Assignment: Provide a reflection paper of 500 words minimum (2 pages double spaced) of how the knowledge, skills, or theories of Risk Management and Information Security have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Answers

Answer 1

Answer:

Following are the response to the given question:

Explanation:

They are already talking business to business collects in which we are calling the client for collecting whenever the products which we have purchased are overdue and overdue inside 30 days. About business criteria, we should ensure no other websites mostly on agent acting open up so that nobody can misuse it; we also have to know the correct revising and trying to run off all systems and therefore all apps are organ systems because then the critical business work time has would not get out of the way. This is about the security of information. The agents also are adequately taught in IT policy according to the demand of the company.

They soon come towards the area of risk, experience, and skill. All agents ought to have proper refresh sessions to fulfill GAP knowledge but also improve their abilities for 100 percent cent accuracy on TAT on every appeal. Your Agency's response.

There ought to be a right party connect. We must keep up with 80-20 RULE which means that we can easily acquire the bigger amount earlier than somehow investing whatever money for future production if we concentrate on TOP 20 Overdue Current Passengers.

When we add up the current sum owing as well as the amount due by both the end of the month, so we will subtract all promises that were made by the end of each month. You can readily deduce how long and how much money will be received by the end of each month, and how long this will be due by the end of each month.

The total danger which we imagine to be cash flow issues is when a company is close to collapse or even has a money problem, they are few risks that any company has.

To solve this RISK to money flow clients, we have to provide them a payment plan so that we could at the very least invest some cash in additional production. Besides offering customers a pay system, you truly cannot help.

Another key potential risk is the unrequired quantity on the accounts of the consumer. Underneath the U.S. government, it'll be a direct responsibility of the government if there is an unclear and unapplied amount which has lied to an account for even more than 4 years.

Therefore it does have to do about risk, skills, knowledge the safety of information. All above theory helps explain everything which enables the execution of operations as well as, as project manager, we have to track input and output information. we need to charge, past due, credits, debits, PD percent every week and month, seeing the company's pattern, and also transform policies as to how the trend or even the forecast can enhance.


Related Questions

Advancements in technology often make computer
hardware and software more convenient to use as
well as able to fit a variety of budgets. As
technology advances, it usually gets
smaller and less expensive.
larger and more expensive.

Answers

Answer: smaller and less expensive.

Explanation:

As technology advances, the architects of the devices that we use are getting more efficient in the production of said devices such that they are using better materials and techniques in production.

This has led to a situation where devices are increasingly getting smaller in size and cheaper to afford as well. For instance, compare the computers of today to those of the 90's. We have laptops now which are really slim and cost a fraction of what the bulky computers of those days cost.

SummaryIn this lab, you complete a partially written C++ program that includes a function named multiplyNumbers() that multiplies two int values to find their product.Three ints should be passed to the multiplyNumbers() function, the two numbers to be multiplied (num1 and num2) should be passed by value, and another int (product) to hold the product of the two numbers should be passed by reference, enabling the multiplyNumbers() function to change its value.The source code file provided for this lab includes the necessary variable declarations and input and output statements. Comments are included in the file to help you write the remainder of the program.Instructions:Open the source code file named MultiplyTwo.cpp using the code editor.Write the multiplyNumbers() function, the function declaration, and the function call as indicated by the comments.Execute the program by clicking "Run Code."Rewrite the multiplyNumbers() function to pass the two numbers (num1 and num2) by value and to pass product by address.Execute the program. It should generate the same output.// MultiplyTwo.cpp - This program calculates the product of two numbers.// It demonstrates pass by reference and then pass by address.// Input: None// Output: The product of two numbers#include using namespace std;// Write function declaration hereint main(){int num1 = 10;int num2 = 20;int product = 0;// Print value of product before function callcout << "Value of product is: " << product << endl;// Call multiplyNumbers using pass by reference for product// Print value of calculated productcout << num1 << " * " << num2 << " is " << product << endl;return 0;} // End of main function// Write multiplyNumbers function here; use pass by reference for result of multiplication. Then use pass by address.

