Free Essay

Cis 505

In:

Submitted By amaranth24
Words 1636
Pages 7
Select one (1) of the working groups in the IETF or IEEE and briefly summarize what this group is working on. “Working groups chartered by the IETF carry out the actual development of new standards and protocols for the Internet. Membership in a working group is voluntary; any interested party may participate. During the development of a specification, a working group will make a draft version of the document available as an Internet Draft, which is placed in the IETF's "Internet
Drafts" online directory. The document may remain as an Internet Draft for up to six months, and interested parties may review and comment on the draft. During that time, the IESG may approve publication of the draft as an RFC (Request for Comment). If the draft has not progressed to the status of an RFC during the six month period, it is withdrawn from the directory. The working group may subsequently publish a revised version of the draft.” (Stallings, p. B-5, 2009). “The IETF is responsible for publishing the RFCs, with approval of the IESG. The RFCs are the working notes of the Internet research and development community. A document in this series may be on essentially any topic related to computer communications and may be anything from a meeting report to the specification of a standard. The work of the IETF is divided into eight areas, each with an area director and each composed of numerous working groups.” (Stallings, p. B-5, 2009).
Justify the need of the IEEE 802 standard used in networking. “IEEE 802 is an Institute of Electrical and Electronics Engineers (IEEE) standard set that covers the physical and data link layers of the Open Systems Interconnection (OSI) model. It defines standards and protocols for wired local area networks (WLAN), metropolitan area networks (MAN) and wireless networks; defines characteristics, operating procedures, protocols and services for networks that carry variable sized packets and specifies the development and handling of compatible devices and equipment.” (Technopedia, 2014). “IEEE 802 subdivides the data link layer into sublayers, namely the logical link control (LLC) and media access control (MAC) layers, which provide protocol multiplexing and a multi-access mechanism, respectively. IEEE 802 is comprised of standards with separate working groups that regulate different communication networks, including IEEE 802.1, 802.3, 802.11 and 802.15.” (Technopedia, 2014).
Evaluate the three (3) standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology. “ISO is commonly known as ‘International Organization for Standardization’, the ISO 9001:2000 standard is used for quality systems audited by outside auditors. This standard is applicable for manufacturing companies not only for software. This standard is given based on the documentation, design, production, testing, servicing and other processes.” (Testing Excellence.com, 2009). “IEEE refers to ‘Institute of Electrical and Electronics Engineers’, which has members from many technical professional organizations around the world. IEEE 829 is the standard followed for software test documentation.” (Testing Excellence.com, 2009).

