I have uploaded the question in the attachments
Policy, Legal, Ethics, & Cmplc week 1
Week 1 Discussion
Week 1 DiscussionRead this article about Cambridge Analytica in Wired Magazine. Discuss whether you think the premise of the article is correct and that people are more aware of privacy concerns. Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. Write in essay format not in bulleted, numbered or other list format. Do not use attachments as a submission. Do not zip your submissions.Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’. You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.
Threat Modeling
A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:
- User authentication and credentials with third-party applications
- 3 common security risks with ratings: low, medium or high
- Justification of your threat model (why it was chosen over the other two: compare and contrast)
You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Media & Graphic Elements
Business leaders need to be involved in information technology-any computer-based tool that people use to work with information and support the information-processing needs of an organization. Search the Internet to find examples of the types of technologies that are currently used in the field or industry that you plan to pursue (or are currently working in). For example, if you are planning on a career in Marketing, you would research customer relationship management systems, blogs, eMarketing, etc.
Create a PowerPoint Presentation with your findings. Include a brief overview of the types of technologies you found and how organizations are using them to achieve a competitive advantage.
capstone
- discuss the skills needed for each occupation, what kinds of degrees and certifications are recommended, and what the salary ranges are.
- discuss, based upon your personality and work preferences, what you see as the pros and cons of each occupation.
- be written in a narrative style; that is, not as a list of items. This is a research paper, not a memo and not a simple list.
- be written in a professional manner, according to the following guidelines:
- consistent style, and with appropriate font and size, 1” margins, etc.
- a title page,
- a body of 2 pages maximum,
- double spaced,
- introductory paragraph,
- sections for each position,
- in-text citations from your sources,
- a summary / conclusion comparing the positions and stating your preference,
- a References page
- with at least 3 sources, appropriately formatted
- at least one non-web source (see rubric below)
- formatted consistently and providing all relevant info to allow the instructor to verify your sources.
Note: Simply choosing to follow APA or MLA style guarantees you’ll meet these requirements.
TOPIC- Legal
- TOPICS:
Is it more important for a law to be consistent or flexible? - The importance of enforcing civil law vs. the United States being the most litigious country in the
world. - Coexistence of federal law and state law.
- Pros and cons of strict customs enforcement vs. having an open border.
- Methods for management to balance ethical dilemmas in the workplace.
(Select one topic from the above)
Assignment Requirements:- Choose a research topic from the chapter readings or from the list provided by your professor.
- Research/find a minimum at least four (4), preferably five (5) or more, different peer- reviewed articles on your topic from the University of the Cumberlands Library online business database. The article(s) must be relevant and from a peer-reviewed source. While you may use relevant articles from any time frame, current/published within the last five (5) years are preferred. Using literature that is irrelevant or unrelated to the chosen topic will result in a point reduction.
- Write a four (4) to five (5) page double spaced paper in APA format discussing the findings on your specific topic in your own words. Note – paper length does not include cover page, abstract, or references page(s).
- Structure your paper as follows:
- Cover page
- Overview describing the importance of the research topic to current business and professional practice in your own words.
- Purpose of Research should reflect the potential benefit of the topic to the current business and professional practice and the larger body of research.
- Review of the Literature summarized in your own words. Note that this should not be a “copy and paste” of literature content, nor should this section be substantially filled with direct quotes from the article. A literature review is a summary of the major points and findings of each of the selected articles (with appropriate citations). Direct quotations should be used sparingly. Normally, this will be the largest section of your paper (this is not a requirement; just a general observation).
- Practical Application of the literature. Describe how your findings from the relevant research literature can shape, inform, and improve current business and professional practice related to your chosen topic.
- Conclusion in your own words
- References formatted according to APA style requirements
Lab 10
Lab 10
The Command Line
Installing programs in Linux
÷ First, to update your system:
o Open up a terminal window by going to: Applications>Accessories>Terminal
o type:
§ sudo apt-get update
o then type:
§ sudo apt-get install build-essential
§ Do an internet search.
§ What are the update and build-essential packages are used for?
· The apt-get update command is run in order to synchronize the software package index on Ubuntu with their Internet sources. The apt-get build-essential package includes the components and references used to build Debian packages.
§ What is the difference between apt-get and apt-get install?
· Apt-get will fetch the package
§ What is your current location? Example: /home/yazan
· The current location is /home/student
§ What happened? What did sudo mkdir /myProgs do?
· Advanced to the next line and a directory named /myProgs was created in the root of the file system.
§ Is the file that you saved to the desktop gone? If not, see me. Yes the file is gone. Where did it go? The file is now in /myProgs
§ What did this do?
· Moved the directory location of the cursor to the /myProgs directory.
§ What are the file permissions for nmap-5.00.tar.bz2? –RW-RW-R–
o If you want to look inside /myProgs/nmap-5.00 to see the files (without changing directories), what will you type? ls /myProgs or ls –l /myProgs. Do this and tell me what the contents are:
o What do you see? The number 10.
What is this command is doing? Use the man command to find out about both the more
o the input file which in this case is INSTALL.
and the wc command. What does this do? Display the number of lines contained in
¡ What is this doing? Checking for the build system, host system and compiler type to ensure compatibility.
¡ What does the make command do? It is a script that runs the compiler to compile the software/source code.
What is this doing? Installs the software just compiled into the correct directories and edits menus and paths as necessary so that the compiled packages work
¡ correctly.
¡ Why would you do this? To delete the nmap-5.00 directory and files. What does rm do? (remember typing man rm will help) Removes files and directories.
¡ What is the name of the compiler that works with C? gcc
¡ How about C++? g++
¡ What is a compiler? A compiler reads program language code and creates a binary based upon the programmed code. Translates the code to machine language.
¡ What is nano? Nano is a text editor.
What did you do? The command compiled the program I just wrote and saved as
¡ myProg.cpp
¡ Why do you have to type sudo? Because elevated permissions are needed to execute the file.
¡ What result do you get? A $ appears.
¡ Explain what echo $? Does – The echo command displays whatever is given as input to standard output so $ was displayed to standard output.
Computer Science Discussion & Assignment
Cloud Computing – Discussion – 300 Words
Cloud Computing – Assignment – 4 pages
Operational Excellence
How do you define operational excellence? What factors are involved in achieving operational excellence? Who (within an organization) is responsible for operational excellence, and why is this important?
Please answer in 300 words or one full page without extra spacing.
Please refer to the attached textbooks.
