Your Ethical Framework

Please read pgs 67-95 in Ethics for the Information Age

Concerning your ethical framework, please answer the following two questions: 

1) When you have to address moral questions, please rank order from 1 (Highest) to 5 (Lowest) the five ethical frameworks (eg Kantianism, Act Utilitarianism, Rule Utilitarianism, Social Contract Theory, & Virtue Ethics) in terms of their meaning and usefulness to you.  What is the rationale for your rank ordering? 

2) In addition to your preferred ethical framework(s) above, what other factors do you generally consider when addressing moral questions?

please answer 2 separate questions

Presentation on roles and responsibilies of cloud consumer and provider in security controls

For this assignment’s scenario your management is considering deploying several VMs for the next project to the cloud in an IaaS service model to replace your current on-prem data center. They have asked you how hosting the workload in the cloud will change responsibility for security controls. Develop a PowerPoint presentation of no more than ten slides and provide guidance on who will be responsible (the cloud provider or your organization) for various security controls. Give specific examples using the VM you deployed in the previous module as a guide. Consider patching, intrusion response, software updates, network access, security monitoring, system redundancy, and physical security. 

Discuss confrontation and negotiation.

Discuss confrontation and negotiation.

This posting should be at least 250 words. Your primary posting can end with a “tag-line” or a related question of your own. 

Attached student posting either answer student’s questions or comment on their answering my question. Secondary responses should be substantial and well-meaning, between 100-125 words. Initial postings should comply with APA format. For secondary responses, APA is optional (but good practice).

Unit 6 Discussion: How You See Me

Unit 6 Discussion: How You See Me

Unit 6 Discussion: How You See MeAfter viewing the “How You See Me” short film series, discuss the intersection of culture and interpersonal communication.  More specifically, how does culture impact the way you communicate with individuals from diverse communities.  What is the biggest contributing factor in your perception of cultural groups which are different from yours (family, upbringing, media)?  What steps can be taken to communicate more effectively and personally with these groups?

ITSD325U21P

 

Assignment Details

Organizations must manage and administer an e-commerce site with attention to vulnerabilities to both organizational assets and client data. E-commerce creates potential vulnerabilities for the loss of personal information. Click the following article, which explores this topic:

Does E-Commerce Have a Digital Privacy Problem?

Search for and examine a case of an e-commerce site that has been compromised within the last 6 years. In your own words, summarize (2–3 paragraphs) what happened, addressing the following information in detail:

  • How many customers were affected and what kind of data was lost? If the organization was not sure (or did not say) what was lost, state this in your post and discuss any potential consequences for customers.
  • What steps did the organization take to address concerns? Alternatively, what lessons does this example offer?

Provide a reference (with link) for your case example.

When replying to fellow students, look for opportunities to connect their responses to other topics in the current unit, including points that you may have made in your own posts. You may also spot an opportunity to connect the discussion to an article or news story that you have read about, which you can link in your reply. In addition, you can share how your experience with the course content has shaped your opinions and ideas about e-commerce requirements and how participating in this discussion has done so.

Grammar, spelling, punctuation, and format should be correct and professional. Begin contributing to the discussion by Friday.

Reference

McKnight, P. (2019, July 12). Does e-commerce have a digital privacy problem? American Bar Association. https://www.americanbar.org/groups/business_law/publications/committee_newsletters/cyberspace/2019/201907/privacy/

COMP 3051 Algorithm Design and Analysis

  

Assignment 2

Instructions

According to our suggested 16 week “Course Schedule,” you should complete and submit Assignment 2 by the Sunday at the end of Week 6. This assignment is worth 10% of your final grade. To receive full marks, answer each of the following questions in a clear and comprehensive manner. You can find the assignment marking criteria at the end of this document.

Questions

1.  Show that if f(n) is O(h(n)) and g(n) is O(i(n)), then f(n) + g(n) is O(h(n) + i(n)).

[2 marks]

2. Show that 3(n + 1)7 + 2n log n is O(n7). Hint: Try applying the rules of Theorem 1.7. You will have to use the insert equations to answer this question. [2 marks]

3. Give an O(n)-time algorithm for computing the depth of each node of a tree T, where n is the number of nodes of T. Assume the existence of methods setDepth (v,d) and getDepth(v) that run in O(1) time.  [2 marks]

4. What does the following algorithm do? Analyze its worst-case running time and express it using “Big-Oh” notation. [2 marks] 

Algorithm Foo (a,n):

Input: two integers, a and n

Output: ?

k ß 0

b ß 1

while k < n do

k ßk + 1

b  ß b *a

return b

  

5. a. Describe (in pseudo-code) a findAll Elements (k) method of an AVL tree T. It should run in O(logn + s) time where n is the size of T and s is the number of elements returned (i.e., the number of nodes in T whose key is k).

b. Analyze the running time of your algorithm.

[2 marks]

  

Marking Criteria for Assignments

 

You will be awarded full marks if your   answer adequately answers the question addressed.

Total marks = 10

You will be awarded partial marks if your   answer demonstrates:

· Application of the major and   alternative approaches, methods, or algorithms to solve the problem.

· Evidence of appropriate   logic.

· Evidence of correct   computational skills and data structures.

· Inclusion of appropriate   comments or explanations.

For details about how to submit this assignment, refer to the “Assignment Submission Instructions” under the Assignments Overview tab of your course.

Lab5

 

Assembly assignment

A valid password consists of up to 7 characters and must contain one lowercase letter, at one uppercase letter, and one digit from 0-9. You are a security consultant for company XYZ. Your job is to assess the security of their password protected network. To enter their network, the user must pass the password checker. This is accomplished by calling a function and passing into the function a password string:

int check_password(char *passwd);

check_password returns a 7-digit integer of 0s and 1s to indicate which character was correct (0 to indicate a character was incorrect, 1 to indicate it is correct, and 2 to indicate it was not used). If the password entered is “aB2” and the passwd is “a11”, then check_password returns the integer 2222100. If passwd entered is “ab2”, then check_password returns the integer 2222101.

Your assignment is to write an assembly function “hack_password” that will find the secret password stored in “check_password” by iterating through all possible combinations of a-z, A-Z, and 0-9 according to password rule given above and calling the function check_password to determine when the return value is all 1’s and 2’s (e.g., 2211111, 1111111, 2222111, etc…). Note that the correct password decoder returns indicator that a character was not used as well. hack_password will print out the correct password.

You may write the main driver in C as follow:

int main()

{

hack_password();

return 0;

}

discussion

 

To successfully complete this week’s discussion, you will need to refer to Chapter 6, “Culture,” in your Project Management Best Practices: Achieving Global Excellence textbook. 

Please respond to the following in a substantive post (3–4 paragraphs):

  • Explain the primary reasons project management causes a cultural change.
  • Describe the impact of that cultural change on integrative information technology.
  • Provide at least one example of a cultural change that project management can cause.