SyncSession Assignment

 

Write a 4-5 page paper (deliverable length does not include the title and reference pages)

  • What key characteristics distinguish a professional from other kinds of workers, and is an IT worker considered a professional?
  • What factors are transforming the professional services industry?
  • What relationships must an IT worker manage, and what key ethical issues can arise in each?
  • Be prepared to present this assignment at SyncSession 1.
    Sync Sessions are held four times per term. For the exact dates and times please check the course schedule under the Course Overview area.  To connect to a Sync Session, please click on the Sync Session Classroom area and select the appropriate session.
    Due: Assignment is due Wednesday of the second week in the module.

Cloud Computing

Topic: cloud security risks from misconfiguration

1. 5 source annotated bibliography

2. Summary or Abstract containing at least 750 words

MICROSOFT PROJECT 2016

Skim through Appendix A(LINK BELOW) on Microsoft Project 2016 (available on the Companion website for this text). Review information about Project 2016 from the Microsoft website (www.microsoft.com). Research three other project management software tools, including at least one smartphone app. Write a paper answering the following questions:

 a)What functions does project management software provide that you cannot do easily using other tools such as a spreadsheet or database?

 b)How do the different tools you reviewed compared with Project 2016, based on cost of the tool, key features and other relevant criteria? 

c)How can organizations justify investing in enterprise or portfolio project management software?

https://intropm.files.wordpress.com/2018/08/project2016guide.pdf 

APA STYLE, 2 PAGES, COVER SHEET

Programming principle

In this  assignment,  you will  be analyzing sequence,  selection,  and loop,  the relational comparison operators,  precedence when combining AND  and OR  operators,  and the case structure. Instructions: Part I. 1. 2. 3. 4. 5. Design a program  in which,  from  a date  entered by  keyboard with the format DAY,  MONTH,  YEAR,  the date of  the following day  is  obtained. Write a program  that  asks  the user  to enter  two numbers.  If  the first  number entered is  greater  than the second number,  the program  must  print  the message “The first  number  is  the  largest”,  otherwise the  program  must  print  the message “The first  number  is  the  smallest”.  Consider  the case that  both numbers  are equal  and print  the  corresponding message. Write a program  that  simulates  the normal  operation of  a modern elevator  with 25 floors  (levels)  and that  has  two buttons:  UP  and DOWN,  except  on the lower floor  (level),  that  there  is  only  a call  button to  UP  and the  last  floor  (level)  that only  exists  DOWN  button. Write a program  that  selects  the arithmetic  operation to be executed between two numbers  depending on the value of  a variable called selectionOp. Write an algorithm  that  displays  the next  double message: Enter  a month (1 for  January,  2 for  February,….…) Enter  a day  of  the month 

