JNU Cyberlaw New York State Government Discussion
DiscussionIn the discussion forum, describe an instance where the New York state government has taken some legislative action that has negatively influenced economic activity in the state of New York. Minimum 250 words. Reply 1:-As issues of financial disparity, sex segregation and environmental change picked up footing with voters in 2018, neighbourhood governments passed aspiring laws mirroring the moving political climate. New York’s constitution endorses the appropriation of forces among the parts of state government just as the arrangement of nearby government all through the state. The leaders of the rest of the offices, who each organize approach and exercises for a particular concern, are commonly delegated by the Governor with the exhortation and assent of the Senate. The primary special case is the Commissioner of Education, who is chosen by the Regents of the University of the State of New York.While these progressions unquestionably added to the critical 61 percent decrease in New York’s welfare caseload somewhere in the range of 1994 and 2004, a great arrangement of contention stays over the achievement of these strategies in lessening destitution and advancing long haul independence for the most helpless populaces. The Government of the State of New York, headquartered at the New York State Capitol in Albany, incorporates the authoritative structure of the U.S. territory of New York, as set up by the state’s constitution. Similarly to the US government, it is made out of three branches: official, authoritative, and legal.The leader of the official is the Governor. The Legislature comprises of the Senate and the Assembly. A solid and powerful administrative general wellbeing foundation is fundamental not exclusively to react to emergencies, for example, these yet in addition to address continuous difficulties, for example, avoiding or overseeing interminable ailments, controlling irresistible maladies, and checking the security of sustenance and water.Reply 2:-In this discussion, I am giving a brief overview of the convenience of the employer ruling by New York state that creates negative influence to telecommuters who were working from home from a non-New York state. In the modern world of advanced technology and communication using the latest smartphones and quicker internet speed combined with better leadership in organizations has allowed workers to telecommute. The number of employees telecommuting in the US has gone up drastically to 63 million by the year 2016 (Craig, 2013). This has led to questions on the taxation laws on the income of nonresidents. If a person resides in one state and is working in another state, it might be necessary to pay income tax in both states. This is true even when the person is at the work location for only part of the whole year. The reasoning for this is that a person might be availing all the public services at his or her home state where the home is, whereas his or her company is in a different state. This can lead to double taxation. An example is a person who lives in Connecticut and is a writer and writes from his home. If this person is officially employed in an organization in New York, it is possible that the person is taxed both by Connecticut and New York. This is, however, not the case for a person living in New Jersey and telecommuting for a job in New York. However, this person might be paying a higher tax in New Jersey even though it is not as high as double taxation. This extraterritorial taxation by New York for non-residents is an example where state government laws hurt the economic activities in the state of New York (Zelinsky, 2016).
JNU Business Intelligence Real-World Application of BI Discussion
DiscussionHow would one define business intelligence (BI)? Identify and briefly discuss a real-world application of BI. Reply 1:-Business intelligence (BI) uses programming ANd administrations to vary data into vital insight that develop an organizations key and strategic business selections. Business intelligent practicality gets to and investigate information sets and to gift analytical findings in reports, synopses, dashboards, diagrams, graphs and maps to furnish shoppers with purpose by purpose data concerning the condition of the business. Despite of the actual factthat business intelligence doesn’t guide business shoppers or what is going to occur on the off probability that they take a selected step, neither is Business intelligencewith regards to making reports. Maybe, Business intelligenceoffers a path for people to seem at data to understand patterns and infer bits of information. within the current market we’ve excess of vendors United Nations agency area unit providing Business intelligencetools, from thatorganizations will opt for what they require. Microsoft, Qlik and Tableau Business intelligence tools area unit thought-about because the leaders and area unit principally employed by several corporations. Moreover Seattle-based coffee chain Starbucks is one in every of the foremost outstanding users of Business intelligence tools. Through its outstanding Loyalty Card program, Starbucks will hoard personalised get data on an enormous variety of shoppers. Utilizing this information and business data programming, the massive coffee organization would then be ready to anticipate what buys and offers a private shopper is perhaps progressing to be keen on. Apparently, the corporate advises the shoppers of all the offers, that they believe the client are inquisitive about. BI technology revolutionized and created tons of impact on however the organizations operate and fostered