discussion

  1. Review and describe the application development and sustaining (AD&S) methodology your company implemented.
  2. List 3-5 documentations that are critical to the success of implementing AD&S along with description of each document and who uses those documents.

What are Smart Contracts and how might they be applied in human resource management?

 

Discuss the following: 1. What are Smart Contracts and how might they be applied in human resource management? You are required to cite this week’s assigned readings in your paper. You may also cite prior week’s reading assignments and external sources if you wish.

Use the following headings to organize your paper: Introduction, Question 1, Conclusion, References.

Submit your paper as a Word attachment in the discussion forum. I provide feedback within the paper and will not grade your post unless you submit it as an attachment. Your response to the discussion prompt should contain a minimum of 500 words 

 

Follow the following writing requirements for all of your discussion prompt responses (note that these writing requirements DO NOT apply to your responses to other students):

Writing Requirements for all Assignments:

  • References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions
  • Your paper must have headings in it. For discussion posts Introduction, Prompt/Question, and Conclusion will suffice as headings.  
  • Provide the EXACT web link for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write MORE than the minimum requirement of the word count assigned
  • As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a power is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

IT project ticketing system

 

n this course, you are required to identify a problem or opportunity in the IT area and develop a solution to the problem.  The project should integrate theory and application from across your educational experience and allow you to showcase your academic learning.  During the course, you will identify a problem, develop requirements based on stakeholder needs, develop a design after considering alternative solutions, implement the solution (virtually is sufficient), and test the solution.  Your design and test plans should take into consideration the end-user as well as the broader context of the end-user.  The course culminates in a final presentation and final report.

Your project should not be something that you have done before, either as part of your academic work or for an employer.  However, you can work on a project which is for your employer and will be implemented in the workplace, as long as you don’t develop the design with colleagues at work. It is important to note that your project MUST include a hands-on component (typically completed in a virtual environment). Because of the point distribution, you MUST complete an appropriate hands-on project in order to pass this class.

If you need some ideas, see the attached file, “IT491 Capstone Topic Ideas” for some suggested topics. 

Keep in mind that your project should meet the objectives listed for this course: 

1. Apply industry standards to the implementation and support of network systems and computer devices.

2. Demonstrate the principles of information technology security.

3. Use information systems for the collection, organization, and delivery of data.

4. Express relevant information to technical and non-technical audiences.

5. Design secure network infrastructures for physical and virtual environments.

6. Create information technology solutions based on business needs or requirements.

You may not begin work on the project until your proposal is approved by your instructor.

In this assignment, please write a proposal for your capstone project using the attached “IT491 Week One Assignment 2020.”

Python coding

Question 1: Greetings Function! (4 points)

Start with the greeting program, the first program with functions we  used in Python Tutor. This time, the computer is very happy to meet  you.  Modify the function to return the user’s name in uppercase, with  !!!! after it.  So, if the user’s name is Miriam, the greeting function  will return ‘HELLO MIRIAM!!!!’

Question 2: Quiz question function (6 points)

Write a function that takes two arguments – a quiz question and the correct answer. 

In your function, you will print the question, and ask the user for  the answer. If the user gets the answer correct, print a success  message. Else, print a message with the correct answer.   Your function  does not need to return anything.

Call your function with two example quiz questions.   Here’s some suggestions, 

  • Q: What year did Apollo 11 land on the moon? A: 1969
  • Q: Who painted the Mona Lisa? A: Leonardo da Vinci

Question 3: Windows 10 Upgrade (10 points)

When installing Windows 10, a user can either wipe everything from  their computer and do a clean install.  Or if their computer meets  system requirements, the user can upgrade to Windows 10 without erasing  their current operating system.

To do the upgrade, according to Microsoft, a computer needs to have  at least 1GB of memory, and at least 1GHz processor, and either Windows 7  or Windows 8 currently installed.   All three requirements must be  met. 

