Week 5 Written Assignment

 Week 5 Written Assignment

This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

  1. How do geographically dispersed teams collaborate effectively?
  2. Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team.  Please note the pros and cons of each tool. 
  3. Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing. 

email migration

  

A company wants to migrate their email, calendar, and other associated applications to the web. You are to write a plan to perform this migration so that it includes backups, storage, and whether email clients can also be used on the desktop i.e. Thunderbird. 

The requirements 

· The plan must address:

 Migration of email, calendar, and associated applications

 Backups and storage

Option for a desktop application

 Difference between POP3 and IMAP

 How encryption can be used to keep data protected and ensure it is not delivered in plain text

· APA formatted including title page, reference page, and in-text citations.

· Length of 2-3 pages, excuding the title and reference pages.

Minimum of 2 scholarly resources 

Assignment

 People are using their mobile phone browsers more and more every day to find information about businesses, make product decisions and purchases, and even determine the quality of a business based on what they can find online.  Write a 4 page paper in which you: 

  • How to Choose a Mobile Web Development Option.
  • Research and discuss effective use of screen real estate.
  • Compare and contrast different mobile platforms (i.e. Android, iOS).
  • The tools of mobile interface design.
  • Discuss mobile information design.
  • Choosing mobile web options.

Your assignment must follow these formatting requirements:

  • Use quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. 
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment 

Python programming

General information/requirements/grading rules

  1. This HW will test your knowledge on Object Oriented Programming using Classes and Inheritance
  2. Use meaningful names for classes, objects, attributes and methods
  3. If there are two words in the variable use first word lowercase and first letter of second word upper case i.e., firstName, or underscore between the two words i.e first_name
  4. Include appropriate comments in the code
  5. Output should be displayed exactly as mentioned against each problem
  6. Indent the lines of code appropriately

Q1: Employee.py : (50 points)

Write a class named Employee that holds the following data about an employee with attributes: name, ID number, department and job title.

Once you have written a class, write a program that creates three Employee objects to hold the following data:

Name

ID Number

Department

Job Title

Susan Meyers

47899

Accounting

Vice President

Mark Jones

39119

IT

Programmer

Joy Rogers

81774

Manufacturing

Engineer

The program should store this data in the three objects, then display the data for each employee on the screen.

Example OUTPUT:

Employee 1:
Name: Susan Meyers
ID number: 47899
Department: Accounting
Title: Vice President

Employee 2:
Name: Mark Jones
ID number: 39119
Department: IT
Title: Programmer

Employee 3:
Name: Joy Rogers
ID number: 81774
Department: Manufacturing
Title: Engineer

Q2: Customer.py : (50 points)

Write a class named Person with data attributes for a person’s name, address, and telephone number. Next, write another class named Customer that is a subclass of the Person class. The Customer class should have a data attribute for a customer number, and a Boolean data attribute indicating whether the customer wishes to be on a mailing list. Demonstrate an instance of the Customer class in a simple program.

Sample output:

Enter the name: john
Enter the address: 239 lovers lane
Enter the phone_number: 817-907-5367
Enter the customer number: 0011
Does the customer wish to be on the mailing list?(Yes/No) Yes

Customer information: 
Name: john
Address: 239 lovers lane
Phone number: 817-907-5367
Customer Number: 0011
On Mailing List: True

IT345: Impact of IT on Individuals, Organizations, and Society

Throughout this course we are going to critically assess the institutional forces that shape and create the demand for information technology. When responding to discussion boards, try to incorporate, when possible, your view as a student and your view as an employer. For example, how does social media impact you on a personal level and how would it impact your employer? They are both two very different answers.

Q1) Select one of the topics listed below and find a recent article that relates to this topic and post a summary of that article and express your views as well.

Listed Topics:

  • What is disruptive technology? Cite one example of a technology that has emerged in the last decade and what impact it has had. Who/what was affected?
  • What are some concerns that a typical cell phone user should have regarding privacy and how can they mitigate those concerns?
  • In your opinion, how was Facebook able to dethrone MySpace as the most popular social media site? What did Facebook offer that MySpace did not?
  • What technological improvement/invention has had the most impact on modern day business? Why?

Not more than 350 words total. Respond to at least two other students (150 words each peer)!!

2. Two (2) paragraphs (350 Words total) discussion response to main DQ questions. In addition, respond with two (2) students/Peers to Peer (identify peers) or two classmates. The responses should 150 words each and must focus on the discussion topic above. Examine related issues, ask questions, provide hypothesis and/or situation(s). A peer response may not be to a peer already responded to more than twice.

Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade. 

You will be graded by

  

You will be graded by the quality of your response. Also, please do not copy someone else’s post but try to make it yours.
You may look at the posts of others for ideas, but do not copy and paste it and make it yours.
You can do one post that answers both parts. So think carefully about your post.
 

Here is the topic:
****************************
 

Write pseudo code that prompts the user to enter his/her age and then outputs
(i) the user age divided by 4
 

and
 

(ii) the remainder when age is divided by 4

Project Part 1: Risk Management Plan Outline and Research

 Please read the following outline and the attached file carefully.

