Rubic

 The purpose of this assignment is to examine the components of a research article and help you identify guidelines for conducting critical analyses of published works.  

 

Please use the attached “Guidelines for Evaluating a Research Article” to answer the below questions.  Write a 2 page paper on:

  1. What is an Information Technology Project?  
  2. Identify & explain the major parts of a research paper.
  3. Explain the difference(s) between qualitative vs quantitative research methods.
  4. Why use Peer Reviewed journals?
  5. Why are keywords used during the Literature Review process?
  6. Why are project deliverables, limitations & deadlines an important aspect of project development?
  7. Why use/apply APA Basic Citation Stiles in YOUR writing assignments/research?
  8. Why is Academic Integrity important (see syllabus)?
  9. Explain the difference between plagiarism vs self-plagiarism?

 

  • Use at least three – five (3 – 5 ) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format

Discussion question, 350 words and 2 references.

A.     What is the leadership paradox? Give some reasons why a leader can encounter difficulty in newly formed teams or groups using a participative management system. Support your discussion with at least two (2) external sources.

B.     Present a discussion of the strategies for encouraging participative management in the workforce, and how to implement each of these strategies. Support your discussion with at least two (2) external sources.

C.    What serious biases or misassumptions do groups that are involved in inter-team conflict sometimes experience? How do these biases and prejudices affect the ability of teams to accomplish their goals? Support your discussion with at least two (2) external sources.

Cyber Security planning and Management

Many believe that cloud computing can reduce the total cost of computing and enhance “green computing” (environmentally friendly). Why do you believe this to be correct? If you disagree, please explain why?

Enterprise Risk Management

  1. Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.
    In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

    • Introduction
    • Why should an organization Implement an ERM application?
    • What are some key challenges and solutions to Implementing an ERM?
    • What is Important for an effective ERM?
    • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
    • Conclusion, final thoughts for future research
    • Recommendation
    • Your paper should meet the following requirements:
    • Be approximately seven to ten pages in length, not including the required cover page and reference page.
    • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

cc-15

 https://www.youtube.com/watch?v=W_O7mziH3vM&ab_channel=DEFCONConference

Review in 500 words or more the video above called Cloud Security Myths.

