Laws, Regulations, and Compliance

part-1

provide a 50–100-word explanation on why you chose your answer. Please cite your sources for your answers from your course materials or other credible resources.

1. Which guidelines state that the data gathered for private individuals should only be used for the purpose for which it is collected?

A. European Union Principles on Privacy
B. Computer Security Act of 1987
C. Economic Espionage Act of 1996

2. Which pillar of Basel II determines the lowest amount of funds that a financial institute must keep on hand?

A. Supervision
B. Market Discipline
C. Minimum Capital Requirements

3. Your organization’s website follows the Platform for Privacy Preferences Project (P3P) guidelines for user privacy on its public website. Which organization developed P3P?

A. Internet Architecture Board (IAB)
B. World Wide Web Consortium (W3C)
C. European Union

4. Based on the Federal Privacy Act of 1974, which type of permission must be obtained by a government agency to disclose private information that the agency collected?

A. Verbal permission
B. Implied permission
C. Written permission

5. What is the correct definition of a data aggregator?

A. A company that compiles, stores, and sells personal information
B. A company that analyzes personal information
C. A company that secures personal information

6. You work for a pharmaceutical company. The research department of your company has recently created a chemical formula for a new drug. Which property law term applies in this case?

A. Trade secret
B. Copyright
C. Trademark

7. You work for a United States federal agency. Your manager indicates that you must identify computers that contain sensitive information. Which law requires this?

A. HIPAA Act
B. Computer Security Act of 1987
C. Economic Espionage Act of 1996

8. Which statement is true of reverse engineering?

A. It involves compiling vendor object codes.
B. It analyzes the operation of an application.
C. It removes security flaws from object code.

9. Which of the following is MOST important in determining whether a disaster recovery test is successful?

A. Critical business processes are duplicated
B. Only business data files from offsite storage are used
C. IT staff fully recovers the processing infrastructure

10. An organization determined that if its email system failed for 3 days, the cost to the organization would be eight times greater than if it could be recovered in one day period. This determination most likely was the result of:

A. Disaster recovery planning
B. Business impact analysis
C. Full interruption testing

11. Which of the following should be performed FIRST in the aftermath of a denial of service DOS attack?

A. Restore servers from backup media stored offsite
B. Conduct an assessment to determine system status
C. Perform an impact analysis of the outage

12. Which of the following is the MOST important element to ensure the successful recovery of a business during a disaster?

A. Network redundancy is maintained through separate providers
B. Hot site equipment needs are re certified on a regular basis
C. Detailed technical recovery plans or maintained off site

part-2

provide a 50–100-word explanation on why you chose your answer. Please cite your sources for your answers from your course materials or other credible resources.

1. You are researching computer crimes. All of the following are categories of this type of crime, EXCEPT:

A. Computer-assisted crime
B. Computer-targeted crime
C. Computer-commerce crime

2. Which crime term is used to indicate when and where a crime occurred?

A. Means
B. Motive
C. Opportunity

3. Which type of law governs the payment of compensation and fines without sentencing the offenders to jail?

A. Civil law
B. Criminal law
C. Copyright law

4. An employee is suspected of criminal activity involving access to data in excess of the employee’s authority. You have obtained the original signed copy of the no-right-to-privacy agreement that the employee signed when he was hired. What kind of evidence is this agreement?

A. Best evidence
B. Secondary evidence
C. Corroborative evidence

5. As part of an incident investigation, you need to ensure that the primary copy of the original media is stored properly. All of the following steps should be completed, EXCEPT:

A. Label the primary copy with the date, time, collector’s initials, and case number, if applicable.
B. Encrypt the primary copy to ensure the contents are protected.
C. Seal the primary copy in a container and label the container to ensure that the primary copy is safe.

6. Which crime term is used to indicate how a criminal committed a crime?

A. Means
B. Motive
C. Opportunity

7. Which statement is true of circumstantial evidence?

A. It helps prove either a point or an idea.
B. It requires inference from the available facts.
C. It relies on original documents to prove a fact.

