Discussion 2

Discussion: This week we focus on the social and organizational issues that exist with better understanding why changes occurs.  This week discuss the phases of change noted in the Linear Development in Learning Approaches section in the Information Technology and Organizational Learning text. 

Textbook Name — Information Technology and Organizational Learning text.

Note: The first post should be made by Wednesday 11:59 p.m., EST. 

Answer below

 

  • Use the star schema developed in Portfolio Milestone 1 – Option 1 in Module 3; incorporate your instructor’s feedback.
  • Use the tables created in Portfolio Milestone 2 – Option 1 in Module 5; incorporate your instructor’s feedback.

Develop and execute the SQL commands to populate the fact and dimension tables by extracting data from the Northwind OLTP database and loading the data into the tables within the Northwind Data Warehouse. Your ETL workflow should consist of selecting the required variables from the source database and tables and inserting the required variables into the destination database and tables. After you have populated the tables, construct an SQL command to count the number of rows in each table. Capture a screenshot of the row count for each table. Finally, construct an SQL command to list the first ten rows of each table. Capture a screenshot of each listing.

Your deliverable for this Portfolio Project is a report containing the following information:

  • Changes to your business process, business questions, and fact table grain from Module 5
  • Updated version of the star schema incorporating your instructor’s feedback from Module 5
  • Screenshots of the row counts and table listings
  • Listing of SQL commands used in this assignment
  • A brief description of lessons learned in completing the Portfolio Project and the two Milestones. Based on your lessons learned, what advice would be offer to an organization embarking on building a data warehouse system?

Opposing Shadow IT

Organizations do not always provide information systems that allow their staff to perform their responsibilities efficiently and effectively. Read the article, “Lifting the Veil Off Shadow IT.” Then, respond to the following:

  • Take a position favoring or opposing shadow IT.
  • If you are in favor, give one reason that shadow IT should be allowed. If you are not in favor, provide one way that the organization can reduce the risks of shadow IT.

Information security

 

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in either C/C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. 

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

Discussion_Clustering_Algorithms

Many partitional clustering algorithms that automatically determine the number of clusters claim that this is an advantage. List two situations in which this is not the case.

Need 250 words with references. No APA format required.

research paper – Info-tech import in strategy Planning

 

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

please answer this in word document.

no plagiarism .  please follow above instructions

EH FP

In 750 words

What is the Internet of Things (IoT) and how can we secure it? What are the Challenges?  

Address the below points
1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Homework in R

 

In this homework, you will do some data analysis using R for the Forest Fire Data described https://archive.ics.uci.edu/ml/datasets/forest+fires (Links to an external site.) The dataset is used to find the relationship between the burned area of forest fires and meteorological data.

Please provide your output only in .HTML format. Do not send the .rmd file.

I have already downloaded the forest fires data and added it to the files section.

https://classroom.ucsc-extension.edu/files/1144259/download?download_frd=1

  1. Import the data into R.
  • How many observations are there in the dataset?
  • How many observations are there with a fire (i.e., area>0)
  • How many observations are there with a rain (i.e., rain>0)
  • How many observations are there with both a fire and a rain?

 2.Show the columns month, day, area of the all the observations.

 3. Show the columns month, day, area of the observations with a fire.

 4.How large are the five largest fires (i.e., having largest area)

 a.What are the corresponding month, temp, RH,wind, rain area?

 b.Add one column to the data indicating whether a fire occurred for each   observation (True for area >0 and False for area ==0) (Use Mutate function)

5.Create the following to display the outliers from the below vector.

    -plot 

   – boxplot

Also mention the numbers that are outliers in this vector.

(1,2,50,45,67,200,230,55,56,49)

6. Using the dplyr approach, perform the following actions from ‘iris’

  a) select the columns  Sepal.Length, Sepal.Width, Petal.Length,Petal.Width

 b) filter the iris data for Species = “setosa” or “virginica”