Operational excellence

Discussion: 

 This week we focus on the knowledge management cycle noted in Figure 5.3 in the Information Technology and Organizational Learning text. Note the various aspects of knowledge management, continuous innovation, and competitive advantage and how they integrate with one another. 

Assignment: 

 Information Systems for Business and Beyond Questions:

  • Chapter 5 – study questions 1-9, Exercise 1
  • Chapter 6 – study questions 1-10, Exercise 6, & 7

Information Technology and Organizational Learning Assignment:

  • Chapter 4 – Review the section on Linear Development in Learning Approaches.  Discuss how learning changes over time impact organizational culture.  What is the impact of this cultural change on the success of IT projects?
  • Chapter 5 – Review the Roles of Line Management and Social Network and Information Technology sections.  Note the various roles in the organization and note the similarities and differences within each role.  Also, note how innovation technology management shapes how we communicate amongst coworkers within an organization. 

Essay 500 words discussing how database auditing and monitoring fit within a SOX compliance framework.

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

IT214 4

Question 1

 

You are the Primary Programmer on a new project for your company. The helpdesk reports that the program exits prematurely. The help desk attributes the crash to users deleting the file “myfile.txt” from the desktop. Write a Python program module using the try: exception: statement to capture this error and instruct the users the file does not exist. Always thank the users for using the program. Include the helpdesk phone number (888) 555.1515 in your message.

Question 2

 

Upload your answer to this question. NOTE: Your answer must be a Python program.

Write a python program, using dictionary, to print the following list:

PRODUCT              PRICE                QUANTITY  

Banana                     3.24                     10

Mango                       1.10                      3

Guava                        2.13                      5

Orange                       4.56                     1

Peach                         2.33                      1

Question 3

Write the pseudocode to convert feet to meters then to kilometers.

Your code should not exceed 50 lines.

Decrypt the following ciphertext that is encrypted using RSA

Decrypt the following ciphertext that is encrypted using RSA:

5433065902986267632605533071412313607849042001231487725752160944543337634764776942780551811154931702225666567112761402854245945771790200374756020087742730448029511549378258035341909089954945069377423917666095579241594583655805469852654975413725915810650231239021446353034249591165382217733674640

RSA public key (N, e):

N =

9443933355875323479428701223436866003317020345062337184168866482442741746051755875714077225424938697068202237079691276886895796347334130227954217861122456746475811995655599937678751969288324093545863325957721247606698180886906068377558846502707583137394885329858060292972366775543495590847656457

e = 65537

Hint.

• A modulus N of the standard RSA consists of only the two large prime p and q.

• But the modulus N in this assignment consists of many primes, which may weaken the security of RSA (so making this assignment practicable).

• Students can use the following website for integer factorization: https://www.alpertron.com.ar/ECM.HTM

• Refer to the provided example code (example.py).

java discussion response

 

Hello everyone,

Exceptions in Java are similar to an error message, but less severe. Java has both checked and unchecked exceptions. “An exception or exceptional event is an event that occurs during the execution of a program that  disrupts the normal flow of instructions” (mit.edu, 2005). Common  terminology regarding exceptions include terms such as “throw” and  “raised” when an exception occurs. When an exception is handled, one  might say the exception was “handled” or “caught”. Exceptions are used  because the compilation process may not find all of the errors. In Java,  a checked exception is an exception that will occur in code  outside of the Java runtime system. These exceptions must be “caught”  using “try-catch-finally” exception handling. Examples of checked  exceptions include: FileNotFound, MalformedURL, and SocketException. The  key difference between checked and unchecked exceptions in Java is that  the unchecked exceptions occur during runtime of the system. There is  no method that has to “catch” or specify the “throwing” of unchecked  exceptions, although it may occur anyway. Examples of unchecked  exceptions include: ArrayIndexOutOfBounds, NullPointerException, and IllegalArgumentException.  It seems whether a programmer sides with usage of checked or unchecked  exceptions is not very important, as they are both functionally  equivalent. It would make sense that problems may occur if a programmer  decides to use both checked and unchecked exceptions at the same time.  Personally, it makes more sense to go with the checked exceptions.  Unchecked exceptions seem slightly more problematic since the compiler  does not make it mandatory to catch or propagate exceptions. With this  in mind, it would seem that dealing with checked exceptions may be the  path of relative ease.

reflection paper

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

 demonstrate a connection to your desired work environment. 

Research Paper and Discussion

Research Paper:

 The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited).

 Start your paper with an introductory paragraph.

Prompt 1 “Blockchain” (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future.

 Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?  How does big data affect a global economy.

Prompt 3 “Government and Policies” (1-2 pages):  Discuss the role government plays in a global economy.  Also, look at what policies are currently in place and then discuss what policies should be put in place.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately six to eight pages long, including both a title page and a references page (for a total of eight to ten pages). Be sure to use proper APA formatting and citations to avoid plagiarism.Your paper should meet these requirements: 

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion:

 

There is a relationship between policy evaluation and production identification, policy evaluation and policy implement, and policy evaluation and policy formulation.  Can you explain this relationship and why they are important?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

TOPIC- Legal

  • TOPICS:
      Is it more important for a law to be consistent or flexible?
  •   The importance of enforcing civil law vs. the United States being the most litigious country in the
    world.
  •   Coexistence of federal law and state law.
  •   Pros and cons of strict customs enforcement vs. having an open border.
  •   Methods for management to balance ethical dilemmas in the workplace.

    (Select one topic from the above)
    Assignment Requirements:

    1. Choose a research topic from the chapter readings or from the list provided by your professor.
    2. Research/find a minimum at least four (4), preferably five (5) or more, different peer- reviewed articles on your topic from the University of the Cumberlands Library online business database. The article(s) must be relevant and from a peer-reviewed source. While you may use relevant articles from any time frame, current/published within the last five (5) years are preferred. Using literature that is irrelevant or unrelated to the chosen topic will result in a point reduction.
    3. Write a four (4) to five (5) page double spaced paper in APA format discussing the findings on your specific topic in your own words. Note – paper length does not include cover page, abstract, or references page(s).
    4. Structure your paper as follows:
      1. Cover page
      2. Overview describing the importance of the research topic to current business and professional practice in your own words.
      3. Purpose of Research should reflect the potential benefit of the topic to the current business and professional practice and the larger body of research.
      4. Review of the Literature summarized in your own words. Note that this should not be a “copy and paste” of literature content, nor should this section be substantially filled with direct quotes from the article. A literature review is a summary of the major points and findings of each of the selected articles (with appropriate citations). Direct quotations should be used sparingly. Normally, this will be the largest section of your paper (this is not a requirement; just a general observation).
    5. Practical Application of the literature. Describe how your findings from the relevant research literature can shape, inform, and improve current business and professional practice related to your chosen topic.
    6. Conclusion in your own words
    7. References formatted according to APA style requirements