“The American National Standards Institute (ANSI) was founded in 1918 and is headquartered in Washington, D.C., with an operational office in New York City. Its mission is “to enhance both the global competitiveness of U.S. business and the U.S. quality of life by promoting and facilitating voluntary consensus standards and conformity assessment systems, and safeguarding their integrity.” (Bartleson, 2013). “The private, non-profit organization oversees the development of voluntary, consensus-developed standards. It is dedicated to strengthening the U.S. in the global marketplace while ensuring the health and safety of consumers and the environment. Its annual budget is a modest $22 million.” (Bartleson, 2013). “ANSI’s membership comprises companies, governmental agencies, academic institutions, international bodies, other organizations, and individuals. It represents the interests of more than 125,000 companies and 3.5 million professionals. Internationally, ANSI officially represents the U.S. standardization activities in ISO and IEC.” (Bartleson, 2013). “While ANSI doesn’t directly develop standards, it oversees and accredits the standards that come from approximately 200 standards-developing organizations, government agencies, companies, and other groups. ANSI approval of a standard helps ensure that the principles of openness, consensus, and due process were followed during its development. Standards from more than 180 standards publishers are available through the ANSI store.” (Bartleson, 2013). “There are currently around 10,000 American National Standards. They are dispersed throughout a wide variety of industries and services, touching just about every business sector. Areas such as construction, energy, and livestock production benefit from standards that come from ANSI-accredited organizations.” (Bartleson, 2013). “Most of the IEEE’s standards are accredited by ANSI. Additionally, there are many standards-developing organizations accredited by ANSI whose standards affect the electronics industry. These include the Consumer Electronics Association (CEA), Electronic Components Association (ECA), Association Connecting Electronics Industries (Institute for Interconnecting and Packaging Electronic Circuits - IPC), National Marine Electronics Association (NMEA), and Optics and Electro-Optics Standards Council (OEOSC/ASCOP).” (Bartleson, 2013). IEEE is the most important for communication technology as “IEEE Transactions on Communications focuses on all telecommunications including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space, and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory.” (IEEE Xplore, 2014).
Take a position on the need for a federal regulating body of standards such as NIST. Include supporting evidence to justify your opinion. I feel the need for a federal regulating body, such as the NIST is very important, especially in today’s world with mobile devices being indispensable and ubiquitous for business people and consumers. “Smart phones and tablet devices have specialized built-in hardware, such as cameras, accelerometers, Global Positioning System (GPS) receivers, and removable media readers. Furthermore, they employ a range of wireless interfaces, including Wireless Fidelity (Wi-Fi), Bluetooth, Near Field Communications (NFC), and one or more types of cellular interfaces that provide network connectivity across the globe. These devices can be used for sending and receiving email, browsing the web, online banking and commerce, social networking, storing and modifying documents, remotely accessing data, recording audio and video, and as navigation aids.” (NIST.gov, 2014). “Mobile devices, such as smart phones and tablets, typically need to support multiple security objectives: confidentiality, integrity, and availability. To achieve these objectives, mobile devices should be secured against a variety of threats. Like any new technology, smart phones present new capabilities, but also a number of new security challenges, including the need for secure and efficient cryptography suitable for power-constrained devices. Moreover, as the pace of the technology advancements continues to increase, our current Information Assurance standards and processes must be updated and new technologies developed to allow the continued use of Commercial Off-The-Shelf (COTS) products, allowing government users to access the latest technologies to meet their missions without sacrificing privacy and security.” (NIST.gov, 2014). “From the smart electric power grid and electronic health records to atomic clocks, advanced nanomaterials, and computer chips, innumerable products and services rely in some way on technology, measurement, and standards provided by the National Institute of Standards and Technology. Founded in 1901, NIST is a non-regulatory federal agency within the U.S. Department of Commerce. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life. NIST carries out its mission through the following programs:” (NIST.gov, 2014). • “The NIST Laboratories, conducting world-class research, often in close collaboration with industry, that advances the nation's technology infrastructure and helps U.S. companies continually improve products and services;” (NIST.gov, 2014). • “The Hollings Manufacturing Extension Partnership, a nationwide network of local centers offering technical and business assistance to smaller manufacturers to help them create and retain jobs, increase profits, and save time and money;” (NIST.gov, 2014). • “The Baldrige Performance Excellence Program, which promotes performance excellence among U.S. manufacturers, service companies, educational institutions, health care providers, and nonprofit organizations; conducts outreach programs; and manages the annual Malcolm Baldrige National Quality Award which recognizes performance excellence and quality achievement;” (NIST.gov, 2014). • “From 2007 to 2011, NIST provided cost-shared grants through the Technology Innovation Program, and between 1990 and 2007, it managed the Advanced Technology Program.” (NIST.gov, 2014). “NIST’s standards and guidelines must be sufficiently robust to protect the wide range of information and information systems supporting the critical missions and business functions of the federal government—from the Department of Homeland Security, to the
Federal Aviation Administration, to the Social Security Administration. As they are developed, NIST works collaboratively with Industry, often hosting workshops on specific areas, and putting the publications out for public comment to ensure industry, government, academia, and the public have the ability to engage in the process.” (NIST.gov, 2014).