Answers

Answer:

Declare the method prototype using:

void multiplyNumbers(int x, int y,int &product);

Call the function using:

multiplyNumbers(num1, num2,product);

Lastly, the method is as follows:

void multiplyNumbers (int x, int y,int &product) {

  product = x * y;

  return; }

Explanation:

Declare the method prototype using

void multiplyNumbers(int x, int y,int &product);

Call the function using

multiplyNumbers(num1, num2,product);

The method is as follows; the & written in front of product implies that product is passed by reference

void multiplyNumbers (int x, int y,int &product) {

This calculate the product

  product = x * y;

This returns nothing

  return; }

See attachment for complete program

Give a name of the part responsible for memorising a cell phone number​

Answers

cerebrum

Explanation:

it controls all voluntary actions and also controls all the higher thought processes such as memory, judgement and reasoning

which is the best monitor and why?​

Answers

Answer:

dksjnejknfkjssjhflkjZfijthajwhj

Explanation:

fjnskjenkjnewkjnfkjs

According to the Gabriela Colman talk, one of the main hackers in Anonymous was a(n) ____________________ agent.

Answers

Answer: FBI agent

Explanation:

According to Gabriela Colman talk, 4chan was the imageboard that Anonymous was organized on. According to Gabriela Colman, Anonymous had many faces.

According to the Gabriela Colman talk, one of the main hackers in Anonymous was also a FBI agent.

investigate the design objective of hybrid computers​

Answers

Explanation:

Hybrid computers are computers that exhibit features of analog computers and digital computers. The digital component normally serves as the controller and provides logical and numerical operations, while the analog component often serves as a solver of differential equations and other mathematically complex equations

What are the characteristic features of TFTP?

Answers

Answer:

TFTP Server is used for simple file transfer

Explanation:

Example

boot-loading remote devices

The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and phone needs. Group of answer choices

Answers

The term [tex]\sf\purple{digital \:convergence}[/tex] refers to the use of a single unifying device that handles media, internet, entertainment, and phone needs.

[tex]\large\mathfrak{{\pmb{\underline{\red{Happy\:learning }}{\orange{.}}}}}[/tex]

Discuss the impact of Python and other open source programming languages on electronic health records and the health care industry. What are the advantages of using open-source programming

Answers

Answer:

Explanation:

Python itself has had an enormous impact on all types of industries including the health care industry. This is mainly due to its ability to easily implement data analysis techniques and artificial intelligence. These combined allow developers to implement artificial intelligence that analyzes large sets of data to pinpoint interesting patterns, which can save lives and detect at-risk individuals using health care records. This is all made possible because it is an open-source language. This means that anyone can use it without having to pay for it. This basically allows anyone to build amazing new features and software without having to worry about gathering the money to pay for licensing fees.

state the function of a URL in a website​

Answers

Answer:

It's purpose is to access a webpage.

Explanation:

A URL contains detailed information on the webpage such as, the domain name, protocol, and path. This information directs the browser to the desired page.

When my phone powers on does it take away 1 percent of battery?

Answers

Answer:

No, battery is based on your phone activity. Simply turning your phone on will not take away battery percentage.

No turning on your phone does not take up any batteries, your phone battery going go when your phone is used too much-


Digital collaboration tools can ensure that clients are able to record their
requests or issues. This would be particularly important to people working in
which field?
A. Science and engineering
B. Customer service
C. Human resources
D. Internet and media

Answers

Answer:

Option B, Customer service

Explanation:

People working in customer service industry  continuously record their conversation with the customer for future references. These recordings are used to tally order placed, issue raised or help seeked so that maximum customer satisfaction can be ensured.

Hence, option B is correct

name the box where the name of the first cell of the selected range appears?
i need help i would be happy if u helped​

Answers

Answer:

Name box

Explanation:

From the picture, the name box is at the top left corner with B1 written inside, here B1 is written because it is the active cell at the time which also happens to be the first cell of the selected range. The name box can be used to easily create a named ranges rather Than having to draw the mouse over a group of cells. It also helps to know which cell is the current active cell as the cell address in the name box is the active cell at any point in time.