Write a program that asks the user for

  • The current memory in their computer, in GB.  (For example, a user with 8GB of memory would enter 8)
  • The current processor speed, in GHz. (For example, a user with a 2.6GHz processor should enter 2.6)
  • The name of their current operating system. (For example, a user could enter Windows 8 or Windows 7 or Windows XP)

Write a can_upgrade function that takes three arguments, the amount of memory, the processor speed, and current operating system.

In can_upgrade, use conditions to figure out if the  user’s computer can be upgraded to Windows 10 or not.  Your function  should return one of the Boolean values True (if the computer can be  upgraded) or False (if it can’t be upgraded).

Call your can_upgrade function from main(), and use the return value to print a message to the user telling them if they can, or can’t, upgrade.

Extra Credit Question: (+5 points)

Start with the College ID card program from https://gist.github.com/claraj/b993219477d015d58341c4f3c1950a22.  This has no functions but it would benefit from being re-organized into  functions. Refactor this program. Suggestions – functions for  validation, functions to help print the college ID card, for example  printing a line of —-, printing centered text, printing text in  color. 

8 Assignment

On April 18, 2016, The United States Supreme Court denied a petition for certiorari (refused to review the lower court’s ruling) in the case of Authors Guild v. Google, Inc., 804 F. 3d 202 – Court of Appeals, 2nd Circuit 2015.

Tell me what you would do if you were the Supreme Court.

That case let stand the ruling of the Court of Appeals which can be found at the following website:

https://scholar.google.com/scholar_case?case=2220742578695593916&q=Authors+Guild+v.+Google+Inc&hl=en&as_sdt=4000006  last accessed February 9, 2019.

Please write a 500-word summary of fair use as this court decision says it.

Organ leader Discussion and Assignmenet

Discussion :   Leadership vs. Management and How Leadership Impacts Decisions in the Digital Space
content should be one page: 300 to 400 word and references

Assignment:
 

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World. Complexity is increasing as new technologies are emerging every day. This complexity impacts human experiences. Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that are emerging as noted in the article. Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.

Content should be 3 to 5 pages with 5 references at least and those references should be within last 5 years 

Explain how my job responsibilities relates to my course load

Please explain how my job responsibility will relate to my courses below.
Each course should have explanation of at least 700 words.

1.Project management

2.Information System Security

3.Management InformationSystems

4.Team Management

5.Current and Emerging Technology

6.Disaster Recovery

7.Cyber Law

8.Managerial Accounting

JOB ROLE: Software Developer

Managing Access Controls

 

Complete a three to four-page report with APA cited references to support your work.

Part 1: For the scenarios that follow, identify the  data that would need to be protected. Recommend how you would implement  one or more of the access controls for the given scenario. Justify your  recommendations.

Scenarios:

  1. A small construction company consisting of 12 computers that have Internet access.
  2. A small advertising company consisting of 12 computers that have Internet access.
  3. All employees communicate using smartphones.
  4. A multinational IT services company consisting of 120,000 computers  that have Internet access and 45,000 servers. All employees communicate  using smartphones and e-mail. Many employees work from home and travel  extensively.
  5. A defense contractor that builds communications parts for the military. All employees communicate using smartphones and e-mail.
  6. A military-support branch consisting of 14,000,000 computers with  Internet access and 250,000 servers. All employees must have security  clearances, and they communicate mainly using BlackBerry devices and  e-mail.

Part 2: Select an access control model that best  prevents unauthorized access for each of the five scenarios. Which types  of logical access controls should be used in each scenario? Justify  your recommendations.

  1. Access control models:
    1. Mandatory access controls
    2. Discretionary access controls
    3. Role-based access controls
    4. Rule-based access controls
    5. Content-dependent access controls
    6. Nondiscretionary access controls

  2. Access Controls

  1. Administrative controls: Policies approved by management and passed down to staff, such as policies on password length.
  2. Logical/technical controls: Control access to a computer system or network, such as a username and password combination
  3. Hardware controls: Equipment that checks and validates IDs, such as a  smart-card for or security token for multifactor authentication.
  4. Software controls: Controls embedded in operating system and application software, such as NTFS permissions.
  5. Physical controls: Control entry into buildings, parking lots, and protected areas, such as a lock on an office door.