SlideShare une entreprise Scribd logo
1  sur  13
Week Four Journal
Objective
You will identify key ethical problems facing the company,
create potential solutions to those problems, and explain why
certain solutions are better than others.
Instructions
In this assignment, you will identify problems that face the two
companies that you have chosen to study in this course. You
will explain those problems, how they affect the company, and
who or what is responsible for those problems. Then, you will
attempt to provide solutions to those problems, also identifying
the difficulties in implementing those solutions.
Please answer all questions in detail. Because this journal is
worth 5% of your final grade, there is a high expectation for
your participation. Grades for the journals are based on content,
critical engagement, quality of reflection, and detail. Please
submit the completed journal via the Assignment Basket found
in the Week Four Journal tab on the left navigation toolbar by
Day 7.
Problems Facing Not-for-Profit Company
1. Identify two to five problems that face your chosen not-for-
profit company. Explain those problems.
a. Why do these problems exist? Present the background on
these problems.
b. How do these problems impact the organization?
c. Who is responsible for these problems?
2. Identify potential solutions to those problems. Here, you can
feel free to brainstorm and merely list various solutions to the
problems that you identify.
3. Choose a best solution for each problem. Explain why that
solution is the best solution. In addition, determine whether or
not the solution is possible and what would need to be done to
implement the solution.
Important note: Do your best to support your claims with
evidence, facts, and information that you have learned about
ethical theories and values throughout the course.
Problems Facing For-Profit Company
1. Identify two to five problems that face your chosen not-for-
profit company. Explain those problems.
a. Why do these problems exist? Present the background on
these problems.
b. How do these problems impact the organization?
c. Who is responsible for these problems?
2. Identify potential solutions to those problems. Here you can
feel free to brainstorm and merely list various solutions to the
problems that you identify.
3. Choose a best solution for each problem. Explain why that
solution is the best solution. In addition, determine whether or
not the solution is possible and what would need to be done to
implement the solution.
Important note: Do your best to support your claims with
evidence, facts, and information that you have learned about
ethical theories and values throughout the course.
1
CLASS NAME: MIS600
PROFESSORS NAME: William Ying
STUDENTS NAME: Issah Musah, and Raj Patel
PROJECT NAME: NETWORK DESIGN
Content
Topic
Page No.
Cover Page
1
Content
2
Executive summary
3
Project Charter
3
Earn Value Statement
11
Executive Summary
Network under a set of confined region is known as Intranet. It
uses an IP protocol and IP-based tools like the file transfer
application and web browsers that is provided by the server to
only assigned IP address. Computer network communication is
an important installation in a contemporary organization
organisation. As the organization's service provision is
improved through the reliable communication, its competition
with related firms is enhanced and, therefore, valued
competence. Ultimate network design as a mode of flow of
information among employees and stakeholders in promotes
coordination in the management, team work and services the
business offer. This automatically improves the performance of
the organisation at the good will of all workers.
It should be noted that an organisation's communication systems
alone holds a large percentage in its performance that it should
not be compromised, even on the slightest default. This would
mean that the organisation would require an Information System
that when a default occurs at any single point in the connection
system, it would be easier to detect and reach that point as soon
as possible. The design should be design with backbone network
so temporally technical problem with not upset the performance
of network communication. This is more appropriate in big
organisations to maintain their data and communication
confidentiality, integrity and accessibility. In networking design
approach, the choice of device should be intelligently selected
for the desired function, this will enhance performance in terms
of managing security, traffic, errors in storage and transmitting
information.
Documents and programs that are sensitive are run through LAN
security domain system to create passwords for their protection
against cybercrimes. The protected file would then be accessed
by authorised personnel only. This would be an important idea
where security of flowing information is paramount. Each set of
the employee has got a privilege to prevent the access of any
restricted file in the company.
Project Charter
Project Name
Network Design
Project Number
DW2
Project Team
Sponsor: Robert Elson
Author : Jacobs Adam
Manager: Joyce Robert
Prioritization
To design network that will provide information and
communication confidentiality, integrity and accessibility
Owner(s)
Jacobs Adam
Start Date
11/09/15
Scheduled Completion Date
12/15/15
Mission/ Purpose
Based on customer’s statistical report, we are designing network
that will provide faster, with increased security assurance and
24/7 direct online support platform.
Project
Description and Project Product
It is assured to increase online communication and coordination
between sales services and customers.
Optimize the customer choice to online shopping.
Additional capacity with be added to the design to align the
company’s current market demand.
Rejuvenating company network infrastructure, plan and trend
through the network design. Incorporating additional features
and the new branches that are currently established.
Objectives
Increase sales through the utilizing the speed of the network.
use
Business NeedSince customers are the main financial sponsors
of the company, and by popular request, we intend to recreate
the website to meet the following criteria:· Mobile friendly·
Enhance information security
· Add new functionality
· Improve usability
· Keep up to date and shake things
Milestones
Network is expected to be mobile friendly i.e. with Wi-Fi
capabilities
By 11/30/15 midway of the project is evaluated according to
standard.
Last revision date by 12/07/15
Budget
Estimated Labor