the expansion by anticipating the trends. Reply 2:-Many organizations use the technology of Business Intelligence (BI) which is a technology driven process in order to analyze the data to present the data with the actionable details. These information will help the managers, executives and corporate end users to view the information and make certain decision over the business (Moreno, Silva, Ferreira, Filardi, 2019). Thera re wide variety of tools includes for the BI and also the applications and other methodologies which allow companies to retrieve data from the internal processors. The data which has been retrieved from the internal systems and also the external sources will prepare the analysis (Kretzer Maedche, 2018). The analysis done by developing queries and run queries against the retrieved data which allows the implement the reports, data visualizations, and dashboards. These data visualizations give analytical results for the companies to take decisions and also use for operational workers. The companies able to use combine the data sets along with the BI tool such as querying, ad hoc analyzes, enterprise reporting, OLAP, operational BI, Mobile BI, SAAS, location intelligence, etc.As an example of the companies who uses the Business Intelligence technology is Starbucks. Its a Seattle-based coffee chain who uses the BI via the program of loyalty card. They were able to collect the data which is related to individualized purchases on million customers. The information helped them to predict what items been purchased and offers a customers are mostly interested in. By getting this information, Starbucks able to give offers to the customers for them to take advantage of the offer more and also by using their mobile devices. This attracts the new customers also the customers who are already registered. It helps draw the customers more to stores very frequently and also helps the business to higher the sales. The Starbucks uses the CRM system and the company has combined the CRM system along with the BI to have the more effective information out of their data.
Did you know? hardware and software (discussion)
Initial Post: Respond to each prompt below.
Describe one hardware component that are essential to YOU as a consumer. Provide three options (brand, style, etc.) for the component.
Offer two new or interesting details about hardware and software from the consumer report. Write one question that you have about technology after reading the consumer report.
Example:
1.A hardware that I find very important and that we tend to forget is a printer. Especially the all in-one printer that we can generally see in most electronic stores. Even though the trend is to go paperless, the majority of us cannot follow it. As a student, I need to print and scan papers few times a week, therefore an all-in-one printer is very essential for me.
Brand:There are too many brands out there that produce an all-in-one printer, but the most popular ones are: Canon, HP, Brother, and Samsung. I personally go with Brother, because compared to the other brands, Brother focuses in producing printers. Canon, HP, and Samsung all produce other electronic products.
Price:I take a quick look on Brothers Website and an all-in-one printers price varies from $79.99 to $599.99. Of course, students or households dont need to buy an expensive one. The $79.99 one is more than perfect and will last long if well taking care of. Also, many retail store may sell them at a lower price.
Features:An all-in-one printer gives you not only the possibility to print, but also to scan and to fax. Most them can print on different types of paper and also recto-verso. Scanning on these machines can be made by deposing the paper on the top tray or by placing the paper in the glass flatbed inside of the printer. Faxing is not as popular as it was before because of emails, but it can be something useful depending on the situation. To fax, paper has to be placed on the top tray and a phone number has to be entered on the keypad. One important feature that many people forget about is the possibility to connect the printer to Wi-Fi. This option is a must in todays world because it lets use print or scan from anywhere and from any device as long as we are connected to the same Wi-Fi. For example, I can print a document from my smartphone or tablet wirelessly.
2.After reading the Consumer Report about the all-in-one printers, I learned that it used a certain type of printing and I found out that an application to let us print from our smartphone or tablet is already downloaded in our devices.
Printing type:There are different types of printing and this product uses a a printing type named Inkjet. Inkjet prints paper by deposing droplets of ink on the paper instead of speaking it like other printers. It was interesting to see that this method of printing is very efficient. It takes less time for the ink to dry and it uses less ink than other printing procedures.
App:Imagine that we are reading an interesting article on your tablet and that we decide we want to print it. Normally, we would send the link of the article to our email, open the link from a computer, and then print the article. With the applications Apple AirPrint and Google Cloud Print already installed in our iOS or Android device, we can simply click on a button and our article gets printed. We dont need to deal with the struggle of downloading the app or go through a third party application.
Question:After reading the Consumer Report and people reviews, I realized that printers are becoming less used with time. I wonder if it will stay among us or if it will join the floppy dick and the DVD player?