For a processor with primary caches only, an instruction cache miss rate of 1%, a data cache miss rate of 5%, a instruction mix of 30% data accesses, and a cache miss penalty of 80 cycles, what will be the contribution to total CPI from the cache misses

Answers

Answer:

2

Explanation:

Instruction cache miss rate = 1% = 0.01

Data cache miss rate = 5% = 0.05

data access Instruction mix = 30% = 0.3

Cache miss penalty = 80 cycles

Determine the contribution to total CPI from the cache misses

Assume cache access time = 1 clock cycle

CpI ( average ) =  1 + (0.01 * 0.7 + 0.05 * 0.3) * 80 = 2.76

∴ contribution to total CPI from cache miss = 2.76 - 0.76 = 2

The volumes of data collected by contemporary organizations are so huge that they are beyond the ability of typical DBMS to capture, store, and analyze. These big data may be unstructured or semi-structured and are not suitable for relational DBMS products. What are the new technologies developed to handle the big data

Answers

Answer:

Some of the new technologies developed to handle the big data are as follows:

1. In-memory Databases

2. Blockchain

3. NoSQL Databases

4. Edge Computing

5. Streaming Analytics.

6. Artificial Intelligence

Explanation:

Some of the new technologies developed to handle the big data are explained as follows:

1. In-memory Databases: This allows for rapid and easy access to data and analytics, which can be used to inform a variety of business choices. In-memory computing provides the information required to improve marketing, finances, and operations efficiency.

2. Blockchain: Blockchain is the distributed database technology that underpins the Bitcoin digital currency, and it's a darling among forward-thinking analysts and venture capitalists. The distinctive feature of a blockchain database is that data can't be erased or changed after it's been written. Furthermore, it is extremely secure, making it a perfect solution for sensitive industries such as retail, insurance, health care, banking, and among others.

3. NoSQL Databases: NoSQL databases are used to store unstructured data and offer quick performance. This implies it can handle a wide range of data formats in high volumes while remaining flexible. MongoDB, Redis, and Cassandra are examples of NoSQL databases.

4. Edge Computing: Edge computing systems evaluate data very near to where it was originated — at the network's edge — rather than sending it to a centralized server for analysis. An edge-computing system has the advantage of minimizing the quantity of data that must be transferred over the network, therefore lowering network traffic and expenses.

5. Streaming Analytics: By analyzing data as it is created, Streaming Analytics allows for faster and faster access to insights. Streaming Analytics can also take data from a variety of sources, evaluate it, and offer insights almost instantly.

6. Artificial Intelligence: Artificial intelligence has the ability to transform data analytics by learning (from previous analytic activities) and improving the speed and accuracy of outputs over time. Artificial intelligence has the ability to make accurate future predictions based on current events with vast amounts of data to draw from, as well as analytic results from previous inquiries.

A generic information systems planning methodology that identifies and defines IS development projects based upon solving operational business problems or taking advantage of some business opportunities defines:______.a. democratic planning.b. bottom-up planning.c. top-down planning.d. foundation planning.

Answers

Answer:

Option b (bottom-up planning ) is the correct approach.

Explanation:

This kind of planning gives clients additional emphasis to their program since a greater amount of individuals are participating, that every single person has its unique knowledge, which is termed as Bottom-up planning.it is always a positive thing promoting morality since it promotes the engagement of employees towards company strategy.

All other three alternatives aren't connected to the given query. So the above would be the correct solution.

False
2. Complete the script by filling in the missing parts. The function receives a name, then returns a greeting based on
whether or not that name is "Taylor".
1
2
3
4
def greeting(name):
if
"Taylor":
return "Welcome back Taylor!"
5
6
return "Hello there,
+ name
7
8
print(greeting("Taylor"))
print(greeting("John"))
Run
Reset
3. What's the output of this code if number equals 10?
1
2
3
4
if number > 11:
print(e)
elif number ! - 10:
print(1)
elif number >= 20 or number < 12:
print(2)
else:
print(3)
5
6
7
8

Answers

Answer:

Explanation:

2. #The correct finished code would be the following.

def greeting(name):

  if name == 'Taylor':

      return "Welcome back Taylor!"

  else:

      return "Hello there, " + name

print(greeting("Taylor"))

print(greeting("John"))

3.  The output of this code will be 2 , this is because the second elif statement states that if the number is greater than 20 or less than 12 to print out the value 2. Since the input number is 10 then that is the elif that will be called.

Consider the following statements, taken from three different Jack programs. In each one of these programs, the identifier foo represents a different thing: let x = 5 + foo - a // program 1. Here foo represents a simple variable. let y = foo[12] - 3 // program 2. Here foo represents an array. let z = 2 * foo.val() // program 3. Here foo represents an object. Suppose that we are parsing any one of these statements (we don’t know which), and that the current token is foo. What kind of parser do we need to determine if we have a simple variable, an array reference or a method call?