$150000.00
Estimated Materials
$12000.00
Estimated Contractors
$20000.00
Estimated Equipment and Facilities
$21000.00
Estimated Travel
$8500.00
Total Estimated Cost
$211500.00
User Acceptance Criteria
User friendly and security assurance network structure is the
minimum success criteria as defined by the key stakeholders.
Contractors and customers will be in charge of testing and
evaluating the quality network and feedback will be collected
through employees and document report from contractors.
High-Level Project Assumptions
It is anticipated that similar project will be taken in about eight
years’ time, since vulnerability of network increase with time,
and technology will keep changing, preference will keep
changing based on factors like the economy, climate or
influence from our competitors market strategy. The network
design will create feasible working environment.
High-Level Project ConstraintsCreating perfect network
communication structure to suit both customer and business
needs.Providing fraud free network, customers are expect to
create online account with sensitive information such as social
security number, credit card and address. Project must be
completed on time to avoid exceeding budget.
Exclusions and Boundaries
Creating perfect network environment to suit both customer and
business needs.
Software interface is limited to be compatible to existing
hardware.
Project must be completed at most not more than a week after
stipulated deadline.
Budget must not increase more than 5% of the stipulated
budget.
Network technical support unit will be decentralized to
accommodate influx calls that will expected from employees
who may encounter technical problem. Feedback from users
should use during in the designing process.
Major Risks
Provide a written description of software process and hard
process.
Regular technical review to ensure that design meets standards.
Budget is expected to rise if design do not meet specification
and thee the need to fix flaws.
Experts are required to answer question about the tools used in
design.
Establishing a procedure for tracking and reviewing contractors
Documentation is required for all formal, informal procedure
and deliverables. Availability of testing tool.
KEY STAKEHOLDERS
Project Manager Authority Level
CEO: Robert Elson , (makes final financial decision of the
project)
Project Core Team
Author : Jacobs Adam
Owner/Sponsor: Robert Elson
Head of Contractors : Peter Christian
Manager : Joy Roberts
Subject Matter Experts (SMEs)
Programmers and software tester and equipment’s tools:·
Functionality testing· Usability testing· Interface testing·
Compatibility testing· Performance testing· Security testing
APPROVALSType NameSignatureDate
Project Manager Approval
Robert Elson
09/01/15
Customer/Sponsor Approval
Jacobs Adam
09/01/15
Earn Value Statement
Statement of Work—Project Description and
Project Product
The project intends to design easy to use network design that
will accommodate shareholder demand and leverage the
company on competitive edge against its rival.
Specification of the network is based on collective inquiry,
user’s feedback and sponsors request, and the priority is meet
the national regulation standard.
Scrum agile method approach will be employ in this design
development project, this will allow the product use by the
development team, while in design is in process, so that
feedback will be used to make correction on inherent and
apparent weakness that will be detected at the early stage..
The project team will be group in three, the developers, the
testers and the users. The user group will consist of
shareholders and designated team professional. Strong chain of
feedback mechanism will be establish between users and the
developers to report any fault at the early development stage.
However early glitch may also be detected at the testing level
and reported to the developers.
Project DeliverablesNetwork design will be will have about
500sqft Wi-Fi capability, encryption tool for the protection of
sensitive’s information of inputs made by client when hosting
on the network. Users will be authenticated. .
Project Objectives
The Objectives is to design company’s network to incorporate
additional features and also correct inherent apparent weakness
that have been reported on major cases by shareholders. It is
also intended to give competitive advantage over business
rivals. Project is schedule to complete in three commencing
from 09/09/15 to 12/15/15.
50% of the total budget will be disbursed for the comment of
the project and the remaining 50% will be disbursed at the
midway of the project. Provision of 5% increase of the original
budget is made available in the budget coffers to accommodate
anticipated increase project cost.
However, with the introduction of improved working tools,
project is expected to compete within budget.
Project Assumptions
Work space will be required to accommodate all working station
(i.e. developers, testers and users team station) and team
members.
Project is likely to take longer than will be expected since the
sponsors are part of the design process with direct influence on
the project, sponsors preference might keep changing.
In addition to the testers and the users who may report design
flaws ,experts or outsourced team may be required to
independently assess performance, evaluate and test network,
feedback may be employ to make to make required changes
when the need arise to extend service or employ feedback from
auditors to make any changes.
Other opportunities may be consider to affect design during
process if it will give competitive advantage over business
rivals.
Project ConstraintsOver security is concern like authentication
process may discourage and prolong access to network facility
.Project cascaded team and process may slow work. Project
design needs dedicated and reliable server, free from threat and
can host all team members time. Daily project routine needs to
be documented and review by head of project before going to
the next step, the procedure sometimes slow down development
process. Team are expected to have long meeting with legal
advisor before of the work begins.
Exclusions
Based on available spaces and tools, only 8 members are
required to the task.
Acceptance Criteria The network must operational or
compatible to the major internet devices protocols.
APPROVALSType NameSignatureDate
Project Manager Approval
Robert Elson
11/9/15
Customer or Sponsor Approval
Jacobs Adam
11/9/15
Week Four JournalObjectiveYou will identify key ethical proble.docx