Discussion board: religion and work
RELIGION AND WORK by Carol P. Harvey
Assumption College
In todays global society, it is useful to learn more about the religions that may be practiced by coworkers. Without some knowledge, individuals may attribute incorrect meanings to others behaviors. In addition, organizations may have policies and practices that inadvertently conflict with their employees religious beliefs. For example, some organizations do not allow vacation time to be accrued, thus preventing pilgrimages that may require a month of leave. Others require all workers to take Christian holidays and do not capitalize on the opportunity to have non-Christians work on days that have no significance to them. Jewish employees, for example may choose to work on Christmas Eve in exchange for having Yom Kippur off with pay. Because many individuals may be reluctant to discuss their religion or to explain its practices in a work setting, misunderstanding of behavior can result.
The following scenarios depict workplace incidents in which others are not aware of the religious basis for the individuals behavior. In each case, the employee is put in the limelight because of his/her religion. The supervisor or coworker, who has little or no knowledge of the religious practices that are at the root of these actions, may attribute an incorrect reason for the behavior that they see. These scenarios illustrate that lack of knowledge can lead to conflict, decreased productivity, and diminished motivation for workers as well as managers.
DIRECTIONS
Each scenario illustrates the intersection between religion and the workplace. Pick one scenario, conduct additional research if needed, and share your answers to the following questions with your classmates on the discussion board. Each question is worth 4 points totaling 16 points for Part A of the assignment. For Part B, elaborate on another students post worth another 4 points. The total assignment is worth 20 points.
Using only the information provided in the scenario, list the possible attributions (i.e., explanations of why this person is behaving as he/she is without knowing the real reasons behind the behavior) that coworkers and managers in the case might use to explain the persons behavior without understanding that persons religion.
Discuss the negative and/or positive effects of these attributions on the work organization.
What should a manager do in this situation?
Explain the religious significance of this workers behavior. (NOTE: It is important to this exercise that this is the last step in the discussion.)
SCENARIOS
Mary Ellen comes to work with a dark spot on her forehead. Several times during the day, coworkers tease her about forget ting to wash her face and suggest that she visit the ladies room.
David sits with his coworkers at a luncheon provided during a meeting. Chicken, with a creamy sauce, salad, and rice are served but he declines to eat and only sips water. People at the table ask him if he is feeling well. He keeps assuring them that he is fine.
Kaleen never attends any company informal or formal social events (drinks after work, trips to a nearby casino, holiday parties, etc.). In addition, in an organization where open doors are a strong cultural norm, his door is often closed for short periods of time. During his performance appraisal, his boss tells Kaleen that he needs to become more sociable and accessible if he expects to move into a management position.
Tyler works full time as an assistant manager in a large retail chain store that is open 12 hours a day, 7 days a week. It is company policy that all managers must rotate working on weekends. Tyler has been using many different excuses to avoid working on Saturdays. Although Tyler is a good worker, his boss no longer believes Tylers stories and will be noting this behavior in his next performance review.
UC Computer Science Network Security Management Discussion Responses
provide replies to below two Discussions:main que:What are three network security management best practicesAs most of the companies and organizations use internet, Information systems security. Computer and network security, it has become complex system and changes occur every day. It is important to develop a strong security strategy involves keeping one eye on the reality of Internet-speed changes in threats and technology, and the other on the reality of the corporate environment. It is necessary that the companies should know how and what to protect and what controls to put in place. This includes planning, policy development and the design of procedures. According to the January 2000 Internet Software Consortium’s Internet Domain Survey (www.isc.org/ds), there are more than 72 million hosts on the Internet. Given that many organizations do not advertise their internal name spaces, we know that many more computers are connected in some fashion to the Internet. Changes in network and security architectures, network security management is far more challenging and complex than just a few years ago (Bodhe, Masuti Umesh, 2016).Three network security management best practicesSecuring Hardening, preparing are three best practices in networkNetwork attacks are developing, and former resolutions might not be adequate to prevent future risks and attacks. This is the reason for one of the vital parts where network security best practices came into picture and having antivirus up to date in the system. Software updates should be installed, having effective anti-virus in the system will almost protect over 90 percent of instances. Installing patches is also an important aspect to be considered. System should be always secure and up-to-date. Logging should be enabled to track how is doing what, who logged into the system. Giving access on need base and eliminating privileges and access rights should be implemented as top network security standard. System administrators and network administrators should be able to identify the weaknesses.Hardening helps in solving known as well as predictable while preparing provides solution for unknown and unpredictable