Answers

Answer:

instanceOf

Explanation:

The parser that would be best suited for this scenario would be the instanceOf keyword, which is part of the javaParser class. This keyword allows you to check if a variable is a simple variable, an array reference or a method call through an IF statement. If it is equal to the compared type it will return a boolean value of True, otherwise it will return False. This keyword is used in Java and Javascript to check the type of the variables in scenarios such as this one.

Suppose you joined a company that had a WAN composed of SONET, T carrier, and frame relay services, each selected to match a specific network need for a certain set of circuits. Would you say this was a well-designed network

Answers

Answer:

Colts, gan 8 This depends on depends on How suitable the varbus technolog. A axe fol the Applicationd Supporlds Today, increasingly Network...

Peter wants to make sure his code is going to work. He has Sally act as the computer mentally checking each step and its results for the entire set of computer instructor. Sally is performing a ________.
A) Inspections
B) Walk-throughs
C) Desk check
D) Unit test

Answers

The answer is B walk throughs

The fact that Sally act as the computer by mentally checking each step means she's performing B. walk throughs.

What is a computer?

A computer simply means an electronic machine that's important to make one's work easier and faster.

In this case, the fact that Sally act as the computer mentally checking each step means she's performing the walk throughs.

Learn more about computer on:

https://brainly.com/question/24540334

What lets you do many things, like write book reports and stories?

Application Programs

Antivirus Software

Email

Duct Tape

Answers

A -
Application programs
application progarms lets you do many things

Please help it’s timed

Answers

Answer:

archetecture firm

Explanation:

government dont do that,

energy company arent engineers, and manufactures dont do specifically mapping techichian work

which data type uses %i as a format specifier​

Answers

A decimal integer(detects the base automatically

What is blockchain in detail?

Answers

Question

What is blockchain?

Answer

Blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. It is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems.

❄❄❄❄❄❄❄

hope this helps you !!

enjoy your day

◕ ◡ ◕

Azzam is reviewing a paper he just wrote about kinetic friction for his physics class. On the third page, he realizes that every time he wrote "coefficient of friction," he should have written "coefficient of kinetic friction." He uses the Find and Replace tool and clicks on "Replace All" to fix the issue, but then when prints out the paper, he sees "coefficient of friction" in the first paragraph. What is most likely the reason why the phrase was not fixed? Azzam used Find and Replace instead of the Spell Checker. O Azzam clicked "Replace All" instead of "Replace." O Azzam used the tool while he was on the third page. Azzam did not set up the proper printing options.​

Answers

Answer: Azzam used the tool while he was on the third page

Explanation:

The most likely the reason why the phrase was not fixed is because Azzam used the tool while he was on the third page.

This can be infered from the information given when we're told that he uses the Find and Replace tool and clicks on "Replace All" to fix the issue with regards to the error that he made and thus was done from the third page. Therefore, the tool might not have worked for the first page.

Alani downloads a game called Kandy Krush from the app store. The app prompts her to enter her Social Security number (SSN) before playing. Alani asks her friend for advice. Which advice should her friend give

Answers

Answer:

"The game shouldn't need your SSN to be playable; don't enter it."

Explanation:

The game shouldn't need your SSN to be playable; don't enter it."

What is SSN?

A numerical identification code known as a Social Security number (SSN) is given to residents and citizens of the United States in order to track income and calculate benefits.

As a component of The New Deal, the SSN was established in 1936 to offer benefits for retirement and disability. The SSN was first created to track earnings and offer benefits. Today, it is also utilized for other things including tracking credit reports and identifying people for tax purposes.

In the US, people are required to provide their SSN in order to open bank accounts, apply for government benefits, get credit, make large purchases, and more.

Therefore, The game shouldn't need your SSN to be playable; don't enter it."

To learn more about SSN, refer to the link:

https://brainly.com/question/2040269?

#SPJ5

how do computers help us with our homework​

Answers

A computer can be helpful in completing homework because it gives you access to lots of sources of information like graphing websites, calculators, educational games & programs that can help you. It also allows for an easier process to submit work, organize papers, & presentations.

xD I don't know if you said this as a joke, or if you're serious, but here:

A computer can be a helpful tool to complete your homework by giving you access to countless sources of information, it can also provide you with educational games which can enhance a child's learning ability by presenting learning as something fun and interactive as opposed to boring loads of repeated work which barely stimulate learning at all. But keep in mind that a computer can also take the opposite effect on a child's brain, and can gradually turn into addiction.

