Java Mips Programming

 This homework requires students to create a MIPs program to simulate playing multiple games of “Craps” (a popular casino game) to determine an approximate winning percentage. : To simulate throwing two independent dice, you need to get two random numbers in the range of 1 to 6 and add them together. Do not get a single random number in the range of 2 to 12, as each value will not reflect the odds of rolling a particular numbe 

Information Technology in Global economy course Practical Connection to Software Engineer work experience

Assume you are a software engineer and write how this course is a reflection or connection to your work and environment.

Assignment:

Provide a reflection of at least 750 words (or 2.5 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment(My role: Software Engineer). 

Requirements:

• Provide a 750 word (or 2.5 pages double spaced) minimum reflection.• Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Must have all required APA components: cover sheet, references as needed, and others.• Share a personal connection that identifies specific knowledge and theories from this course.• Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. • You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.  

Attached: Course Text Book. It might help to build course reflection for software engineer work.

ERM Management

What are the business Opportunities that can be leveraged in the wildfire crisis, and what are the business risks ?

How can you Mitigate/Reduce the business risks?

Support Your analysis with academic references .

COM303 Week 2 Discussion 6

  

The reading offers eight elements to a transactional model of communication. Using the photograph of two boys in Chapter 2, choose three elements from the communication model that you believe are most important to ‘arriving’ at the moment captured in the photograph. Which of the three elements seems the most important to that photograph and why?  Is it possible to gauge verbal communication processes via a photograph?

Separation of Duties

Discuss the importance of separation of duties for personnel. Describe the reasons why separation of duties is a critical requirement for policy framework compliance. Discuss examples of roles you would separate and why. For example, an administrator has full administrative server login access, and a network technician has limited administrative access but can view system login details. Payroll has access to employee financial records, but only payroll managers can approve raises. Describe your methodology for creating a security policy. Explain your answers. 

Passing User Values To A Function And Using The Return Value Of The Function

 

Instructions

This program gets values from the user, and then runs a calculation.  The values are passed by reference (by address), so the main() function  sees the changed values of the variables. The first function  (getValues()) gets user input. The second function (calcCubic), performs  the calculations, and the third function (printCubic()) prints the  value of the calculation.

Here is the code:

And here is the output:

Unit 3 Guided Practice 6 Output.JPG

Submission Instructions

Now, you enter the code, and run it. (No flowchart this time)

Upload your .c file and a screenshot of your code output saved in a Word document 

Summary of 2 papers

 Conduct research over the Internet and find an article on data mining. The article has to be less than 5 years old. Summarize the article in your own words. Make sure that you use APA formatting for this assignment. 

Subject: Data mining

Blockchain problems

Blockchain continues to be deployed into various businesses and industries. As noted in this week’s reading, Blockchain is not without problems.  Several challenges have already been associated with the use of this technology.  Identify at least 5 key challenges and potential solutions.

Your paper should meet the following requirements:

• Be approximately 3 pages in length, not including the required cover page and reference page.

• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations.  

• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Project: Risk Management Plan

 

Purpose

This project provides an opportunity to apply the competencies gained in the lessons of this course to develop a risk management plan for a fictitious organization to replace its outdated plan.

Learning Objectives and Outcomes

You will gain an overall understanding of risk management, its importance, and critical processes required when developing a formal risk management plan for an organization.

Required Source Information and Tools

The following tools and resources that will be needed to complete this project:

  • Course textbook
  • Internet access for research

Deliverables

As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provide critical support for organizational missions. The heart of risk management is a formal risk management plan. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation.

The project is structured as follows:

Project Part

Deliverable

Project  Part 1

Task  1: Risk Management Plan

Task  2: Risk Assessment Plan

Task  3: Risk Mitigation Plan 

Submission Requirements

All project submissions should follow this format:

  • Format:     Microsoft Word or compatible
  • Font:     Arial, 10-point, double-space
  • Citation     Style: Your school’s preferred style guide
  • Minimum 2     pages per task

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors. 

Company Products 

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

· Loss of company data due to hardware being removed from production systems

· Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

· Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

· Internet threats due to company products being accessible on the Internet

· Insider threats

· Changes in regulatory landscape that may impact operations 

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined.

Project Part 1 Task 2: Risk Assessment Plan

After creating an initial draft of the risk management plan, the second part of the assigned project requires you to create a draft of the risk assessment (RA) plan. To do so, you must:

  1. Develop an introduction to the plan explaining its purpose and importance.
  2. Create an outline for the RA plan.
  3. Define the scope and boundaries for the RA plan.
  4. Research and summarize RA approaches.
  5. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk assessment.
  6. Develop a proposed schedule for the RA process.
  7. Create a professional report detailing the information above as an initial draft of the RA plan.

Evaluation Criteria and Rubrics

  • Did the student demonstrate an understanding of the competencies covered in the course relating to risk assessments?
  • Did the student include all important components of a RA plan in the outline?
  • Did the student demonstrate good research, reasoning, and decision-making skills in identifying key components and methodologies?
  • Did the student create a professional, well-developed draft with proper grammar, spelling, and punctuation?