Turnitin® enabled

Project 3: Proof of Concept Report

Turnitin®Turnitin® enabledThis assignment will be submitted to Turnitin®.Instructions

This week, you will complete your proof of concept and submit the report. This is the final report to management before the actual cloud deployment process begins.

Use the Proof-of-Concept Report Template to prepare a report that shows the steps and results for the proof of concept. In the template, you will see specific instructions. Delete the instruction text before you submit the project.

Your report should:

  • Be between five to seven pages (plus an appendix for screenshots, cover page, and table of contents)
  • Address the topics listed in the Proof-of-Concept Report Template
  • Include the following screenshots from the “Build a Virtual Private Cloud and Launch a Web Server” activity:
    • Start Lab page
    • AWS Management Console Name with your name visible from user drop-down
    • Task 1: Create Your VPC
    • Task 2: Create Additional Subnets
    • Task 3: Create a VPC Security Group
    • Task 4: Launch a Web Server Instance

How Will My Work Be Evaluated?

As a cloud professional tasked with developing a proof of concept for the companies cloud adoption, you will prepare a proof of concept report to be submitted to the company owner. By developing a well-structured report of your results and recommendations to management, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express recommendations to decision makers with the right mix of technical detail in an accepted format is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.3: Present ideas in a clear, logical order appropriate to the task.
  • 1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.1.2: Describe the context surrounding the issue or problem.
  • 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.
  • 2.3.4: Address alternative viewpoints, perspectives, and methods.
  • 11.1.3: Install software.
  • 11.2.1: Configure technology according to stakeholder specifications and requirements.
  • 13.1.1: Create documentation appropriate to the stakeholder.

Discussion

 1. Explain why it is useful to describe group work in terms of the time/place framework.

2. Describe the kinds of support that groupware can pro-vide to decision makers. 

discussion 10/16

 discuss the challenges of writing the recovery plan from the perspective of your current or previous employer’s work environment.   

 400 words.

case study 6

Read The Case of Plant Relocation and complete the questions at the end of the case study.

https://www.scu.edu/ethics/focus-areas/business-ethics/resources/the-case-of-plant-relocation/

Kindly answer to the question at the end.

Pros and cons of each country and ethical challenges.

C programming – Basic

Develop a C (or C++) program that reads an unsigned number in some base and outputs the

equivalent value in BCD.

Your program must require a single command line argument, the name of an input file. This

input file will consist of any number of lines, each falling into one of three varieties:

1. Comment – These lines always start with an asterisk (‘*’) and should be completely

ignored.

2. Blank line – Used to visually organize the input file and should be completely ignored.

3. Data line – These are the ones your program will process and are described below.

Data lines will all have exactly two items separated by a single space character:

1. an input base (2 through 16) and

2. an input value in that base whose decimal equivalent will never be more than 6 digits

For each Data line from the input file, you must output:

1. the line number of the input file this data line is on (starting the file with line 1… same as

a text editor would show)

2. a colon followed by a space

3. the BCD equivalent of the input value , four bits at a time with one space between each

set of bits. Remember the decimal values will not exceed 6 digits, so the BCD value will

never exceed 24 bits, not including whitespace between 4-bit sets. NEVER print any

leading bit sets that contain only zeros…

a. eg, instead of 0000 0101 0000 1000, you would print 0101 0000 1000

b. only exception is if the value itself is zero, as in the example below

Example input file Expected output to console

* a first example

2 011000

8 70

7 0

11 3A

* This is long

10 123456

Results

2: 0010 0100

4: 0101 0110

5: 0000

6: 0100 0011

9: 0001 0010 0011 0100 0101 0110

Week 4 Research Paper: ERM Strategy

 The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications. Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion 2

For your initial post, consider the following scenario.

After internal security issues nearly ruined the business, an organization is looking to hire a new chief information officer (CIO) to institute a new governance design. In addition, the new CIO will need to decide whether to use an acceleration or containment strategy to address user computing.

For this interactive assignment, you will take on the role of a perspective candidate for the CIO position and propose to the executives of the organization a governance design that you would implement. In a separate document, create a diagram that depicts your governance design and attach it to the initial post. Within the initial post, explain the role of information systems governance in business and why the CIO role has become so important. Explain the strategy you would use as the CIO to support user computing (i.e., acceleration or containment) and provide a rationale for why you selected one over the other. In addition, explain the governance design you created and would implement as the CIO of the organization. Provide at least three implementation examples to support your design selection and user computing rationale

Your initial post should be a minimum of 300 words.

Research paper

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.