Automatic coding. Discussion board

There is a trend in programming to make coding easier and more automatic. Some welcome this trend, but others are concerned about future programmers not learning necessary programming fundamentals if programming is no longer required. For instance, without understanding how looping and variable initializations work, how easily would an individual be able to find a logic error in a looping process? Do you think programmers of the future should still learn programming fundamentals, even if coding is no longer required? Why or why not?

MM group

a) Develop a marketing plan for a small business (either real or fictional) with a brief introduction (1-2 pages) 

b)The final marketing plan should include the following sections with APA formate and references 

1. Cover Page 

2. Executive Summary 

3. Target Customers

 4. Unique Selling Proposition 

5. Pricing and Positioning Strategy

 6. Distribution Strategy 

7. Promotions Strategy 

8. Contingency Plans 

CC W 14 D

 Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter’s 16-18  (Jamsa, 2013).Chapter 16 topics:

  • Define and describe total cost of ownership. List at least 10 items to consider when determining a data center’s total cost of ownership.
  • Define and describe a capital expense. How are capital expenses different from operational expenses?
  • Define and describe economies of scale and provide a cloud-based example.
  • Define and describe “right sizing” as it pertains to cloud computing.
  • Define Moore’s law and discus how it might influence cloud migration.
  • Given company revenues of $2.5 million and expenses of $2.1 million, calculate the company’s profit and profit margin.

Chapter 17 topics:

  • Compare and contrast functional and nonfunctional requirements and provide an example of each.
  • Discuss why a designer should avoid selecting an implementation platform for as long as possible during the design process.
  • Discuss various trade-offs a designer may need to make with respect to nonfunctional requirements.
  • Discuss why the system maintenance phase is often the most expensive phase of the software development life cycle.

Chapter 18 topics:

  • Using Yahoo! Pipes, create a pipe that displays the names of pizza restaurants within a given zip code.
  • Using Google App Engine, create a page that displays the following Python script:
    • print “Content-type: text/htmlnn”
    • print “Cloud Computing, Chapter 18“

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.

Professional Behaviour

 

In this Assignment, you will have an opportunity to view a set of slides. After viewing all of the choices of sets of slides, choose one of the sets that best represents your desired career field. Then, describe and analyze what you viewed according to the following directions. Each paragraph should be a minimum of 5–7 sentences.

Choose a set of slides to view.

Your Assignment should include:

Part 1: View and Analysis (3–4 paragraphs)

Describe and explain what you viewed. Answer the following questions in your response:

  • Which set of slides did you choose to view? How does this set of slides relate to your own career?
  • Were the individuals professional? What made the individuals professional (consider attire, non-verbal communication skills, presentation of self, and identify and describe specific things in the slides that made the individuals professional)?
  • After reviewing the slides, list and explain specific areas that would be unprofessional on the slides as well as in your field when considering attire, non-verbal communication skills, and presentation of self.
  • Include any additional thoughts focused on professionalism based on what you viewed on the slides.

Part 2: Personal Reflection and Connection (4 paragraphs)

  • Describe the appropriate attire for an individual in your profession. Provide specific examples of appropriate attire. Note: you may want to research this by talking to those in your profession or researching appropriate attire for your profession as this may differ from what you viewed in the presentation. In addition, review the Credibility Robbers information from the Unit 2 Learning Activities.
  • Describe and analyze what makes someone a professional in your field. Use research to support your ideas for this paragraph.
  • Explain the behavioral attributes you practice that identify you as a professional (review Units 1–3 for information).
  • What aspects, such as attire, non-verbal communication skills, and presentation of self, do you possess that make you professional? How do these aspects relate specifically to your field?

Assignment Format

Your submission should:

  • Have a brief introductory and concluding paragraph
  • Be about 2 pages, double-spaced, in length using 12 pt. Times New Roman font
  • Include a title page and reference page (note: these do not count towards the two-page content requirement).
  • Be clearly written in Standard English. Be sure to proofread your assignment before posting to ensure you have proper grammar and writing mechanics.
  • Be unified, original, and insightful
  • Follow proper APA format for both in-text citations and sources on reference page.

IT345 8

 Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources. 

 

Topics:

  • Do you believe we are too dependent on computers? Why or why not?
  • In what ways are we safer due to new technologies?
  • What are some recent examples of technology that has been created that is used to “save lives”?

Computer science

Briefly describe the following

1.profession (15 marks)

2.professional(15 marks)

3.code of conduct (15 marks)

4.Ethics(15 marks)

5 contracts(15 marks)

6.policies(15 marks)

7.practices(15 marks)

Management of Information Security Project

Project Description

Carry out a security self-assessment of an organization of your current or previous employer or your own organization. You must seek permission from the individual responsible for the information security of that organization. You may use any NIST Special Publications (e.g. SP800-171, SP1800), or any other national framework to assist in your report.

Report

Write a report based on the self-assessment of an organization. It should be 5-7 pages long, 12 point character size, double line spacing, and have 1” margins on all sides. It is recommended that you do not use the actual name of the organization in the report; use a title, such as “ABC, Inc.” Your report should include a brief description of the organization, nature of the business, analysis of the results, and recommendations for improvement in the form of an action plan.

Deliverables: A single Word document

Project Guidelines:

For the project, you can do a security assessment on either a single IT system or the entire IT infrastructure of an organization, whichever you think is feasible and manageable.

You can use these guidelines when working on your project:

1) Your project report just needs to be a very general assessment of the IT system in organization. You can keep it brief (about 4 to 8 pages long, not including the cover page), and broadly cover the following areas:

 Management Controls

 Operational Controls

 Technical Controls.

You don’t need to get into specifics on anything that might be considered sensitive or proprietary. Keep it very general (something that can be in the public-domain).

2) For your project, **only** use information that is considered public. Please **do not** use or reference any proprietary or non-public information. As the project guidelines state, do not use the actual name of any organization – instead use “ABC Inc.” And in your project please don’t reference any documents that are not considered to be in the public domain; also don’t use any company names – use something generic such as XYZ Inc.

3) Instead of doing a self-assessment of a real company, you can also do a self-assessment of a fictitious company similar to a real entity. For example, you could imagine that you are performing an assessment of a fictitious entity such as the following:

 A college bookstore that accepts online textbook purchases, or

 A pharmacy store that maintains a database of customer prescriptions

 An auto-insurance agency that maintains customer data

 … etc. … etc.

You can imagine yourself being hired as an Info Security consultant to perform a security audit of the fictitious company’s IT infrastructure. Assume that some rudimentary security measures are currently in place, but there is much room for improvement. In your report describe your assessment of the security measures currently in place and recommend any needed improvements to ensure better IT security in the organization.