Engineering ethics

 

For paper 3, you will analyze the ethical or unethical nature of a specific engineering issue by identifying problems in the situation and using an engineering code of ethics to determine how engineering actions and decisions were ethical or unethical. You should write your analysis on one of the topics below. Within your chosen topic, you’ll argue three points that focus on specific parts of engineering that were ethical or unethical according to a specific code of engineering ethics (e.g., NSPE Code of Ethics (Links to an external site.), ASME Code of Ethics (Links to an external site.)).

Avoid discussion of business ethics and focus on the engineering and/or actions of engineers.

ChatGPT
Planned Obsolecense
Manned Trip to Mars
Gene Editing
Drone Surveillance

LEARNING OUTCOMES/GOALS

(1) Students form a persuasive and well-supported argument about the ethical issues of the case
(2) Students adequately describe the technical engineering aspects of the issue for a general audience
(3) Students create clear, organized, and detailed documents

ASSIGNMENT CHECKLIST

  • All papers must be in 12-point Times New Roman font (smaller fonts are appropriate for figure captions and text inside figures).
  • All margins must be 1” all around (note that old versions of Word typically default to 1.25” for left and right margins, so you will need to change these).
  • All papers should be 4-6 pages, double-spaced.
  • Graphics should be used as needed, particularly in the technical description.
  • The paper should be well-researched and cite various sources as needed. Your sources are necessary to provide authoritative support for your ideas and to give credit for supporting ideas that don’t belong to you. Use the APA style of documentation to format your in-text citations and References section.
  • Your paper should have a well-defined point/thesis – a statement somewhere in the introduction that conveys to the reader precisely what your subject is, what your position is, and how you will support this position. Remember that a thesis is a promise to the reader that you’re going to discuss one specific main idea; the rest of your paper is how you go about keeping that promise.

GENERAL WRITING AND ORGANIZATION CONSIDERATIONS

Every paragraph and section should be obviously related to the thesis; every paragraph and section should be obviously related to each other; every sentence in a paragraph should be obviously linked to each other and should obviously refer back to its paragraph’s topic sentence.

The structure of the paper should include an introductory section, a section that describes the engineering issue/technology/problem, a section that discusses the relevant ethical issues and applies a code of engineering ethics to the issues, and a conclusion section. These sections should be clearly labeled with section headings.

Your audience for paper 3, though educated, possesses no specialized knowledge of your research/experiment or of the ethical situation you’re discussing; this fact means you must provide a technical explanation of your chosen scenario (defining any technical terms).

Graphics must serve a substantive purpose, which means you must think carefully about what areas of your content might be helped by visual representation and what types of graphics (photos, diagrams, tables, charts, etc.) will most effectively accomplish your purpose. These graphics may certainly come from outside sources as long as you cite them appropriately. If you modify a graphic in any way, your citation should reflect changes made.

Below, I have attached the short reflection that I have submitted before writing this paper

ASSESSMENT 4

 In this Assignment, you will use Python Pandas. The assignment is designed in sections, with each section having examples. You will run the code that is provided and record the results. 

Discussion – Information Governance

Organizations are struggling to reduce and right-size their information foot-print, using data governance techniques like data cleansing and de-duplication. Why is this effort necessary?  Briefly explain and support from your readings, using APA style citations. Remember to appropriately respond to two other learners for full credit.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least two scholarly sources should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Reference :

Textbook Chapter 2 – Information Governance, IT Governance, Data Governance: What’s the Difference? 

Textbook Chapter 3 – Information Governance Principles

ARMA International, “The Principles”, ARMA International  Retrieved from  https://cdn.ymaws.com/www.arma.org/resource/resmgr/files/Learn/2017_Generally_Accepted_Reco.pdf

Saffady, William,PhD., F.A.I. (2015). Records management or information governance? Information Management, 49(4), 38-41,47. Retrieved from https://search.proquest.com/docview/1696246911?accountid=1037

Fundamentals of Security

Cryptography was identified in one of the key security controls planned for improving PCS security. The cost of the hardware and software for these controls raised some additional concerns.  

Based on your research for Unit 6, write a point paper: 

Explain the benefits of encryption.  

Explain the different ways encryption will play a role on the PCS corporate network and satellite offices.  

Give some examples of security problems that will be addressed by your encryption solutions.  

The CEO asked why we haven’t been using encryption all along if it is so easy. Other than hardware and software costs, provide a response to this question.

System Designs

 

A final report which describes and documents your analysis and design efforts of the proposed solution. Your report must include at a minimum

  • A brief description of the problem, functionality of your proposed information system solution, and the business benefits gained by implementing it. 
  • Artifacts such as use case diagrams, activity diagrams, context level data flow diagrams, E-R diagrams, user interfaces etc. used in your information needs/requirements specification and the systems design.
  • List of the hardware and software required to meet the needs of your business problem.
  • A brief discussion on what kind of a project methodology do you envision to use to implement your proposed solution. Include in your discussion the possible project scope and risk issues, you may encounter.