solutions. Always update the procedures and policies according to the trend. Implementing and exploring new tools to update configurations, policies and procedures as required.Best security management practices should me focused on four fields. They are when planning and executing the deployment on systems. Integrity maintenance. Providing awareness to the employees on security issues.Security teams support compliance mandates internally and externally, permit new facilities, improve routine, confirm obtainability, and provision the capability to troubleshoot professionally on mandate with no scope for mistake. That is a portion for steadiness when handling network security.Prevention is top network security practice.By the period to determine that the association has suffered a data breach, the damage will have already been done. Therefore, its so important to prepare ahead of time. After all, in terms of network security, an ounce of prevention is worth far more than a pound of cure. Computers should be configured in a way that they should be less vulnerable to any kind of malicious attacks. Integrity is an important aspect to be considered for deployments. Employees should be aware of all the security issues thats are taking place in recent times. They should be trained to follow compliance and regulations. Disaster recovery and incident report are the best practices for a company to keep them in a place.Securing networks according to the requirements and categories of data must be handled with proper care on computers. Building servers on a tight security system and they should be dedicated for solitary purpose. Multifactor Authentication is the best practice for login system to attain a token-based authentication. Encryption should be implemented to protect certain assets. Recognize the security apprehensions associated to daily administration. Traffic monitoring should be done on an isolated network and network traffic should be captured on internal hosts.
Jawaharlal Nehru University Real-World Application of Business Intelligence Discussion
Discussion How would one define business intelligence (BI)? Identify and briefly discuss a real-world application of BI.Reply 1:-Business intelligence will help in dealing with a proper leverage with respect to the software but the services on the other hand will help in bringing up a better transfer ability through the actionable intelligence. It will be given through multiple units where the influence of the organisational strategy has been completely tactic under the business stations but the intelligence which has been used in order to meet it for the and compassion pattern will be advised only on the computer technologies has been enhanced (Korth, 2018).The identification on the other hand would be discovered once the analysis of the business data has been made due to the decision making process but have the strategic operations on the other two sides would be managed only once the data warehousing as being managed by the dashboards. It could also be reported only once the technology has been associated with discovering ability but the management of data analysis on the other hand could be going through the process of the technology. Another most important part of the business intelligence would be the reference which has been associated with the Technological Applications in the aspect of crackers it has been associated with collection as integration of data by the proper analysis. It will be well presented with the finding have been reported based on the summer is but the dash quotes on mother hand could be used by the proper management of grass as well as chat as a map that has been providing the uses along with the detailed intelligence. Another most important aspect which has been associated with organisations will definitely be the competitive strategy at a market place due to increase in the process (bi-survey.com, 2019).Reply 2:-Business intelligence and Organisation prospective will help with lot of oxidation with respect to women in the decision making process of increasing operational efficiency with acid trying to get a revenue internship training. Help in identifying the market Trends based on the business problems that has been used to on the spot it out along with the address.The probability of the business transactions on the system would be migrated from the ones essentiality of the day after managed by some time based on the internal memory of the books. It was generally help in managing the software systems based on the historical context that the predictive of the business operations would be used on the data has been well gathered by the data warehouse. It can also be managed by the context that the operational efficiency of the data will be during multiple elements so that the support system would be reported only once the interactive management of the table analysis division is along with the statistical data (Koch, 2018).Will also be used in the business perspective get information which has been gathered along with the companies would be used only once the industry has been managed along with the benchmarking source. Business intelligence of original be associated with details which flower has been making it impossible to buy traditional values that sentence which has invented the Technologies will be involved with the data warehouses add remove black spots as a territory for the reporting aspect of discoveries. They are helping dealing with performance indication with the matrix which has been associated of of the organisation will help in managing the intelligence tools with countries (Koch, 2018).Note:-Its a Discussion and two replies for above questioni need everything in separate documents as 1st document should be discussion of 250words. , 2nd document should be reply 1 and 3rd document should be reply 2.make sure no turnitin and no plagiarism please dont copy it from any source write in your own words.make sure you write everything in own wordsPlease dont copy from any source we have a turnitin.And send me three documents in different folder.
