IT214 Week 6

Weekly Assignment/Discussions via Unicheck Week 06

Write a Python program to convert temperature from Celsius to Fahrenheit and Kelvins; from Fahrenheit to Celsius and Kelvins.

Document your program – to include your name, course, date written, and the formulas used in the conversions as COMMENTS at the top of your program.
Instruct the user on how to enter the data you are requesting.
 

You must use the IF, ELSE, ELIF statements or a combination of these statements.
 You must functions [at least three functions]  You must have error trapping routine(s)
 You must have an exit to you program

INFORMATION SECURITY

 

(A).examine an organization’s relationship between information security and ISO 27001. Additionally,  students  will examine some of the different types of cryptographic Attacks such as those on social media plaforms.

  1. Understand the importance of articulating an organization’s goals, values and risk position as well understanding how they assist in setting an organization’s materiality standard.
  2. Assess effectiveness of an organization’s information security risk assessment methodologies.
  3. Define the relationship between an organization’s operational informational security requirements and the ISO 27001.

(B).The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

For your week 3 research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

computer

Research Project Instructions

5G

5G Cell communication is gradually been adopted by telecommunications providers across the country. 

However, there are technical problems to overcome, including that the higher frequencies cannot even 

penetrate a pane of glass. 

Security alarms have been raised everywhere, from the ridiculous to the political. Do as much research 

as you can on the threats of 5G and tell me about what you can find. You should be able to find 

everything from hacking issues, to privacy issues, to frequency issues, to political and nation state issues,

to manufacturing issues, and maybe others. What are the dangers you found and how real are each of 

them? Be sure to give sources of your research

Note:
Irrespective of the option you choose, your paper must have at least 5 sources. Include in-text
citations and a reference section. The reference section does not count towards the total number of
pages. Make it double spaced with a minimum font size of 11.
It’s worth noting that Wikipedia does not count as a reliable source in academic writing. Use APA or IEEE
for your citations.
Some sources to consider:
https://www.pcc.edu/library/databases/#group=databases&subject=computers-math-
engineering&format=articles-full-text&peer_reviewed=0
APA Citation Guidelines
:
https://www.pcc.edu/library/research/citation-style-guidelines-and-samples/
IEEE Citation Guidelines:
https://ieee-dataport.org/sites/default/files/analysis/27/IEEE%20Citation
%20Guidelines.pdf
,
Research Help Appointments at PCC
:
https://www.pcc.edu/library/research/research-help-
appointments/

Blockchain – Discussion

n chapter 6, the author describes twelve disruptions to existing markets. Create a new thread, choose one of the disruptions discussed in chapter 6, and explain how you think it will impact today’s economy, and provide at least two real examples of the chosen disruption being realized with blockchain technology today.

Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 4, 5, or 6. You’re not trying to test each other, but you are trying to start a discussion.

You must do the following:

1) Create a new thread. As indicated above, choose one of the disruptions discussed in chapter 6, and explain how you think it will impact today’s economy, and provide at least two real examples of the chosen disruption being realized with blockchain technology today. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 4, 5, or 6. You’re not trying to test each other, but you are trying to start a discussion.

2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should answer AT LEAST one of the questions posed in the thread and extend the conversation started with that thread. Make sure that you include the question in your comment so I can see what question you’re answering.

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just a short answer.)

C# Programming

URGENT! PLEASE ANSWER FAST!!

I attached the banking application

(unzip the file so there’s no errors when opening)

Computer Science

  

Calculus Chapter 2

 Read the bottom of p.160 through the top of p. 161. Now take a road trip.  If you don’t drive, ride with a friend, or ride the bus.  Think about what you are feeling as the vehicle starts, speeds up, moves, slows down, and stops.  Considering the position of the vehicle as the function, explain what you notice in terms of the function and its first, second, and third derivatives.  How do you measure each of these, both by using the vehicle’s instruments and by what you feel acting on your body?   

Note:  Be safe!  Obey speed limits and other laws of the road.  You can test these phenomena without driving fast.   

Once you have posted, respond to one other post. Do not focus on length, but instead focus on clear and original thoughts.  As always, your work must be your own.  

Training Management Database System – project

Project Instructions 

• This project worth 14 marks and will be distributed as in the following: 

a) Identify the entity types, attributes, keys.                        (2 marks) 

b) Identify the relationship and cardinalities.                       (2 marks) 

c) Draw the ERD.                                                                 (2 marks) 

d) Schemas before Normalization.                                       (1.5 marks) 

e) Schemas after Normalization.                                          (1.5 marks) 

f) Create the tables.                                                              (1.5 marks)                                                    g) Populate your tables with at least 5 rows.                        (1.5 marks) 

h) Execute the requested sample queries.                             (2 marks) 

Screenshots for answering SQL questions (f, g, and h). 

• You are advised to make your work clear and well presented; marks may be reduced for poor presentation.

• The work should be your own, copying from students or other resources will result in ZERO marks

Training Management Database System   

A training providing institute is offering training courses to their clients.  A database system is needed to register the trainees in these courses. The data requirements for the system are given as follows: 

• The company has many teachers. Each teacher has a unique id, name, date of birth, address (house number, street name, city, state), and may have several phone numbers.  

       o A teacher may teach many courses.  

       o We keep track of the number that a teacher has taught a course. 

• The institute offers many courses to their clients. Each course has unique id, course name, start date, end date, and course language. 

      o The course language is either English or Arabic. 

      o We keep track of the fee of each offered course. 

      o One or more courses is offered to a client. 

• There are many clients. Each client is identified by unique id, client name, address, contact person, and contact person name. 

• Trainees works for a client. Each trainee has a trainee id, first name, last name, and a phone number. 

     o Trainees may take several courses. o We keep track of the fee of the taken course by a trainee. 

Learning Outcome(s): 

Design a database starting from the conceptual design to the implementation of database schemas. 

Create EntityRelationship model, Relational model, and write SQL queries. 

InfoTech Import in Strat Plan 10

Develop a computer/Internet security Policy :

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy

NOTE: You are writing policies that might actually be used in an organization.
Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 
Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.Your paper should meet the following requirements:

  • Be approximately 2-4 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.`