Assignment 1

  

Assignment 1 (20 points)

CONTEXTUAL THINKING ABOUT DIFFERENT SCENARIOS

This exercise involves you using imagination and logical reasoning to occupy the mindset of a visualiser facing the task of formulating a brief for different scenarios. Imagine you are given the challenge of creating a visualisation/infographic in each of the following made-up scenarios relating to the subject of Oil Spills

Scenario A: A broadsheet newspaper reporting on the regions and communities affected by oil spills

Scenario B: Analysts at the International Tanker Owners Pollution Federation (ITOPF) providing business intelligence reporting to support operational colleagues

Scenario C: Presentation to shareholders of BP (British Petroleum) demonstrating the reduction in spill-related losses

Website reference: The International Tanker Owners Pollution Federation (ITOPF) statistics page

Compile a document outlining your assumptions, definitions and ideas about the context and vision for each of the scenarios presented above. Get into the mindset of the potential creators and audiences. If you were them what do you think you might be faced with in terms of requirements, constraints, needs and possibilities? 

(Context) CURIOSITY: Outline what you think might be the essence of the trigger curiosity behind each scenario?

(Context) CIRCUMSTANCES: Work through the list shared in the book of the main circumstantial headings and list or describe your creative and critical judgment about the inevitable, assumed, or self-defined factors you think might be relevant or existent in each scenario. Consider the reasons behind your judgments

(Context) PURPOSE: How might you describe or articulate what you imagine the purpose of the work associated with each scenario would be: how might success, impact or effectiveness be expressed and measured? What is the right kind of experience and tone of voice that would reflect the best fit creative direction (could be a singular location or a journey across the dimensions of the map).

(Vision) IDEAS: Sketch out your instinctive ideas about what you think the visual work for each scenario look’s like in your mind’s eye: what colours, forms, keywords, layouts, thoughts come to mind when you think about the subject at hand? What other work can you find through research or past experience that may offer inspiration, influence or reference for your thinking?

There is no need to do any data extraction or analysis, just use your imagination for what data could exist and could be available. There is no perfect answer, no right and no wrong: it is about using a degree of practical imagination and empathy (your ability to occupy the mindset of others). You will need to make many assumptions and take the initiative to define things yourself.

Algorithm analysis

 

We  have n stations along a river, numbered 1 to n in the direction of the  current. You can rent a boat at any station i, go down the river to a  station k> i, return the boat and pay a fee c (i, k) for the tour. It  is possible that c (i, k) is greater than c (i, j) + c (j, k), with j  being an intermediate station between i and k. In this case, it is  cheaper to rent a boat from i to j and then another from j to k. Give an  efficient algorithm that calculates the minimum cost of a trip from 1  to n. Depending on n, how long does your algorithm consume?

Build a C program that has two functions: one for encryption and one for decryption.

 Procedure

 Implement one program that has two functions: one for encryption and one for decryption. 

Encryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.) 

Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file. 

Case Study 8

Read Deceitful Spammer or Marketing Genius? and complete the questions at the end of the case study.

https://www.scu.edu/ethics/focus-areas/business-ethics/resources/deceitful-spammer-or-marketing-genius/

At least 600 words with APA format. Need to answer all questions. Reference and citations.

Need 2 Page document with proper APA formatting and citations, references and No plagiarism

Assignment: Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course( Telecomm Network Security, Firewalls and VPNs ) have been applied, or could be applied, in a practical manner to your current work environment (software developer in Financial industry). If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

InfoTech in a Global Economy 3

 

Today’s Global Economy is very top-down driven with the government making all the decisions and regulations as it relates to doing business globally.  What are some advantages and disadvantages to this approach?  Is there another approach that might work better?

Python Functions

1) Write a function that calculates the volume of a sphere with radius r for only values > 0, return 0 otherwise . V=4/3  π r^3

2)  Write a function that finds you weight in stones using the formula.  mstone = mkgx2.2/14

3) Write a function that takes some monetary amount from the user in dollars, and then display exact changes for this amount using the minimum number of coins. For example, $0.97 shows 3 quarters, 2 dimes, and 2 pennies. 

 

Output: 
change_it(97)

The change for 97 cents is:
3 quarters
2 dimes
2 pennies

 Write an function to calculate both Ohm’s Law and Power transferred. The function takes i and r as inputs and prints the results (see output below). Calculate only if both i and r are > 0. 

 

FORMULA
 i is current, v is voltage, r is resistance, p is power
 p = i * v   # power = current * volatage
 v = i * r   # voltage = current * resistance
def ohms_law(i, r): 
   '''
     i is current
     r is resistance
   '''
   # check if both i and r are greater than 0
   # calculate v and p
   # PRINT v and p
omhs_law(5, 5)
v = 25 p = 125

omhs_law(-5, -5)
0

VPNs

  • Explain some of the security risks associated with VPNs.
  • Describe how organizations can mitigate these risks.
  • Determine the effect of penetration testing and any applicable laws on VPNs.
    4000 words