Python Programming

 

Description: The university maintains course schedules at http://appsprod.tamuc.edu/Schedule/Schedule.aspx for different semesters (spring, fall, winter, etc ). You will develop a Python program to dynamically complete certain tasks, such as list, find, sort, and save, in course listings from schedule portal. You will mainly use “request” and “BeautifulSoup” libraries (or similar, see exercise 12.1). The program will operate at different level: Semester and Department.  Your program will be a menu based application. Assume that you project file is myproject.py. Once you run, it will show last 5 semester (fall, spring, summer only, (not winter, may mini))

> python myproject.py
Choose a semester: 1) Sprint 2021   2)Fall 2020  3)Summer II  4)Summer I 5)Spring 2020 
Selection: 2

Here, your program will parse the data from website and show only last (most recent) 5 semesters. User will make selection, then, you will show departments for the selected semester (Fall 2020). Note that selected semester is visible before a “>” sign.

Fall 2020> Select a department:
1) Undeclared
2) Accounting and Finance
3) Art
4) Ag Science & Natural Resources


30) Social Work
31) Theatre
Q)Go back

Selection: 3

Fall 2020> Art > Select an option:
1) List courses by instruction name
2) List courses by capacity
3) List courses by enrollment size
4) List courses by course prefix
5) Save courses in a csv file
6) Search course by instruction name
7) Search courses by course prefix
Q)Go back
Selection: ??

Here, your program will parse the data from website and show all available department then list of tasks. Q (go back) option will take user to previous level. 

Course listing output should show the following fields. For instance for course listing for “Fall 2020> Computer Science & Info Sys> List the course by prefix ” should show

PrefixIDSecNameInstructorHoursSeatsEnroll.COSC130101WIntro to CompuLee, Kwang33510COSC143601EIntro to Comp Sci & ProgBrown, Thomas44036COSC143601LIntro to Comp Sci & ProgBrown, Thomas4036COSC143601WIntro to Comp Sci & ProgHu, Kaoning44543COSC143602EIntro to Comp Sci & ProgHu, Kaoning43532

as first 5 rows.

You will follow above headers and order (prefix (col. width 6), ID (5), Sec (5) ,Name (25), Inst (20), Hours (5), Seats (5), Enroll. (7) ) for other listing selections too. Data cell should be aligned with column header and left justified. A course name should not have a word more than 5 chars. For instance Algorithms should be abbreviated as “Algor”. The length of course name will not exceed 25 chars. In option 5, the above format should be used to save a listing to a file as .csv format. User will be able to provide a filename for csv file.

For this program you need to develop at least one class (chapter 10) with (possible) many methods.

Apply: Database Management Plan: Part 1 – Storing and Extracting Information

 

Scenario

You are the Vice President for Information Technology at a small, growing business. You have been tasked with developing a plan for maintaining databases for storage of business data and use in business analytics. In Weeks 1-5 you will work on gathering information in a Database Management Plan. In Week 6, you will present your plan in a 20-minute presentation (10-12 slides) to the President of Information Technology. 

Create a 700-word entry in your Database Management Plan. You will use information from this entry in your presentation due in Week 6. In your Database Management Plan entry, ensure you:   

  • Provide an overview of how databases can be used in a company to store and extract information. 
  • Decide what data elements need to be stored. 
  • Analyze major component of the SDLC when developing this database application. 

A Database Management Plan template is available to help you record and organize your information.

Submit your assignment.

Information Technology 1700

 

1 .Do you think there are security issues with hardware too, or software-based security (anti-malware, monitoring, etc.) is enough?

2. Have you have instanced where your USB flash drive works well with some systems but does not work with other systems (Windows, Linux, car MP3 player, IoT devices. etc)?

3. Another frequent situation is that you cannot copy a big file (say 6GB) onto some disks even though you have plenty of free space on the disk. 

If you never had such experience, many of us have. If you have, please, describe it. What may cause such situations? What could be a way to resolve each of those situations? What may be a tradeoff that comes with your solution?