The algorithm  accepts  and stores  a number  in the “month”  variable  in response to the  first  question and accepts  and stores  a number  in the “day”  variable in response to the second question.  If  the  month entered is  not  between 1 and 12 inclusive,  an information message should be displayed  to  the user  warning that the number  entered is  not  valid as  a month;  in the same  way  we proceed with the number  that  represents  the day  of  the month if  it  is  not  in the range between 1 and 31.   Modify  the  algorithm  to alert  the  user  to no  enter  numbers  with decimals. Part II. 1.  In the  following pseudocode,  what  percentage raise will  an employee in Department  8 receive? if  department  <  5  then   raise =  SMALL_RAISE else    endif if  department  <  14  then raise  =  MEDIUM_RAISE else    endif if  department  <  9  then raise  =  BIG_RAISE endif 2.  Design a flowchart  or  pseudocode for  a program  that  accepts  two numbers from  a  user  and displays  one of  the following messages:  First  is  larger, second  is  larger,  numbers  are equal. 3.  Cecilia’s  Boutique wants  several  lists  of  salesperson data.  Design a flowchart or  pseudocode for  the  following: a.  A program  that  accepts  one salesperson’s  ID  number,  number  of items  sold in the last  month,  and total  value of  the items  and displays data message only  if  the salesperson is  a high performer—defined as a person who sells  more than 200 items  in the month. 
b.  A program  that  accepts  the salesperson’s  data and displays  a message only  if  the salesperson is  a high performer—defined a person who sells  more than 200 items  worth  at  least  $1,000 in the month. 4.  The Dash  Cell  Phone  Company  charges  customers  a  basic  rate of  $5 per month to send text  messages.  Additional  rates  are as  follows: •  The first  100 messages  per  month,  regardless  of  message length,  are included in  the basic  bill. •  An additional  three cents  are charged for  each text  message after  the 100th message,  up to and including 300 messages. •  An additional  two cents  are charged for  each text  message after  the 300th message. •  Federal,  state,  and local  taxes  add a total  of  14 percent  to  each bill. Design a flowchart  or  pseudocode for  the following: a.  A program  that  accepts  the following data about  one customer’s messages:  area code (three digits),  phone number  (seven digits),  and number  of  text  messages  sent.  Display  all  the data,  including the monthend bill  both before and after  taxes  are added. b.  A program  that  continuously  accepts  data about  text  messages  until  a sentinel  value is  entered,  and displays  all  the details c.  A program  that  continuously  accepts  data about  text  messages  until  a sentinel  value is  entered and displays  details  only  about  customers  who send more  than 100 text  messages. d.  A program  that  continuously  accepts  data about  text  messages  until  a sentinel  value is  entered and  displays  details  only  about  customers  whose total  bill  with taxes  is  over  $10.  A  program  that  prompts  the user  for  a three-digit  area code from  which to select  bills.  Then the program continuously  accepts  text  message data until  a sentinel  value is  entered and  displays  data only  for  messages  sent  from  the specified area code. 5.  Black  Dot  Printing is  attempting  to organize  carpools  to save energy.  Each input  record contains  an employee’s  name and town of  residence.  Ten percent  of  the company’s  employees  live in  Wonder  Lake;  30 percent  live in the adjacent  town of  Woodstock.  Black  Dot  wants  to encourage employees who live in either  town to drive to  work  together.  Design  a flowchart  or pseudocode for  the following: 
a.  A program  that  accepts  an employee’s  data and  displays  it  with  a message that  indicates  whether  the employee is  a candidate for  the carpool  (because he lives  in one of  the  two cities). b.  A program  that  continuously  accepts  employee data until  a sentinel  value is  entered and displays  a list  of  all  employees  who are carpool  candidates. Make sure  the decision-making process  is  as  efficient  as  possible. c.  A program  that  continuously  accepts  employee data until  a sentinel  value is  entered and displays  a list  of  all  employees  who are ineligible to carpool because they  do not  live in either  Wonder  Lake or  Woodstock.  Make sure the decision-making process  is  as  efficient  as  possible. Requirements: •  Show your  work  in a Word  document. o  Include all  your  work  for  each question. o  You can include screenshots  of  work  done on paper. •  For all  justification exercises,  remember  to use the definitions  and principles  that we have learned thus  far. •  You must  prepare a written work  where you respond to the programming exercises.  The work  must  comply  with APA  academic  writing standards.  You must  support  your  answer  using appropriate  sources  that  are properly  cited.    •  Minimum  four  pages  in length,  excluding the Title and Reference page. •  APA format,  including an in-text  citation for  referenced works. •  At least  three  resources. 

Articlee writing

conduct a search in online Library resources to find 2-3 recent peer reviewed articles (within the past 3 years) that closely relate to Impact of Mobile Computing on Businesses. Your submission must include the following information in the following format:

ANALYSISUsing 750-1200 words, write a brief analysis, in your own words of how the article relates to the selected chapters. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions.

Digital Forensics

 Do a bit of research on-line. Find a criminal case that involved Digital Forensics. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the case and how digital forensics were used in the investigation. 

Discussion (course – Bussiness Continuation Plan & Disaster Recovery Plan )

 

Compose and submit well-written paragraphs that contain a minimum of 200 words, which address the following: 

Select an organization of your choice and identify five steps taken to build the interim plans for initial security protection; describe each step as well.  

The post should include adequate citations and references that adhere strictly to the APA format.

Discussion 2 Info Tech Strat Plan

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.

Please make your initial post of 500 to 600 words 

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Week 5 – Research Paper – Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.