Preview

homework7

Satisfactory Essays
Open Document
Open Document
1639 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
homework7
12-8.
a. using the Figure 12-11 information, develop a risk assessment for the Espy Company.
These are the risk assessment in the order of probability from high to low:
Followed by Vandalism: 0.65; Brownout: 0.40; Power surge: 0.40; Flood: 0.15; Fire: 0.10; Software failure: 0.10; Equipment failure:0.08. Embezzlement:0. 05.
Based on the probability,

Estimated loss situation range
Control cost
In order to prevent that (Solutions):
Vandalism
1,000-15,000
8,000
1. Give limited people to access the data. (set up authorizations.) Make sure only people who needs what information and who have rights to edit what information.
2. Change the access code or passwords of employee periodically.
3. Manually monitor their own property. For example, creating form or setting up camera recording.
Brownout
850-2000
250
1. Keep in a proper place.
2. Prepare back up incase.
Power surge
850-2000
300
1. Have proper power cord.
2. Keep in a proper place.
Flood
250,000-500000
2500

1. Whenever talk about nature disaster, the first come to mind is insurance.
2. Launch equipment and inventory on a floor up, incase water to reach.
3. Back up data in other place in order to keep documentation alive.
Fire
150,000-300,000
4000
1.Whenever talk about nature disaster, the first come to mind is insurance.
2.Launch emergency early warning mechanism.
3.Back up data in other place in order to keep documentation alive.
Software failure
4,000-18000
1,400
1. Monitor whole processes and check which software does not work well. Contact the software company to see if they can fix the problem. If they could not, exchange the software.
2. Data need to be back up in order to avoid to loss documentation together.
Equipment failure
50,000-150,000
2,000
1. Keep eye on your equipment and estimate the deprecation year. Replace the equipment as soon as possible , decrease the cost.
2. Make sure workers use it in a right way. Provide training if necessary.
Embezzlement
3,000-9,000
1,000
1. Separeate the work

You May Also Find These Documents Helpful

  • Good Essays

    Homework Chapter 4

    • 1675 Words
    • 7 Pages

    3. Allen visits Reno, Nevada, once a year to gamble. This year his gambling loss was $25,000. He commented to you, “At least I didn’t have to pay for my airfare and hotel room. The casino paid that because I am such a good customer. That was worth at least $3,000. “What are the relevant tax issues for Allen?…

    • 1675 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    A DMZ network which is made up of 2 Border (Core) routers, which are connected to the 2 10GB internet connections. 2 Distribution Routers. 1 VPN gateway, 1 firewall, 1 RMS server and a PBX box that is connected to the PSTN remote access dial up network.…

    • 887 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Homework Week 2

    • 743 Words
    • 3 Pages

    5. Bob enters a pizza shop and notices there are three different sizes of pizzas available. Sizes are given as the diameter of the pizza in inches. The cost of a pizza is based on the size. Bob would like to know which size of pizza has the lowest cost per square inch.…

    • 743 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Homework #1

    • 251 Words
    • 1 Page

    1)Farmer Brown produces eggs and milk on his farm. He initially produces at point A. He would like to produce the same amount of eggs per day and increase his milk production by one gallon per day. Is it possible? Why or Why not?…

    • 251 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Homework 3

    • 830 Words
    • 4 Pages

    Molecule x blocked the ion channel receptor site so acetylcholine could not attach therefor not allowing the muscle to ultimately contract.…

    • 830 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    11 What determines which areas of the program a particular user can access, and whether that user can only view data or has rights to enter or edit data?…