8. To investigate computer crimes, with which agency does FBI work?

A. Interpol and NSA
B. Secret Service and local law enforcement
C. Department of Defense

9. When an organization is using an automated tool to manage and house its continuity plans, which would have following is the PRIMARY concern?

A. Ensuring accessibility should a disaster occur
B. Versioning controls as plans are modified
C. Tracking changes in personnel and plan assets

10. Which of the following actions should be taken when an information security manager discovers that a hacker is footprinting the network perimeter?

A. Reboot the border router connected to the firewall
B. Check intrusion detection system logs
C. Enable server trace routing on the Demilitarized Zone segment

11. One performing a business impact analysis, which of the following should calculate the recovery time and the cost estimates?

A. Business continuity coordinator
B. Business process owners
C. Information security manager

12. Which of the following is MOST closely associated with a business continuity program?

A. Periodically testing network redundancy
B. Updating the hot site equipment configuration every quarter
C. Developing recovery time objectives for critical functions

Wk 4 – Apply: Case Study: Appliance Warehouse – Application Implementation

  

Assignment Content

  1.     Continue your work to support the development and implementation of the new Service Department for Appliance Warehouse.

    Directions
    In MindTap, review the Appliance Warehouse Case, and do the following:

    • Read the Before You Begin Message and the Module 11 Appliance Warehouse Webmail Client Emails. Read the messages to help determine the tasks you must complete.
    • Review and analyze the weekly Appliance Warehouse case study content and resources.
    • Create a 2- to 3-page document (to submit in Blackboard) to support the Appliance Warehouse Service Plan that includes the following:
    • Testing Plan: Create a testing plan to manage the systems through QA standards. Include a testing plan for each part of the new service you’ve identified, such as, scheduling, invoicing, and reporting. For each part identified, include in your testing plan an action to be tested, along with an expected outcome.
    •  Implementation Plan: Indicate whether you will use parallel, direct, phased, or pilot changeover strategies. Explain your reasoning. For Implementation recommendations, refer to section 11.9, “Installation,” in Ch. 11 of Systems Analysis and Design.
    • Training Plan: Indicate what a training plan would include for affected employees, such as appointment setters, technicians, management, and the parts department. Include a plan for all employees (or specific departments) affected by the new system implementation.

Draw an ER diagram for the following scenario:

Anglo Coal RSA is creating a database to keep track of all the employees in the company. Each employee’s name, surname, contact information and employees start date needs to be kept. There are different positions at Anglo Coal that indicate a different salary, medical aid and if you qualify for danger pay. There are different departments over the country. Anglo would like to know who works in what department and where that department is.  

CAESAR CIPHER

Python 3.8.6 (tags/v3.8.6:db45529, Sep 23 2020, 15:52:53) [MSC v.1927 64 bit (AMD64)] on win32

Type “help”, “copyright”, “credits” or “license()” for more information.

>>> 

============== RESTART: C:FDPyLoopCaesar CryptCaesarAll.py =============

                 WELCOME TO CAESAR CIPHER!                  

Please select one of the following options:

1 – Encrypt a message

2 – Decrypt a message

3 – Brute force

4 – Quit

Enter your choice:                   3

Enter your Encrypted message:        haahjr

Your decrypted message is:

1    gzzgiq

2    fyyfhp

3    exxego

4    dwwdfn

5    cvvcem

6    buubdl

7    attack

8    zsszbj

9    yrryai

10   xqqxzh

11   wppwyg

12   voovxf

13   unnuwe

14   tmmtvd

15   sllsuc

16   rkkrtb

17   qjjqsa

18   piiprz

19   ohhoqy

20   nggnpx

21   mffmow

22   leelnv

23   kddkmu

24   jccjlt

25   ibbiks

26   haahjr

Please select one of the following options:

1 – Encrypt a message

2 – Decrypt a message

3 – Brute force

4 – Quit

Enter your choice:                   

operational excellence

 Information Technology and Organizational Learning Assignment:

  • Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter).  Reflect on the various challenges are present in the digital era.  Will things get better or more complicated as times goes on?  Explain.  What are some methods to assimilate new generations into the workforce to think about competitive advantage?