Case problem 13.1 | Accounting homework help
Case problem 13.1Mary and Nick Stalcheck have an investment portfolio containing 4 vehicles. It was developed to provide them with a balance between current income and capital appreciation. Rather than acquire mutual funds shares or diversify within a given class of investment vehicle, they developed their portfolio with the idea of diversifying across various types of vehicles. The portfolio currently contains common stock, industrial bonds, mutual fund shares, and options. They acquired each of these vehicles during the past 3 years, and they plan to invest in other vehicles sometime in the future.Currently, the Stalchecks are interested in measuring the return on their investment and assessing how well they have done relative to the market. They hope that the return earned over the past calendar year in excess of what they would have earned by investing in a portfolio consisting of the S P 500 Stock Composite Index. Their research has indicated tha the risk-free rate was 7.2 % and that the (before-tax) return on the S P 500 was 10.1% during the past year. With the aid of a friend, they have been able to estimate the beta of their portfolio, which was 1.20. in their analysis, they have planned to ignore taxes, because they feel their earnings have been adequately sheltered. Because they did not make any portfolio transactions during the past year, all the Stalchecks investments have been held more than 12 months and they would have to consider only unrealized capital gains, if any. To make the necessary calculations, the Stalchecks have gathered the following information on each of the 4 vehicles in the portfolio.Common Stock. They own 400 share KJ Enterprises common stock. KJ is a diversified manufacturer of metal pipe and is known for its unbroken stream of dividends. Over the past years, it has entered new markets and, as a results, has offered moderated capital appreciation potential. Share price has risen from 417.25 at the start of the last calendar year to $ 18.75 at the end of the year, quarterly cash dividends of $0.20, $0.20, $0.25, and $0.25 were paid.Industrial bonds. The own 8 Cal Industries bonds. The bonds have $1000 par value, have a 9.250% coupon, and are due in 2018. The are A-rated by Moodys. The bond is quoted at 97.000 at the beginning of the year and ended the calendar year at 96.375%.Mutual funds,. They hold 500 shares in the Holt fund, a balanced, no-load mutual fund. The dividend distributions on the fund during the year consisted of 0.60 in investment income and $0.50 in capital gains. The funds NAV at the beginning of the calendar year was $19.45 and at the end of the at $20.02.Options. They own 100 options contracts on the stock of a company they follow. The value of these contracts totaled $26,000 at the beginning of the calendar year. At year-end the total value of the options contract was 429,000.Questions:a. Calculate the holding period return on a before tax basis for each of these 4 investments vehicles.b. Assuming that the Stalchecks ordinary income is currently being tax ear a combined (federal and State) taxes rate of 38% and that they would pay a 15% capital gains tax on dividends aand capital gains for holding periods longer than 12 months, determine the after-tax HPR for each of the 4 investment vehicles.c. Recognizing that all on the Stalchecks investments were unrealized, calculate the before-tax portfolio HPR for their vehicle portfolio during the past calendar year. Evaluate this return relative to its current income and capital gain components.d. Use the HPR calculated in question c to compute Jensen;s measure (Jensens alpha). Use the measure to analyze the performance of the Stalchecks portfolio on a risk-adjusted, mark-adjusted basis. Comment on your finding. Is it reasonable to use Jensens measure to evaluate a 4-vehicle portfolio? Why or why not?e. On the basis of your analysis in a, c, d, what, if any, recommendations might you offer the Stalchecks relative to revision of their portfolio? Explain you recommendations. Please do in memo not to exceed 500 words
Assignment instructions sociology 330 research methods assignment 3:
Assignment Instructions SOCIOLOGY 330 RESEARCH METHODS Assignment 3: Questionnaire
Assignment Instructions
SOCIOLOGY 330
RESEARCH METHODS
Assignment 3: Questionnaire (25 points):
Due no later than 11:55p ET on Sunday of Week 7
Purpose: The purpose of exercise is to develop a short questionnaire containing both close-ended survey questions and open-ended questions. Students will go through the research design process from research question, to survey construction, to analysis of survey results and theory building using a peer-reviewed article.
Requirements:
Your assignment should include
All sections 1-9
This assignment does not have to be written in essay format. You may organize it by section, question number with question text, and then your answer.
APA formatting should be used throughout. Any time your paraphrase or directly quote a source (such as your article), in-text citations should be used. A full APA-formatted reference should be included at the beginning or end of assignment.
