Ethics and Discussion

 

This is the second of a series of five assignments focusing on software engineering ethics.

Read the attached Ethics-II.pdf Download Ethics-II.pdfwhich continues the discussion on what Ethics mean  in the context of software engineering.

Then proceed to answer the questions inside the reading:

  • Questions 2.1 and 2.2
  • Questions 3.1 and 3.2
  • Question 4.1

Because for many ethics questions there is no absolutely right or wrong answers as such, your responses will be graded based on completeness and thoughtfulness as opposed to rote or perfunctory ones. There are three grade levels for this assignment based on your responses to all the questions: 20 (no reasoning in responses), 35 (minimal to little reasoning), and 50 (sufficient reasoning and consideration).

Write your answers in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides. At least 3 pages 

 Question 2.1: What sorts of things can excellent software engineers contribute to the good life? (Answer as fully/in as many ways as you are able) 

Question 2.2: What kinds of character traits, qualities, behaviors and/or habits do you think mark the kinds of people who tend to contribute most in these ways? (Answer as fully/in as many ways as you are able) 

 Question 3.1: Who are the various stakeholders in this scenario, and what do they each have at stake in your action? Reflect carefully and deeply, and answer as fully as possible.

Question 3.2: What do you think is your ethical obligation in this situation? What do you think an excellent software engineer would do in this situation? Are they the same thing, or different? Please explain your answer. 

 Question 4.1: Which of the contributions in your answer to 2.1 are related to vital public good(s)? What vital public goods might software engineers help to secure that you did not mention in your initial answer to 2.1? 

 

M4 Discussion 1

Read the attached article: “The Mythical Man-Month Download The Mythical Man-Month“, by Frederick Brooks, extracts from The Mythical Man Month book, 1975.

1. Tell us something about what you learn from this article. Your posting should contain at least 100 words;
2. Provide constructive comment on at least one other student’s posting. “Agree”, “good” etc. are not counted as constructive commenting.

 

M4 Discussion 2

Find at least two credible sources to study the recent VW Diesel Scandal and read what this topic is about and what the latest development is.

1. Discuss your understanding of this case from the software engineering ethics viewpoint. Consider including in your post on your thoughts related to questions such as

  • What VW software engineers should have done to in order contribute to the good life for others in this case;
  • Who are the public’ to who the VW software engneers is obligated;
  • Why the software engineers is obligated to protect the public and
  • how VW software engineers failed in this case.

Your posting should contain at least 100 words;

2. List the two sources used in your research at the end of your post;

3. Provide constructive comment on at least one other student’s posting. “Agree”, “good” etc. are not counted as constructive commenting.

CYBERLAWS & ETHICAL HACKING PROJECT

Scenario  It is your first day at the job in the information security department, and you are called for a meeting. In the meeting the need for strengthening the information security for the college is discussed, and everyone agrees that the first step in this direction is to identify the top five threats that are a potential risk to Aim Higher College.  The college’s administrative staff and faculty run the latest version of Microsoft Windows on their primary workstations, whereas students’ laptops may run Windows or macOS. The college’s web servers run on Linux; however, all other servers are Windows Server-based. Student, staff, and faculty mobile devices, such as tablets and smartphones, run on iOS or Android; all mobile devices can connect to the campus network.  Tasks  You have been given the responsibility to determine the top five threats that Aim Higher College faces. You asked your supervisor for support in this task and he gave you the following resources that might be useful in your research and analysis: 

    Microsoft Security Advisories and Bulletins (https://docs.microsoft.com/en-us/security-updates/)

    Common Vulnerabilities and Exposure (CVE) database search
(http://cve.mitre.org/find/index.html)

    Security organizations, such as Secunia (http://secunia.com/)

Your supervisor has also asked you to consider the following questions as you shortlist the threats:

What threats are new this year, and which have become more prevalent?

Why are these threats more common and why are they important?

What threats remain constant from year to year? Why?

What threats do you believe will become more critical in the next 12 months? Why?

What is the likelihood of an exploit affecting Aim Higher College, and which operating system(s)does it target?

With these considerations in mind, write a summary report of the top five threats to Aim Higher College. Briefly explain why you have selected them and what effect they might have on the institution or its students, employees, graduates, or other communities on campus.

Submission Requirements

Format: Microsoft Word (or compatible)

Font: Arial, size 12, double-space

Web Techonology

 Create a site map of a website you are familiar with. It need not be an overly large or complex website (in fact, it would be to your detriment to choose a very large site!). It can be the website of a local business or one in your hometown, or even the website of a friend or one of your own. Something 7 to 10 pages in size is sufficient. All links must be accounted for and mapped. Using Microsoft Word for this is preferred, but you may use any similar software you choose as long as you achieve map with a similar look to those created in Coding Video 2.  

Assignment

 

Topic: Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.

