Research paper and discussions

Discussion1:

  Assume  that you have been tasked by your employer to develop an incident  response plan. Create a list of stakeholders for the IR planning  committee. For each type of stakeholder, provide the reasons for  inclusion and the unique aspects or vision that you believe each of  these stakeholders will bring to the committee.   ***Standard for all discussion posts:   Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:    

  • Ask an interesting, thoughtful question pertaining to the topic 
  • Answer a question (in detail) posted by another student or the instructor 
  • Provide extensive additional information on the topic 
  • Explain, define, or analyze the topic in detail 
  • Share an applicable personal experience 
  • Provide  an outside source (for example, an article from the UC Library) that  applies to the topic, along with additional information about the topic  or the source (please cite properly in APA 7) 
  • Make an argument concerning the topic 

At  least one scholarly source should be used in the initial discussion  thread. Be sure to use information from your readings and other sources  from the UC Library. Use proper citations and references in your post.  

Discussion 2:

 The seven domains of a typical IT  infrastructure include the User Domain, Workstation Domain, LAN Domain,  LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and  System/Application Domain. As you’ve learned, each domain has business,  technical, and security policy challenges that affect organizations. Answer the following question(s): 

  1. What is an advantage of organizing IT security policies by domain?
  2. What is a disadvantage of organizing IT security policies by domain?
  3. Do you think one domain is more challenging than the others as far as applying security policies? Explain your answer.

Fully address the questions in this  discussion; provide valid rationale for your choices, where applicable;  and respond to at least two other students’ views. 

Research paper:

  Submit  a report that discusses the techniques used by malware developers to  disguise their code and prevent it from being analyzed.  Give  suggestions on how these techniques should be classified and ranked in  the disaster recovery documentation and recovery plan.    ***Standard for all Research Assignments   Your paper should meet the following requirements:   

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support  your answers with the readings from the course and at least two  scholarly journal articles to support your positions, claims, and  observations, in addition to your textbook. The UC Library is a great  place to find resources.
  • Be  clearly and well-written, concise, and logical, using excellent grammar  and style techniques. You are being graded in part on the quality of  your writing.

ORGANIZATIONAL DYNAMICS

 

Utilizing course material and any outside research you feel will strengthen your analysis, you will be uploading your assessment of a team at work describing the type of team it is and the leadership dynamics associated with the group. Your first task is to decide if it is a true team or a work group based on our text definition. It is also permissible to analyze a team you are part of outside of a work environment.

It is important to understand group dynamics and the elements that make up high-performing teams and groups in the 21st century as we are moving to virtual working relationships for organization success. Your task is to select a group of people at work and define this collection as a work group or a team based on course theory discussed in Chapters 8–12 in our text. You will diagnosis this collection of individuals using explicit course theory and outside resources to determine what is working and not working based on organization behavior (OB) principles discussion in our course and supported by course theory. Academic rigor calls for proper APA citations and references to demonstrate your ability to apply theory to operational challenges faced at work. Typical page range is three to five pages not including cover page and reference page. Due Sunday in Week 6.

Note: Students in the past have also compared groups and teams at work and why one seems to be a better performer over another … something to consider.

building secure web applications week 8

 

Week Eight Assignment

You are the web master of a college website. You share a server with other school departments such as accounting and HR.Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.Write your answer using a WORD document. Do your own work and use your own words. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.You have three attempts.To improve Safe Assign score, submit references in a separate document or paste in the text section.
Attach your WORD doc and then hit SUBMT. 

Essay on IT Outsourcing

 According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (2-4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. 

Exp19_DSP_Access – Business 1.0

 

Exp19_DSP_Access – Business 1.0

Project Description:

You are the assistant director for the Information Technology (IT)  department at Healthy Living Motorcycles, Inc. In addition to overseeing  hardware and software selection, system maintenance, and employee IT  training, you create and maintain databases for the whole organization.  The organization uses one central database rather than maintaining  several individual ones to reduce data redundancy and errors. You will  take the opportunity to create an efficient database to keep track of  and manage information regarding the company’s employees, products, and  shareholders.

You   have an existing database that contains the products sold by  the company.   However, you need to create   a table that will classify  each product under a specific category. After the   table is created,  you import the category data into the new table.
 

