Discussion and Assignment 6

Discussion:

Focus on globalization concepts. Please explain the concept of globalization and the role information technology has in the global market.

Need 125 words on this topic with references and in a separate document.

Assignment 1 (Information Systems for Business and Beyond):

Q1::

Compare the concept of Friedman’s “Globalization 3.0″ with Nielsen empowerment stage of the digital divide. 

Q2::

Provide one example of how information technology has created an ethical dilemma that would not have existed before the advent of information technology.

The above assignments should be one page submitted in a single Word document with references. 

Assignment 2:

Chapter 9: Review the section on Establishing a Security Culture. Review the methods to reduce the chances of a cyber threat noted in the textbook. Research other peer-reviewed source and note additional methods to reduce cyber-attacks within an organization. (Information Technology and Organizational Learning)

Chapter 10: Review the section on the IT leader in the digital transformation era. Note how IT professionals and especially leaders must transform their thinking to adapt to the constantly changing organizational climate. What are some methods or resources leaders can utilize to enhance their change attitude? (Information Technology and Organizational Learning)

The above submission should be two pages in length (one page for each question) and adhere to APA formatting standards with references included. 

Assignment 3:

Select an organization that has a Global platform (they operate in more than one country: Organization selected is Amazon and write on this company), that has demonstrated operational excellence. In this paper, perform the following activities:

1) Name the organization and briefly describe what good or service they sell and where they operate.

2) Note how they are a differentiator in the market.

3) Note the resources used to ensure success in their industry (remember resources are comprised of more than just people).

4) Explain what actions the company took to achieve operational excellence.

The above submission should be three pages in length. There should be at least three APA approved references to support work.

Discussion – Enterprise Risk Management (350 words)

 

After reading both articles this week (see below), and any other relevant research you locate, please discuss the following: 

Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

**************************************——————**************

Reading Assignments

Reading Assignments

project management with make

 the question is 

 

The code in project2 is for a program that plays a simple game called Chomp.

The programmers of this project have opted to package some of their code in a “module” called chomp.adt, from which the related files cookie.h and cookie.cpp files can be generated.

The steps necessary to produce this program are:

  1. Run the command
    csplit chomp.adt "/Split Here/"
    and copy the resulting file xx00 to cookie.h.
  2. Run the command
    csplit chomp.adt "/Split Here/"
    and copy the resulting file xx01 to cookie.cpp.
  3. Compile cookie.cpp to produce cookie.o.
  4. Compile mainProg.cpp to produce mainProg.o.
  5. Link the the .o files to produce an executable program named playChomp

Write a makefile that will carry out these steps. Your makefile should result in only the minimum required amount of steps when any input file to this process is changed. (Note: you will probably not be able to base this makefile upon my self-updating makefile as in the earlier part of the assignment. Instead, you will probably find it necessary to write this one from scratch.

_________________________________________________

I am currently having an issuewith the question above. I am meant to create a makefile that runsthe program like stated above, and currently this is mymakefile:

all: cookie.h cookie.cpp playChomp cookie.o mainProg.o

cookie.h: chomp.adt
csplit chomp.adt “/Split Here/”
cp xx00 cookie.h
cp xx01 cookie.cpp
 

playChomp: cookie.o mainProg.o
g++ -o playChomp cookie.o mainProg.o

cookie.o: cookie.cpp
g++ -c cookie.cpp

mainProg.o: mainProg.cpp
g++ -c mainProg.cpp

However, I am receiving this error code:

Your makefile does not build playChomp in 3 distinct g++ stepswhen chomp.adt has been changed:
csplit chomp.adt “/Split Here/”
1372
8632
cp xx00 cookie.h
cp xx01 cookie.cpp
g++ -c cookie.cpp
g++ -o playChomp cookie.o mainProg.o

is there anything that I can do to fix my makefile?

Security Risk Assessment

 Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format double space and have to include at least two references and 400 words. 

  • When should the architect begin the analysis?
  • What are the activities the architect must execute?
  • What is the set of knowledge domains applied to the analysis?
  • What are the tips and tricks that make security architecture risk assessment easier?

The computer did it! Discussion board

 1414 unread replies.1414 replies.

When human beings and computers are both involved in accomplishing a task and something goes wrong, we tend to blame the computer.

There is little question about the existence of software bugs, but can all real-world problems involving computers (such as erroneous bank transactions, military training incidents, or privacy breaches) be attributed to errors in the software program?

Today, do you think it is more likely that a computer or a human being would be responsible for a serious system problem?

Why?

Answer with complete sentences for full credit.

Discussion 15

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter’s 19-20  (Jamsa, 2013).

Chapter 19 topics:

  • Define scalability.
  • List five to ten potential relationships that align with the Pareto principle, such as how 80 percent of sales come from 20 percent of customers.
  • Compare and contrast vertical and horizontal scaling.
  • Explain the importance of the database read/write ratio.
  • Assume a site guarantees 99.99 percent uptime. How many minutes per year can the site be down?

Chapter 20 topics:

  • List and describe five ways you think the cloud will change the future of TV.
  • List and describe five potential uses for intelligent fabric.
  • List and describe five ways the cloud will influence the mobile application market, or vice versa.
  • Discuss the importance of HTML 5.
  • Discuss how the cloud will impact future operating systems.
  • List and describe three potential location-aware applications.
  • List and describe five ways intelligent devices may work together.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

Assignment

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.  Minimum of 400 words

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus?