this area of research into their company?NOTE: for all the questions above, just pick one research area, and first part- give summary and stick to the same topic while answering all the 7 questions. Choose a company and relate that area to the company.

Read more

Branding Project

In this project, you will create a professional presence on LinkedIn (a professional social media network that is widely used by professionals and employers in most industries). If your profession or personal beliefs prevent you from establishing a LinkedIn site, ask about an alternative to building a live LinkedIn profile. As part of this project, you will conduct research into your present or desired industry, you will create a branding statement, and finally, create or revise an existing LinkedIn profile, using what you have learned about the industry and yourself.My desired Industry is Information TechnologyNow that you’ve analyzed the situation, you can start on your branding statement.Step 1: Engage in Analysis and ReflectionYou now know your assignment, but before you get started, take a few minutes to think about a strategy for success. Watch the See Yourself in a New Career Video for some inspiration and ideas.For background information, read Professional Use of Social Media and LinkedIn on the Using LinkedIn resource page.Are you seeking to advance in your current field? Are you changing fields? Where are you right now in your career? Where do you want to be? Will you be seeking a new position in your field or will you need to seek opportunities for getting experience in a new field? What are your goals and objectives? What particular positions do you want, and what is your time frame for obtaining them? For example, you might ask yourself “Why am I pursuing a graduate degree?”Next, answer the question: What’s the market like in the industry or field in which you’d like to apply your degree? Is the demand for employees increasing, decreasing, or remaining steady? Does the geographic region play a role? Does specialization within the field matter? Use the UMUC library to locate journal articles, books, and other sources that will enable you to identify information about your industry or field. You can refer to the Project 2 information on Business Research.Finally, you need to think about what’s competition like? Who are the other competitors seeking positions in this profession? Who are the primary competitors for employment and upward mobility in this field? Can you identify particular individuals who are your main competition (which will be the case if you are competing internally). How do you compare to these competitors? What do you need to do to become more competitive? Look at Competitor Analysis for some guidance on these issues.STEP 2See Branding Statements for some resources and tips to create your statement. Draft a personal branding statement of 200 words or less. Edit for clarity and conciseness. It should be error-free as the representation of you!STEP 3Next, you will create or revise a LinkedIn page.Now that you’ve analyzed the situation, you can start on your branding statement.

Read more

Mobile Application Development

To help you understand the design challenges and issues in mobile apps development.Topic of DiscussionOver the last ten years, mobile devices technology has changed significantly and becoming a necessity to human being. These developments have led to a huge variety of mobile applications to improve the quality of life. These mobile applications are typically harder to design and build because of several issues. Discuss TWO (2) issues in designing a mobile app with examples.Submission InstructionsPost your responses, examples, ideas, and discussions on this topic on the blackboard.You must write at least ONE original post and at least four respond commenting on the posts uploaded by your classmates.

Read more

Strategy and Technology

In Chapter 2 of ISMG (Module 1) you read about strategy and technology. In this module, in Chapters 9, 10 of ISMG, you learned that there are several enterprise systems / software. You also read about the concepts of cloud computing and open source software.For the “Discussion 2 Forum”, read the scenario below and answer the question:”Imagine that you are an IT / IS manager in an organization. Your organization is planning to implement a new ERP system. You have two options – a cloud based solution offered by a reputed vendor and an open source product used by many competitors. You are responsible for making the decision. Which one will you choose and why? Provide at least three specific reasons to justify your choice.”Support your answer with appropriate sources as needed.(Note: References will not be counted in the word count, you can use any format MLA / APA. See the supporting guide on how to add citations in Word document in Module 2 if needed).

Read more

The IP Address

Respond to the following in a minimum of 175 words:Research how to identify the IP address of your computer. After you have identified the IP address of your computer, share the URL of the resource that you found most useful in figuring out how to find your own IP address. What other details about your computer’s network connection, if any, did you learn while locating your device’s IP address? Note: If your computer is behind a firewall (which it may be if, for example, you’re using a computer at a public library or your place of work), your computer will be associated with two IP addresses: an internal IP address and an external, or public, IP address generated by the firewall.

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information