Note: For 1st and 2nd bullet points, you can use your assignment work and add it to the report

Research Paper

 

Research Topic:  Credit card fraud detection

Rules:

APA Format , 14 – 20 pages 

SubTopics to be covered:

Introduction (3 – 4 pages) 

Problem Statement and Purpose of Research 

Relevance and Significance 

Research Questions  

Barriers and Issues  

Review of the Literature (6-8 pages) — 5 peer-reviewed literature sources do not create below subheadings. This for reference as to understand what all topics have to be covered under review of literature

Description of the research including who the target population was (if available) 

Research Method used to conduct the research (describe what the researcher(s) did to gather data for the research) Was survey distributed? How many questions? How many participants? 

 Was it a focus group? Was it a case study? Be explicit 

Findings: Indicate the findings as reported in the article 

Conclusion: What was the conclusion of the research 

Research Methodology (3 – 4 pages) 

Findings, Analysis, and Summary of Results (2 – 4 pages) 

Conclusions (2 – 4 pages) 

References  

NOTE: I am attaching a copy of detailed description on how to write the research report along with a sample example in the last 2 pages.

GO16_AC_CH02_GRADER_2E_AS – Grants and Organizations

GO16_AC_CH02_GRADER_2E_AS – Grants and Organizations

  

Project Description:

In this project, you will use a database to answer questions about grants awarded to a college. You will open and save an existing database, create a relationship between two tables, sort records in a table, create queries in Design view, create queries from existing queries, sort query results, and specify criteria in a query.

     

Start   Access. Open the downloaded file named go_a02_grader_a1_Grants_Organizations.accdb,   and then enable the content.

 

Using   Organization ID as the common field, create a one-to-many relationship   between the Organizations table and the Grants Awarded table. Enforce   referential integrity and enable both cascade options.

 

Create   a relationship report with normal margins, saving it with the default name.   Close all open objects.

 

In   the last record of the Organizations table, change the data in the   Organization ID field from ORG-1527   to ORG-1001, and then close the table. (The   related records in the Grants Awarded table will automatically update.)

 

In the Sorted Grants table, sort the   records first in descending order by the Award Amount field and then in   ascending order by the Department field. Close the table, saving the changes   to the table.

 

Create   a query in Query Design view based on the Grants Awarded table. Add the following   fields to the design grid in the order given: Grant ID, Grant Name, Award   Amount, Type, and Award Date. Run the query, save it as All Grants Query, and then close the query.

 

Copy   the All Grants Query to create a new query with the name Grant Types Query. Redesign the query so that the   following fields display in the order given: Grant ID, Department, Type,   Grant Name, and Award Amount. Sort the records in ascending order by the Type   field and in ascending order by the Grant Name field. Run the query, and then   close the query, saving the changes to the query.

 

Copy   the All Grants Query to create a new query with the name Grants Sort Query. Redesign the query so that the   following fields display in the order given: Grant Name, Department, Award   Amount, and Award Date. Sort the records in ascending order by the Department   field and in descending order by the Award Amount field. Run the query, and   then close the query, saving the changes to the query.

 

Copy   the Grants Sort Query to create a new query with the name All Private Grants Query. Redesign the query so that the   following fields display in the order given: Grant Name, Department, Award   Amount, Award Date, and Type. Sort the records in ascending order only by the   Grant Name field. Set the criteria so that when you run the query only those   records display that have private   as the Type. Do not display the Type field in the query results. Run the   query (11 records display). Close the query, saving the changes to the query.

 

Create   a query in Query Design view based on the Organizations table. Add the   following fields to the design grid in the order given: Organization Name,   Contact Name, and Contact Phone. Sort the records in ascending order by the   Organization Name field. Set the criteria so that when you run the query only   those records display that are missing the contact phone number. Run the   query (two records display). Save the query as Missing Phone   Query,   and then close the query.

 

Be   sure that all database objects are closed, open the Navigation Pane, and then   close Access. Submit the go_a02_grader_a1_Grants_Organizations.accdb   database as directed.

Into to Data base(Final project)

 1. Create a database named “Bookstore” and tables, using the following E-R diagram.

E-R diagram is given in attached file.

 1You could create the database on AWS using RDS, or you could create your database on your local machine. 

2. Create a website for access your database, and include some functionalities, like: 

• insert records to each table, you may need to update other tables when you need to insert a record to a table. 

• query records from each table using different columns

 • delete records from each table, you might need to update other tables when you delete a record from a table. 

3. You could use any framework to develop your website, for example: 

• if you are familiar with Python, you could use Flask or Django 

• if you are familiar with javascript, you could use Node.js