    • 484 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Homework 7

    • 932 Words
    • 4 Pages

    Go to the list of datasets located on the website http://wps.aw.com/aw_stock_ie_3/178/45691/11696965.cw/index.html . Right-click the one named “Guns Data (Stata dataset)”, save it somewhere you can access it and then open it in Stata. This dataset contains panel data from 50 states plus the District of Columbia for the years 1977 through 1999. A detailed description is given in the file “Guns Data Description (PDF)” on the same page. We are interested in the effects of “shall-issue” laws relating to concealed handguns. The variable “shall” is 1 if a state has such a law, 0 otherwise. States that have “shall-issue” laws *shall* (i.e., must) give a concealed gun permit to anyone that wants one (and isn’t a felon, mentally incompetent). States that do not have “shall-issue” laws may issue permits, but generally do so only to certain types of people (i.e., their laws are much stricter). Proponents of “shall-issue” laws argue that they will reduce crime, because criminals will be deterred by the knowledge that some people are carrying guns. Critics argue that “more guns means more crime”. 1. The outcome we will analyze is the log of violence (i.e., you need to create a variable such as ln_vio using a command such as “gen lnvio=ln(vio)”. Why is it convenient to use the log of violence as the outcome variable (rather than the number of violent incidents as recorded by “vio”)? [2 points] 2. Estimate a regression of lnvio on shall for 1977: (a) How many observations are in this regression? [1 point] Is this what you expected? [Hint: think about it in relation to the number of states and the number of time periods in this regression] (2 points) (b) What does the coefficient on “shall” imply is the effect of a shall-issue law on violent incidents in 1977 (assuming we believe these estimates)? 3. Estimate a regression of lnvio on shall for 1977, controlling also for incarcrate, density, avginc, pop, pb1064, pw1064, pm1029. (a) How does this…

    • 932 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    The data must be kept secure against unlawful or unauthorised processing, accidental loss or erasure.…

    • 1120 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Ensure that the service user has access to their records if they wish, as they are entitled to know the information their records contain. Securing records when they are being written in or read…

    • 1515 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    When ensuring the security of information, records should be stored correctly, any confidential calls or meetings should be private and take place where nobody can accidentally overhear the conversation, all records should be returned to the correct storage place. And any lost, stolen or destroyed records should be reported immediately, you should ensure the proper disposal of any information or records that are no longer needed or are damaged.…

    • 532 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Homework #4

    • 365 Words
    • 1 Page

    Responding to the philosophical dilemma of the Euthyphro, the first conclusion “What is moral is not moral because it is commanded by (the) God(s)”, the premises to support this conclusion would be from James Rachel’s chapter, “Does Morality Depend on Religion?” Rachel evidences that “according to Exodus 20:16, God commands us to be truthful. On this option, the reason we should be truthful is simply that God requires it. Apart from the divine command, truth telling is neither good nor bad. It is God’s command that makes truthfulness right”. Rachel is stating that God commands us to be not to be liars and leaving the command on the side, telling the truth is neither good nor bad but it is God’s command to make the truth right. Also, Rachel states that lying would lead to trouble but God could have given us another command. For example, being liars and it would not be a bad thing because God gave us that command. Therefore, he could give us more reasons to command the opposite so, from a point of view of a moral; God’s command is a random choice. Thus, with this conclusion, we are stuck with consequences that even most religious people would find it offensive. The second conclusion “What is moral must be moral because it is commanded by (the) God(s)”, the premises to support this conclusion would be from James Rachel’s chapter, “Does Morality Depend on Religion?” Rachel defines “God, who is infinitely wise, realizes that truthfulness is better than deceitfulness, and so he commands us to be truthful; he sees that killing is wrong, and so he commands us not to kill; and so on for all the moral rules”. Rachel means that God knows what is right for a human being so he commands us to be honest and truthful because he knows that it is wrong. If we take this option, then we would abandon the conception of right and wrong because we are leaving ourselves open to a lack of reasoning. Many religious people opinions are to accept the fact of right…

    • 365 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Homework 3

    • 459 Words
    • 2 Pages

    (* Coursera Programming Languages, Homework 3, Provided Code *) exception NoAnswer datatype pattern = Wildcard | Variable of string | UnitP | ConstP of int | TupleP of pattern list | ConstructorP of string * pattern datatype valu = Const of int | Unit | Tuple of valu list | Constructor of string * valu fun g f1 f2 p = let val r = g f1 f2 in case p of Wildcard => f1 () | Variable x => f2 x | TupleP ps => List.foldl (fn (p,i) => (r p) + i) 0 ps | ConstructorP(_,p) => r p…

    • 459 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Wk8 Quiz Hca

    • 379 Words
    • 2 Pages

    4. List two actions you will take to make sure electronic data is not lost if the computers in your office crash or there is a power failure:…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Homework 2

    • 1897 Words
    • 8 Pages

    1. What common programming language statement, in your opinion, is most detrimental to readability and why do you think that?…

    • 1897 Words
    • 8 Pages
    Powerful Essays