The above submission should be one -page in length and adhere to APA formatting standards.**Remember the APA cover page and the references (if required) do not count towards the page length**Note the assignment should have the information from the Information Technology and Organizational Learning textbook.  

practical connection.

 Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course(  Data Science & Big Data Analy) have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Web 2.0 phenomenon

Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet?

Exp22_Excel_Ch10_Cumulative – Student Enrollment

#Exp22_Excel_Ch10_Cumulative – Student Enrollment 

#Exp22 Excel Ch10 Cumulative Student Enrollment 

#exp22_excel_ch10_cumulative – student enrollment 

#Excel Chapter 10 Cumulative – Enrollment Report 

#Exp22_Excel_Ch10_Cumulative_EnrollmentReport 

  

Project Description:

You are a student enrollment analyst at a local university. Currently your data management systems contain student information, course offerings, and student grades. You want to create a report to examine total enrollment and student performance. You will use Power Query to import data, Power Pivot to analyze grades, and Power Maps to visualize student demographic information.

     

Start Excel. Download and open   the file named Exp22_Excel_Ch10_Cumulative_EnrollmentReport.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

Use Get & Transform to   import the file e10c1StudentEnrollment.csv   into a new worksheet. Be sure   to load the table to the data model during import.

 

Rename the worksheet StudentEnrollment.

 

Use Get & Transform to   import the ClassesOffered table located in the database e10c1ClassOfferings.accdb into a new worksheet. Be sure to load   the table to the data model during import.

 

Import the GradeReport table   from the e10c1Grades.accdb database   into a new worksheet. Be sure to load the table to the data model during   import.

 

Open the StudentEnrollment query   in the Power Query Editor. Split the Name column using space as a delimiter.   Rename the split columns Last Name and First Name respectively. Close and load the query.

 

Use Get & Transform to   import the file e10c1StudentEnrollment2024.txt   into a new worksheet. Prior to loading the data into the worksheet, use   the Power Query Editor to split the Name column using space as a delimiter.   Rename the split columns Last Name and First Name respectively.

 

Append the   e10c1StudentEnrollment table with the data from the   e10c1StudentEnrollment2024 table. Close and Load the table.

 

Define the following   relationship between the Grade Report table and Classes Offered table:
 

  Table:
  GradeReport
  Field:
  ClassNumber
  Table:
  ClassesOffered
  Field:
  ClassNumber

 

Define the following   relationship between the Grade Report table and the e10c1StudentEnrollment   table:
 

  Table:
  GradeReport
  Field:
  StudentID
  Table:
  e10c1StudentEnrollment
  Field:
  StudentID

 

Use Power Pivot to create a   PivotTable on Sheet1 starting in cell A1. Add ClassName from the   ClassesOffered table to the Rows area, Grade from the GradeReport table to   the Values area, and ClassNumber from the ClassesOffered table to the Filters   area.

 

Change the Implicit measure of   GPA created in the previous step from Sum to Average.

 

Rename the worksheet GradeAnalysis.

 

Format the grades in the range   B4:B19 to display 2 decimal places.

 

Insert a Clustered Column   PivotChart. Add the chart title Grade Analysis. Move and resize the chart so that the upper-left   corner is inside cell D4 and lower-right corner is inside cell K18.

 

Create a 3D Map based on student   addresses in the enrollment table. Add Address as the Location dimension. Add   Grade as the Height dimension and change the aggregation from Sum to Average.

 

Add Grade as the Height   dimension and change the aggregation from Sum to Average. Zoom and tilt the   map so the entire US is visible. Edit Scene 1 by changing the name to Over View, setting the Scene duration to   6 seconds, and then setting the Transition Effect to Dolly.

 

Add a new scene called East Coast. Zoom out and reposition the   map to view the Eastern seaboard. Set the Scene duration to 6 seconds and set   the Transition Effect to Dolly.

 

Edit the connection properties   so all queries do not refresh in the background and do not refresh on Refresh   All.

 

Save and close Exp22_Excel_Ch10_Cumulative_EnrollmentReport.xlsx.   Exit Excel. Submit the file as directed.