It is important to understand that humans and technology interact in all information systems. Why do you feel businesses must spend time and money to educate their employees on security matters?
Human Computers
first video: https://youtu.be/m13Jrk-cUmo
second video: https://youtu.be/eE69LKO4dCQ
Introduction
Before the 1950s, “computers” were human, they were not machines. The first human computers appeared in the mid-1700s when people wanted to solve big, complex problems by approximation and repetitive solutions, such as determine when Halley’s Comet would return. Scientists realized that they could break complicated calculations apart so that a team could work on them. Human computers also adopted Industrial Revolution methods such as specialization, division of labor, and mass production. The field reached its peak during WWII. As electronic computers took over calculation-intensive work, some human computers became programming pioneers.
Answer questions on Human computers
- Why are mathematical computations important to human progress? Give examples throughout history and imagine technologies that can benefit from mathematical computations in the future.
- What was the meaning of the word “computer” in the past and how is it different from the current definition?
- How did new manufacturing strategies in the Industrial Revolution transform human computing?
- What effect did mainframe computers have on human computing?
Website development
Database – Discussions
Create a discussion thread (with your name) and answer the following question(s):
Discussion 2 (Chapter 6): How can the key and foreign key constraints be enforced by the DBMS? Is the enforcement technique you suggest difficult to implement? Can the constraint checks be executed in an efficient manner when updates are applied to the database?
Instructions: Your response to the initial question should be 250-300 words. Next respond to two postings provided by your classmates. The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often. You are require to create your initial thread in order to view and respond to the threads posted by other students. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post as needed. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.
UD
William Montgomery Gardner III (WG) is the owner of Gardner Novelties, Inc., a large family business that designs and manufactures specialty items for sale at roadside restaurants around the country. The company has over 2,500 employees in 13 locations around the world. They have recently begun to outsource a lot of their manufacturing to China, Mexico and India. In spite of a bad economy, WG has been able to consistently grow the company’s revenues at a rate of over 10% per year over the last ten years. As a result, WG has decided to take the company public. The Initial Public Offering (IPO) is scheduled to take place next month.
WG calls you, Joseph K. Barnes (JB) into his office. You have been in charge of all Information Technology services for the company for the past 17 years. You have a staff of 12 direct reports in your department, of which 6 are located in the company headquarters office with you. Since the items being manufactured are not technical in nature, there has never been a lot of emphasis placed on protecting proprietary data in the corporate network. Most of your time is spent dealing with service calls and Internet disruptions, maintaining the firewall, and uploading software patches.
WG tells you of the plans for the company. You try to act surprised, but the rumor has been floating around the company for months now so it is anything but a surprise. You are a little alarmed by the fact that the IPO is planned for next month, however.
WG explains that once the IPO takes place, they will need to have everything in place to be in compliance with Sarbanes-Oxley. WG asks if you are familiar with Section 404 of SOX.
You struggle to find the right words. You’ve heard of Section 404 from friends and colleagues who have had to deal with it for years now, but you never though it was something you needed to know. You mention that you know Section 404 deals with management’s assessment of internal controls, and that the IT network will need to have some controls put in place.
WG tells you he needs a plan from you in one week on how to get the IT system in compliance with SOX. You will need to make a presentation to the Executive Committee (ExCom) on your plan. The ExCom will consist of, among others, WG, the COO, VP of Human Resources, and the CFO of the company. WG warns you not to let him down…there is a lot riding on this IPO and the investors and analysts want to know that the company will be in compliance with SOX.
JB walks out of the meeting and his head is spinning. He has one week to develop a plan to bring the company’s entire IT system into compliance with SOX. How is he supposed to do that? He decides that the first course of action will be to call a friend, Robert Rodes (RR), who works for a publicly-traded company. Maybe he can help point JB in the right direction.
Read the scenario and decide on a response. Your goal is to identify the critical issues in the scenario and determine how you would resolve. Write a 3 to 4 page paper that addresses the following issues:
- Explain your plan for implementing COBIT for Gardner Novelties. Your plan should include a discussion of the following elements:
- What will Gardner Novelties be required to do with IT to remain in compliance with SOX?
- What is COBIT and how can it help keep Gardner Novelties in compliance with SOX?
- What are the benefits of using COBIT as opposed to other control frameworks?
- What questions would you expect to receive from the Executive Committee of Gardner Novelties? Identify two questions that you could be asked and address how you would answer them.
Discussion Topic
Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.
Due Thursday
Respond to the following in a minimum of 175 words:
- Most schools and businesses require some standard style of documentation for written reports. Discuss why that might be.
- What disadvantages, if any, might there be to insisting that all reports conform to a certain style?
Due Monday
Reply to at least 2 of your classmates. Be constructive and professional in your responses.
stems Engineering
use Course hero or Chegg for any answers. Thanks!
fixNearZeroData
Part 1: Write a function called fixNearZeroData that finds the items in a given list where the absolute value of the item is less than or equal to a specified positive value (a “tolerance”) and replaces each of these values with zero. The function should take an argument of type list as its first parameter; the second parameter is the positive float value representing the tolerance. You can assume that all items in the list are of type float. The function should do two things: (1) modify the original list of values by replacing these near zero values, and (2) the function should also return an integer that represents the number of values that were changed.
Part 2: Execute your code sufficiently (i.e., with different input values) to demonstrate that it works sufficiently for both positive and negative values near zero
Execute your code sufficiently (i.e., with different input values) to demonstrate that it works sufficiently for both positive and negative values near zero Noon tomorrow
AUP
- Write a brief summary of the attached article. In your summary, focus on the need for an AUP and its key elements.
- Design an AUP for this fictional credit union, using the online example of the AUP as a template. Your policy does not need to be exhaustive, but it should outline the key components of an AUP and provide policy statements that address the above requirements. You may want to create your policy using word processing software on your local computer and then copy and paste the text into the deliverable field.
Consider the following fictional organization, which needs an acceptable use policy (AUP):
- The organization is a local credit union with several branches and locations throughout the region.
- A major focus for the organization is online banking.
- The organization’s most critical business function is its customer service department.
- The organization wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
- The organization wants to monitor and control use of the internet by implementing content filtering.
- The organization wants to eliminate personal use of organization-owned IT assets and systems.
The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
Algorithm Discussion
Respond to the discussion about algorithms and their roles below using 150 words or more.
An algorithm is the set of instructions a computer uses to complete a task or solve a problem. These instructions are developed to be a precise list of instructions that are a step-by-step guide to accomplish a task or series of tasks.
We are surrounded by algorithms everywhere we go. They manipulate, process data, and perform calculations. Algorithms used in programming require an input either from a user or related task. The programmer’s goal is to design instructions a computer uses to complete a series of steps based on certain circumstances and follows the steps like a flow chart. After each step is completed in the specified order, an output is generated. If the programmer is successful in developing the algorithm, the automated function is completed without a hiccup. If the process is not completed correctly, an error or faulty output will be generated.
Search and sorting algorithms are essential processes used in computers. The main search may be used to look for an integer, string, or other info in an array or database.
Sorting algorithms sort the items in a given list per the instructions the developer decides to use. They work by comparing two elements and rearrange them or keep them in order as necessary. Insertion sort compares the second element to the first and makes the necessary changes.
