C Coding Exercises

 Write a program with a function that converts a string of digits into an integer value. Do not use the strtol() function or any other standard C library function. Write your own! 

Update. hotmail login

IMPACT OF IT -2b

 Find a recent article that relates to this week’s topic and post a summary of that article and how it relates to this week’s lesson.

Post your reply by Wednesday at midnight. Your response should be at least 200 words and appropriately cite your resources.

find the below link for reference:

Discussion 7 (commerce)

250 words+

Wilderness Trailhead, Inc. (WTI) is a retailer that offers hiking, rock-climbing, and survival gear for sale on its Web site. WTI offers about 1200 different items for sale and has about 1000 visitors per day at its Web site. The company makes about 200 sales each day on its site, with an average transaction value of $372. WTI sells products primarily through its Web site to customers in the United States and Canada. WTI ships orders from its two warehouses: one in Vancouver, British Columbia, and another in Shoreline, Washington. WTI accepts four major credit cards and processes its own credit card transactions. It stores records of all transactions on a database server that shares a small room with the Web server computer at WTI’s main offices in a small industrial park just outside Bellingham, Washington. Outline and propose a security policy for the WTI database server. Be sure to consider the threats that exist because of that server stores customer credit card numbers.

Discussions: Identity & Access Management for Work From Home

 

Your task: You have been asked to give a  presentation at an online training session for employees who are now  working from home. The subject of this training session is: Access  Controls and Why They Matter.

Background: Access controls are security features  that are usually considered the first line of defense in asset  protection. They are used to dictate how subjects access objects, and  their main goal is to protect the objects from unauthorized access.  Access control models are frameworks that use access controls to enforce  the rules and objectives of the model (e.g. MAC, DAC, RBAC).

For this training, you should focus on the need to use Access  Controls to protect corporate assets and data which are accessible via  equipment and networks within the Work From Home setting. In your  talking points you should also consider and address the frustrations  that employees may feel when they encounter access controls that are not  set up to allow the same type of “inside” access as employees had when  working on company equipment inside company networks. (Explain why  “turning off” access controls is not an acceptable solution to remote  access to internal networks and resources.) Finally, address some  potential “insider threats” which may exist in the Work From Home  environment that need the countermeasures provided by access controls.  Such threats could include the actions of others residing in the home  who have access to the employee’s laptops or who use the same networks  and network connections.

Format: This week, the format for your deliverable  (posting) will be “Talking Points.” Talking points are presented in  outline format and contain the content that you would put on slides in a  slide deck. Your outline should include 5 to 7 major points (“slide  titles”) followed by 3 to 5 supporting points for each. Remember to put  enough information into the talking points that your peer reviewers can  understand what you intend to cover in each section of your briefing.  Remember to introduce the topic at the beginning, present your analysis,  and then close your briefing with an appropriate summary. Include a  list of sources (3 or more) which attendees could refer to if they wish  to fact check your work.

System Analysis-n System Roles and Business Systems

  

Assignment 1: 

Research a scholarly paper or professional video on “Business Systems Roles” and reflect on only one (1) of the following:

What is the difference between a Systems Analysts, a Business Analyst, a Data Analyst and a super-users and what other ‘people’ roles deal with business systems?

NOTE:

This paper must be between 250-300 words on what caught your eye and reflect on what you read. 

Do not add extraneous text that does not address the question – do not add an introduction or conclusion.

Do not copy and paste text from the referenced resource.

You must provide at least one APA reference for your resource and corresponding in-text citations.

You must provide the referenced resource URL/DOI in the APA reference.

Do not use the Textbook as a referenced resource.

Assignment 2:

Research a scholarly paper or professional video on “Business Systems” and reflect on only one (1) of the following:topics:

“Systems Perspective”: What is a System Perspective?

“System Types”: Describe a type of systems that exists in an Business.

“Enterprise System”: Identify a type of enterprise system.

“Data Driven System”: Describe a data-driven system.

NOTE:

You must copy and paste the topic (“Systems Perspective” or “System Types” or “Enterprise System” or “Data Driven System”) at the start of your paper to provide a context for your answer.

This paper must be between 250-300 words on what caught your eye and reflect on what you read. 

Do not add extraneous text that does not address the question – do not add an introduction or conclusion.

Do not copy and paste text from the referenced resource.

You must provide at least one APA reference for your resource and corresponding in-text citations..

You must provide the referenced resource URL/DOI in the APA reference.

Do not use the Textbook as a referenced resource.

SIEMENS SIMATIC

I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA) 

There are all the requirements for the term paper alongside the template for the term paper.
Please help and thank you 

Discussion post

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

Assignment

 Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. what do each of these terms refer to: copyright, patent, trademark, trade secret?

2. Why is intellectual property entitled to legal protection? 

3. Why did copyright laws become stricter and more punishing in the late 20th century?

4. What is the Fair Use doctrine?

5. Make an argument for legalizing the copying of music or software. 

6. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I don’t own them, what is my legal right to them?

7. What was the 1984 Sony Supreme Court case about?

8. Was Napster responsible for the actions of its users?

9. Why did the court find in favor of Diamond in the Rio case? 

10. What is Digital Rights Management?