LIT101 week 9 A

Discussion 9A: Reflection

This week, you will be completing your literary analysis. In this discussion you will reflect on the analysis process and the course overall. 

Initial Post

In your initial post, first discuss what you learned in this course and how you might apply it to your professional context. What were your favorite elements of the course? What was most confusing?

Then, identify the work that you chose for your literary analysis. Explain what concepts you will use to analyze this work. Do you have any questions that you need answered to complete this project. 

Responses to others. 

Respond to two other posts by comparing it to the literary work you chose. How is it similar to how you will approach your literary analysis?

Guide to implement access control change

Two APA pages

Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences. (please see below and and follow all requirements)

Create a guide that security personnel will use that includes procedures for implementing an access control change. The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved.

Ensure that your procedures include the following:

1. Status or setting prior to any change

2. Reason for the change

3. Change to implement

4. Scope of the change

5. Impact of the change

6. Status or setting after the change

7. Process to evaluate the change

In Chapter 14 of Davis

  

QUESTION 1

In Chapter 14 of Davis, Schiller, and Wheeler (2011), the authors explored various steps for Auditing Cloud Computing AND Outsourced Operations, which seemed to suggest (implied) organizations having business relationships with third-party service providers. Heiser and Nicolett (2008) contemplated risks, and how organizations might ASSESS risks – that were associated with outsourcing or Cloud computing.

Considering your understanding of Davis, Schiller, and Wheeler (2011), as well as Heiser and Nicolett (2008), compare and contrast vital steps (recommendations) given by each source. Identify 4 recommendations that were similar or closely align BETWEEN (not From) each source. Explain how they were similar.

Davis, C., Schiller, M., & Wheeler, K. (2011). IT Auditing: Using controls to protect information assets (2nd ed.). New York: McGraw-Hill.

Heiser, J., &Nicolett, M. (2008). Assessing the Security Risks of Cloud Computing (G00157782). Stamford, CT: Gartner, Incorporated.

QUESTION 2

In Chapter 15 of Davis, Schiller, and Wheeler (2011), we considered the Auditing function of company or organizational projects from a Project Management perspective. Chapter 16 presented us with a variety of Frameworks and Standards (TOOLS) for carrying out audits in a SYSTEMATIC fashion. 

Identify the one framework that is ALL about Information Technology Governance, is comprised of 34 high-level control objectives, and 215 lower-level control activities. What are the 7 qualities that are emphasized by this particular framework (provide as a LIST)?

Davis, C., Schiller, M., & Wheeler, K. (2011). IT Auditing: Using controls to protect information assets (2nd ed.). New York: McGraw-Hill.

QUESTION 3

You might be asking, “what relates accounting with IT?” The URL for The Public Company Accounting and Oversight Board’s Audit Standard #5 is referenced below. Bullet point 27 mentions IT specifically but other bullets may require IT resolutions. Chapter 17 of Davis, Schiller, and Wheeler (2011), discusses SOX requirements in the ‘Specific IT Controls Required for SOX Compliance’ section starting on p422. Choose three of the IT control area and discuss how they might resolve the problems discussed in PCOAB standard 5 referencing specific bullet points in the standard. 

Davis, C., Schiller, M., & Wheeler, K. (2011). IT Auditing: Using controls to protect information assets (2nd ed.). New York: McGraw-Hill.

PCAOB. (n.d.). Auditing Standard No. 5. Retrieved from http://pcaobus.org/Standards/Auditing/Pages/Auditing_Standard_5.aspx#introduction 

SPSS Data Analysis

I have attached word file with question and datasets which required for this exercise. You will required SPSS software and generate output to perform this exercise. 

SOFTWARE MANAGEMENT -4

1. Using Microsoft Project, add a project start time of 0 (or January 1) and a required project completion time of 180 days, calculate the ES, EF, LS, and LF times and total slack for each activity. If your calculations result in a project schedule with negative total slack, revise the project scope, activity estimated durations, and/or sequence or dependent relationships among activities to arrive at an acceptable baseline schedule for completing the project within 180 days. Describe the revisions you made.

Responses could be presented in a network diagram or in the schedule table format. The project should finish in 180 days. If the original plan is not completed by 180 days, the responses should describe what tasks were revised to meet the required completion date.

2. Determine the critical path and identify the activities that make up the critical path.

Responses can be presented in a list of activity names, highlighted in the network diagram, or highlighted in the schedule table.

HW

  

I. Instructions for your Choosing your Topic

Choose a specific technological artifact (or interconnected set of artifacts) or form of technology whose impacts, biases and political properties you can study by observing first-hand how people in the world use it. Your choice should be a primary source, some form of immediate, first-hand technology that you can observe directly. It should be original and unique, chosen from the categories below, and not be simply something like a smart phone.  

Possible topic categories include:  

· Technological Artifacts in the Built Environment: The built environment includes human-made structures, features, and facilities that encompass the environment where people live and work. Artifacts here would include things like a streetlight, a walkway, a road, a fence or barrier, a sidewalk, a piece of playground equipment, a building entrance, and a building elevator. For example, you could examine the streetlights at a specific busy corner where you live, an EV plug-in parking spot at a local supermarket, elevators in a building near you, an overpass on a specific street, or a specific floating dock at a riverside. 

