computer science

 

Each student will use the term CONCESSIONS and conduct a search of Campbellsville University’s online Library resources to find 1 recent peer reviewed article (within the past 3 years) that closely relate to the concept. Your submission must include the following information in the following format:

Key Term:

  •  Concessions

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment. See the tips and the “How to Write a Journal Article Review Analysis,”  both posted in Moodle just below the Syllabus.  

DO NOT write an analysis of the material in the article or explain what is in the article for the analysis.  You may briefly describe the article in the summary. 

REFERENCES: All references must be listed at the bottom of the submission–in APA format. 

Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required.

Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.

 

Intro-level Python pseudocode help

Hello,

I need pseudocodes written for a intro-level python class(Rubric attached). Please write them in the included “Design Document Template”- word document and have it reflect the storyboard. The deadline is November 29, 2020 (4:00PM Pacific Time). Thank you! 

Enterprise-Finale

 Annotated Bibliography:

 

In order to complete this program, you will need to do research. One of the more useful tools in conducting research is the annotated bibliography.  An annotated bibliography combines the citations found in the References list at the end of documents in APA format with annotations about each of the sources.  For this final assignment, you will construct an annotated bibliography to help build your personal citation “database” to use as your move forward and (hopefully) for your dissertation.  Take this time to start on the right foot and be prepared when the time comes.  You should have a general ideal of your research topic, if not, take this time to think about what area you want to do research and find article to help shape that path.  

Purpose:  An annotated bibliography is an organizing tool that is helpful when working on a research project.  An effective annotated bibliography is used to compile research sources in one location and provide the researcher with quick access to the information contained in each source. 

Audience: This assignment should be directed at your scholarly peers, and you may assume that they have only a casual familiarity with your topic or issue.

Content/Subject: Your annotated bibliography will consist of the sources that you have deemed relevant to your topic and/or question(s) of inquiry.  While you may encounter sources that are not relevant or do not fit the scope of your project while researching, for the purposes of this assignment, you will only include the ones that you find useful and relevant. 

Cite the source in proper APA format.  The citations should be organized in alphabetical order by the author just as in an APA References page. 

Follow with a brief annotation that summarizes the source (approx. 100-150 words). You may NOT quote from the source; Ideally, all of the annotations should be in your own words.  In 1 or 2 sentences, explain the source’s relevance and importance to your issue.

Constraints:  The annotated bibliography is a fairly rigid genre.  Your citations must adhere to APA format.  This will be one of the central components of the grade for this assignment.  Failure to follow APA format exactly will harm your grade.  The annotations for each source should follow an academic style.  This means that you must construct, with an elevated and sophisticated language, correct grammatical sentences that effectively summarize what each source has to say.  Additionally, you should explain how each source is relevant to the issue that you have selected and what it adds to your knowledge about your issue.

Specific guidelines to follow when completing this assignment are:

  • 15 sources of various types (book, article, website, etc.)
    • No wikis
    • No more than 3 can be website citations
    • At least 5 must be peer-reviewed.
  • Adherence to the APA format for all citations.
  • Sources in alphabetical order according to the author.
  • Thoughtful and complete annotations of 100-150 words each.
  • Correct grammar, punctuation, and spelling.
  • No late assignments can be accepted due to University policy.  I will make this due towards the end of the semester, final grades are due 24 hours after the end of the semester, so I do not have a large time frame to accept late work, since I cannot grade after I have to submit your final grade to the University Registrar.  You have multiple weeks to finish, finish sooner, rather than later.

Discussion : Describe the current trends in information systems as well as how technology changes impact society and culture

Discussion: This week the focus turns to the future as we talk about trends in information systems.  Describe the current trends in information systems as well as how technology changes impact society and culture.

Note: The first post should be made in 12-15 hours.

Your response should be 250-300 words.  Respond to two postings provided by your classmates by saturday .

Bank Enterprise Information Security Policy (EISP)

  

The organization that we will use is a small community bank. This type of organization was selected because everyone in the course should have some familiarity with banks, a community bank has a smaller scope, the banking industry has regulatory requirements to follow, and public trust in banking is very important. (Maryland SECU is an example of this type of bank.)

