Johnson Controls – Metasys (Building Automation)
Midwest Health Systems: Case Analysis Assignment
Midwest Health Systems
Case Analysis Assignment
In this case, the context is Midwest Health Systems (Midwest) and the scenario is evaluating a enterpise information security architecture. Your analysis of this case will be framed around a number of questions that are presented at the end of this writeup. As laid out in our syllabus, your analysis should, at minimum, meet the “2-why” standard.
While you can find a number of strategies out there for conquering case analyses (many of them are very good), I recommend the approach of reading the case at least once without consideration of the questions. That opens the mind up to absorbing details that might otherwise erroneously get dismissed in a “know the questions, hunt for the answers” type of approach. After that, lay our your outline with each question framing a new major section. Then, re-read the case analysis and as you go through, build the outline of your answer with references to page numbers so you can quickly go back. Once the outline is built, you should have a clean connection between your point and some evidence from the case. At that point, it is a matter of polishing the communication without inadvertently changing the thesis.
The case can be found in your Harvard Coursepack, referenced in the Materials section of our syllabus. The case analysis must be submitted through Blackboard in Microsoft Word or .pdf format before 11:59pm Sunday, March 28th.
Case Analysis Questions:
1. Identify the IT general control risks evident from the case. For each risk identified, identifiy possible controls to mitigate those risks and explain why you believe the control would work.
2. Define residual risk and then identify at least three such risks from the case, mapping those examples conceptually to your definition of residual risk.
3. Do you agree with the audit team’s conclusion that the only significant areas of concern in IT general controls are access security and change management? Please explain your answer at a “2-why” minimum standard.
4. What course(s) of action do you recommend that Nelson take based on your analysis of identified risks and suggested controls?
Activity to do
1. Evaluate an acceptable use policy. Learn whether the organization where you work or attend school(if you decide to write about my school, this is their website : San Antonio College | Alamo Colleges .) has an acceptable computer use policy for employees or students.
2. Make a list of ALL activities that are permitted and those not permitted (in EXCEL, as a list in a spreadsheet).
3. Identify on your list those activities(on the EXCEL spreadsheet you created in Step 2) that are illegal and those that are not permitted according to organizational policy.
QL Injection
Please see the HW 9 document for the questions.
Online exam
HIT326 DATABASE-DRIVEN WEB APPLICATIONS
Technology discussion
Referencing the Learning Resources for this module, choose a different question from the previous discussion in the research project list and answer it in relation to an issue in religion and technology.
- What is the problem for which this technology is the solution?
- Whose problem is it?
- Which people and what institutions might be most seriously harmed by a technological solution?
- What new problems might be created because we have solved this problem?
- What sort of people and institutions might acquire special economic and political power because of technological change?
- What changes in language are being enforced by new technologies, and what is being gained and lost by such changes?
Assignment 1
See attached for question
Gwinnett Technical College CIST 1305 Program
Gwinnett Technical College CIST 1305 Program Design and Development PROGRAM ANALYSIS WORKSHEET NAME: ____________________ DATE: __________ PROGRAM DESCRIPTION: SOFTWARE (PROGRAM) REQUIREMENTS: INPUT PROCESS OUTPUT Gwinnett Technical College CIST 1305 Program Design and Development PROGRAM ANALYSIS WORKSHEET NAME: ____________________ DATE: __________ PROGRAM DESCRIPTION: SOFTWARE (PROGRAM) REQUIREMENTS: INPUT PROCESS OUTPUT FUNCTION I-P-O CHART PROGRAM: FUNCTION NAME INPUT PROCESSING OUTPUT Program 1) A small company is moving all its employee data to a computer. To make a smooth transition, a software program will permit the data entry personnel to enter data into a file. Design a program that writes the employees.dat file. The program should accept user input until the user indicates there are no more records to write. The Employees file contains four fields (see the Input File Description). The program will use the employee ID as criteria to determine a current employee. Validate the employee ID and employee wage fields per the requirements below. You may use any of the library functions presented in Chapter 6 of the textbook to assist in validation. Your validation routines should include error messages and allow the user to correct an input error. Use an array to hold the valid ID numbers. The Input File Description is the same for both programs. Process: The user has a stack of employee files from over 25 years of being in business. There are more files than current employees. The user should enter an ID number and, if the ID is valid, continue to enter the rest of that employee’s data. If the ID is not valid, then the user moves on to the next file. The program must support this process. No data should be entered for an employee that does not have an ID found in the system (below). Program assumptions: Employee ID: May not be more than 10 characters long. The number must exist in the list of valid employee ID’s. Valid ID Numbers: RE49762358, PR156125, OF45461, RE68566547, PR156984 Employee Wage: The number may not be zero nor larger than $45.50. Program 2) Design a program that reads the contents of the employees.dat file and prints all the data within it. Format the report as designated in the Printer Spacing Chart below. The last name should print first followed by a comma, and then the first name. On the same line, the ID number should appear separated from the name by a few blank spaces (you may use TAB). Add more white space before displaying the employee’s wage. Use the EOF function to determine when the last record has been read. ________________________________________ Deliverables: Design the logic for both programs and submit using either pseudocode OR flowchart. Submit all other appropriate documentation to complete these applications (hierarchy chart, internal documentation). Include program analysis for both programs (separate form for each) and IPO chart for any custom functions created for the programs (may use single form but indicate which program utilizes each function). A desk check is NOT required. Input File Description: File: employees.dat Field Description Data Type Employee first name String Employee last name String Employee ID # String Employee Hourly Wage Real (2 decimal places) Output Report – Printer Spacing Chart: GTC1305 Company Employee Report Employee Name Identification Number Wage XXXXXXXXXX, XXXXXXX
Module 1 Creating a Worksheet and a Chart
Microsoft Excel 2019 Module 1 Creating a Worksheet and a Chart
Week4
This is a required assignment worth 15 points (15-points/1000-points). Assignment must be submitted by the due date. No late assignments are allowed. Please discuss the following topics and provide substantive comments to at least two other posts. Select from the following list two topics and discuss. Use only 50-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 5 (Jamsa, 2013).Chapter 5 topics:
- Define and describe SSO.
- Define and describe IDaaS.
- Define SAML and describe its purpose.
- Define and describe provisioning.
- Define and describe FIDM.
- List factors that make mobile ID management difficult.
Note: You are required to use at least two sources (besides your textbook) to answer the above questions.