References
Stallings, W. (2009). Appendix B: Standards Organizations. https://app.box.com/shared/9dtnzvwys8/1/15730219/164146343/1
Technopedia. (2014). IEEE 802. http://www.techopedia.com/definition/19935/ieee-802
Testing Excellence.com. (2009). What is SEI, CMM, CMMI, ISO, IEEE, ANSI? http://www.testingexcellence.com/what-is-sei-cmm-cmmi-iso-ieee-ansi/
Bartleson, K. (2013). 10 Standards Organizations That Affect You (Whether You Know It Or Not). http://electronicdesign.com/communications/10-standards-organizations-affect-you-whether-you-know-it-or-not
IEEE Xplore. (2014). Communications, IEEE Transactions on. http://ieeexplore.ieee.org/xpl/aboutJournal.jsp?punumber=26
NIST.gov. (2014). The Role of the National Institute of Standards and Technology in Mobile Security. http://csrc.nist.gov/documents/nist-mobile-security-report.pdf
NIST.gov. (2014). NIST General Information. http://www.nist.gov/public_affairs/general_information.cfm[pic][pic][pic][pic][pic]

Similar Documents

Premium Essay

Cis 505

...* Explain what you believe to be the most important difference between internal and external penetration tests. Imagine you are the manager of an information security program. Determine which you believe to be the most useful and justify your answer. Internal pen-testing takes a different approach -- one that simulates what an insider attack could accomplish. The target is typically the same as external pen-testing, but the major differentiator is the "attacker" either has some sort of authorized access or is starting from a point within the internal network. Insider attacks have the potential of being much more devastating than an external attack because insiders already have the knowledge of what's important within a network and where it's located, something that external attackers don't usually know from the start. As a manager, I have to keep in mind that, The goal of the pen-test is to access specific servers and crown jewels within the internal network by exploiting externally exposed servers, clients, and people. Whether it's an exploit against a vulnerable Web application or tricking a user into giving you his password over the phone, allowing access to the VPN, the end game is getting from the outside to the inside. An "external" penetration test will examine the various resources available from anyone outside the security perimeter (i.e., the firewall). This testing could include the web/email servers, dial-in, wireless and VPN access. The "internal" penetration...

Words: 444 - Pages: 2

Free Essay

Cis 505 Assignment 2

...Why the fifth point, “Meet information requirements of management”, is in the CIO’s list “Society is bombarded with data”( Scams & Fraud, 2012). Often so much information is received and as a result we feel overloaded! There's e-mail, web processing, instant messaging, voice mails, and a myriad of other means of communication that are constantly streamed to us daily. Dealing with the organization and management of information can be frustrating and make us want to pull our hair out, but nonetheless, it must be given serious attention. Businesses are driven by data, and the information derived from data is an extremely valuable asset in today's environment and most organizations are dependent on its availability and accuracy. The electronic age has brought new challenges in managing information that previously was non-existent prior to computers and the Internet. While technology has generated higher efficiency, access, and integrity with the newer ways to organize and manage information, it can be overwhelming. Managing data information has become a job in itself, yet it is an important one. In today's global economy, networks have created ways to rapidly transmit data. As a result managers must be able to obtain current data quickly in order to make informed and up to date decisions. This requires readily accessible information at their fingertips in order to analyze. Instantaneous recall information is often crucial, and in order to achieve this, efficient file management...

Words: 1390 - Pages: 6

Free Essay

Cis 505 Assignment 8

...Identify the DSL and cable modem services referenced in this assignment and the region(s) in which they operate. A digital subscriber line (DSL) and cable modems provide Internet access to residential users who reside in the servicing network area of the provider. Cable modems deliver Internet access by drawing information from the same coaxial cable that delivers information to their televisions. DSL modems provide Internet access by transmitting digital data over copper wires in telephone lines. Both DSL and cable modems have advantages that proceeds one another, in particular because of the varying technology used in each. I reside in Trussville, AL, which is a suburb of Birmingham, Alabama. In 2010, Trussville’s population grew beyond its neighboring cities. Alongside the population growth came businesses, school, and network technology services. The residents of the city can choose from many different providers, because many providers developed services in the area they noticed the population growth. Both cable and SL services are available depending upon the provider’s services. The majority of the residents are motivated by prices; rather than technology. Many service providers promote bundle services to grasp the attention of the targeted audience, which in this area are working middle class families. Charter Communications and AT&T are amongst the top ranked in Trussville, because of the quality, speed, and affordability. Create a diagram of the DSL and cable...

