information thecnology

  

Hour of Code (HOC) is a web site where you will complete a one-hour introduction to computer science. It is designed to explain code and show that anyone can learn programming basics. Since we are focusing on software during this course segment, you will see what is involved in the process of creating program, “apps.” Here is the link to the general HOC website:

Here’s the link: 

https://code.org/

You are going to complete the Processing Foundation – Hello Processing, module. Here is the link to this Module:

https://hourofcode.com/processfound

It has a video that will guide you through writing software to do the things that you often do with your hands: create drawings, create animations or to create images. 

Pausing the video when the instructor asks you to type code will help. 

Come up with an original creation, it should not look like this example. You should paste a screen shot of your creation after each section of the tutorial (Shapes, Color and Interact, and Questions). Use your favorite colors and try to create one of your favorite images. Paste your original screen shots below my examples. 

After Shapes:

  

After Color:

After Interact:

After Questions: (with the mouse down)

Final step:

Continue to edit your code as much as you would like on your original image. Make sure your last block of code includes elements from each section of the tutorial. When you finish, click the Share button. At the Confirm dialog box hit Continue. It is your choice whether or not you want to, “Share in gallery.” Copy the link in the next dialog box and pate it into a Word document that I can see your final creation. In that document also past a copy of your last block of code. I will run your block to make sure it creates the same image. Finally, paste a screen shot of after you finish the Questions section. Make sure I can see the date and time in the status area of your screen shot. 

graded assignment

Using a web browser,search for”incident response template”.Look through the first five results and choose one for further investigation.Take a look at it and determine if you think it would be useful to an organization creating a CSIRT.why or why not?

IAM Compliance Management

 1. An annotated bibliography of at least five sources. The annotations must be at least five sentences long.

2. A power point with at least 12 slides not including the title and references addressing the topic IAM Compliance Management  .

3. A 750 word summary on topic IAM Compliance Management 

Health information management

 

Assumptions:

All HIM applications must be managed by the same individual. It is more important the individual who manages the applications have a familiarity with the HIM processes rather than IT experience.

Deliverables:

1. Choose three different job analysis methods discussed in chapter 7 that you will use to collect data for the proposed new HIM application specialist position.

2. Write a 1-2 page paper summarizing the methods, explain why you chose the method, and describe how you would carry out the method in analyzing the application specialist position.

3. Create a new job title and job summary the HR department will use to recruit for candidates for this new HIM position.

4. Review the results on page 281 of candidates and then develop 3 interview questions to ask each candidate during a structured interview; each candidate will be asked the same 3 questions. (see part 3 on page 281 for additional suggestions).

HIM departments are always budget conscious and trying to do more with less. It is very common to combine jobs or eliminate positions through attrition.

Review the case study on pages 150-151 and provide the following deliverables:

1. A new combined job title and describe why this title was selected (approx. 2 paragraphs incorporating what you learned from reading chapter 7)

Wk 1 – Threats, Attacks, and Vulnerability Assessment

 

Part A:

Select an organization you wish to explore and use throughout the course.

As you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security Threat Analyst, Penetration Tester, Cyber Security Engineer, Risk Management Analyst, and Software Engineer. You need sufficient knowledge of the organization you select to complete these security assignments.

Part B:

A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests.

Take on the role of a Cyber Security Threat Analyst for the organization you select. Use the Threats, Attacks, and Vulnerability Assessment Template to create a 3- to 4-page assessment document.

Research and include the following:

  • Tangible assets:
  • Include an assessment scope. The scope must include virtualization, cloud, database, network, mobile, and information systems.
  • Asset descriptions:
  • Include a system model, diagram, and descriptions of each asset included in the assessment scope and existing countermeasures already in place. (Microsoft® Visio® or Lucidhart®)
  • Threat agents and possible attacks
  • Exploitable vulnerabilities
  • Threat history
  • Evaluation of threats or impact of threats on the business
  • A prioritized list of identified risks
  • Countermeasures to reduce threat

Note: The page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment. For assignments that require use of the template, insert the completed template into the APA document. Delete the assignment instructions from the document. This will improve the originality score from Safe Assign. Make sure to check the SafeAssign originality score. Individual assignments can be submitted more than once to correct any content, quality, or originality issues.

Submit your assignment.

java

 Please read the following requirements carefully and then implement your own customized Array class:

provide the following features:

 Two constructors. One takes the input of the initialized capacity (int) and create the underlying array with that capacity; the other takes no input and creates an array that can hold a single element by default (that is, init capacity == 1);

 Getters and setters and basic methods we discussed during the class including: getCapacity(), getSize(), set(int index), get(int index), isEmpty();

 CRUD operations we discussed during the class including: add(int index), addLast(), addFirst(), remove(int index), removeLast(), removeFirst(), removeElement(int target), removeAll(int target);

 Supports generic types;

Mutable, that is when add element exceeding its capacity, it can resize to accommodate the change.

