object-oriented programming

Define and explain class inheritance in object-oriented programming. Provide a code example using a sub and super classes. Explain how the code works. Ensure not to replicate your classmates’ codes.

In developing your initial response, be sure to draw from, explore, and cite credible reference materials, including at least one scholarly peer-reviewed reference. In responding to your classmates’ posts, you are encouraged to examine their opinions, offering supporting and/or opposing views.

You are required to reply to at least two peer responses to this week’s discussion question and/or your instructor’s response to your posting. Your replies need to be substantial and constructive in nature. They should add to and evaluate/analyze the content of the post answer. Normal course dialogue doesn’t fulfill these two peer replies but is expected throughout the course. Answering all course questions is also required.

7

 Before an organization decides to purchase a SaaS application, they need to review the legal and regulatory concerns before entering into any agreement with a service provider. Addressing and understanding issues around data privacy, security, ownership, and business continuity can help to avoid unexpected problems in the future. For this week’s assignment, research and include four (4) issues or considerations that organizations need to evaluate before entering into any agreement. Discuss why the issue is important and include examples of what could happen if the issue was not properly addressed by the vendor. Your assignment should be 3 pages in length, with two or more references in APA Format cited in your response.

 

Reflection paper 3

 

Reflection Paper:

For each assigned presentation,  you must write a “Reflection Paper”.  This paper is to be a write-up of your learning, observations and reactions to the presentation and must demonstrate both your reflections about and your understanding of the topic(s) presented by our guest speakers.  Your write-up must meet the following criteria:

  • Content Demonstrates understanding of the topic(s) covered by speaker(s) and includes reflections upon these content areas:
    • Three new things that you learned from the speaker.
    • Two reasons why (each) functional role of IT presented is important to the business.
    • One question that you have regarding the area of IT that the speaker covered.
  • Adherence to Excellent Writing StandardsAttendance Criteria Met
    • Between 300 – 400 words
    • 12 Point Times New Roman Font, 1.5 spacing, standard 1″ margins
    • No spelling or grammar errors
    • Well written – concise and coherent
  • Well Formatted, easy to read and grade (meaning – easy to find your required content)
    • Visual cues that aid reading, such as: paragraphs, bullets, section headings, etc.
    • A readable reflection that presents organized thoughts and ideas

Web Application Security

  

1. Watch this video about Joseph Shumpeter’s concept of Creative Destruction. For example, many think that the introduction of self-driving cars will disrupt the job market for drivers. Write 500 words on this. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. 

Write an essay format not in bulleted, numbered or another list format. 

2. Do a bit if research into File Inclusion Vulnerability. Post between 100-300. Use your own words. Do not copy the work of another students.

· What is it?

· Why is dangerous?

· What is the difference of low and remote inclusion?

· What methods can me employed to prevent a security breach?

· What programming languages are vulnerable to this type of attack.

Creating a Resource List

Create a resource list to use to learn about the most current security attacks. Include people, user groups, networking resources too. Suggest ways to share information within your own IT department so that the helpdesk and other IT professionals become aware of issues and concerns quickly too.

Complete a three to four-page report with APA cited references to support your work. Please submit your work using this table as an example. You may add or remove additional columns as needed.  

Research paper – Organisation leader and decision making

 This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:

  1. How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? 
  2. How does servant leadership assist with transferring knowledge in an organization?
  3. When thinking about data analytics, how does transformational leadership assist with building good data structures?

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing. 

 Required Reading

Optional Resources:Chapter 5 Journal articles

CC week 15

 

Review in 500 words or more the video above called Cloud Security Myths.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

MIS 504 Introduction to Information Systems

  

Is it safe to log onto a wireless network at an airport, library, or other public location? It depends on how vigilant you are. Even the wireless network in your home is vulnerable because radio frequency bands are easy to scan. Both Bluetooth and Wi-Fi networks are susceptible to hacking by eavesdroppers. You are expected to prepare a research project (e.g. 400/500 words) about malicious programs (e.g. Shamoon), and the damage being caused to public and private sectors in Saudi Arabia, if any. 

Purpose: The assignment is to promote awareness of various security threats, and to develop a better understanding of how enterprises/business firms improve their security environment via the establishment of a framework for security and control. 

Assignment Guideline:

1. Use Time New Roman.

2. Use Font Size 12.

3. Use 1.15 Line Spacing.