Words: 489 - Pages: 2

Free Essay

Cis 505 Case Study 3

...CIS 505 Case study 3 week 7 Carlson Companies Prof Name Matthew Anyanwu Student name Sajid Mehmood Date 08/16/2015 Carlson Companies * Assess how the Carlson SAN approach would be implemented in today’s environment. In the same way as other IT staff confronted with exponential stockpiling development, Norman Owens understood a couple of years back that his organization was set out toward a test on the off chance that it didn't begin uniting its stockpiling assets onto a stockpiling territory system (SAN). Owens, a stockpiling system designer and expert with Carlson Companies, addresses a crowd of people of his associates at Storage Decisions 2003 as of late about his organization's merging endeavors. (While not so much a commonly recognized name, Carlson Companies is a global vicinity behind such understood retail and lodging networks as TGI Friday's and Radisson inns and resorts. Before solidifying onto a SAN, Owens' imparted administrations gathering upheld an arrangement to one centralized computer and 26 servers, where the greater part of the servers were working diligently supporting the organization's Oracle Financials database under HP/UX. This course of action took care of 14TB of information, more than 54 SCSI and 8 ESCON associations. "It resembled a point-to-point SCSI arrangement," Owens said, noticing, "There were a ton of links." When they required more stockpiling, "We'd simply go purchase another casing. After the organization requested that his gathering...

Words: 1555 - Pages: 7

Free Essay

Cis 505 Wk 9 Assignment 5 Wireless Technology

...CIS 505 WK 9 ASSIGNMENT 5 WIRELESS TECHNOLOGY To purchase this visit here: http://www.activitymode.com/product/cis-505-wk-9-assignment-5-wireless-technology/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 505 WK 9 ASSIGNMENT 5 WIRELESS TECHNOLOGY CIS 505 WK 9 Assignment 5 - Wireless Technology There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the pros and cons 3G and 4G technologies and its role in today’s applications. Write a three to four (3-4) page paper in which you: 1.Compare the pros and cons of 3G and 4G technology to determine the best uses of 3G and 4G technology in today’s applications. 2.Describe how an enterprise would use 3G, 4G, WWAN, and WIAMX to improve business. Explain why they would use one (1) solution over the remaining three (3). 3.Analyze the changes in 4G technology since the printing of the textbook in 2009 and identify those of importance for a user of 4G technology. 4.Take a position on the following statement, “Wireless application protocol is a necessity for wireless communication organizations and their users.” Then, explain your position with supporting evidence. 5.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times New...

Words: 1006 - Pages: 5

Premium Essay

Cis 505 Wk 3 Assignment 2 Requirements for the Corporate

...CIS 505 WK 3 ASSIGNMENT 2 REQUIREMENTS FOR THE CORPORATE To purchase this visit here: http://www.activitymode.com/product/cis-505-wk-3-assignment-2-requirements-for-the-corporate/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 505 WK 3 ASSIGNMENT 2 REQUIREMENTS FOR THE CORPORATE CIS 505 WK 3 Assignment 2 - Requirements for the Corporate Computing Function Your new corporate CIO has devised a nine-point mission statement for the company. As one of the operations managers in the department, you have received a memo on the new policy and an associated task. The CIO wants to address the new strategy in a three-phase rollout plan and wants your feedback on LAN and MAN technology. Refer to Table 3.1 in Chapter 3 of the textbook for the nine points of the mission statement. Write a three to four (3-4) page paper in which you: 1.From Table 3.1, speculate why the fifth point, “Meet information requirements of management”, is in the CIO’s list of nine (9) points. 2.Imagine only three (3) points are to be rolled out in the first phase. Evaluate each point to determine the most important three (3) for the initial rollout phase. 3.Recommend one (1) additional point the CIO should include in order to ensure the topic of security is addressed in the mission statement. Explain your rationale for the inclusion. 4.Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these...

