JA1 Business ethics

  1. How would you personally define ethics?
  2. How do business ethics differ from your personal ethics?
  3. What is the biggest influence on your personal ethics? Why?
  4. Do you try to always be ethical? Why or why not?
  5. Do you think you have a high personal standard?
  6. Do you know an adult that has lied, cheated, or stolen anything? How might an adult justify this type of behavior?

Requirements:

  • Answer each question not less than 100 words.
  • Include the list of references used.
  • Avoid Plagiarism.

assignment

CONTEXTUAL THINKING ABOUT DIFFERENT SCENARIOS

This exercise involves you using imagination and logical reasoning to occupy the mindset of a visualiser facing the task of formulating a brief for different scenarios. Imagine you are given the challenge of creating a visualisation/infographic in each of the following made-up scenarios:

THE SUBJECT: Texas Department of Criminal Justice

Scenario A: A pro-capital punishment (local/national) newspaper reporting on the milestone of the 500th execution (pretend it is 2013, there have now been more than 500)

Scenario B: Analyst staff at the Texas Department of Criminal Justice reporting to senior management about aspects of their operations

Scenario C: A campaign group looking to influence the debate about the ending of capital punishment

Website reference: Executed Offenders dataset

Assignment Link: http://book.visualisingdata.com/chapter/chapter-3

Assignment Length (word count): At least 500 words (not including direct quotes).

References: At least three peer-reviewed, scholarly journal references.

Assignment week 1

Answer the following question:

A few weeks ago, many of you completed your research projects on NoSQL, open source, or OO databases. What are some of the advantages that OO Databases offer that even the most advanced RDBMS cannot offer in the enterprise setting? Please provide three advantages and provide a business use case illustrating these examples. 

Instructions

  • This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed. 
  • You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
  • Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
  • Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.
  • Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.

OWASP

Learning About OWASP

Visit the OWASP website. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP. 

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. For your first written assignment, you have unlimited times to retry your assignment.

Attach your WORD doc and then hit SUBMT.

Easy Computer Paper

 

  • Assignment Topic: MS Office Integration.
    • To make this assignment as simple as possible, all you must do is to write about the use of the computer applications we are studying this month in real world settings. (excel, powerpoint, word) For instance, you can write about how you use or plan to use them at home or work place, or about somebody that you know or a business that use these applications. (Please be sure you write around this topic, if you write about something not related to this topic and class you will receive a ‘0’; I am required to enforce this).
    • You can read Chapter 22 in your textbook (Integrating Word, Excel, Access and PowerPoint) to learn more about this subject and have a better idea about what to look for in your research and write.
  • General Guidelines:
    • You must use APA writing style guidelines to write your paper.
    • After conducting your research, write to present your findings and in a very simple way or tell how these applications affect your work, position, and/or field of expertise to make you more productive in the office activities you are or will be performing soon or even here at Everglades University while attending your classes.
    • In this class ONLY, I want you to keep your research very simple/basic.
    • I need you to focus on the APA writing style format of your assignment and learning the correct use of MS Word controls and features to write a paper that conforms with APA writing style guidelines format, this way you will be ready for the rest of your classes and will be using MS Word the correct way for that.
  • Requirements:
    • Assignment MUST be submitted as a Word document. (.docx or .doc)
    • Contains at least four pages:
      • Page one: Title (AKA for many students as Cover Page).
      • Page two: Abstract (Remember NOT to indent the abstract section).
      • Page three: Body (At least two short paragraphs of any length that will allow you to insert the required in-text citations).
      • Last Page: References (At least 3 different that must come from the source list you created in the Insert Citation Source list).
    • Font type: Times New Roman.
    • Font size:
      • 14 points for running headers only.
      • 12 points for headings and everything else in your document.
    • Font color: Black.
    • Alignment: Left align.
    • Line Spacing: Double space.
    • Paragraph Spacing: None after each paragraph.
    • Quote from the article(s) when appropriate and use at least three proper Word generated in-text citations in the paper’s Body conforming to APA writing style guidelines.
    • References must be MS Word generated from using the source list created to insert the required citations.
    • Must include “Running head and a colon” text before the actual header on Title Page ONLY, the rest of pages must use the header alone, left aligned.
    • Must include page numbers in all pages, right aligned and MUST be in the same line as the running header.
    • No spelling and grammar mistakes.
    • Paper Body must use a header (Notice that this may already have been covered by the Running Header since this exercise is a single topic paper).
    • Please, DO NOT convert citations or references to static text, the placeholders need to be active to be reviewed, thank you!

