Mobile Application – Practical connection paper

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

ABSOLUTELY ZERO PLAGIARISM

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

SAS 70 standard

Must be 100% original work APA format. no plagiarism. At least (2) APA reference. 

You are required to research the following:

The SAS 70 standard was replaced by a new standard in June of 2011. Please research the new standard published by the Auditing Standards Board of the American Institute of Certified Public Accountants (AICPA). Write at least a one page report explaining the difference between the two standards.

Discussion and Portfolio Project: ITS-833: Information Governance

Discussion: Regulations and Compliance

Word count: 300

Chapter Eight (8): Information Governance and Legal Functions: According to the authors, Smallwood, Kahn, and Murphy, IG is perhaps one of the functional areas that impact legal functions most. Failure to meet them could be literally put an organization out of business or land executives in prison.  Privacy, security, records management, information technology (IT), and business management functions are very important.  However, the most significant aspect of all of these functions relates to legality and regulatory compliance from a critical perspective. 

For this discussion, identify the industry you will be writing about in your final paper and discuss the regulatory compliance requirements that the company has to meet and the corresponding security, privacy, and records management functions that would need to be enabled for that organization. Remember to cite your sources and critically respond to two other learners.

* Share an applicable personal experience


* Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)


*  At least one scholarly source should be used in the discussion. Be sure to use information from your readings. Use proper citations and references in your post
.

Textbook: 

For this assignment, please read chapters 8, and 9 from the below textbook.

Chapter 8- Information Governance and Legal Functions
Chapter 9 – Information Governance and Records and Information Management Functions

Title: Information Governance, ISBN: 9781118421017 Authors: Robert F. Smallwood Publisher: John Wiley & Sons Publication Date: 2014-03-28

Portfolio Project: Milestone 1: Introduction

Word count: 2 pages

The project paper is broken down into 3 parts. For this piece of that assignment, you will write the introduction to your final portfolio project, comprehensively describing the industry you are choosing to use in the paper and preliminary challenges with information governance that you have identified.

Each milestone is a separate writing assignment, leading up to the final submission.

Expectations are that it will be a scholarly work, using largely peer-reviewed resources, formatted to APA 7 style. Grammar, spelling, and punctuation are significantly weighted. 

  

Scenario:

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business, or customers. The company also desires to leverage the marketing power of social media but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Note: plagiarism check required, APA7 format, include References, within 8hrs

Please provide discussion and project in separate documents.

Activity

First review some PC Troubleshooting Videos made by KEVTECH (on YouTube). Then write a blog in the SAME format of attached file(What-is-a-Blog) and also  (see file called “How to Create a Blog” that instructor posted in WEEK list) with many details, single space, one page.

STEP 1: Check the pdf file (What-is-a-Blog) you have to make it the same as the pdf file .This means to go to WORD, make those borders (INSERT borders icon), key in the info. Make it attractive, stimulating for others to read/review. PROMOTE your favorite/s Videos made by Professor Messer. Still, do not bad mouth the videos that are not your favorite.

Put a background color OR use the yellow highlighter to select some key words (not both).

C++

Language c++ only can use (If else statment, for (while) loop, array, function,vector)

#include
#include
#include
#include
#include
#include

The first file ecoli.fa is a FASTA file which contains the DNA sequence data. Here is an excerpt from the file:

>Chromosome dna_rm:chromosome chromosome:ASM584v2:Chromosome:1:4641652:1 REF AGCTTTTCATTCTGACTGCAACGGGCAATATGTCTCTGTGTGGATTAAAAAAAGAGTGTC TGATAGCAGCTTCTGAACTGGTTACCTGCCGTGAGTAAATTAAAATTTTATTGACTTAGG TCACTAAATACTTTAACCAATATAGGCATAGCGCACAGACAGATAAAAATTACAGAGTAC ACAACATCCATGAAACGCATTAGCACCACCATTACCACCACCATCACCATTACCACAGGT AACGGTGCGGGCTGACGCGTACAGGAAACACAGAAAAAAGCCCGCACCTGACAGTGCGGG CTTTTTTTTTCGACCAAAGGTAACGAGGTAACAACCATGCGAGTGTTGAAGTTCGGCGGT ACATCAGTGGCAAATGCAGAACGTTTTCTGCGTGTTGCCGATATTCTGGAAAGCAATGCC AGGCAGGGGCAGGTGGCCACCGTCCTCTCTGCCCCCGCCAAAATCACCAACCACCTGGTG GCGATGATTGAAAAAACCATTAGCGGCCAGGATGCTTTACCCAATATCAGCGATGCCGAA CGTATTTTTGCCGAACTTTTGACGGGACTCGCCGCCGCCCAGCCGGGGTTCCCGCTGGCG CAATTGAAAACTTTCGTCGATCAGGAATTTGCCCAAATAAAACATGTCCTGCATGGCATT AGTTTGTTGGGGCAGTGCCCGGATAGCATCAACGCTGCGCTGATTTGCCGTGGCGAGAAA ATGTCGATCGCCATTATGGCCGGCGTATTAGAAGCGCGCGGTCACAACGTTACTGTTATC GATCCGGTCGAAAAACTGCTGGCAGTGGGGCATTACCTCGAATCTACCGTCGATATTGCT GAGTCCACCCGCCGTATTGCGGCAAGCCGCATTCCGGCTGATCACATGGTGCTGATGGCA GGTTTCACCGCCGGTAATGAAAAAGGCGAACTGGTGGTGCTTGGACGCAACGGTTCCGAC TACTCTGCTGCGGTGCTGGCTGCCTGTTTACGCGCCGATTGTTGCGAGATTTGGACGGAC GTTGACGGGGTCTATACCTGCGACCCGCGTCAGGTGCCCGATGCGAGGTTGTTGAAGTCG ATGTCCTACCAGGAAGCGATGGAGCTTTCCTACTTCGGCGCTAAAGTTCTTCACCCCCGC

