Reference no: EM133202534
Assignment - Business Paper
Q1. Based on the Cambridge Analytica video, define and describe Psychographics. Don't use the Internet to search for the perfect definition, use the video. Then, explain the OCEAN acronym utilized by Cambridge Analytica by using the video. Break the acronym into its individual parts and explain what they mean. Please write each answer on its own separate bullet point or numbered list, do not write everything into one single paragraph.
Q2. Assume the University could sell the WiFidata they collect from students, faculty, and staff utilizing the WiFi on campus. Name three companies you think would benefit from buying WiFi data from UD. Please list each company, separately, and explain why the company you have named would benefit. Please do not use any cell phone providers, think about what students, faculty, and staff use WiFi for on campus. Please write each answer on its own separate bullet point or numbered list, do not write everything into one single paragraph.
Q3. Use the "What is Data Lake?" video and please answer the following questions:
a. What is the entrance point for data to enter into the Data Lake?
b. When data is stored in a Data Lake, can it be used right away or does it need to have something done to it? If data does need something done to it, name three processes that data needs to be put through for it to be used.
c. What does Governing Data mean? Explain in detail.
d. List three things and describe each, that take place in the Apply area.
Q4. Using the FinGoPay videos, explain exactly what FinGoPay is and how it differs from using an RFID chip or Venmo. Assuming FinGoPay is an option for UD to adopt for all their students, faculty, and staff as a method of payment for all on campus locations for the Fall semester. Would you like to use it or stay with your current payment method. This also means you need to tell what your current payment method is for on campus purchases at UD.
Q5. Using the "What is DDos" video, define and explain what a Volumetric Service Attack is.
6. Using the videos found within the lecture, define and give examples of both Symmetric and Asymmetric Encryption keys. Which do you believe to be safer in transmitting and receiving data over the Internet and explain why?
7. Using the video "This is how easy it is to get hacked", it is discussed the Soviet Union had one of the largest collections of polytechnical schools in the world. Why was it bad for ethics to not be taught in these schools? How has this affected the way information technilogu is utilized in today's Russia, as well as other now independent states that were once part of the Soviet Union?
8. Seeing the Hacking Conference in the video "This is how easy it is to get hacked", you are able to see how easy it is to get hacked and for someone to take down part of a country's, or city's, infrastructure. List three areas of infrastructure that you believe would be bad for it to be taken down by hacking and then held for ransom. Please use bullet points as you list each piece of infrastructure. Since it was already done, previously, you are not allowed to use a gas or oil pipeline. We all saw the impact the Colonial Pipeline made on one small area of the country.
Attachment:- Videos.rar
Define the origins of renaissance
: Grossmont College-Define the origins of Renaissance. Why did the Italian Renaissance produce such a strong spirit of Humanism?
|
Describe a Place Use MLA formatting
: Describe a Place Use MLA formatting. Appeal to the 5 empirical senses. Focus on and develop place, time of place, social place, private place
|
Why people resist multi project resource scheduling system
: Why would people resist a multi project resource scheduling system? What do you think would have happened if Washington Forest Service didn't assess resources?
|
What mobile app do you use that help facilitates transaction
: What mobile apps do you use that help facilitates your transactions with a specific retailer or service provider?
|
What is entrance point for data to enter into the data lake
: What is the entrance point for data to enter into the Data Lake? List three things and describe each, that take place in the Apply area
|
Analyze the marketing mix variables
: Describe the competition, and how they are addressing this target market. Analyze the marketing mix variables.
|
Which selection criterion is the most critical in hiring
: Organizations must find the best candidate for a job among a pool of many applicants. Which basic selection criterion do you feel is the most critical in hiring
|
Cause of the increase in types of crimes
: 1. Domestic terrorism is on the rise and particular groups of individuals and organizations, such as Muslims, Blacks, abortion clinics and today the FBI, are be
|
What characteristics differentiate stars and cash cows
: What characteristics differentiate stars, cash cows, question marks, and dogs in the BCG market share/market growth matrix (Exhibit 2.6 in your text)?
|