Contenu connexe

Similaire à Week Four JournalObjectiveYou will identify key ethical proble.docx

QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEeAuditor Audits & Inspections
 
Questions On Technical Design Decisions
Questions On Technical Design DecisionsQuestions On Technical Design Decisions
Questions On Technical Design DecisionsRikki Wright
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxbradburgess22840
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxdeanmtaylor1545
 
1Running Head Business ProjectSection 1 Business Requirement.docx
1Running Head Business ProjectSection 1 Business Requirement.docx1Running Head Business ProjectSection 1 Business Requirement.docx
1Running Head Business ProjectSection 1 Business Requirement.docxfelicidaddinwoodie
 
Trying to implement enterprise collaboration
Trying to implement enterprise collaborationTrying to implement enterprise collaboration
Trying to implement enterprise collaborationStephane Cheikh
 
I need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course pI need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course pdoylymaura
 
PurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitPurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitTakishaPeck109
 
IntroductionThis is an individual project. Each student must comp.docx
IntroductionThis is an individual project.  Each student must comp.docxIntroductionThis is an individual project.  Each student must comp.docx
IntroductionThis is an individual project. Each student must comp.docxmariuse18nolet
 
Ifsm 370 project 2 white paper instructions
Ifsm 370 project 2  white paper instructionsIfsm 370 project 2  white paper instructions
Ifsm 370 project 2 white paper instructionsbestwriter
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxnettletondevon
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxbobbywlane695641
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxrhetttrevannion
 
CPIN 269 Final Documentation
CPIN 269 Final DocumentationCPIN 269 Final Documentation
CPIN 269 Final DocumentationJennifer Cordes
 
Assessment 2DescriptionFocusEssayValue50Due D.docx
Assessment 2DescriptionFocusEssayValue50Due D.docxAssessment 2DescriptionFocusEssayValue50Due D.docx
Assessment 2DescriptionFocusEssayValue50Due D.docxgalerussel59292
 
Open Source adoption in a Mexicon Second tier Bank
Open Source adoption in a Mexicon Second tier BankOpen Source adoption in a Mexicon Second tier Bank
Open Source adoption in a Mexicon Second tier BankWSO2
 