Disclaimer
Originality of attachments will be verified by Turnitin. Both you and your instructor will receive the results.
1.Research Question (1pt)
1) Develop a clear, specific, sociological research question that will investigate the relationship between two social phenomena/behaviors/facts.
2. Conceptual and Operational Definitions (5pts)
2) Clearly identify the variables in your research question
3) Identify which variable is your independent variable, and which variable is your dependent variable.
4) Provide a conceptual definition for each variable. (i.e. similar to dictionary definition)
5) Describe what type of variable each variable is.
6) Provide an operational definition for each variable. (i.e. how the variable is going to be measured)
3. Hypothesis (1pt)
7) Develop a hypothesis for your research question a statement of what direction you believe the relationship between your two variables will be.
4. Questionnaire Construction (3 pts)
8) Develop 5-10 closed-ended questions (*for groups: 10-15 questions)
a. Some of these should measure basic socio-demographic characteristics (i.e. age, race/ethnicity, gender, SES)
b. The rest should be indicators for your variables
c. These should be constructed based on the type of variable you are measuring.
9) Develop 2-5 open-ended questions for to help measure your variables (* for groups: 3-7 questions)
a. This is going to help provide some rich qualitative information and serve as a check for the internal validity of your close-ended questions
5. Sampling Design (2 pts)
10) Describe your population, sampling frame, and method
11) Describe your sample
6. Administer the Questionnaire (1 pt)
12) Have 3-5 people complete your questionnaire. (*for groups: 10 people per person)
a. This may be done face-to-face where you ask the questions, the respondent answers, and you record the information
b. This may be done via a form that people fill out (i.e. it could have been sent to some friends/family via email or handed to them in the kitchen)
c. When asking people to complete the questionnaire, you need to inform them that it is voluntary, and their identity will be kept confidential
i. Do not put a place for name on the questionnaire
6. Compile the results of your questionnaire into a table (1 pt)
13) This provides you with a simple count
14) *For groups only: consolidate data and consult with professor by Week 6 about data analysis.
Sample Table
Indicators
Respondent 1
Respondent 1
Socio-demographic measures
Age
38
24
Gender
female
Male
Etc.
Variable 1
Measured by Q1
C neither agree nor disagree
A strongly agree
Q3
D disagree
B agree
Q8 (open-ended)
R1 described their daily activities in the household
R2 described their daily activities in the household
Variable 1
Measured by Q2
5 hours
29 hours
Q5
3 days a week
7 days a week
Etc.
7. Analyze the results of your questionnaire (see chapter 12) (3 pts)
15) Provide descriptive statistics (counts) of the responses
16) Identify trends in the data results
17) Conduct a chi-square test (optional)
18) How do these results help you to answer your research question
8. Peer-Reviewed Article (3 pts)
19) Find 1 peer-reviewed article that is related to your research question.
20) Briefly describe the article (thesis/research question, hypothesis, methods, findings)
21) Compare and discuss the methods and findings of the article to your own small study
9. Discussion (4 pts)
22) Briefly summarize the research purposes, methodologies, and key findings (in a non-statistical manner) of your study
23) What are the strengths of your study and findings
24) What are the weaknesses of your study and findings
25) Discuss implications for future research on your research question
10. Reflection (1 pt)
26) Briefly discuss what you learned about research methods through this assignment.