 Implement a (private or public) swap(int a, int b) method that swaps the two elements in the index a and b if a and b are both admissible; also a public reverse() method that reverses the order of stored elements in-place (means, no additional spaces are allocated).

 A public void sort() method sorts the stored elements in ascending order inO(nlog(n)) time. 

[hint]: Quicksort or Merge sort

SQL challenge

In this assignment, you will design the tables to hold data in the CSVs, import the CSVs into a SQL database, and answer questions about the data. In other words, you will perform:

  1. Data Engineering
  2. Data Analysis

Note: You may hear the term “Data Modeling” in place of “Data Engineering,” but they are the same terms. Data Engineering is the more modern wording instead of Data Modeling.

Data Modeling

Inspect the CSVs and sketch out an ERD of the tables. Feel free to use a tool like http://www.quickdatabasediagrams.com.

Data Engineering

  • Use the information you have to create a table schema for each of the six CSV files. Remember to specify data types, primary keys, foreign keys, and other constraints.
    • For the primary keys check to see if the column is unique, otherwise create a composite key. Which takes to primary keys in order to uniquely identify a row.
    • Be sure to create tables in the correct order to handle foreign keys.
  • Import each CSV file into the corresponding SQL table. Note be sure to import the data in the same order that the tables were created and account for the headers when importing to avoid errors.

Data Analysis

Once you have a complete database, do the following:

  1. List the following details of each employee: employee number, last name, first name, sex, and salary.
  2. List first name, last name, and hire date for employees who were hired in 1986.
  3. List the manager of each department with the following information: department number, department name, the manager’s employee number, last name, first name.
  4. List the department of each employee with the following information: employee number, last name, first name, and department name.
  5. List first name, last name, and sex for employees whose first name is “Hercules” and last names begin with “B.”
  6. List all employees in the Sales department, including their employee number, last name, first name, and department name.
  7. List all employees in the Sales and Development departments, including their employee number, last name, first name, and department name.
  8. In descending order, list the frequency count of employee last names, i.e., how many employees share each last name.

Bonus (Optional)

As you examine the data, you are overcome with a creeping suspicion that the dataset is fake. You surmise that your boss handed you spurious data in order to test the data engineering skills of a new employee. To confirm your hunch, you decide to take the following steps to generate a visualization of the data, with which you will confront your boss:

  1. Import the SQL database into Pandas. (Yes, you could read the CSVs directly in Pandas, but you are, after all, trying to prove your technical mettle.) This step may require some research. Feel free to use the code below to get started. Be sure to make any necessary modifications for your username, password, host, port, and database name:
    from sqlalchemy import create_engine engine = create_engine(‘postgresql://localhost:5432/‘) connection = engine.connect()
  1. Create a histogram to visualize the most common salary ranges for employees.
  2. Create a bar chart of average salary by title.

Epilogue

Evidence in hand, you march into your boss’s office and present the visualization. With a sly grin, your boss thanks you for your work. On your way out of the office, you hear the words, “Search your ID number.” You look down at your badge to see that your employee ID number is 499942.

Submission

  • Create an image file of your ERD.
  • Create a .sql file of your table schemata.
  • Create a .sql file of your queries.
  • (Optional) Create a Jupyter Notebook of the bonus analysis.

visual basic project done in visual studio

 

The Final Project for this course is the creation of an employee database. This assignment will give you some insight into how Visual Basic programming can be useful in the real world.  

As you work on this application, try to make it presentable like an application you would want to use if you were using an employee database application.  Feel free to incorporate pictures to make it appeal to the user….be creative.  Keep in mind the things you learned such as tab order and exception handling for user experience on the front end.  Also, think about the coding you are doing and make sure you comment your code and follow Visual Basic standard conventions. What if a new developer were to make changes to the application?  Will they understand your intentions and what the code is doing?

Complete the following Programming Challenges:

Programming Challenge #1 – Creating Employee Data found on page 625 of the textbook.

Programming Challenge #2 – Reading Employee Data found on page 625-626 of the textbook.

Programming Challenge #12 – Employee Data, Enhanced found on page 629 of the textbook.

Specifically, be sure to meet the following criteria:

  1. Employee records must be saved to a text file.
  2. Employee records can be retrieved from the text file, display one record at a time.
  3. Employee records can be retrieved from the text file, all records at once.
  4. New employee records can be added to the text file without erasing the existing records.
  5. Users can search employee records by employee ID.
  6. Save/OpenFileDialog must be used at least once.
  7. Users can print all employee records appropriately formatted.

Most students find this easier if all three programming challenges are put into one application.  If you choose to do these as three separate applications, put each one in its own zipped file.