Preview the document

COMPUTER SCIENCE

 

Read the Orlando Marathon Case StudyPreview the document, found in this week’s module. Then respond to the following questions by due date listed in the syllabus:

  1. Consider  the responsibilities of risk management programs and risk in volunteer  management. What steps should be taken to prepare for the event in  compliance with the responsibilities of risk management programs and in  the aftermath of the Boston Marathon events. Assume that terrorism  threats on this event would be extremely heightened.
  2. What are all of the risks that you need to consider for the organization and for volunteers?
  3. In  what ways would you approach each of these risks? (Think about  elimination, reduction, assumption, transfer, etc). Explain your  rationale.

By the Saturday following the due date listed on  the syllabus at 11:59pm, respond to at least 1 other student. Do you  agree with the steps they selected to prepare for the event? Are there  risks they did not identify that should be included? 

configuring

The director of IT has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how a code of ethics impacts daily decisions. The director of IT has asked for you to help by providing an example.

Using the links provided, research at least 2 of the following codes of ethics:

Write a 1- to 2-page ethical choice example using Microsoft® Word. Complete the following in your document:

  • Reflect on ethical considerations for each type of data involved (e.g., Active Directory user information, reporting information,logs). Explain how to apply your knowledge of ethical theories to decisions you would make as a security administrator for System Center 2012.
  • Select 2 of the codes of ethics you researched and quote the items you would use in your corporate code of ethics. Explain how they would help you implement ethical choices when working as an administrator of System Center 2012 Active Directory user information, reporting information, and logs.

Cite any references to support your assignment.

Format your assignment according to APA guidelines.

Network Protocols

 The responses for each question need to be at least one paragraph each

Use your textbook and other academic resources to justify your responses.

  1. What is the TCP/IP suite?  What makes it so relevant in regards to networking?
  2. What are some major differences between TCP and IP?  What layers of the OSI model do they reside?
  3. What is UDP?  How is it different than TCP?
  4. In your own words, what is ARP?  DNS?  DHCP?

IT 204 assignment 1

IT 204 Week 1 Assignment

These are instructions for completing the Week one assignment. You are creating a basic business letter.

The section immediately below is the header. Below the horizontal line is the body of your letter.

Use one-inch margins  all around. (This is usually the default in MS Word)

Your Name (use 14 point Verdana font, bold, centered)

Your mailing address (12 point Verdana font, not bold, centered)

Your email address (12 point Verdana font, not bold, centered)

Your telephone number ((12 point Verdana font, not bold, centered)

Add a line below the title as shown below. Use 12 point Verdana for the rest of the letter.

(1 blank line)

Today’s date in long date format, January 5, 2021

(1 blank line)

(indent paragraphs) Write two or three short double-spaced paragraphs, describing what you plan to do when you graduate. For example, describe your ideal job?

(2 blank lines)

Sincerely,

(3 blank lines)

(For a formal business letter, you will hand sign with blue ink)

Your name (typed)

Capstone Assignment week2

Question 1: 400 words

You are a member of the Human Resource Department of a medium-sized organization that is implementing a new inter organizational system that will impact employees, customers, and suppliers.  Your manager has requested that you work with the system development team to create a communications plan for the project.  He would like to meet with you in two hours to review your thoughts on the KEY OBJECTIVES OF THE COMMUNICATIONS PLAN.  What should those objectives be? 

Minimum of two references and one of the references needs to be from Text book to be used: Reynolds, George W. Information Technology for Managers, 2nd edition.(2016). Cengage Learning. ISBN: 978-1-305-38983-0.

Programming Java Database

 Assignment-4 

Create the user interface shown below in WindowBuilder. 

Write a Java program to do the following: 

When the user clicks on the “Display Records Button, read all the records from the product table in demo.db 

Display the data in the TextArea below the Button, one line per record. 

Separate each field in the record by a comma. 

Sample output:(Note this is NOT the actual data in the table) 

Hammer,200,7.99 

Nalis,500,0.78

Bolts,300,1.23

Nuts,300,1.12 

Convert the following C++ program into an x86 assembly language program. Make sure to use your “Chapter 8” understanding of advanced functions, parameter passing, and local variables. Post ONLY your ASM file here to Blackboard when complete

 #include

using namespace std;

int IsSemifauxtrifactored(int value)
{
    // Return 1 if a number’s factors/divisors from (value – 1) to 1 sum up to a quarter of the number value
    // Return 0 otherwise

    // A number is called “semifauxtrifactored” if its summed factors/divisors equal a quarter of the number itself
    // Integer division is used, so remainders on the halving can be lost
    // That’s why…

    // 7 is a semifauxtrifactored number
    // 7 divided by 4 with integer division is (7 / 4) = 1
    // 7 % 6 -> 1
    // 7 % 5 -> 2
    // 7 % 4 -> 3
    // 7 % 3 -> 1  
    // 7 % 2 -> 1  
    // 7 % 1 -> 0   FACTOR!
    // 7 is a semifauxtrifactored number since its factors (1) equal a quarter of the number (1)

    // 6 is a normal number
    // 6 divided by 4 with integer division is (6 / 4) = 1
    // 6 % 5 -> 1
    // 6 % 4 -> 2
    // 6 % 3 -> 0   FACTOR!
    // 6 % 2 -> 0   FACTOR!  
    // 6 % 1 -> 0   FACTOR!
    // 6 is a normal number since its factors (1 + 2 + 3) do not equal a quarter of the number (1)
}

int main()
{
    cout << "Enter a value: ";
    int value;
    cin >> value;
    value = IsSemifauxtrifactored(value);
    if (value == 1)
    {
 cout << "The number is semifauxtrifactored!";
    }
    else
    {
 cout << "The number is normal";
    }

    cout << endl;
    system(“PAUSE”);
} 

Organization leader and decision making

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Information Governance W-7

From our weekly chapter reading, digital preservation can be defined as the long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required to be retained.  Though this assessment holds true to the authors, business organizations continue to face significant challenges in meeting their LTDP needs, especially those organizations whose primary mission is to preserve and provide access to permanent records.

Looking at your identified industry for your paper, what considerations would have to be made in developing a long-term archival plan for a company within that industry?

400 Words 

Based on this weeks lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.

 Please download the Assignment 3 Door and Window Lock Assessment  template (MS Word), which is already in APA 7 format, using size 12  Times New Roman font, 1-inch margins, TOC, Headings and Reference page.  If you insert images or tables in your report make sure you label them  appropriately according to APA. Once completed name your file:  YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit  to the appropriate assignment folder. Also review any additional files  attached for more information.