What is showrooming? Are customers who engage in it acting ethically?Why is the online B2B market so much larger than the online B2C market?

Assignments 9
3 Pages

PART 1:
What is showrooming? Are customers who engage
in it acting ethically? Provide reasons for your
answer.

Why is the online B2B market so much larger than
the online B2C market?

What are the two primary goals of companies who
engage in e-procurement and what strategies do
they use to achieve those goals?

PART 2:


Apply IT Concepts to Business Decisions

Visit IBM’s “Many Eyes” website at www.ibm.com/
manyeyes
Select visualizations from the left-side
menu bar. Generate two visualizations. How does
visualization improve understanding of the datasets?

Explain why people are much more likely to view and pay attention to product and service informa- tion in SERPs compared to traditional mass media advertising? What strategies are businesses adopt- ing to take advantage of this trend?

Assignments 5&6

PART 1:
Why is it important that businesses maintain a high
level of visibility on search engine results pages?

Why are organic search listings more valuable than
paid search listings for most companies over the
long term? Even though organic search listings are
more valuable, what are some reasons that compa-
nies should consider using PPC advertising as part
of their search marketing strategies

Explain why people are much more likely to view
and pay attention to product and service informa-
tion in SERPs compared to traditional mass media
advertising? What strategies are businesses adopt-
ing to take advantage of this trend?

Why are “black hat” SEO techniques (see
Section 6.2) considered unethical? Who is harmed
by the use of such techniques? What are the conse-
quences of using these questionable SEO tactics?

PART 2:


Apply IT Concepts to Business Decisions
Review the information in Section 6.1 about the
three types of searches (informational, navigational,
and transactional) that people conduct on search
engines. Put yourself in the role of an SEO consul-
tant for your college or university. Create a set of
content and/or keyword strategies that you would
recommend to your institution’s leaders to increase
the chances of appearing on SERPs resulting from
prospective students conducting each kind of search

Why would a company invest in a data mart instead of a data warehouse?What are significant issues about 4G wireless networks?

Assignments 3 & 4:

What are the functions of databases and data ware-houses

List three types of waste or damages that data
errors can cause

Why would a company invest in a data mart instead
of a data warehouse?

What are significant issues about 4G wireless
networks?

What digital technologies does each company use to engage you, keep you informed, or create a unique customer experience? How effective is each use of digital technology to keeping you a loyal customer?Why are businesses experiencing a digital transformation?


Assignments 1 & 2

PART 1:
1. Why are businesses experiencing a digital transformation? 
8. Select three companies in different industries, such as banking, retail store, supermarket, airlines, or package delivery, that you do business with. What digital technologies does each company use to engage you, keep you informed, or create a unique customer experience? How effective is each use of digital technology to keeping you a loyal customer?

PART 2:


Apply IT Concepts to Business Decisions
20. Visit YouTube.com and search for two videos on Michael Porter’s strategic or competitive forces models. For each video, report what you learned. Specify the complete URL, video title, who uploaded the video and the date, video length, and number of views.

Describe a time that you have had to solve a challenging programming problem, and what the results were. How would you answer? describe the programming methods you used to solve the problem( 250 words Max)

Essay

Imagine that you are in a job interview. The interviewer asks you to describe a time that you have had to solve a challenging programming problem, and what the results were. How would you answer? describe the programming methods you used to solve the problem( 250 words Max)

Identify and discuss an alternative to challenge questions as a means of authentication for the password recovery/reset process.Should the local government suspend implementation of the new policy for 90 days (180 days?) to allow members of the public to comment on the new policy? Why or Why not?

Your “Expert Opinion” (document) should address the following issues:

How can the local government officials convince residents that this “invasion of privacy” (collection of personal information during account registration) is necessary and for their benefits?

Should the local government suspend implementation of the new policy for 90 days (180 days?) to allow members of the public to comment on the new policy? Why or Why not?

Identify and discuss an alternative to challenge questions as a means of authentication for the password recovery/reset process.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

Resources:
https://www.policynl.ca/policydevelopment/policycycle.html
https://www.iacdautomate.org/aboutiacd
https://us-cert.cisa.gov/sites/default/files/ncirp/National_Cyber_Incident_Response_Plan.pdf

Compare and contrast Barcode technology with RFID technology as they are used for inventory control. Include inventory control aspects, manufacturing process, Shop floor Control and retail sales. Paper should be 3-5 pages basic APA format, longer if you include illustrations.

Barcode vs RFID

Compare and contrast Barcode technology with RFID technology as they are used for inventory control. Include inventory control aspects, manufacturing process, Shop floor Control and retail sales. Paper should be 3-5 pages basic APA format, longer if you include illustrations. Submitted in Microsoft Word format. You should also include a cover page and bibliography (not included in the 3-5 pages)

Include:

Technology (How do Barcode and RFID technology work)
History of Barcode and RFID.
Advantages and Disadvantages of Barcode and RFID.
Transition from Barcode to RFID technology.
Personal opinion of how Barcode and RFID technology will affect our lives in the future.

Will working with MS-ISAC reduce the risks of data breaches in my organization? Why or why not?Who else could each city partner with to reduce the risks and impacts of data breaches?

Will working with MS-ISAC reduce the risks of data breaches in my organization? Why or why not?
Who else could each city partner with to reduce the risks and impacts of data breaches?

Resource: https://msisac.cisecurity.org/about/services/
https://www.cisecurity.org/ms-isac/

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

Prepare a PowerPoint presentation that compares how 802.11a works and lists the advantages and disadvantages of 802.11a over 802.11g. Because ACS is a technical group, the presentation should have a high level of technical detail. Your presentation should last 15-20 minutes.

Your presentation will be graded on content to include grammar and spelling.

Assignment:
The Baypoint Group (TBG) needs your help with a presentation for Academic Computing Services (ACS), a nationwide organization that assists colleges and universities with technology issues. ACS needs more information about the differences between the IEEE 802.11a and IEEE 802.11g standards so that their salespeople will be better equipped to sell this wireless technology to schools.
Deliverables

1. Prepare a PowerPoint presentation that compares how 802.11a works and lists the advantages and disadvantages of 802.11a over 802.11g. Because ACS is a technical group, the presentation should have a high level of technical detail. Your presentation should last 15-20 minutes.

Documenting a network is essential in troubleshooting and support. Explain the security implications in keeping such documentation. How should an organization balance access to the documentation against protecting the network from intentional hacking, compromise or damage?

Documenting a network is essential in troubleshooting and support. Explain the security implications in keeping such documentation. How should an organization balance access to the documentation against protecting the network from intentional hacking, compromise or damage?