Business Law Worksheet
Question 1. Using the web site www.canlii.org Find the following case Ellerforth Investments Limited V. Typhon Group Ltd., 2010 ONCA 275 (CanLII) and answer the questions from the case and the text book. a. What was the judges conclusion? (1 mark) b. The court referred to section 35 f of the Partnerships Act ,RSO 1990, c.P.5,what were the 2 grounds for dissolving the partnership on the just and equitable grounds ?(2 marks) c. Explain 2 other grounds there are in the Partnerships Act (not including those under section 35) to dissolve a partnership. ( 2 marks )Do not cut and paste your answers. d. The judge referred to fiduciary duty, explain in your own words what this means and give 2 examples of how partners can breach their fiduciary duties. ( 3 marks) e. Explain the conflicting views held by the appellant and the respondent as to the future of the partnership. ( 2 marks) f. According to the Partnerships Act, explain what would happen to a partnership of 10 partners if one of the partners dies and if there is anything that can be done to avoid those consequences in Ontario.( 2 marks) Total 12 marks Question 2 As a hobby, Sabreena has been making homemade cupcakes for her friends and family for some time. Recently she has been asked if she would supply her cupcakes to farmers markets. She has been told by a friend to consider forming a business before she does this. Sabreena is seriously considering forming a sole proprietorship as she believes she could make a reasonable amount of money from this. She does however have a number of questions. 3 Advise Sabreena on the followinga. Explain to her, the type and extent of the liability she could face if the business fails. (2 marks) b. Besides the liability aspect, explain (not just name) 2 advantages and 2 disadvantages of forming a sole proprietorship. (4 marks) c. If after a few years Sabreenas business thrives and she wishes to form a Limited Partnership, what advice would you give her mother if she wants to invest in her daughters business but avoid liability and why.(2 marks ) Total 8 marks Question 3 a. Under both the common law and statute law, both the employer and the employee are under certain duties. From the following scenarios, identify AND explain who has breached what duty. i. Ahmed has started his new job at a language school. On his Resume he stated he was fluent in French, German and Italian. His first class of teaching French went well but he is dreading the afternoon class, which is a very high level of Italian. The truth is he only took Italian to Grade 10 and is by no means fluent. (2 marks) ii. Sonja is a secretary in a large architect firm. The firm has now acquired the very latest computer system. It is very different to what Sonja is used to. She has been given a very urgent task to do that requires her to use this new equipment .She is unsure about certain aspects of the equipment but her boss had told her to just get on with the task in hand.( 2 marks) 4 iii. Manjeet is a nurse and as such has to work shifts. He is not a morning person and finds it very hard to get to the hospital on time for his early shifts. As a result he is frequently 20 minutes late and this is causing problems.( 2 marks) b.There is a statutory duty on employers to provide a safe workplace. Explain, giving 2 reasons, why it is in the employers interests to set and enforce health and safety standards in the workplace. (2 marks) c.There are many statutes regarding employment law. Using the website www.canlii.org Find the Occupational Health and Safety Act, RSO 1990, c 0.1 and under section 32.0.1 what are the 2 types of policies that an employer has to prepare. (2 marks)Do not cut and paste your answers. Total 10 marks
Security plan -privacy policies- risk assessments
Part 1 Devils Canyon
Part A: Ch. 3 Role Playing Sim: Devils Canyon
In this simulation, you will evaluate how to design an enterprise architecture for a Mountain Resort. Your job is to utilize the teams vision to design the enterprise architecture using the interactive map tools while staying within budget. Using the Devils Canyon Simulation Access link, complete the interactive before moving to Part B.
Part B: Policies, Plans, and Risks
Now that youve seen all of the elements contributing to the Devils Canyon enterprise architecture, Justin wants to move forward with developing privacy policies to ensure videos arent distributed or uploaded to the net without the consent of the people in them. This opens a much larger conversation: Devils Canyon is also in need of a complete security plan, as well as risk assessments.
In a 3- to 4-page rationale and table, prepare the following information to present to the Devils Canyon team:
Explain the relationship between policies and security plans. Identify potential policy needs, noting Justins privacy policy, in relation to the Devils Canyon enterprise structure.
Outline the importance of a security plan in relation to security roles and safeguards.
Analyze at least 5 security-related risks/threats that Devils Canyon may face.
Assess the probability and impact to the Devils Canyon if each risk occurs. Based on these two factors, determine the overall risk level. For purposes of this assignment, evaluate and categorize each factor as low, medium, or high, and create a table to illustrate the risks. For example, a risk/threat with a low likelihood of occurrence and a high impact would represent an overall medium risk.
Consider digital elements mentioned in the designing of the enterprise architecture, such as software, hardware, proposed security measures, smart lift tickets, webcam systems, and smartphones.
Part 2 Devils Canyon
Using the potential risks for Devils Canyon you identified in Part 1, create a 4- to 5-page matrix to share with the team. In your matrix, you should do the following:
Describe briefly each of the identified risks/threats.
Evaluate the security controls that mitigate each of the risks/threats identified.
Provide a rationale for how each of the controls identified mitigates the risk to an acceptable level.
Research and describe the security technologies and security design that can be used to mitigate each of the identified information security risks.