Response Required Discussion cloud

Please read the below discussion posts and provide response in 75 to 100 words

Post#1

 

Cloud computing offers a variety of service to its users and so is the audit of it multifunctional and multi-directional. The purpose of the audit can be many and based on that the audit report can reveal different information about the cloud computing audit. The scope of cloud computing audit in my the business will include the IT and its controls of the business as well as the administration, risk assessment, communication, monitoring several activities, system operation, logical as well as physical access and finally change management. “The importance  of  IT  auditing  and  especially  cloud  computing auditing  is  an  essential  effort to  ensure  the  proper  functioning processes  of  an  the organization’s  IT  systems,  management, operations, and  related  processes,  to  avoid  fraudulent,  in  order to  have  comprehensive  and  accurate financial view of their business” (Moghadasi, 2018).

The IT structure of the cloud computing of the business is the basic that needs to be understood to ensure that everything is in proper condition and place so as to enhance the overall business and the output and this is effectively understood by an audit of cloud computing structure. Another important area being targeted by the audit is risk assessment. With the advances in the cyber field, the types of risks to have advanced. Thus the business needs to have thorough knowledge about its cloud computing and related risk so as to take security measures against them. Cloud computing audit for risk assessment reveals information about qualitative and quantitative aspects of the risks and thus becomes crucial in securing the business from any future attack or breaches. “The outsourced data, however, in the cloud are not always trustworthy because of the inadequacy of physical control over the data for data owners” (Sookhak, 2017).

The activities being performed on the cloud can be monitored by the audit of it. It helps the business owner understand what employees are doing on the cloud and how fruitful an employee is towards the overall development and growth of the business. Any activity being performed which is not related to the work profile of the employee can thus be revealed in the audit so the business can take appropriate measures against such employees or clients. “Despite regulatory interest in the audit impact of new technologies, little empirical work has studied how auditors behave when clients introduce cloud platforms into their accounting information system” (Banker, 2020).

The organization systems operation is also an important scope of cloud computing audit. It investigates the working of several systems and informs what systems need to be upgraded or changed for better results. The communication happening on the cloud is a part of audit wherein the business owner gets to know who is communicating over the cloud and who is viewing the information stored overcloud. Any unauthorized access being taken by a third party to the cloud services will be revealed in the audit report thus helps in blocking such access and improving the accessibility features for the enhanced security of the business cloud computing (Moghadasi, 2018).

Post#2

 

Cloud computing auditing ensures the proper functioning of the IT system, the operations, the management, and the related processes. It helps to avoid fraudulently that provides a comprehensive and accurate financial view of the business. Nurhajati states that cloud computing audits are relevant towards protecting the data, identification and access management, risk technology, setting up rules and ensure better operations (Nurhajati, 2016). It is through cloud computing audits that points out the risk that is related to cloud computing that ensures business continuity.

The objectives that are required to be covered by cloud audit is to provide the stakeholders with having an internal security policy and towards having a successful control process of the cloud computing service. It also helps to evaluate the productiveness. The purpose of cloud audit is also to provide an interface between the service provider and the clients of the company. It helps to identify the definiteness and the inadequacies that can be found in internal control. It also provides the assessment criteria and generates the capabilities of reporting (Marks, 2015). Thus the stakeholders become much more confident in regards to the quality of the audit that also ensure better internal control.  The auditors are also required to consider the control access, the control framework, and the features of authorization, notification in regards to a data breach, latency in communication and also take into consideration international law. The cloud auditor is also required to consider the cloud support and the IT support functions and towards anticipating re-enforcing the business function.

The cloud auditors are required to understand the risk association, the ways to deal and towards developing the abilities towards auditing the plan and the strategy. As the architecture for cloud computing consists of different models different components and services, it is required for the cloud auditor towards considering if the application is compatible with that of the cloud environment (Moghadasi, Mousavi, & Fazekas, 2018). This is because most of the application depends on the internal network of the organization and not the internet. Further, the web applications are required to be accessed that would assure authentication, monitoring, and access control. The cloud auditors are also required to assess the appropriateness of the control access over the other resources. They are required to access the endpoints and ensure that there is sufficient security. This would help towards gaining legitimate access towards the cloud resources (Halpert, 2011). Moreover, the service level agreement is required to be considered all communication and correspondence between the different vendors.