Words: 725 - Pages: 3

Premium Essay

Director

...he problem with Compaq is that they developed too much IT architecture using financial advisory, where R&D and openness keys to development and the culture, while ignoring the environment. Open communication and trust was barricaded and destroyed by ASK (financial IS). The workers were being motivated by fear, much like Geneen in Morgan’s Images Of Organization. From an IT architecture standpoint, numbers based on the finance division depicted the entire company, even the organizational structure. The organizational structure did not align with the IT architecture, and the culture did not align with it either. Morgan stated, “The division of labor characteristic of industrial societies creates a problem of integration, or what may be more accurately described as a problem of integration, or what may be more accurately described as a problem of “cultural management.”” Compaq started as a functional structure, changed into a divisional fairly soon and then back to functional. Culture was strongly emphasized over anything else. CASH stated, “The process encompassed a whole range of ideas, including (1) the rule of inclusion, (2) teamwork, (3) “working the issue,” and (4) consensus building.” The IS system at Compaq did allow the free-flow of information through email named “B-mail.” ASK was used for financial services so that the company could easily track orders, and know where it stood financially. The culture felt monitored by ASK operators since it “becomes responsible for...

Words: 5841 - Pages: 24

Premium Essay

Cis 505 Wk 2 Assignment 1 Standards Research

...CIS 505 WK 2 ASSIGNMENT 1 STANDARDS RESEARCH To purchase this visit here: http://www.activitymode.com/product/cis-505-wk-2-assignment-1-standards-research/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 505 WK 2 ASSIGNMENT 1 STANDARDS RESEARCH CIS 505 WK 2 Assignment 1 - Standards Research The following Website may be used for reference to complete this assignment. The Website represents an electronic document titled “Standards Organizations” written by William Stallings (2009), located at http://www.box.net/shared/9dtnzvwys8/1/15730219/164146343/1. Write a three to four (3-4) page paper in which you: 1.Select one (1) of the working groups in the IETF or IEEE and briefly summarize what this group is working on. 2.Justify the need of the IEEE 802 standard used in networking. 3.Evaluate the three (3) standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology. 4.Take a position on the need for a federal regulating body of standards such as NIST. Include supporting evidence to justify your opinion. 5.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Course Home Work aims to provide quality study notes and tutorials to the students of CIS 505 WK 2 Assignment 1 Standards Research in order to ace their studies. CIS 505 WK 2 ASSIGNMENT 1 STANDARDS RESEARCH To purchase this visit here: http://www.activitymode.com/product/cis-505-wk-2-assignment-1-standards-research/ ...

Words: 682 - Pages: 3

Premium Essay

Cis 505 Wk 5 Assignment 3 Elastic and Inelastic Traffic

...CIS 505 WK 5 ASSIGNMENT 3 ELASTIC AND INELASTIC TRAFFIC To purchase this visit here: http://www.activitymode.com/product/cis-505-wk-5-assignment-3-elastic-and-inelastic-traffic/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 505 WK 5 ASSIGNMENT 3 ELASTIC AND INELASTIC TRAFFIC CIS 505 WK 5 Assignment 3 - Elastic and Inelastic Traffic Write a three to four (3-4) page paper in which you: 1.Outline a plan for the development of an addressing and naming model in an environment of the following scenario: 1. Ten (10) departments in a 1,000-employee organization 2. Equal separation by geography 3. Use a common data center of twenty (20) backend enterprise servers 2.Analyze the functional problems of throughput, delay, and packet loss as it pertains to your plan. 3.Analyze and explain how you would use DNS in your plan. 4.Compose a two-paragraph executive summary highlighting the main points of your plan. 5.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the...