1Grand Canyon UniversityInstructor Name MIS-652 Busines
1Grand Canyon UniversityInstructor Name MIS-652 Busines1Grand Canyon UniversityInstructor Name MIS-652 Busines
1Grand Canyon UniversityInstructor Name MIS-652 BusinesEttaBenton28
 

Similaire à Week Four JournalObjectiveYou will identify key ethical proble.docx (20)

QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
 
Online cinematicketingdocx
Online cinematicketingdocxOnline cinematicketingdocx
Online cinematicketingdocx
 
Questions On Technical Design Decisions
Questions On Technical Design DecisionsQuestions On Technical Design Decisions
Questions On Technical Design Decisions
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
1Running Head Business ProjectSection 1 Business Requirement.docx
1Running Head Business ProjectSection 1 Business Requirement.docx1Running Head Business ProjectSection 1 Business Requirement.docx
1Running Head Business ProjectSection 1 Business Requirement.docx
 
Trying to implement enterprise collaboration
Trying to implement enterprise collaborationTrying to implement enterprise collaboration
Trying to implement enterprise collaboration
 
Web Engineering
Web EngineeringWeb Engineering
Web Engineering
 
Dual-Track Agile at Scale
Dual-Track Agile at ScaleDual-Track Agile at Scale
Dual-Track Agile at Scale
 
I need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course pI need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course p
 
PurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitPurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilit
 
IntroductionThis is an individual project. Each student must comp.docx
IntroductionThis is an individual project.  Each student must comp.docxIntroductionThis is an individual project.  Each student must comp.docx
IntroductionThis is an individual project. Each student must comp.docx
 
Ifsm 370 project 2 white paper instructions
Ifsm 370 project 2  white paper instructionsIfsm 370 project 2  white paper instructions
Ifsm 370 project 2 white paper instructions
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docx
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docx
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docx
 
CPIN 269 Final Documentation
CPIN 269 Final DocumentationCPIN 269 Final Documentation
CPIN 269 Final Documentation
 
Assessment 2DescriptionFocusEssayValue50Due D.docx
Assessment 2DescriptionFocusEssayValue50Due D.docxAssessment 2DescriptionFocusEssayValue50Due D.docx
Assessment 2DescriptionFocusEssayValue50Due D.docx
 
Open Source adoption in a Mexicon Second tier Bank
Open Source adoption in a Mexicon Second tier BankOpen Source adoption in a Mexicon Second tier Bank
Open Source adoption in a Mexicon Second tier Bank
 
1Grand Canyon UniversityInstructor Name MIS-652 Busines
1Grand Canyon UniversityInstructor Name MIS-652 Busines1Grand Canyon UniversityInstructor Name MIS-652 Busines
1Grand Canyon UniversityInstructor Name MIS-652 Busines
 

Plus de alanfhall8953

With regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docxWith regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docxalanfhall8953
 
WIT Financial Accounting Test Ch.docx
WIT                   Financial Accounting Test                 Ch.docxWIT                   Financial Accounting Test                 Ch.docx
WIT Financial Accounting Test Ch.docxalanfhall8953
 
Windows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docxWindows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docxalanfhall8953
 
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0  Supplement to Computer Networking.docxWireshark Lab TCP v6.0  Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docxalanfhall8953
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxalanfhall8953
 
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
Wireshark Lab IP v6.0  Supplement to Computer Networking.docxWireshark Lab IP v6.0  Supplement to Computer Networking.docx
Wireshark Lab IP v6.0 Supplement to Computer Networking.docxalanfhall8953
 
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docxWillowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docxalanfhall8953
 
Wind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docxWind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docxalanfhall8953
 
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docxwinter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docxalanfhall8953
 
WinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docxWinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docxalanfhall8953
 
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docxWiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docxalanfhall8953
 
Winter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docxWinter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docxalanfhall8953
 
With the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docxWith the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docxalanfhall8953
 
Windows Server 2012 R2 Essentials Windows Server 2012.docx
Windows Server 2012 R2 Essentials  Windows Server 2012.docxWindows Server 2012 R2 Essentials  Windows Server 2012.docx
Windows Server 2012 R2 Essentials Windows Server 2012.docxalanfhall8953
 