The audit process encompasses various phrases which include the planning process. In the planning process, it is required to understand the nature of the business. In the planning process, it requires examination of the controls and the procedures, the structure of the organization, the terms and the reviews and also understanding the application and also the comprehensive control review (Halpert, 2011). The next stage is the control examination phrase where the auditor is required to access the quality and towards specifying the degree to rely on. They are also required to execute and examine the control and test the outcome.

Discussion: Roles and Responsibilities in IT

 

In this module, you are learning about various IT disciplines, roles, and responsibilities in the field, and the certifications and degrees that equip you for those roles. In this discussion, you will examine various IT roles to find one of interest to you. You will learn about the skills and technologies used in these roles and how they can be transferred to other IT disciplines.

For your initial post, use a website such as the Bureau of Labor and Statistics Occupational Outlook Handbook or CompTIA’s Cyberstates Interactive Map to determine your areas of interest in the IT field. Then, choose a job title or role in that area of interest. In your post, describe how this role is situated within the broader IT fields discussed in this unit, and define the responsibilities of the role.

In your responses to your peers, discuss the job title or role they chose. In your response, describe the tools, skills, and certifications your peer would need to be successful in the identified role. Additionally, describe at least one other role that these skills and certifications could be used in.

To complete this assignment, review the Discussion Rubric.

Python Programing

****Assignment #4 Makeup – Instead of in-fix notation for our maybe-probably logic language, you should implement the parse, evaluate, and print functions to work with pre-fix notation. The input strings will now be of the form, s = ‘ AND T M_0.5 ‘, and will not need parentheses. 

General structure of your make-up assignment (regardless of which one) should be as follows:

import unittest


class YourClass:
    """
    YOUR CLASS DOCUMENTATAION
    """

    def __init__(self, size):
        """ INSERT COMMMENTS (IN YOUR OWN WORDS) """
        pass

    # ADD YOUR OTHER METHODS HERE...


def YourFunctionA:
    """ DOCUMENTATION FOR THIS FUNCTION """
    pass

    # ADD YOUR OTHER FUNCTIONS HERE (IF NEEDED)...


class TestYourClassOrFuctions(unittest.TestCase):

    def testMethodA(self):
        """ INSERT DESCRIPTION OF WHAT THIS TEST IS CHECKING.. """
        pass

    # ADD MORE TESTS TO CHECK YOUR OTHER CLASSES/METHODS/FUNTIONS WORK


# main() - run any example/demo you want to when running as standalone program
def main():
    pass

# unittest_main() - run unittest's main, which will run TestHashTable's methods
def unittest_main():
    unittest.main()

# evaluates to true if run as standalone program
if __name__ == '__main__':
    main()
    unittest_main()

PreviousNext

Apply research to create original insights and/or solve real-world problems

 

How did this historic landmark case affect the scientific field of computer forensics, and the required expert testimony of forensic professionals? Your paper should assess the problem that prompted the lawsuit and draw on key points from your research to justify your views.

The complete essay should be no less than 3 double-spaced pages, conforming to APA style guidelines. Be sure to reference at least three sources outside of the course book. Ensure that the paper has a complete introduction, main body, conclusion, and reference page.

Assignment Requirements:

  1. Include a title page.
  2. Font size 10 or 12.
  3. At least 3-5 full double-spaced pages in length, not counting the title page or reference page.
  4. Includes a highly developed viewpoint, purpose and exceptional content.
  5. Demonstrates superior organization, is well ordered, logical and unified.
  6. Free of grammar and spelling errors.
  7. No evidence of plagiarism.

Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

 Article:

Lopes, M., Guarda, T. & Oliveira, P. (2019). How ISO 27001 Can Help  Achieve GDPR Compliance. 2019 14th Iberian Conference on Information  Systems and Technologies (CISTI), pp. 1-6. https://ieeexplore.ieee.org/document/8760937?arnumber=8760937

From your research, discuss whether or not your organization has  ISO 27001 certification. Outside of overall protection from  cyber-attacks, describe, in detail, some other benefits your  organization will achieve in obtaining this certification. If your  company does not have this certification, how can they go about  obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

 A substantive post will do  of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC  Library) that applies to the topic, along with additional information  about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial  discussion thread. Be sure to use information from your readings and  other sources from the UC Library. Use proper citations and references  in your post.