Programming project

  • Inventory ManagementObjectives: Use inheritance to create base and child classes Utilize multiple classes in the same program Perform standard input validation Implement a solution that uses polymorphismProblem:A small electronics company has hired you to write an application to manage their inventory. The company requested a role-based access control (RBAC) to increase the security around using the new application. The company also requested that the application menu must be flexible enough to allow adding new menu items to the menu with minimal changes. This includes re-ordering the menu items and making changes tothe description of a menu item without having to change the code.Security:The company has suggested to start the application by prompting the user for a username and password to authenticate the user. There are two types of users at this company, managers and employees. If managers log on to the application, they will seeall options on the menu list. If employees log on to the application, they will see a limitedset of options on the menu list. User information is stored in Users.dat file, which may ormay not exist at the start of the program. A super user “admin” with password “admin” has already been hardcoded in the program to allow for the initial setup and the creationof other users. The Users.dat file contains the FirstName, LastName, Username (case insensitive), HashedPassword and a flag to indicate whether a user is a manager or not.The file is comma separated and it is formatted as follows:Joe, Last, jlast, 58c536ed8facc2c2a293a18a48e3e120, trueSam, sone, 2c2a293a18a48e3e12058c536ed8facc, falseJane, Best, jbest, 293a18a48e3e12052058c536ed8facc2c, falseNote: Ensure that the ‘AddUser’ function does not add duplicate values, and the ‘ChangePassword’ function does not change password if username/password is entered incorrectly. If adding a new user or changing the password is successful, return true, or else return false.
  • Application Menu:The menu of the application is dynamically loaded and displayed to the user only after the user successfully logs on. The menu items will be loaded from file “MenuList.dat”, which may or may not exist at the start of the application. If the file doesn’t exist, the application should show at least an Exit menu item as default. The file will contain all menu items details, including the name of the command that will be executed when the menu item is selected. If a menu item is marked as restricted (Boolean flag), only managers can see that item. The file contains the following comma separated fields, Description, a Boolean flag to indicate if the option is restricted to managers only, and the name of the menu command that will be executed when the option is chosen. The order and option number of a menu item may change depending on how they are listed in the file. The Exit option will always be listed last and it will not be in the file.Below is a sample of how the MenuList.dat file looks like:Add User, true, AddUserCommandDelete User, true, DeleteUserCommandChange Password, false, ChangePasswordCommandAdd New Product, true, AddProductCommandNote:The command name of each menu item must match the name of the class that you will create in the code (See AddProductCommand class in the code for example).Inventory:The inventory consists of multiple products of type Product stored in class ProductCatalog. The ProductCatalog is responsible of all inventory operations that add, remove, find and update a product. When printing a product information, the product retail price should be calculated and displayed as well. Retail price = (cost + (margin * cost/100)). A list of functions has been added to this class in the provided code template. You must implement all listed functions. The inventory products will be saved in file Inventory.dat, which may or may not exist when the program first starts. The file will contain the product unique id (int), product name (string), cost (double), quantity (int)and margin (int, integer that represents margin percentage).The Inventory.dat file is comma separated and formatted as follows:3424, Smart Watch, 20.45, 23, 8065454, Flat Screen TV, 465.98, 15, 35435, Computer Monitor, 123.54, 84, 43Program Flow: Program starts in main() method Prompt user for username and password Authenticate user and maintain the logged-on user object Load inventory
  •  Load and create menu list Display menu list and prompt the user for option Execute selected option Keep displaying the menu until the user chooses to exitOutput Format:Enter username: some usernameEnter password: some password //Repeat prompts until useris authenticated OR show error andoption to exit.Invalid username or password!Press enter to continue or “Exit” to exit:Enter username: some usernameEnter password: some passwordWelcome Firstname LastName!Inventory Management System Menu //This is the header of the MenuList// The order and option number of a menu item may change depending on how they are listed in the MenuList.dat file. The Exit option will always be listed last and it will not be in the MenuList.dat file.1- Add user2- Remove user3- Change password4- Add new product5- Update product information6- Delete product7- Display product information8- Display inventory9- ExitEnter your selection: 7
  • Enter product name: sMaRt wAtChId Name Cost Quantity Retail—————————————————-3424 Smart Watch $20.45 23 $36.81//Repeat the menu after each command is executedUnit Testing:A unit test method is required to test each of the methods listed below. These methods will be used by the unit testing framework to test the accuracy of your code. InventoryManagementSecurity.AuthenticateUser InventoryManagementSecurity.AddNewUser InventoryManagementSecurity.RemoveUser InventoryManagementSecurity.ChangePassword MenuList.AddMenuItem() ProductCatalog.AddUpdateProduct(Product product) ProductCatalog.RemoveProduct(int productId) ProductCatalog.FindProduct(int productId) ProductCatalog.PrintProductInformation(int productId) ProductCatalog.PrintInventoryList()Grading: Coding standards, style and comments (10 Points) Unit testing methods x 10, (2 points for each of the methods mentioned above – 20 Points) The rest of the grade will be broken down as follows: InventoryManagementSecurity.AuthenticateUser (5 Points) InventoryManagementSecurity.AddNewUser (5 Points) InventoryManagementSecurity.RemoveUser (5 Points) InventoryManagementSecurity.ChangePassword (5 Points) MenuList.AddMenuItem() (20 Points) //This includes implementing all commands for the menu list ProductCatalog.AddUpdateProduct(Product product) (10 Points) ProductCatalog.RemoveProduct(int productId) (5 Points) ProductCatalog.FindProduct(int productId) (5 Points) ProductCatalog.PrintProductInformation(int productId) (5 Points) ProductCatalog.PrintInventoryList() (5 Points)N

Research Assignment

 Draft a 5-6 page research prospectus (a short version of what will become your “research proposal”) that is a shortened description of a possible research project you’re looking into for your dissertation, including a description of the problem area, the purpose of your research project, and research question(s) that you would answer in your dissertation. 

Short answer

     

Short answers.    APA is necessary for any paraphrasing or direct quotes.  Complete   the four questions. 

   

Short answer – describe a common attack against safes and vaults:

Short answer – describe a protection against your common attack in the previous question:

Short answer – describe criteria when selecting a safe or vault:

Short answer – describe a common deterrent control related to safes and vaults:

computer Archtecture

Q1. Describe the major components of a desktop or laptop personal computer that is not more than 3 years old. There should be four categories. Each category has many components. Some components, such as CPU has many more components. You must provide at least a complete sentence to describe this component.

Q2. Draw the layout of the following components: CPU, cache, ROM, RAM, DMA, and I/O modules. Use the line to show the interaction between every two components. For example there is a line between CPU and cache and another line between CPU and ROM. You can’t draw a line in the middle with all components hanging from the line. No other components should be included in the answer. No need to provide additional description.

700 words: Information Technology and Organizational Learning. Read the reference document and answer the questions in description

Please find the reference document in the attachment:   

· Chapter 7 – Review the section on dealing with multiple locations and outsourcing. Review figure 7.2 and note how virtual team communications further reiterates the importance of this model. 

· Chapter 8 – Review the Siemens AG case study. Note the importance of understanding the interrelationships amongst all the senior leaders at every location. Pay special attention to Figure 8.1 and Figure 8.2. Note how the corporate CIO should engage with each of the regional leaders. Why is this important?