· Household Items & Tools: These would include forms of technology used in a home. Included here could be things like a vacuum cleaner, a steam mop, a tool for fixing or building things, an interior or exterior lighting system, appliances, pieces of entertainment systems. Be sure to pick a specific brand and model since all vacuums, for instance, are not designed the same way. They can be items used in your own home by your family or in the home of someone you know. Make sure you have been able to observe their actual use. 

· Transportation and Infrastructure: These would include technologies people use to get around and systems that deliver specific locale services. Examples would include a specific car, truck, tractor, bus, train, airplane or a water/sewer system, a set of electrical towers, a dam, a sewage plant or system, a snowplow, a UPS truck, etc. This should be something you can see with your own eyes in its actual context where you live.  

· Technology from another Culture: This would include a technological artifact or form of technology used in a culture other than American culture or another country. Examples would include facial recognition technology in China, high-speed rail systems in Japan, precision farming technology in South Africa, the motorcycle rickshaw in India, and speaker systems on mosques in Pakistan. 

· Digital technology: This would include specific categories of computer programs, apps, platforms, or video games. Examples would be word-processing software, shopping apps, puzzle apps, Web 2.0 social media platforms, Web 1.0 multi-user platforms (usenet, text-based mmorpgs), first-person shooter video games, building video games, military training programs, MMOs of a particular genre (adventure, first person shooter, building), graphical based MMORPGs, bitmap games. 

· Workplace technology: This would include artifacts and digital technology found in the workplace. Examples would be things like staplers, copiers, labelers, mail sorters, forensic microscopes, accounting software, medical software, medical and dental tools, learning management systems, customer management software. 

  

II. Instructions for Creating your Video

Video Content

Once you have chosen your topic, create a 3-5 minute video. You can record your video with your smartphone, tablet or computer. You can give us a glimpse of what you will talk about, such as making your video on-site if you plan to talk about a set of streetlights or a playground, or you could edit in a photo of an artifact you plan to discuss. Be creative! 

In your video you should describe your artifact, mention why you are interested in examining it further, and include some of your thoughts about why this is an appropriate topic for a class on technology and culture. In your video, please make sure to cover the following questions, and feel free to include additional thoughts as appropriate.   

1.  

1. What are you planning to study?

2. Where is it located? If a digital form, where are its creators located?

3. Why is this technology interesting to you, personally?

4. Why is it an appropriate choice to talk about its impacts, biases or technological politics? Please see the readings and other assignments from week 3 to help you figure out how to talk about this question.  

Video Format

Your video should be about 3-5 minutes long and formatted as an MP4, MOV, or WMV. If you cannot create a video for whatever reason, please contact your instructor for an alternative way to fulfill this assignment’s requirements. 

  

III. Instructions for Sharing your Video

Please do not upload your video to the classroom. Instead, upload it to a cloud server (Google, OneDrive, etc.), set the permissions so that everyone with the link can see it, and cut and paste the link from your cloud server into the discussion forum.  

After you post your video, please make sure that others can access it by testing it. You can send your link to a family member or friend to see if they have access. If they don’t, then this means your professor and classmates also don’t, and you will have to adjust the settings. 

ITCO425U4DB

  

Assignment Details

In Unit 4, as we enter the systems integration selection phase, we must select the technical integration framework, and describe and illustrate our systems integration architecture.

For this Discussion Board assignment, share how you think integration frameworks typical to the systems integration selection phase are best used to represent an integration of your system components.

Responses to Peers:

Compare the integration frameworks identified by other students in the discussion, and share how it can be used to supplement integration patterns in your solution.

In your own words, please post a response to the Discussion Board and comment at least 75 words on other people post. You will be graded on the quality of your postings

discussion

 

Select one of the layouts and devise at least three strategies for hardening the network environment throughout the seven domains of a typical IT infrastructure. Support your decisions with justification.

computer architecture FEB 8

Assignment Content

  1. We are now in Week 4 so you all should be more familiar with the Architectural components and processes of a computer. To further enhance your knowledge on this topic, you will be answering the questions below.   Remember to format your work in an APA style (Cover Page is a Must) and provide proper citation and references for the paper. Plagiarism is not allowed and I will give you an automatic zero if I discover that any part of your work was plagiarized either from the internet or another student’s paper.   For this week’s assignment, Please provide a write-up as an answer to the question below;  
    • Compare the computer architecture of modern processors from two different vendors in terms of memory, speed and expansion bus.
    • Explain the concept of virtual memory and its role in memory management and in memory protection.
    • Provide any five differences between logical addressing and physical addressing in operating systems.
    • What are the benefits of using scripts to automate operating systems tasks?
    • You should submit at least TWO FULL PAGES OF CONTENT…meaning sources, title, etc. do NOT count…be sure to include any reference material you used…      

Intro to mL with R

Need an assignment to be done almost completed till 50% ,also materials to do and solution book will be provided

https://drive.google.com/file/d/1Vm0LIRmzyDhl2BNEyjGlQSpSPO58b-G4/view?usp=sharing (materials)

https://drive.google.com/file/d/1Fw0Ht2NQs5-Vt8ThSAlvMT1Ld9ag9jsF/view?usp=sharing (my work)