This assignment is due on Sunday of the third week of class, September 20th.

Linux Implementation Proposal

 

Faster Computing has contacted Go2Linux and requested a brief proposal presentation for migrating its systems from Windows to Linux.

The company is specifically interested in seeing the following information:

(10.1.1: Identify the problem to be solved.)

  • Based on your current understanding of Faster Computing’s business, what are some potential benefits of Linux?
  • The company is aware that many different Linux derivatives exist. Be very specific and choose only one version (e.g., Ubuntu, Mint, Zorin, Redhat, CentOS, Kali). Which would Go2Linux recommend, and why? Give specific reasons for your choice (e.g., security features, support, updates, user interface).

(10.1.2: Gather project requirements to meet stakeholder needs.)

  • What steps will be required to migrate the systems from Windows to Linux?
  • Are there graphical interfaces available for the Linux workstations that would provide similar functionality to Windows? Some users are concerned about working with a command-line interface.

(10.1.3: Define the specifications of required technologies.)

  • What tools are available on Linux for the servers to provide file sharing, Linux services, and printing? (e.g., Apache/Nginx, Samba, CUPS, SSH/SCP). Ensure you identify what the functions/services are used for (e.g., Samba is used for file sharing).

(1.1.3: Present ideas in a clear, logical order appropriate to the task.)

The deliverable for this phase of the project is a three- to five-slide PowerPoint narrated presentation.

  • An introductory slide
  • A summary slide
  • Voice narration on every slide

For each slide, you will embed your own audio recording as if you were presenting the content to the Faster Computing team. Faster Computing has not yet committed to the project, so this should be presented as a proposal. The presentation should be visually appealing; the inclusion of at least one image that supports the content and adds value to the proposal is required.

(1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.)

You must cite at least two quality sources.

You used at least 2 references and your references were cited properly following an accepted style. Ask your instructor for clarification.

Use the Migration Proposal Presentation template to get started.

(2.3.1: State conclusions or solutions clearly and precisely.)

You should present your proposal as if you are selling to the company. Revisit all of these important reasons in the summary slide.

How Will My Work Be Evaluated?

As you progress in your IT career, you may find yourself making presentations to customers, client audiences, and professional peers. By creating an effective presentation, you are showing how you use your technical knowledge and convey your ideas to others in a professional setting, an important workplace skill. 

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.3: Present ideas in a clear, logical order appropriate to the task. 
  • 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas. 
  • 2.3.1: State conclusions or solutions clearly and precisely. 
  • 10.1.1: Identify the problem to be solved. 
  • 10.1.2: Gather project requirements to meet stakeholder needs. 
  • 10.1.3: Define the specifications of the required technologies. 

NETWORK SEC

  

Instructions: Answer all questions in a single document. Each response to a single essay question should be 150 words. 

1. Software development is a complex task, especially as technology changes at the speed of light, environments evolve, and more expectations are placed upon vendors who want to be competitive within the software market. This complexity also makes implementing security more challenging. Given this environment, what suggestions for secure software development best practices would you suggest to improve software security? 

2. In addition to application development, databases are another area that needs to have a focus on security within their design. Describe the database concepts of View-based access control, Polyinstantiation, Data warehousing and data mining, and Online Transaction Processing (OLTP)? 

3. In a database, to control security, lock controls are implemented and tested using the ACID test. Explain the following terms for each letter within the ACID method: Atomicity, Consistency, Isolation, Durability. 

Disaster recovery plan

Create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future. The plan will follow the template/example provided

Datawarehousing

To assist with this question you will need to have experience with the following:

Required Tools and Skills: SQL, OLTP , ETL in SSIS, Adventureworks, SSAS, Tableau Packaged Workbook (TWBX)

All answers need to be submitted in the correct file format. 

For the final project, you will be conducting a forensics investigation using one of the following items: A smartphone A network (ideally, a wireless network)

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.