The second file in the project folder is a CSV file named codon_table.csv which contains the codon list. Here is an excerpt from the file:

Codon

AA.Abv

<

td>AA.Code

AA.Name

UUU
Phe
   F
   Phenylalanine
UUC
   Phe

F

   Phenylalanine
UUA
   Leu
   L
   Leucine
UUG
   Leu

L

   Leucine
CUU
   Leu
   L
   Leucine

In the above table, AA.Abv represents the abbreviation of the aminoacid, AA.Code represents the code for the aminoacid and AA.Name represents the actual name of the aminoacid. There are 64 codons in the file. One aminoacid can be represented with multiple codons, they all create the same aminoacid. For example, both UUU and UUC codons are translated as phenylalanine.

Write a function transcribe(dna_string) that creates the mRNA string from the DNA string. Each base in dna_string must be matched to its corresponding mRNA base. There might be strange characters in the DNA string other than A, T, C, G. They should be ignored: A  U, T  A, G  C, C  G matchings are the only valid ones.

string transcribe(string dna_string){
//this function must take the DNA string and construct a new mRNA string

//then return the mRNA string

}

Write a function translate which accepts the mRNA string as a parameter and creates a string vector of proteins. Each item in the vector is a string that consist of the aminoacid codes of the protein. The function must return the protein vector as a result.

Each protein’s aminoacid sequence starts with M (Methionine) which is the starting aminoacid and ends with a Stop aminoacid. So the function should:

look for mRNA sequences that starts with AUG codon;
detect the end (UAG, UGA, or UAA codon);
in between, identify the corresponding aminoacids for the codons to construct the protein;

save the protein string in the vector(Use push_back function).

vector translate(string mrna_string) {

//create a protein vector and return it. }

Use the following print and main function to connect the processes and print the resulting protein vector

void print_protein_list(vector list) {

   for(string line : list)
   {
       cout << line << endl;
   }

cout << list.size() << " proteins listed" << endl; }

int main() {

string dnastring = readFastaFile(“ecoli.fa”);

readCsvFile(“codon_table.csv”);
string mrnastring = transcribe(dnastring);

vector protein_list = translate(mrnastring);

print_protein_list(protein_list);

return 0; }

The first few lines of the output should look like this:

0 -> MDGTHLILKStop
1 -> MKLVISVSRVCLFLMSHVLStop
2 -> MVVVVVMVSIATPDCACPLCLFSGVDCHARKKKLVSIAPLLVRSQLQAAMStop
3 -> MGYSRYGLHKNGLKTALSGGGSAPRATALTFESSStop
4 -> MTIARPAFStop
5 -> MELRWQLStop
6 -> MRRRHDRRTNARLTTLStop
7 -> MDAGRSPRATLQQLQLQDGPSLPRKDEAAISRSGGVVMGVAGQGLGNGLIFMAFRSSWSMRVTTVGTTSAStop 8 -> MRStop
9 -> MSStop
10 -> MDLDFLPNDLGDRHCLADRStop
11 -> MSSLRQVMASPIASQTLTAATATATRRPRStop
12 -> MHRRHNGStop

….

unit 4 db#2+ responses

 How often should you perform risk assessments? What are some factors that might make you do them more often or less frequently? Please use outside research to back up what you say. Be sure to cite your sources. 

need citation and 2 responses to classmates.

Pr4

 

  1. Describe the factors influencing the need for change and the imperatives for managing information assurance change initiatives.
  2. Discuss how group and organizational dynamics may affect the success of your information assurance change initiative.
  3. Evaluate the leadership style needed to successfully implement your information assurance change initiative.
  4. Describe your change strategy and the potential resistance factors to be managed.
  5. Describe the change model most appropriate for your information assurance change initiative.

Project 1

Please use the attached “Guidelines for Evaluating a Research Article” to answer the below questions: 

  • What is an Information Technology Project?  
  • Identify & explain the major parts of a research paper.
  • Explain the difference(s) between qualitative vs quantitative research methods.
  • Why use Peer-Reviewed journals?
  • Why are keywords used during the Literature Review process?
  • Why are project deliverables, limitations & deadlines an important aspect of project development?
  • Why use/apply APA Basic Citation Stiles in your writing assignments/research?
  • Why is Academic Integrity important (see syllabus)?
  • Explain the difference between plagiarism vs self-plagiarism?

Your assignment must follow these formatting requirements:

  • Use at least three-five (3 – 5 ) quality resources in this assignment.