I hope this helps! :D

(FYI, I spent an unreasonable amount of time typing this all in, so I hope it makes any difference at all :P)

Topic: Graphs.1.) Bob loves foreign languages and wants to plan his courseschedule for the following years. He is interested in the followingnine language courses: LA15, LA16, LA22, LA31, LA32, LA126, LA127,LA141, and LA 169. The course prerequisites are.i.) LA15: (None)ii.) LA16: LA 15iii.) LA22: (None)iv.) LA31:LA 15v.) LA32:LA16, LA31vi.) LA126: LA22, LA32vii.) LA127: LA 16viii.) LA141:LA22, LA 16ix.) LA 169: LA32.Find the sequence of courses that allows Bob to satisfy allthe prerequisites.

Answers

Answer:

  LA15; LA22

LA16; LA31; LA32

  LA169; LA126;

  LA127; LA141

Explanation:

Given

[tex]Courses: LA15,\ LA16,\ LA22,\ LA31,\ LA32,\ LA126,\ LA127,\ LA141,\ LA 169.[/tex]

Required

Course sequence to satisfy the prerequisite

From the course prerequisite, we have:

[tex]1.\ LA15 \to None[/tex]    and    [tex]3.\ LA22 \to None[/tex]

This means that LA15 and LA22 are the base courses, and they have no prerequisite. So, we have:

[tex][LA15; LA22][/tex]

LA16 and LA31 have LA15 as their direct course prerequisite. So, the sequence becomes

[tex][LA15 \to [LA16, LA31]; LA22][/tex]

To complete the sequence, we read each course and place them other their prerequisite.

See attachment for complete tree

From the tree, we have the sequence to be:

LA15; LA22

LA16; LA31; LA32

LA169; LA126;

LA127; LA141

how to get fast frontend development online job as a beginner?​

Answers

Answer:

hmmm well what is your magager?? every job will ask you what you can do.

There are several types of software development methods, but almost all of them are based on the ________ model.

Answers

Answer:

Waterfall

Explanation:

The waterfall model development strategy may be classed as a flexible design architecture exhibiting a linear operational sequence with each phase being largely dependent on the preceeding phase. Each phase of the waterfall has clearly defined task ; usually starting with the requirement phase where use cases and required docs are gathered, then the design, which caters for the software architecture, the the implementation (which is the main software build) followed by verification and maintainance.

We can see that the waterfall method is sequential and not extremely complex as it follows an entirely linear process.

Other Questions
Can someone help me please? Id appreciate it! Also please do not send me a link or delete your answer! ThanksThe piston of an internal combustion enginecompresses 218 mL of gas. The final pressureis 15 times greater than the initial pressure.What is the final volume of the gas, assumingconstant temperature?Answer in units of mL. which structure does a web page normally use to define an area of focus What is the mean for 46 47 52 55 64 69 70 78 Can I get help with number 16. Help please explain Revise the sentences below by adding a transition to improve sentence filow.Add on to the sentence Female lions are better hunters than males Female lions do the majority of hunting in a pride of lions What are the similarities between the grasshopper and the cricket (Discuss any two)? on the poem grasshopper and the cricket by Jhon Keatsneed asap will mark brainliest Four Reasons why having environmental personal mission statement may enhance the environment? The mean of a standard normal probability distribution _____. a. can be any value b. can be any value as long as it is positive c. is always equal to 1 d. None of these answers are correct. What did the Texan learners call their new nation Please helppppppp I need it todayyyyyt!!!!! What is the overall reaction potential for reaction below In the circle above, DE = 2, CE = 6, and BE = 3.What is the measure of EA?A) 2B) 3C) 6D) 4 I need help no files just type the whole thing in Philip wants to buy a new video game system that costs$349.99 including tax. Philip has $125.50 saved. IfPhilip mows grass for $15.00 per yard, what is the leastamount of yards he could cut to purchase the new videogame system? I really need help lol so please do me a favor When a firm invests in a risky project that happens to be highly profitable, bondholders also enjoy a higher payoff than what a less risky project would produce the same way as stockholders would.a. Trueb. False The perimeter of this rectangle is 30 units. How long is the longer side?a. 24 unitsb. 9 unitsc. 5 unitsd. 6 units Why did countries start to look for a water route to the Indies? Which equation represents an exponential function with an initial value of 500?O f(x) = 100(5)^xOf(x) = 100(x)^5O f(x) = 500(2)^xOf(x) = 500(x)^2