Words: 577 - Pages: 3

Free Essay

Cis 505 Wk 8 Assignment 4 Services in Your Area

...CIS 505 WK 8 ASSIGNMENT 4 SERVICES IN YOUR AREA To purchase this visit here: http://www.activitymode.com/product/cis-505-wk-8-assignment-4-services-in-your-area/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 505 WK 8 ASSIGNMENT 4 SERVICES IN YOUR AREA CIS 505 WK 8 Assignment 4 - Services in Your Area Research DSL and cable modem services available closest to your community. You may use neighboring communities or regions if your community does not have access to DSL or cable modem services. Researched material must be focused on the technical aspects of DSL and cable modem services. Marketed documents, white papers, or other advertisements may not be used for the completion of this assignment. Write a three to four (3-4) page paper in which you: 1.Identify the DSL and cable modem services referenced in this assignment and the region(s) in which they operate. 2.Create a diagram of the DSL and Cable Modem connections to your ISP, cable organization, and telecom to your home router using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length. 3.Compare and evaluate the speeds of DSL and cable modem that you researched. 4.Compare and evaluate the cost of DSL and cable modem that you researched. 5.Compare and evaluate the reliability of DSL and cable modem that you researched. 6.Recommend DSL or cable modem based on the previous comparison and evaluation of services available closest to your...

Words: 829 - Pages: 4

Free Essay

Bis 155 Complete Course (Dqs - Quizes - Labs & Course Project) Devry

...Strayer, BUS 475 Complete Course, BUS 475 Complete Class, BUS 475 Entire Course BUS 475 Entire Class, Strayer BUS 475 , BUS 475 New Course, BUS 475 All Assignments, BUS 475 All Dqs, BUS 475 ExerCises, BUS 475 Final, BUS 475 Week 1, BUS 475 Week 2, BUS 475 Week 3, BUS 475 Week 4, BUS 475 Week 5, BUS 475 Week 1-5, BUS 475 mcqs, BUS 475 , BUS 475 Strayer, BUSN 319 Complete Course, BUSN 319 Complete Class, BUSN 319 Entire Course, BUSN 319 Entire Class, BUSN 319, BUSN 319 New Course, BUSN 319 All Assignments, BUSN 319 All Dqs, BUSN 319 ExerCises, BUSN 319 Final, BUSN 319 Week 1, BUSN 319 Week 2, BUSN 319 Week 3, BUSN 319 Week 4, BUSN 319 Week 5, BUSN 319 Week 1-5, BUSN 319, BUSN 319, BUSN 319 Devry, CIS 246 Complete Course, CIS 246 Complete Class,...

Words: 1473 - Pages: 6

Premium Essay

Paper Uva Finance

...GET FILE='\\soliscom.uu.nl \uu\Users\3530647 \1\Capm spss.sav '. DATASET NAME DataSet1 WINDOW=FRONT. NEW FILE. DATASET NAME DataSet2 WINDOW=FRONT. REGRESSION /DESCRIPTIVES MEAN STDDEV CORR SIG N /MISSING LISTWISE /STATISTICS COEFF OUTS CI(95) R ANOVA /CRITERIA =PIN(.05) POUT(.10) /NOORIGIN /DEPENDENT mcdonaldrp /METHOD=ENTER sp500rp /RESIDUALS DURBIN /SAVE RESID. Regression [DataSet2] Descriptive Statistics Mean Std. Deviation N mcdonaldrp -,0017 ,01145 502 sp500rp -,0027 ,00840 502 Correlations mcdonaldrp Pearson Correlation sp500rp 1,000 ,495 ,495 1,000 . ,000 mcdonaldrp sp500rp Sig. (1-tailed) mcdonaldrp sp500rp ,000 . mcdonaldrp 502 502 sp500rp N 502 502 Variables Entered/Removeda Model 1 Variables Entered Variables Removed b sp500rp Method . Enter a. Dependent Variable: mcdonaldrp b. All requested variables entered. Page 1 b. All requested variables entered. Model Summaryb R Model 1 Adjusted R Square R Square a ,495 ,245 Std. Error of the Estimate ,243 Durbin-Watson ,00996 2,049 a. Predictors: (Constant), sp500rp b. Dependent Variable: mcdonaldrp ANOVAa Sum of Squares Model 1 df Mean Square Regression ,016 1 ,016 Residual ,050 500 ,066 Sig. ,000b ,000 Total F 501 162,223 a. Dependent Variable: mcdonaldrp b. Predictors:...

