5s week 6 assignment PL

 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. what do each of these terms refer to: copyright, patent, trademark, trade secret?

2. Why is intellectual property entitled to legal protection? 

3. Why did copyright laws become stricter and more punishing in the late 20th century?

4. What is the Fair Use doctrine?

5. Make an argument for legalizing the copying of music or software. 

6. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I don’t own them, what is my legal right to them?

7. What was the 1984 Sony Supreme Court case about?

8. Was Napster responsible for the actions of its users?

9. Why did the court find in favor of Diamond in the Rio case? 

10. What is Digital Rights Management?

Include references. No copy paste strictly.

Project Documentation

Project implementation is arguably the most exciting stage of the project management process. It is during project implementation that project plans begin to come to life and assumptions are able to be tested and measured in real-life scenarios.

One of the outcomes of project implementation is a set of deliverables that typically includes a system diagram; a network diagram; a database design document, including an entity-relationship diagram, a data dictionary, and table definitions; a clearly articulated cybersecurity plan; and source code.

To complete this assignment, you will create:

  • A system diagram that shows, in graphic form, the components of your project.
    • Your system diagram should follow the system description you submitted in your Week 2 project plan (but may differ based on the research you have conducted since Week 2).
    • You may create your system diagram in Microsoft PowerPoint or a graphics program of your choice.
  • A network diagram that shows, in graphic form, the flow of data within your project.
    • Your network diagram should follow the network description you defined in the Week 2 project plan (but may differ based on the research you have conducted since Week 2).
    • You may create your network diagram in Microsoft PowerPoint or a graphics program of your choice.
  • A database design document, including an entity-relationship diagram, a data dictionary, and table definitions, representing all of the data that must be stored and maintained within the context of your project and how that data is organized.
  • A clearly articulated cybersecurity plan that explains how you plan to secure project data and processes.
  • Source code (may be partial) for at least one software application.
    • Your source code may be implemented in HTML/JavaScript, Java, C++, or another programming language.
  • A quality assurance and software test plan.
  • Download the Software Test Plan for an example of what information is typically included and how it is typically organized in a software test plan.

Data Base – Assignment

 

Research on the Internet each of the following topics: 

  1. Explore NoSQL database alternatives.
  • Document
  • Key-Value
  • Object
  • Graph 
  1.  Reporting and analytical databases.
  • Big Data
  • Datamart
  • OLAP vs. OLTP 

Select one topic from the four topics listed for your paper: 

  1. Database models for Big Data
  2. Alternatives to the Relational Database Model (describe at least four)
  3. Relational Database Models and data needs that support their use
  4. Database models for multimedia
  5. You may choose your own database-related topic if you get your instructor’s approval 

Your paper should be 3–5 pages, double-spaced, and in 12-point font. Be sure to provide an introduction and conclusion, and use appropriate section headers. Your paper should be free of spelling and grammar errors, well-written in Standard English, include a reference page and in-text citations, and be formatted in APA.

Discussion-1 MF

 Part 1: Financial Acumen

Keeping abreast of the financial measures and metrics employed by a company allows employees to better understand its health and position at any given time. Using Campbellsville University library link or other libraries and the Internet:

1. Review at least three (3) articles on financial acuity. Summarize the articles in 400 – 600 words. Use APA formatting throughout including in-text citations and references.

2. Discuss the benefits of establishing solid financial acumen in a company? Discuss your personal experiences in a situation where financial acumen was either not supported as an organizational hallmark or, conversely, was built into the company’s culture.

Part 2: Sarbanes-Oxley (SOX)

Write a 200-word commentary on Sarbanes Oxley and the importance this act has for American businesses today. Your commentary should include the following:

 A. Rationale for SOX
B. Provisions of SOX
C. Enforcement of SOX 

main discussion

 

Compare and contrast the different techniques for anomaly detection that were presented in Chapter 9.

Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects.

python Coding

For this lab, and every lab: comment your code. If you  use/adapt code from the internet, you must add a comment with the source  of the code.

Reading: Chapter 3 https://automatetheboringstuff.com/2e/chapter3/

Activity – Python Tutor: Try at least one program in Python Tutor http://www.pythontutor.com/ 

Question 1: Greetings Function! (4 points)

Start with the greeting program, the first program with functions we  used in Python Tutor. This time, the computer is very happy to meet  you.  Modify the function to return the user’s name in uppercase, with  !!!! after it.  So, if the user’s name is Miriam, the greeting function  will return ‘HELLO MIRIAM!!!!’

Question 2: Quiz question function (6 points)

Write a function that takes two arguments – a quiz question and the correct answer. 

In your function, you will print the question, and ask the user for  the answer. If the user gets the answer correct, print a success  message. Else, print a message with the correct answer.   Your function  does not need to return anything.

Call your function with two example quiz questions.   Here’s some suggestions, 

  • Q: What year did Apollo 11 land on the moon? A: 1969
  • Q: Who painted the Mona Lisa? A: Leonardo da Vinci

Question 3: Windows 10 Upgrade (10 points)

When installing Windows 10, a user can either wipe everything from  their computer and do a clean install.  Or if their computer meets  system requirements, the user can upgrade to Windows 10 without erasing  their current operating system.

To do the upgrade, according to Microsoft, a computer needs to have  at least 1GB of memory, and at least 1GHz processor, and either Windows 7  or Windows 8 currently installed.   All three requirements must be  met. 

Write a program that asks the user for

  • The current memory in their computer, in GB.  (For example, a user with 8GB of memory would enter 8)
  • The current processor speed, in GHz. (For example, a user with a 2.6GHz processor should enter 2.6)
  • The name of their current operating system. (For example, a user could enter Windows 8 or Windows 7 or Windows XP)

Write a can_upgrade function that takes three arguments, the amount of memory, the processor speed, and current operating system.

In can_upgrade, use conditions to figure out if the  user’s computer can be upgraded to Windows 10 or not.  Your function  should return one of the Boolean values True (if the computer can be  upgraded) or False (if it can’t be upgraded).

Call your can_upgrade function from main(), and use the return value to print a message to the user telling them if they can, or can’t, upgrade.

Extra Credit Question: (+5 points)

Start with the College ID card program from https://gist.github.com/claraj/b993219477d015d58341c4f3c1950a22.  This has no functions but it would benefit from being re-organized into  functions. Refactor this program. Suggestions – functions for  validation, functions to help print the college ID card, for example  printing a line of —-, printing centered text, printing text in  color. 

Team management

 What other areas of organizational behavior or design are impacted by information technology, and what are the implications for organizational change? 

Discussion Post-Federal Architecture

 

Discuss in 500 words or more  federated architecture in cloud systems. Remember that this is a cloud class not a database class. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

Research paper 8

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

NO plagiarism at any cost. 

Due on Saturday (10/17/2020)

Reference Article:

• Read Puchley, T., & Toppi, C. (2018). ERM: Evolving From Risk Assessment to Strategic Risk Management. HFM (Healthcare Financial Management), 1–5.