Here are some technical parameters of the Bank of Bowie.

· Headquarters is located in Bowie, MD

· Headquarters building has corporate offices and a branch on the lower level

· Two branch offices are located in Bowie and Laurel

· Each of the three branches employees the following staff

o Branch Manager

o Branch Security Officer

o Six Tellers

o Two Loan Officers

· Corporate Headquarters employs the following staff

o Officers and Directors

§ Chairman/CEO/President/Director

§ Vice-President/Secretary/Director

§ Financial Officer/Treasurer

§ Assistant Treasurer 

§ Six Directors – Corporate Strategy, Branch Oversight, Personnel Oversight, Regulatory Implementation, Customer Focus, Policy/Standards/Processes

§ Chief Compliance Officer

o Employees

§ Head Loan Officer 

§ Senior Loan Administrator

§ Two Loan Processors

§ Escrow Processor

§ Eight Customer Service Representatives

§ Internal Auditor

§ Compliance Officer

§ Two Human Resources Personnel

§ Five Information Technology Personnel

· Bank Offerings

o Savings and Checking Accounts

o Loans

o Deposit Products such as IRAs

o Online Banking

Information Technology Landscape

· Primary corporate databases are maintained at the Headquarters and a backup location

· Data is replicated routinely from the branches to the Headquarters

· Headquarters and branch personnel use desktops for their day-to-day activities

· Software consists of a number of standard applications, e.g., Office, and customized banking applications

· The Bank of Bowie website provides static information about the bank

· Electronic banking activities are outsourced to other providers

· Data is archived by a third-party provider

· Data protection mechanisms include encryption, digital signatures, access control firewalls, and other measures

Vision/Mission

Bank of Bowie is built on weeks of dedication to the community, Bank of Bowie will “continue in our rich tradition of providing impeccable customer service within a community environment.”[1]

Regulation

We will simplify the government regulations for this activity. You must account for federal requirements for the following.

· All financial transactions must have integrity.

· All financial transactions must be audited and audit data must be retained for a period of six years.

· Social Security Numbers must be kept confidential.

· Customers must have access to their accounts at least every 48 hours.

· Interest rates and other loan terms and conditions must be clearly disclosed to customers.

Submission One – Policies

Bank of Bowie requires a set of policies to guide their efforts. 

Write an Enterprise Information Security Policy for the Bank of Bowie. See Page 148, Table 4-1 for an example. Make certain the policy includes what the information security needs are and not how to achieve them. Include the five federal requirements and three additional requirements based on market competitors (local banks – such as MECU, SECU, PointBreeze Credit Union, 1st Mariner Bank, Rosedale Federal Savings and Loan). Please detail the mission, vision, and values to support the justification for the “information security needs”. 

Create an Issue-specific security policy (ISSP) on a relevant topic of your choosing. It can be for internal system users or for customers or services provided to customers. 

Create a system specific policy that addresses audit logs and backup of the audit logs. Make certain that it is compliant with the laws indicated in the background. 

Each policy document should be well organized per the outlines presented in the text or another reference. Each policy should be between 2 and 4 pages and it will be graded based on its completeness in addressing the topic, not on its length. Finally, it should follow all of the guidelines for each policy type in the text.

 .

Information Systems Business and Beyond

  • Chapter 4 – Review the section on Linear Development in Learning Approaches.  Discuss how learning changes over time impact organizational culture.  What is the impact of this cultural change on the success of IT projects?
  • Chapter 5 – Review the Roles of Line Management and Social Network and Information Technology sections.  Note the various roles in the organization and note the similarities and differences within each role.  Also, note how innovation technology management shapes how we communicate amongst coworkers within an organization.

700words discussion: If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective.

700words discussion: If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

1.Googel-scholor references

2.In-Text citation

3. APA format

4. Conclusion at the end of discussion

Access control Assignment 14

Discuss the importance of the testing phase of the Software Development Life Cycle.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

All paper are checked for plagiarism using SafeAssign, you can review your score.