Instructions: Please download the Assignment 1 Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. (click here for link).

For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once completed name your file: YourName_Assignment_1_Vulnerability_Assessment.docx and submit to the appropriate assignment folder. 

Practical Assignment – Crypto

Provide a reflection of at least 500 words of how the knowledge, skills, or theories of  cryptography  have been applied, or could be applied, in a practical manner to your current work environment.

APA format with references needed.

project 6 to ppt

 

All assignment must be/have: In APA with a separate Cover and Reference page In 12 Font Doubles spaced In a Microsoft Word format 2-3 Pages of findings Have 4-6 LIRN Library resources that are cited within the paper to show where they apply.

Explain how to determine appropriate tests of controls and consider the results of tests of controls in auditing long-lived assets.

Explain how to determine appropriate responses to identified risks of material misstatement in auditing long-lived assets.

around these questions make ppt of slides 8.

Exp19_Access_Ch06_Capstone – Northwind Traders Sales Analysis 1.0

 

#Exp19 Access Ch06 Capstone – Northwind Traders Sales Analysis 1.0

 Exp19_Access_Ch06_Capstone – Northwind Traders Sales Analysis 1.0

Project Description:

Northwind Traders is a small international gourmet foods wholesaler.  You will update the company’s database by increasing the price of all of  the meat and poultry products. You will make a table for archiving  older order information. You will also summarize quantities sold by  category and identify customers who have no orders.

Start   Access. Open the downloaded Access file named Exp19_Access_Ch6_Cap_Northwind.  Grader has automatically added   your last name to the beginning of the  filename. Save the file to the   location where you are storing your  files.

Using a select query, you will identify   all of the products with a  category of meat or poultry, and then use an   update query to increase  the prices of the products.
 

  Create a select query that includes the CategoryID from the  Categories table   and the UnitPrice and ProductName fields from the  Products table (in that   order). Run the query and note the CategoryID  for Meat/Poultry.

Add the appropriate CategoryID   criterion to limit the query output  to only Meat/Poultry. Convert the query   to an update query. Update the  UnitPrice for Meat/Poultry only by increasing   it by 6 percent.

View   the query in Datasheet view prior to running it to make sure  you are updating   the correct (four) records. Return to Design view and  run the query. Save the   query as Update Meat/Poultry   Prices.   Close the query.

You will identify orders shipped   during the first half of the year  and create a new table in which to store   them. You will then delete  the orders from the current orders table.
 

  Create a select query that identifies all of the orders shipped Between 1/1/2020 and   3/31/2020. Include all fields from the Orders   table.

Convert   the select query to a make table query. Name the new table Orders Archive. Run the query. Save the query as Make Orders Archive Table. Close the query.

Make   a copy of the Make Orders Archive   Table query and save it as Append Orders Archive   Table.   Open the Append Orders Archive Table query   in Design view. Convert the make table query to an append query. The query   will append to the Orders Archive table.

Modify   the criteria to append orders shipped Between 4/1/2020   and 6/30/2020. Run the query, save it, and then   close it.

Open   the Orders Archive table in Design   view and set OrderID as the   primary key field. Switch to Datasheet view, then save and close the table.

Make a copy of the Append Orders Archive Table query and   save it as Delete Archived Orders. Open the Delete Archived Orders query in Design view. Convert the append   query to a delete query.

Modify the criteria to delete all   archived orders from the Orders table (six records). Run, save, and then   close the query.

You   want to determine how sales are performing with respect to each  product   category. You will create a crosstab query that displays  quantities by   category and salesperson.
 

  Open the Profit query in Design view and add the LastName field from the Employees table to the last column of the   design grid. Run, save, and close the query.

Use the query wizard to create a   crosstab query based on the Profit   query that sums the total Quantity by Ship Country (row heading) and CategoryName (column heading). Accept   the query name as Profit_Crosstab.

Modify the query to display CategoryName as the row heading field   and LastName as the column heading   field. Run, save, and close the query.

You will create a query to determine   which customers have no  matching orders. The customers will be contacted to   determine if they  would like to place an order.
 

  Create a query to find out if any of the customers have no current  order   details. Add all of the fields from the Customers table to the  results. Save   the query as Customers With No Orders. Run the query and close it.

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

Assignment

A Security Awareness Program plays an important role in defining the security posture of an enterprise. When managers consider the nature of risk an organization is exposed to, the threats fall into two distinct categories: the risk of disaster and the risk of intentional abuse.

Using the online library resources, industry websites or published articles (scholarly or trade) find two sources which describe how security awareness impacts the success of an enterprise’s security posture. Write a short paper (2 to 3 pages) which provides description of the components of the Security Awareness Program, the type of security threats it addressed (disaster versus intentional abuse), and the effects on the attitudes and behaviors of members of the enterprise.

Please list your reference/s