InfoTech Import in Strat Plan (ITS-831)

InfoTech Import in Strat Plan (ITS-831)

Discussion: Virtualization

Word Count: 300+

Chapter 6, “Architecture and Infrastructure”

Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented?  Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.

Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources. Use proper citations and references in your post.

Reading resources:

1. Chapter 6, “Architecture and Infrastructure”  pp. 143-150. Managing and Using Information Systems, Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta, John Wiley & Sons 

2. Singh, M. (2018). Virtualization in Cloud Computing- a Study. 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), 64. Retrieved from https://doi.org/10.1109/ICACCCN.2018.8748398

plagiarism check required, Good work, APA format, within 8hrs

Problem 1: Create a list that contains the months of the year. Problem 2: Create a loop to print the month number and name

Instructions:

Create a PowerPoint that contains a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. Use Microsoft PowerPoint® for Pseudocode and the flowchart.

Problem 1: Create a list that contains the months of the year.

Problem 2: Create a loop to print the month number and name (do not hard code the month number)

Consider using the attached enumerate method to help!

Discussion question, 300 words and 2 references.

Search “scholar.google.com” for a company or school that has defined the role of end-users in the creation of a contingency plan. Discuss why it is (or is not) important to include end users in the process of creating the contingency plan? What are the possible pitfalls of end user inclusion? 

Cybersecurity

Research the fundamentals associated with cybersecurity, choose one and explain why this fundamental is essential. consider where cybersecurity has come and where it could be going in the future

2 page papers 

Organizational Analysis Paper

Each student will write 4-5 page paper on an organization of his or her choice. The submission must be typed, double-spaced, and have uniform 1-inch margins in 12-point Times New Roman font. The organizational analysis will contain the following sections: 

  • Introduction of the organization, including history and background. 
  • Organizational strategy. 
  • Organizational design and your assessment of effectiveness. 
  • Organizational culture. 
  • Conclusion and what you would change about the selected organization for improvement.

At least two (2) sources are required. APA format source less than 5 years old.

I need python homework

Modify the Pi Simulation program to improve its appearance, behavior, and/or code in order to meet the quality objectives. You should implement at least 5 modifications.  Be sure to use comments to identify each of your modifications.

operations security

 

One factor often overlooked in creating and implementing information security policy is the human factor.  Your reading this week explores this factor.  One tool to help manage the human factor is the separation of duties (also called segregation of duties).  Explain what separation of duties is and why it is important.  What three functions should be separate in all transactions?  Give an example of how duties can be separated using an example you might find in an organization.

Your main post needs to be around 300 words and you need to make at least one reply to your classmates that is 100 words long.  See the links below for more information:

https://www.isaca.org/Journal/archives/2012/Volume-6/Pages/What-Every-IT-Auditor-Should-Know-About-Proper-Segregation-of-Incompatible-IT-Activities.aspx

https://www.csoonline.com/article/2123120/separation-of-duties-and-it-security.html

https://www.accountingtools.com/articles/what-is-separation-of-duties.html

https://www.computerworld.com/article/2532680/the-key-to-data-security–separation-of-duties.html

https://www.aicpa.org/interestareas/informationtechnology/resources/value-strategy-through-segregation-of-duties.html

Discussion: The Future of Offices

q1) Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? 

q2) Will offices as we think of them today exist in the next ten years? Why or why not? 

note:1. the whole discussion should be Minimum 250-300 words. 

2. Use at least one scholarly article.

Portfolio project

 

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements.

vulnerability

Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

write in 300words.