project 3

 

Class Discussion Topics

prepare 2 slide powerpoint for each question with diagram too 

  1. Discuss the pros and cons of the memory management schemes presented in this chapter. If given an option, which scheme would you implement and why?
  2. Discuss the difference between associative memory and cache memory and the steps involved in using these types of memory.
Projects

write 2 page paper for each question 

  1. Choose an operating system and submit a report on approaches to manage its virtual memory.  
  2. Working in teams of four, write pseudocode for the first-in-first-out (FIFO) and least-recently-used (LRU) page replacement policies.

cyber security policy catalog

 

  • Create a cybersecurity policy describing the principle, the objective, and policy statement for the law firm’s company network.
  • Describe the roles and responsibilities by groups (e.g., position director of network security, the network security manager, network security engineers, IT area), defining roles and responsibilities.
  • Suggest the cybersecurity policy statement, an explanation of the policy statement, and the reasons why the policy statement may be controversial.
  • Determine the security testing methodology you would use to facilitate the assessment of technical controls.

 Use Microsoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm. The project plan should include:

  • Tasks, subtasks, resources, and predecessors.
  • An outline of the planning, analysis, design, and implementation phases.
  • The use of cybersecurity in the information systems development life cycle.

Programming Java Database

 Assignment-4 

Create the user interface shown below in WindowBuilder. 

Write a Java program to do the following: 

When the user clicks on the “Display Records Button, read all the records from the product table in demo.db 

Display the data in the TextArea below the Button, one line per record. 

Separate each field in the record by a comma. 

Sample output:(Note this is NOT the actual data in the table) 

Hammer,200,7.99 

Nalis,500,0.78

Bolts,300,1.23

Nuts,300,1.12 

JA1 Business ethics

  1. How would you personally define ethics?
  2. How do business ethics differ from your personal ethics?
  3. What is the biggest influence on your personal ethics? Why?
  4. Do you try to always be ethical? Why or why not?
  5. Do you think you have a high personal standard?
  6. Do you know an adult that has lied, cheated, or stolen anything? How might an adult justify this type of behavior?

Requirements:

  • Answer each question not less than 100 words.
  • Include the list of references used.
  • Avoid Plagiarism.

question

 

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four pages length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Data Acquisition

 Go online and research some tools that would be valuable in collecting both live memory images and images of various forms of media. Put together a shopping list for your manager that includes tools needed to be purchased. Include a price if applicable. Need this in a word document with no less than 250 words

Policy, Legal, Ethics

  

1) You are the web master of a college website. You share a server with other school departments such as accounting and HR.Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security. your own work and use your own words.  Write min of 300 words.

2) Read this Time article and view the video explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  Write in essay format not in bulleted, numbered or other list format. Discuss in 500 words your opinion, Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraph.

3) Answer below questions, each of these questions in a paragraph with at least five to six sentences.Include the question and number your responses accordingly. Min 1 citation for EVERY question and it needs to be referenced. References & citations should be less than 6 years old. They also need to be an academic source something from the library or scholar Google not just any random website. It must be a peer reviewed academic source or an industry recognized type reference. Make sure your citations and your references use proper APA formatting if you are unsure consult the OWL website. 

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Leadership Traits and Attributes

 Please write a 1 page paper with references of at least one peer reviewed paper.

  1. Discuss and identify leader traits and attributes that are most beneficial in implementing the best decisions in an organization. 
  2. Explain the differences in charismatic and transformational  leadership and how both leadership styles impact organizational  effectiveness. Please note how these leadership styles affect  implementing new innovative technologies.
  3. The work characteristics and the traditional versus high-performance focus, note which focus is best for strategic decisions and which is best for operational decisions. Please explain.

Research Paper

 Any one of the below topics:

  • Information systems infrastructure: evolution and trends 
  • The strategic importance of cloud computing in business organizations 
  • Big data and its business impacts 
  • Managerial issues of a networked organization 
  • Emerging enterprise network applications 
  • Mobile computing and it’s business implications  

Research paper basics: 

  • 8-10 pages in length 
  • APA formatted 
  • Minimum six (6) sources – at least two (2) from peer reviewed journals 
  • Include an abstract, introduction, and conclusion 
  • ABSOLUTELY NO PLAGIARISM!!!! Attach a plagiarism report.