  Import the data in the 02a_ProductCategory.xlsx   Excel  file into a new table. Use the column headings from the Excel file,    select the CategoryID field as the primary key, and then save the  table as Product Category.
   Hint: On the External Data tab, in Import & Link group, click New Data   Source.
 

  See next page for Instruction 3

With the Product Category table   open in Design view. Ensure the  field properties of the Product Category   table have been modified as  follows:

Field Name

Data Type

Field Size

Comments

CategoryID

Short Text

2

Description = This field is assigned a 2-letter code

Caption = Category ID

This is a required field

Set Indexed = Yes (No Duplicates)

Primary key

CategoryName

Short Text

25

Caption = Category Name

This is a required field

Set Indexed = Yes (No Duplicates)

Description

Long Text

SupplierID

Short Text

4

Caption = Supplier ID

Description = All Supplier ID must begin with an “S”

Set Indexed = No

  Hint: To open the table in Design view, right-click, and then click  Design   View. Use the Field Properties pane to modify the properties.

View the data in the Product   Category table in Datasheet view and adjust column widths so all data is   visible.
 

  Save and close the table.

You create relationships among   the four tables (Employees, Product  Category, Suppliers, and Products) so   that you can make the database  more efficient.
 

  Create the following relationships and enforce referential integrity:
 

• Product Category and Suppliers   tables using the SupplierID field
  • Suppliers and Employees tables   using the EmployeeContactID and EmployeeID fields
  • Product Category and Products   tables using the CategoryID field
 

  Save and close the Relationships window.
   Hint: On the Database Tools tab, in the Relationships group, click   Relationships.

You need to quickly find the   products that were supplied by a  foreign country. You will open the Suppliers   table and filter the  records.
 

  Open the Suppliers table in Datasheet view.
 

  Filter the records for the suppliers who were outside of the United States.   You should have 11 records.
 

  Close the table.
   Hint: Click the arrow to the right of the S_Country field, and then deselect   the USA checkbox.

The director of marketing has   requested a list of the suppliers  that have a capacity of more than 25,000   square feet for manufacturing  and warehouse space.
 

  Create a query using the Suppliers table to display the SupplierID,    SupplierName, and Capacity fields for those plants with more than  25,000   square feet. Sort the results by SupplierName in ascending  order.
 

  Run the query. Name the query Supplier Size. Save and close the query.
   Hint: On the Create tab, in the Queries group, click Query Design. In the   Capacity column, enter >25000 as the criteria.

The director of marketing wants   a list of the employees who are the  main contact with the suppliers. He also   wants the addresses of these  contact employees so that he can personally send   them a letter  thanking them for working diligently with these suppliers.
 

  Create a query using the Suppliers and Employees tables.
 

  Display the SupplierName, EmployeeLastName, EmployeeFirstName,    E_StreetAddress, E_City, E_State, and E_PostalCode fields. Sort the  results   by EmployeeLastName, in ascending order.
 

  Run the query. Save the query as Contact Employee Address. Close the query.

The human resources manager   would like a list of all employees and  the approximate length of time they   have worked for the company.
 

  Create a query using the Employees table and include the EmployeeLastName,   EmployeeFirstName, and Date_of_Hire fields.
 

  Create an expression in the first blank column of the query that  calculates   the number of years employees have worked for the company,  using the   Date_of_Hire field and the current date. Do not adjust for  days off. Name the   expression Tenure. Format the Tenure field as Fixed with 2 decimal places. Name   the query Employee Tenure.
   Hint: Enter Tenure: (Date()-[Date_of_Hire])/365 as the last field in the query.

Create a report from the   Employee Tenure query. Group by  Date_of_Hire by month. Sort ascending by   Date_of_Hire. Change the  title to Employee Tenure Report. Make sure all fields display   appropriately.
 

  Widen the columns to display all text. Save the report with the default name,   Employee Tenure, and close it.
   Hint: With the query selected, on the Create tab, in the Reports  group, click   Report. On the Design tab, in the Grouping & Totals  group, click Group   & Sort.

Your organization is always   looking for more suppliers to  manufacture products. You create a new form to   make it easier to enter  new supplier information.
 