Words: 1277 - Pages: 6

Premium Essay

Get Online Help with Ur Assignment Ashford a+Material

...http://homeworktimes.com/downloads/acc-202-complete-course-acc-202-entire-course/ http://homeworktimes.com/downloads/acc-206-entire-course-new/ http://homeworktimes.com/downloads/acc-206-new-week-1-assignment-chapter-one-problems/ http://homeworktimes.com/downloads/acc-206-new-week-2-assignment-chapter-two-three-problems/ http://homeworktimes.com/downloads/acc-206-new-week-2-journal-institute-management-accounting/ http://homeworktimes.com/downloads/acc-206-new-week-3-assignment-chapter-four-five-problems/ http://homeworktimes.com/downloads/acc-206-new-week-3-journal-hershey-company/ http://homeworktimes.com/downloads/acc-206-new-week-4-assignment-chapter-six-seven-problems/ http://homeworktimes.com/downloads/acc-206-new-week-5-assignment-chapter-eight-problems/ http://homeworktimes.com/downloads/acc-206-new-week-5-assignment-final-paper/ http://homeworktimes.com/downloads/acc-212-financial-accounting/ http://homeworktimes.com/downloads/acc-250-complete-course-acc-205-entire-course/ http://homeworktimes.com/downloads/acc-290-complete-course-acc-290-entire-course/ http://homeworktimes.com/downloads/acc-291-complete-course-acc-290-entire-course/ http://homeworktimes.com/downloads/acc-340-entire-course-acc-340-complete-course/ http://homeworktimes.com/downloads/acc-400-complete-course-acc-400-entire-course/ http://homeworktimes.com/downloads/acc-407-entire-course/ http://homeworktimes.com/downloads/acc-455-complete-course/ http://homeworktimes.com/downl...

Words: 3197 - Pages: 13

Premium Essay

Requirements for the Corporate Computing Function

...Assignment 2: Requirements for the Corporate Computing Function Student Name Dr Abdel Ismail CIS 505: Communication Technologies April 28, 2013 Meeting the Information Requirements of Management From the Requirements for the Corporate Computing Function, the fifth computing facility fulfillment point reads, “Meet information requirements of management” (Stallings, 2009, p. 58). Stated in another way, this Chief Information Officer’s (CIO) mission statement’s component implies that company information can be utilized by management for a great deal of things. While the security of all company-owned data is immensely important to the success of the organization, some of the information carries significant value when used by management in order to allow the company to make better informed decisions to keep the company competitive in today’s market and to comply with the organization’s legal responsibilities. Today’s markets are vastly competitive. “To succeed in multi-channel, high-speed environments, organizations need to leverage the data they have at their disposal. Organizations today have access to almost unlimited amounts of data - sales, demographics, economic trends, competitive data, consumer behavior, efficiency measures, financial calculations, etc” (Kennerley, 2008, p. 4). Understanding the company’s data metrics is the job of the management tiers of the organization so that better decisions can be made for the direction of the company as a whole...

Words: 1245 - Pages: 5

Premium Essay

Elastic and Inelastic Traffic

...CIS 505 Assignment 3: Elastic and Inelastic Traffic Due Week 5 and worth 60 points Write a three to four (3-4) page paper in which you: 1. Outline a plan for the development of an addressing and naming model in an environment of the following scenario: a. Ten (10) departments in a 1,000-employee organization b. Equal separation by geography c. Use a common data center of twenty (20) backend enterprise servers 2. Analyze the functional problems of throughput, delay, and packet loss as it pertains to your plan. 3. Analyze and explain how you would use DNS in your plan. 4. Compose a two-paragraph executive summary highlighting the main points of your plan. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: * Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions. * Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length. ANSWER: Lakisha Mason Dr. Hossein Besharatian CIS 505 February 7, 2014 Assignment 3: Elastic and Inelastic...

Words: 1933 - Pages: 8