IT531-GL-M6 week 8 assignment

 Prepare a one page paper explaining the mechanism of sending and receiving emails. Use may use the internet for more sources. Please double space your paper and cite your sources. 

Case Scenario

An HU Investment Firm employee who had signed a non-disclosure agreement at the time of hire was identified as posting corporate protected information on the internet which has led to a loss of corporate income and trust of the companies that the corporation represents and does business with. The corporation has taken the incident to a Law firm in an attempt to lead to prosecution against the employee who has since been fired.

Write a Summary Report to the Prosecutor based on the case scenario and your work in previous units.

1. Applicable laws and policies that relate to cyber defense

2. Describe the major components of each pertaining to the storage and transmission of data.

3. Describe the responsibilities related to the handling of data as it pertains to legal, ethical and/or agency auditing issues.

4. Describe how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it.

5. Support your report with documents that you have created previously, such as the Risk Assessment Report and the Mitigation Plan. (Attached) 

Remember to use a professional writing style and support your statements with logical evidence. 

Include APA citations within your paper as well as an APA formatted references list.

Compilers(Question about Computer Science)

  

1 Consider the following grammar (describing LISP arithmetic):

X -> ( E ) 

E -> O | O T

O -> + | * | – | /

T -> n | X

X == executable, E == expression, T == term, n == number

terminals == ( ) n + * – / 

Find FIRST, FOLLOW and LR(0) sets for this grammar.

Is the grammar LR(0)? Is it SLR?

2.Give a rightmost derivation of the string (x+a)*x using:

S=> E

E=> E+T | T

T=> T*F | F

F=> i | (E)

The lexical analyzer returns a token i==identifier for variables ‘x’ and ‘a’.

Display the parse tree, the syntax tree, and the expression DAG.

3. The algorithm for DOM in the text is based on data flow analysis, but it is often desirable to find the DOM tree from the control flow graph without t need to do data flow. Describe a possible algorithm based on breadh-first search to find DOM given a control flow graph. (An overview description in Englishis sufficient, you do not need a formal specification or code of an algorithm)

IT Management Executive Brief

 

Assignment Content

  1. Imagine you are an IT manager at small retail organization that has a new owner. The new owner is from another industry and has expressed a lack of understanding of some of the controls and processes important to IT management and governance. You must help the new owner with understanding these important concepts.

    Write a 2- to 4-page executive brief in which you:

    • Discuss how the 2002 Sarbanes-Oxley Act has affected IT governance, including the major provisions of the act and how this might affect IT, and how IT might assist in compliance.
    • Discuss how IT policies, standards, and procedures can be used to determine if the enterprise is in compliance and support the IT strategy.
    • Discuss how Quality Management Systems (QMS) are important to ensure quality processes are in place.
    • Discuss how IT management and monitoring of controls can be used to assess IT performance.
    • Format your assignment according to APA guidelines.

      Submit your assignment.

Research Project: Portfolio Project

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Java – Process Synchronization

In this assignment, you will write a Java program that implements the solution to the bounded buffer problem between a producer and a consumer. The producer will produce forever and the consumer will consume forever. The producer will put data into the buffer and the consumer will remove data from the buffer. The buffer must implement a means of ensuring that the buffer never enters an under flow (take too much data out) or over flow put too much data into the buffer. Additionally the buffer must have functionality so that a critical region problem does not occur with parallel updates to the data. 

Test you application by creating a java thread for the produce, the consumer and having them access a shared buffer with declared size 5. 

Week#3 Discussion

 

After reading this week’s article, and any other relevant research you locate, please discuss the following in your main post:.

  • Which case study in the paper was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?