  Create a new form based on the Suppliers table using the Form tool. Change   the title label control to Enter Supplier Information.  Reduce the text box widths to   one-half of their original size. Change  the form’s control padding to Narrow.   Save the form as Enter Supplier Information.
   Hint: With the table selected, on the Create tab, in the Forms group,  click   Form. To change the control padding, on the Arrange tab, in the  Position   group, click Control Padding.

Switch to Form view. Enter a new   supplier record, #15, using the following information:
 

  Supplier ID: S115
   Supplier Name: Oakland Supply
   Delete the content in Employee Contact ID.
   Supplier Contact Last Name: Williams
   Supplier Contact Title: Intern
   Street Address: 12 Oak Street
   S_City: Washington
   S_State: MI
   Postal Code: 48094
   S_Country: USA
 

  Leave Capacity at 0. Leave the S_Phone, S_Fax, Home Page, and ProductID   fields blank.
 

  Sort the form by Supplier Name in ascending order.
 

  Save and close the form.
   Hint: To sort the data, click in the SupplierName field and, on the  Home tab, in the Sort & Filter group,   click Ascending.

The director of marketing would   like a report that lists the  suppliers who manufacture the various   motorcycles. You create a query  and the report for him using the Report   Wizard.
 

  Create a query and name it Motorcycles by Suppliers.  Add the SupplierName,   SupplierContactLastName, and Capacity fields  from the Suppliers table. Add   the ProductName and ProductSize fields  from the Products table. Add the   Product Category table. Sort in  descending order by Capacity, but do not   display the field in the  query.
 

  Run, save, and close the query.
   Hint: To hide the field from the query results, in Design view, in  the   Capacity column, click to remove the check mark from the Show box.

Create a report based on the   Motorcycles by Suppliers query. View  the data by Suppliers, and group the data   by SupplierName. Sort the  data by ProductName, ascending order. Select   Landscape Orientation for  the report. Use Block layout.
 

  Change the report title to Motorcycles Grouped by Suppliers.  Preview the report. Change the   column widths so all the data is  visible. Ensure the Report Header title   control is wide enough so the  entire title is visible. Switch to Print   Preview and make sure that  the report is displayed on one page. Exit Print   Preview and close the  report.
   Hint: On the Create tab, in the Reports group, click Report Wizard.

The director of accounting wants   to know the cost of  time-and-a-half overtime, over and above the regular   payroll, for all  hourly employees in the organization. You will create a   query to find  all the employees who worked overtime and create a report based   on the  query results.
 

  Create a query using the Employees table to calculate the hourly  rate at time   and a half for those employees who work more than 40  hours per week. Include the following fields:   EmployeeFirstName,  EmployeeLastName, Hours, Rate, and E_State. Calculate the   weekly  overtime costs in a column called Weekly Overtime.  Please note: Only the hours   worked over 40 hours per week count toward  overtime pay. Format the field as   Currency with 2 decimal places.
 

  Name and save the query as Weekly Overtime.
   Hint: In the Hours column, enter >40 as the criteria. Enter Weekly Overtime:   ([Hours]-40)*([Rate]*1.5) as the last field in the query.

Create a report for the Weekly   Overtime query. Switch to Layout  view and use the SUM function to calculate   the total cost of overtime  pay to all employees. Apply the Organic theme to   the report. Change  the report title to Employee Weekly Overtime, format the title in bold.   Ensure the Control Margins is set to None.
 

  Preview the report and adjust column widths so that the content appears on   one page.
 

  Save the report as Employee Overtime and close the report.
   Hint: To calculate the total cost, on the Design tab, in the Grouping  &   Totals group, click Totals. To change the theme, in the Themes  group, click   Themes. If the theme is not available on your machine,  click Browse for   Themes, and then select the downloaded theme file Organic.thmx.

First Response Digital Forensics

 You have been assigned to investigate whether or not an employee at a local hospital has been accessing patient records and selling information to online pharmacies. It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation. 

Poorly implemented database

We all had the unfortunate experience of seeing how computers can, at times, make life’s journey about more difficult. This is especially true in knowledge-centric workplaces. Describe an example of a very poorly implemented database that you’ve encountered (or read about) that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them

Search the peer-reviewed literature for examples of this. You may select any topic relating to technology that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide supporting evidence, with citations from the literature. It is not enough for you to simply create a own posting. You must read the postings of the other members of the class and comment on each of them. Please see Discussion Forum of the class syllabus for additional details on content.