Wind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docxWind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docxalanfhall8953
 
WilliamStearman_Java301build.xml Builds, tests, and ru.docx
WilliamStearman_Java301build.xml      Builds, tests, and ru.docxWilliamStearman_Java301build.xml      Builds, tests, and ru.docx
WilliamStearman_Java301build.xml Builds, tests, and ru.docxalanfhall8953
 
Wilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docxWilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docxalanfhall8953
 
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docxWilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docxalanfhall8953
 
WinARM - Simulating Advanced RISC Machine Architecture .docx
WinARM - Simulating Advanced RISC Machine Architecture   .docxWinARM - Simulating Advanced RISC Machine Architecture   .docx
WinARM - Simulating Advanced RISC Machine Architecture .docxalanfhall8953
 
William PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docxWilliam PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docxalanfhall8953
 

Plus de alanfhall8953 (20)

With regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docxWith regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docx
 
WIT Financial Accounting Test Ch.docx
WIT                   Financial Accounting Test                 Ch.docxWIT                   Financial Accounting Test                 Ch.docx
WIT Financial Accounting Test Ch.docx
 
Windows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docxWindows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docx
 
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0  Supplement to Computer Networking.docxWireshark Lab TCP v6.0  Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
 
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
Wireshark Lab IP v6.0  Supplement to Computer Networking.docxWireshark Lab IP v6.0  Supplement to Computer Networking.docx
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
 
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docxWillowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
 
Wind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docxWind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docx
 
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docxwinter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
 
WinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docxWinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docx
 
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docxWiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
 
Winter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docxWinter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docx
 
With the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docxWith the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docx
 
Windows Server 2012 R2 Essentials Windows Server 2012.docx
Windows Server 2012 R2 Essentials  Windows Server 2012.docxWindows Server 2012 R2 Essentials  Windows Server 2012.docx
Windows Server 2012 R2 Essentials Windows Server 2012.docx
 
Wind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docxWind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docx
 
WilliamStearman_Java301build.xml Builds, tests, and ru.docx
WilliamStearman_Java301build.xml      Builds, tests, and ru.docxWilliamStearman_Java301build.xml      Builds, tests, and ru.docx
WilliamStearman_Java301build.xml Builds, tests, and ru.docx
 
Wilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docxWilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docx
 
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docxWilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docx
 
WinARM - Simulating Advanced RISC Machine Architecture .docx
WinARM - Simulating Advanced RISC Machine Architecture   .docxWinARM - Simulating Advanced RISC Machine Architecture   .docx
WinARM - Simulating Advanced RISC Machine Architecture .docx
 
William PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docxWilliam PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docx
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Dernier (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

