Signature Assignment

  • Assignment Requirements: Integration: One Piece of a Large Puzzle. 

Refer back to the Marseille Urban Planning Project article you read in the Week 1 Content folder within your course Documents and Resources. In this article, you can visually see how multiple departments came together using Esri’s CityEngine tool to create and implement an urban plan to restructure a city within a matter of months.

To complete this assignment, choose a large public works project, such as the construction of a new high school. For the public works project you can select any project – this could be a local project or a hypothetical situation (adding a city park, expanding a freeway, creating more housing, building a new commercial complex, adding a neighborhood school, building out a train system, etc.). 

Write a two page paper, using the newest APA formatting edition within a Microsoft Word Document, that identifies two phases that can be independent projects. Discuss each phase and discuss how each phase is an independent project and what makes them independent projects.  Specifically, state how each project meets the definition of a project, and describe the product, service, or result of each project, and why it is temporary.

Complete the Unix scripts

| Firewall // 1pt

Open the following ports and services: 443, http

| Account Management // 3 pts

From the csv, use the OS as the filter to complete the following tasks.

– Add each username and make sure to place it on the correct base dir. You can check the /etc/passwd to ensure it is correct.

roary001:x:1000:1000::/home/__OS__ /__COUNTRY__ /roary001:/bin/bash

– Each username must be part of the right primary group. See filter below

roary001:x:1000:1020::/home/__OS__ /__COUNTRY__ /roary001:/bin/bash

– Each home folder must contain the corresponding files. See filter below

– Add the right content to the about file.
* All text must be lower case
* Single space characters
* No extra characters at the end of the document

| MAC

– Base directory = /home/mac/

– Primary group = color

$ ls /home/mac/canada/roary001/

.DS_Store
about

$ cat /home/mac/canada/roary001/about
first last

dob

| WINDOWS

– Base directory = /home/windows/

– Primary group = fruits

$ ls /home/windows/mexico/roary002/

Thumbs.db
about

$ cat /home/windows/mexico/roary002/about
last first

shell

Ubuntu // 4pts

| Firewall // 1pt

Open the following ports and services: 21, 22, 53, 143, 443

| Apache2 // 3pt

Install Apache on the server

$ apt-get install apache2

From the csv, use the permission as the filter to complete the following tasks. 

– Create a base directory under the /var/www/html for each permission

/var/www/html/permission/   // all, create, delete, drop, execute, insert, select, update

– From the CSV, filter all users that match each permission and create a new directory for each month of the year for which your users were born. 

fh7058,forrester,hochstein,m,august 9 1998,ghana,plum,bananas,mac,/bin/tcsh,execute

gm1513,greydon,merrick,m,september 21 1992,bahrain,medium_aquamarine,grapes,mac,/bin/csh,select

iw7165,iriana,weick,f,august 20 1987,cyprus,medium_purple,plums,windows,/bin/tcsh,select

/var/www/html/select/september

– Inside of each folder above, create an index.html file and add all matching users data int the following order: country,color,fruits,os,shell,username,first,last,gender

cat /var/www/html/select/september/index.html

bahrain,medium_aquamarine,grapes,mac,/bin/csh,gm1513,greydon,merrick,m

Fedora // 2pts

// scripts

All scripts must be placed on the /root folder.

Scripts can not be executed prior to submission. This will cause issues.

Make sure to test your scripts before turning in the assignment.

* Ensure that all file references in your scripts are absolute paths.

| useradd

Create a script named useradd.sh. This script will complete the same steps outlined on CentOS, but will run them on demand.

| httpd

Create a script named httpd.sh. This script will complete the same steps outlined on Ubuntu, but will run them on demand.

* Keep in mind that to install apache2 on Fedora you need to use the command below. The folder structure for the web server is the same.

$ dnf install httpd.

math

an aqurium is 10m long, 5m wide and 6m deep 

what is the volume of the aquarium?

discussion 5

Discuss the importance of regular expressions in data analytics. As part of your discussion please include a specific use case for which a regular expression could be used with a dataset.  Also, discuss the differences between the types of regular expressions. (2-3 paragraphs)

Choose two types of regular expressions… For example, [brackets] (Matches the enclosed characters in any order anywhere in a string) and * wildcards (Matches the preceding character 0 or more times) and discuss the differences between the two.  Please be sure to include two or three differences for each. Include how they help manipulate data (1-2 paragraphs).

Project Part 1

  

Purpose

This project provides an opportunity to apply the competencies gained in the lessons of this course to develop a risk management plan for a fictitious organization to replace its outdated plan.

Learning Objectives and Outcomes

You will gain an overall understanding of risk management, its importance, and critical processes required when developing a formal risk management plan for an organization.

Required Source Information and Tools

The following tools and resources that will be needed to complete this project:

  • Course textbook
  • Internet access for research

Deliverables

As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provide critical support for organizational missions. The heart of risk management is a formal risk management plan. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation.

The project is structured as follows:

  

Project Part

Deliverable

 

Project   Part 1

Task   1: Risk Management Plan

Task   2: Risk Assessment Plan

Task   3: Risk Mitigation Plan 

Submission Requirements

All project submissions should follow this format:

  • Format:      Microsoft Word or compatible
  • Font:      Arial, 10-point, double-space
  • Citation      Style: Your school’s preferred style guide
  • Minimum 2      pages per task

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors. 

Company Products 

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

· Loss of company data due to hardware being removed from production systems

· Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

· Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

· Internet threats due to company products being accessible on the Internet

· Insider threats

· Changes in regulatory landscape that may impact operations 

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined.

Project Part 1

Project Part 1 Task 1: Risk Management Plan

For the first part of the assigned project, you must create an initial draft of the final risk management plan. To do so, you must:

  1. Develop and      provide an introduction to the plan by explaining its purpose and      importance. 
  2. Create an outline      for the completed risk management plan. 
  3. Define the scope      and boundaries of the plan. 
  4. Research and      summarize compliance laws and regulations that pertain to the      organization. 
  5. Identify the key      roles and responsibilities of individuals and departments within the      organization as they pertain to risk management. 
  6. Develop a proposed      schedule for the risk management planning process.
  7. Create a professional      report detailing the information above as an initial draft of the risk      management plan. 

Write an initial draft of the risk management plan as detailed in the instructions above. Your plan should be made using a standard word processor format compatible with Microsoft Word. 

Evaluation Criteria and Rubrics

  • Did the student      demonstrate an understanding of the competencies covered in the course      thus far?
  • Did the student      include all important components of a risk management plan in the outline?
  • Did the student      demonstrate good research, reasoning, and decision-making skills in identifying      key components and compliance laws and regulations?
  • Did the student      create a professional, well-developed draft with proper grammar, spelling,      and punctuation?

  

  

C programming

  

Create a word count server that can do the following: converts first alphabet of every word to upper-case alphabet, counts the number of words, counts the number of alphabets, and finally counts the number of vowels in a given sentence. 

CIS 220, Business Information Systems and Analytics

  The databases for this assignment (MBA and IT 100 v4) and the Database II Answers Excel spreadsheet are available on Blackboard and should already be in your CIS 220 folder if you are using Microsoft Access through the virtual machine. ALSO NOTE: You should submit both databases with the queries labeled as specified below AND the Database II Answers spreadsheet, with your answers filled in in the appropriate cell.