Project Part 1: Risk Management Plan Outline and Research

For the first part of the assigned project, you will create a partial draft of the risk management plan. To do so, follow these steps:

  1. Research risk management plans.
  2. Create an outline for a basic risk management plan with anticipated section headings (as indicated in this numbered list). This plan will include a qualitative risk assessment, which is addressed later in the project.
  3. Write an introduction to the plan by explaining its purpose and importance.
  4. Define the scope and boundaries of the plan.
  5. Research and summarize compliance laws and regulations that pertain to the organization. Keep track of sources you use for citation purposes.
  6. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk management.
  7. Develop a proposed schedule for the risk management planning process.
  8. Create a draft risk management plan detailing the information above. Format the plan similar to a professional business report and cite any sources you used.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide

Estimated length: 4–6 pages

PROJECT: METHODOLOGY DEVELOPMENT ANALYSIS ASSIGNMENT

  

Project: Methodology Development Analysis Assignment Instructions

Overview

This part of the project develops the methodology and begins analysis of the information security solution. The problem statement, project scope, risk analysis, and literature review performed in the Project: Problem Identification Assignment must justify the selection of the elements that require analysis for the final fault-tolerant security solution. For example, if the final solution requires a network security solution, an analysis may begin by evaluating the network architecture diagram in Project: Problem Identification Assignment.

Instructions

Segments of the network must be assessed, such as all local node connections in the LAN (e.g. local processes, local devices, local data storage), as well as other connections to the LAN (e.g. network gateways, WANs, wireless APs, network control resources, network databases, cloud integrations). The environment and architecture must justify the analysis of the coinciding threats. A few of the many network threats you could analyze (but are certainly not limited to) are DDS, session hijacking, parameter modification, server-side includes, addressing errors, message integrity, protocol flaws, reconnaissance, impersonation, wiretapping, malicious active code, connection flooding, man-in-the-middle, spoofing, misdelivery, redirection, and/or other transmission failures. The analysis in the latter example must identify any targets such as confidentiality, integrity, or availability and the coinciding vulnerability such as impersonation, protocol flaw, or misdelivery.

This is just an example given for a network security project and in no way limits the outcomes. The review of literature and detailed analysis of the system or application will determine the primary deliverables. Each requires objective justification for credit.

It is critical to identify the proper targets and vulnerabilities to ensure the final fault tolerant security design includes the appropriate correlated controls. For example, if the target is confidentiality, and the vulnerability is misdelivery, an appropriate control solution to design could be encryption. If the target is availability, and the target is a DNS attack, an appropriate control solution to design could be an intrusion detection system (IDS), access control list, and honeypot.

Current and proper APA formatting is required and must include a title page, proper margins, citations, organization, proper grammar and spelling, and an ending resources page.

At the minimum, this phase of the project must include:

I. Executive summary, introduction, and conclusion

II. Methodology (must be supported by relevant and current research from scholarly, peer-reviewed journals)

a. Approach(es) for the information security analyses and design

i. Organizational security structure

ii. System, computing, network, or application architecture

iii. Security models that will be utilized

b. How the data will be gathered to objectively analyze the solution

i. System evaluation method

c. Limitations of the analysis

i. Security threats and risks inside the scope that need to be addressed

ii. Security threats and risks outside the scope

III. Synthesis review of literature to support analysis decisions

a. Analysis of the proper solution

i. Targets of the attack

ii. Vulnerabilities

iii. Controls

b. Create the appropriate correlated diagrams

c. Detail the results of the analysis

d. NOTE: Required minimum length (8 peer-reviewed sources and at least 7 double-spaced current APA formatted pages) in the grading rubric excludes all systems analysis and design (SAD) diagrams and any other tables and/or graphical elements

IV. Diagram examples in this phase could include but are not limited to:

a. Advanced system and/or network architecture diagrams

b. Use case, activity, class, system sequence, and/or state machine diagrams

c. Fault tree

d. Access control matrix

e. Authentication, traffic, and/or data map

f. Dataflow diagrams (DFD)

g. CPU/Memory/OS buffer, segmenting, address, and/or data bus mappings

h. NOTE: A minimum of 5 diagrams exist that accurately analyze a secure system, network, and/or application solution. Within EACH of the 5 diagrams, a minimum of 10 elements exist that accurately detail analysis of the environment that needs securing (Note, if 10 elements are not necessary in a diagram add diagrams as needed to sufficiently meet this requirement). Each diagram is thoroughly developed based upon existing architecture and/or applications. Each diagram meets the associated technical requirements, programming language, notations, formatting, and modeling rules of the language (e.g. UML), industry standards for the diagram, and/or literature review. Analysis and design diagrams must have an associated industry standard that is widely accepted to be recognized (e.g. UML).

Each diagram must be justified by the literature review. In other words, if the plan secures an object-oriented language such as Java, the Java Virtual Machine must be properly analyzed from the class loader to the applet security manager. Analysis and associated diagrams must parallel the proper notations, formatting, and modeling rules and standards outlined in the prior IT infrastructure and systems analysis and design. These must align with peer-reviewed journal research as well as industry best practices.

Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.

8 peer-reviewed sources exist (can have overlap from Phase 1 if appropriate) and a minimum of 7 double-spaced, current APA-formatted pages, excluding the SAD diagrams, graphics, tables, or any other non-textual components.