Week Four JournalObjectiveYou will identify key ethical proble.docx

  • 1. Week Four Journal Objective You will identify key ethical problems facing the company, create potential solutions to those problems, and explain why certain solutions are better than others. Instructions In this assignment, you will identify problems that face the two companies that you have chosen to study in this course. You will explain those problems, how they affect the company, and who or what is responsible for those problems. Then, you will attempt to provide solutions to those problems, also identifying the difficulties in implementing those solutions. Please answer all questions in detail. Because this journal is worth 5% of your final grade, there is a high expectation for your participation. Grades for the journals are based on content, critical engagement, quality of reflection, and detail. Please submit the completed journal via the Assignment Basket found in the Week Four Journal tab on the left navigation toolbar by Day 7. Problems Facing Not-for-Profit Company 1. Identify two to five problems that face your chosen not-for- profit company. Explain those problems. a. Why do these problems exist? Present the background on these problems. b. How do these problems impact the organization? c. Who is responsible for these problems? 2. Identify potential solutions to those problems. Here, you can
  • 2. feel free to brainstorm and merely list various solutions to the problems that you identify. 3. Choose a best solution for each problem. Explain why that solution is the best solution. In addition, determine whether or not the solution is possible and what would need to be done to implement the solution. Important note: Do your best to support your claims with evidence, facts, and information that you have learned about ethical theories and values throughout the course. Problems Facing For-Profit Company 1. Identify two to five problems that face your chosen not-for- profit company. Explain those problems. a. Why do these problems exist? Present the background on these problems. b. How do these problems impact the organization? c. Who is responsible for these problems? 2. Identify potential solutions to those problems. Here you can feel free to brainstorm and merely list various solutions to the problems that you identify. 3. Choose a best solution for each problem. Explain why that solution is the best solution. In addition, determine whether or not the solution is possible and what would need to be done to implement the solution. Important note: Do your best to support your claims with evidence, facts, and information that you have learned about ethical theories and values throughout the course.
  • 3. 1 CLASS NAME: MIS600 PROFESSORS NAME: William Ying STUDENTS NAME: Issah Musah, and Raj Patel PROJECT NAME: NETWORK DESIGN Content Topic Page No. Cover Page 1 Content 2 Executive summary 3 Project Charter 3 Earn Value Statement 11
  • 4. Executive Summary Network under a set of confined region is known as Intranet. It uses an IP protocol and IP-based tools like the file transfer application and web browsers that is provided by the server to only assigned IP address. Computer network communication is an important installation in a contemporary organization organisation. As the organization's service provision is improved through the reliable communication, its competition with related firms is enhanced and, therefore, valued competence. Ultimate network design as a mode of flow of information among employees and stakeholders in promotes coordination in the management, team work and services the business offer. This automatically improves the performance of the organisation at the good will of all workers. It should be noted that an organisation's communication systems alone holds a large percentage in its performance that it should not be compromised, even on the slightest default. This would mean that the organisation would require an Information System that when a default occurs at any single point in the connection system, it would be easier to detect and reach that point as soon as possible. The design should be design with backbone network so temporally technical problem with not upset the performance of network communication. This is more appropriate in big organisations to maintain their data and communication confidentiality, integrity and accessibility. In networking design approach, the choice of device should be intelligently selected for the desired function, this will enhance performance in terms of managing security, traffic, errors in storage and transmitting information. Documents and programs that are sensitive are run through LAN security domain system to create passwords for their protection against cybercrimes. The protected file would then be accessed
  • 5. by authorised personnel only. This would be an important idea where security of flowing information is paramount. Each set of the employee has got a privilege to prevent the access of any restricted file in the company. Project Charter Project Name Network Design Project Number DW2 Project Team Sponsor: Robert Elson Author : Jacobs Adam Manager: Joyce Robert Prioritization To design network that will provide information and communication confidentiality, integrity and accessibility Owner(s) Jacobs Adam Start Date 11/09/15 Scheduled Completion Date 12/15/15 Mission/ Purpose Based on customer’s statistical report, we are designing network that will provide faster, with increased security assurance and 24/7 direct online support platform.
  • 6. Project Description and Project Product It is assured to increase online communication and coordination between sales services and customers. Optimize the customer choice to online shopping. Additional capacity with be added to the design to align the company’s current market demand. Rejuvenating company network infrastructure, plan and trend through the network design. Incorporating additional features and the new branches that are currently established. Objectives Increase sales through the utilizing the speed of the network. use Business NeedSince customers are the main financial sponsors of the company, and by popular request, we intend to recreate the website to meet the following criteria:· Mobile friendly· Enhance information security · Add new functionality · Improve usability · Keep up to date and shake things Milestones Network is expected to be mobile friendly i.e. with Wi-Fi capabilities By 11/30/15 midway of the project is evaluated according to standard. Last revision date by 12/07/15 Budget Estimated Labor $150000.00
