drawrof

  

In this challenge, you’ll create a function that reverses a string.
For example, given the string “forward”, your function should return “drawrof”.
Please do the following:
Name your function reverse.
Call your function with the input string This is my string. and assign the result to the variable my_string.
Print out my_string!
NOTE: Do NOT use input for your function as it cannot be used in this test environment. You should also assume that all inputs are strings, so you do not need to check for this.

week 1 B IT345: Impact of IT

 

Discussion 2 B

No unread replies.No replies.

Find a recent article that relates to this week’s topic and post a summary of that article and how it relates to this week’s lesson.

Post your reply by Wednesday at midnight. Your response should be at least 200 words and appropriately cite your resources.

Respond to two of your classmates by Sunday at midnight. Your responses should be at least 100 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.

You will not be able to see other posts until you make your first post.

Not more than 350 words total. Respond to at least two other students (150 words each peer)!!

2. Two (2) paragraphs (350 Words total) discussion response to main DQ questions. In addition, respond with two (2) students/Peers to Peer (identify peers) or two classmates. The responses should 150 words each and must focus on the discussion topic above. Examine related issues, ask questions, provide hypothesis and/or situation(s). A peer response may not be to a peer already responded to more than twice.

Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade. 

Project Management: A Systems Approach to Planning, Scheduling, and Controlling

 

You will have a two-part team project due in Weeks 9 and 10. The first part will be a research paper that outlines the components of a successful project. The second part will be application of these components to a project (real or fictitious) that you and your team mates are planning to start in a comprehensive Project Plan. Each paper should have a presentation to accompany it.

Guidelines:

  • For Part 2, remember to give me some context with regard to your project selection. Tell me what kind of business/organization it is, the goals of the project, and why it is important to complete the project.
  • Use your textbook as your primary source of information and current research (no more than 5 years old) to supplement it.
  • The papers must be written in APA style with references formatted in APA style, including a References page.
  • Presentations can take any form you like—be creative!

All written work must be submitted in the student’s own words with sources properly attributed in APA format. For your convenience, the correct in-text citation for your textbook is  (Kerzner, 2013). The correct in-text citation for your Case Studies book is (Kerzner, Project Management: Case Studies, 2013).

The correct full-text references for each book appear below:

Kerzner, H. (2013). Project Management: A Systems Approach to Planning, Scheduling, and Controlling, 11th ed. Retrieved from VitalSource Bookshelf: https://online.vitalsource.com/#/books/9781118418550/

Kerzner, H. (2013). Project Management: Case Studies. Retrieved from VitalSource Bookshelf: https://online.vitalsource.com/#/books/9781118415825/

Discussion#5 Week 8-1 – Privacy and Security Considerations for Information Governance

 Topic:

According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.   

Question:

For this discussion, find an example of a security breach which compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend be in place (be certain to remember to cite sources) that could have prevented this breach from occurring. 

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

No Plagiarism**********

Write 200 words for each question. and 100 Words Summary for Each question.

Q1. Each of us works with other people in some manner, such as in teams, on projects, in meetings, virtually, using shared collaboration to edit documents, etc. How have you worked with others at your workplace this week? What challenges have you experienced in collaborating with others at work, and what did you do to resolve them?

Q2. Conflict at work is never easy. Sometimes you may not agree with a supervisor, peer, or client. What are some techniques you can use to address conflict? Share an experience where you had to overcome negative emotions because of a conflict at work.

Q3. What is the most valuable resource within a project? How do you avoid the overallocation of resources? Is communication within an IT project less than ideal, yes or no, and why or why not? Is it different from regular project management? Why or why not?

How would you explain the correlation between the amount of corruption in a country and economic development?

How would you explain the correlation between the amount of corruption in a country and economic development?

Primary/Initial post to Discussion Question: 

Your initial post/response to each module’s discussion forum question(s) should be at least 200 words. 

Secondary Responses/Posts to Peer Posts: 

Respond to at least 2 other postings with 100 words each, attached student question, Your primary posting can end with a “tagline” or a related question of your own. Your secondary postings can either answer another student’s question, or comment on their answering my question. In addition, please ensure that you answer all of my questions.

Disaster Recovery Airlines Industry

  

Mind set

The purpose of this assignment is to identify the activities used to make strategic decisions regarding DRP and BC planning processes.  It is important that you understand the business needs before you can effectively provide security solutions. So, think about the scope of the information systems assets, the threats, and vulnerabilities must be identified.  Now, the business priorities must be identified and aligned with the security posture.  At the end of this exercise, you should be able to prioritize the business needs to determine the scope business continuity and disaster recovery plan

Also, it is important understand that security frameworks are not a one-size-fits-all approach, they must be adjusted to fit the business security goals. 

Research

Thoroughly research the line of business, the industry segment, and the security issues, as well as governing laws and regulations that might impact your business and industry.

Then add the following sections to your paper:

  1. Add a cover page
  2. Company Details
  3. Line of Business
  4. Technology and Security Solutions

Please include 4 scholarly article references. 5 Pages not including reference page and title page