  • 7. Estimated Materials $12000.00 Estimated Contractors $20000.00 Estimated Equipment and Facilities $21000.00 Estimated Travel $8500.00 Total Estimated Cost $211500.00 User Acceptance Criteria User friendly and security assurance network structure is the minimum success criteria as defined by the key stakeholders. Contractors and customers will be in charge of testing and evaluating the quality network and feedback will be collected through employees and document report from contractors. High-Level Project Assumptions It is anticipated that similar project will be taken in about eight years’ time, since vulnerability of network increase with time, and technology will keep changing, preference will keep changing based on factors like the economy, climate or influence from our competitors market strategy. The network design will create feasible working environment. High-Level Project ConstraintsCreating perfect network communication structure to suit both customer and business needs.Providing fraud free network, customers are expect to create online account with sensitive information such as social security number, credit card and address. Project must be
  • 8. completed on time to avoid exceeding budget. Exclusions and Boundaries Creating perfect network environment to suit both customer and business needs. Software interface is limited to be compatible to existing hardware. Project must be completed at most not more than a week after stipulated deadline. Budget must not increase more than 5% of the stipulated budget. Network technical support unit will be decentralized to accommodate influx calls that will expected from employees who may encounter technical problem. Feedback from users should use during in the designing process. Major Risks Provide a written description of software process and hard process. Regular technical review to ensure that design meets standards. Budget is expected to rise if design do not meet specification and thee the need to fix flaws. Experts are required to answer question about the tools used in design. Establishing a procedure for tracking and reviewing contractors Documentation is required for all formal, informal procedure and deliverables. Availability of testing tool. KEY STAKEHOLDERS Project Manager Authority Level CEO: Robert Elson , (makes final financial decision of the project)
  • 9. Project Core Team Author : Jacobs Adam Owner/Sponsor: Robert Elson Head of Contractors : Peter Christian Manager : Joy Roberts Subject Matter Experts (SMEs) Programmers and software tester and equipment’s tools:· Functionality testing· Usability testing· Interface testing· Compatibility testing· Performance testing· Security testing APPROVALSType NameSignatureDate Project Manager Approval Robert Elson 09/01/15 Customer/Sponsor Approval Jacobs Adam 09/01/15
  • 10. Earn Value Statement Statement of Work—Project Description and Project Product The project intends to design easy to use network design that will accommodate shareholder demand and leverage the company on competitive edge against its rival. Specification of the network is based on collective inquiry, user’s feedback and sponsors request, and the priority is meet the national regulation standard. Scrum agile method approach will be employ in this design development project, this will allow the product use by the development team, while in design is in process, so that feedback will be used to make correction on inherent and apparent weakness that will be detected at the early stage.. The project team will be group in three, the developers, the testers and the users. The user group will consist of shareholders and designated team professional. Strong chain of feedback mechanism will be establish between users and the developers to report any fault at the early development stage. However early glitch may also be detected at the testing level and reported to the developers.
  • 11. Project DeliverablesNetwork design will be will have about 500sqft Wi-Fi capability, encryption tool for the protection of sensitive’s information of inputs made by client when hosting on the network. Users will be authenticated. . Project Objectives The Objectives is to design company’s network to incorporate additional features and also correct inherent apparent weakness that have been reported on major cases by shareholders. It is also intended to give competitive advantage over business rivals. Project is schedule to complete in three commencing from 09/09/15 to 12/15/15. 50% of the total budget will be disbursed for the comment of the project and the remaining 50% will be disbursed at the midway of the project. Provision of 5% increase of the original budget is made available in the budget coffers to accommodate anticipated increase project cost. However, with the introduction of improved working tools, project is expected to compete within budget. Project Assumptions Work space will be required to accommodate all working station (i.e. developers, testers and users team station) and team members. Project is likely to take longer than will be expected since the sponsors are part of the design process with direct influence on the project, sponsors preference might keep changing. In addition to the testers and the users who may report design flaws ,experts or outsourced team may be required to independently assess performance, evaluate and test network, feedback may be employ to make to make required changes when the need arise to extend service or employ feedback from auditors to make any changes. Other opportunities may be consider to affect design during
  • 12. process if it will give competitive advantage over business rivals. Project ConstraintsOver security is concern like authentication process may discourage and prolong access to network facility .Project cascaded team and process may slow work. Project design needs dedicated and reliable server, free from threat and can host all team members time. Daily project routine needs to be documented and review by head of project before going to the next step, the procedure sometimes slow down development process. Team are expected to have long meeting with legal advisor before of the work begins. Exclusions Based on available spaces and tools, only 8 members are required to the task. Acceptance Criteria The network must operational or compatible to the major internet devices protocols. APPROVALSType NameSignatureDate Project Manager Approval Robert Elson 11/9/15 Customer or Sponsor Approval Jacobs Adam 11/9/15