Ethical Decision Making

 

Assignment Content

  1. Resource: Decision Tree Example
    Your team of international developers will be developing a publicly accessible cloud-based application which may potentially house user PII data along with information about users’ behaviors and activities (e.g., physical locations, online sites they visit, searches, purchases, etc.), and user’s intellectual property (e.g., photos, artwork, videos, etc.).

    Based on your work in Weeks 3 and 4, develop an ethical decision-making illustration or decision tree that shows ways to address each risk if an actual incident occurs. Develop an ethical policy statement of the actions your team would take, keeping a global perspective in mind.

    Using the Decision Tree Example provided as a guide, create a PowerPoint presentation containing 4 to 6 slides. Provide 1 file for the team. This example will help you develop your individual assignment in Week 5.

    Note: You may use other applications like Adobe Spark, Microsoft Sway, or Mix instead of PowerPoint.

    Submit your assignment.

truncatabel prime

  

Assignment 4: Truncatable Primes

Background

A left-truncatable prime number is one where the numbers resulting from removing the left-most digits are also prime. For instance, the number 9137 is a left-truncatable prime since 9137, 137, 37 and 7 are all prime.

A right-truncatable prime number is similarly defined, but removes a digit from the right. For example, 31193 is a right-truncatable prime since 31193, 3119, 311, 31, 3 are all prime.

A truncatable prime, also known as a two-sided prime, is one that is both left-truncatable and right-truncatable simultaneously. An example of such a prime is 3797.

We will be writing a program to explore these truncatable primes.

As a side note, the property of truncatable is dependent upon the base that the number is represented in. For this program, only worry about base 10.

Analysis

First note that the property of truncatability always produces a chain of numbers that terminate in single digit prime numbers. Therefore we can identify prime numbers by starting at the end of that chain and build numbers by adding digits. That is, we should be able to identify 3797 as a truncatable prime by building it from the right as in 7, 97, 797, then 3797, all the while verifying each step is left-truncatable.

Next note that when building from the right, we can only add odd digits. If we were to add a 0, 2, 4, 6, or 8, the resulting number would be divisible by 2 and thus not prime.

Finally, all of the single digit prime numbers are 2, 3, 5, and 7. These form the basis of our search.

Approach

Based upon the analysis above, we can find truncatable primes by building primes that are right-truncatable by construction, and verify they are left truncatable as we go. This suggest the following recursive algorithm

Build Truncatable Primes(int start)

if (start is not prime)

return

if (start is left truncatable)

found one. print it out

Build Truncatable Primes (start * 10 + 1)

Build Truncatable Primes (start * 10 + 3)

Build Truncatable Primes (start * 10 + 7)

Build Truncatable Primes (start * 10 + 9)

For left-truncatable, consider testing the number 12345. We know that we need to check 12345, 2345, 345, 45, and 5. But since all must be prime, the order they are tested in does not matter. In particular, we can check them in the order 5, 45, 345, 2345, 12345. What is nice about that order is we can get those digits by modding by successive powers of 10. Therefore you can use a loop that starts at 10, and updates by multiplying by 10.

Tips

· Start by writing an is_prime function.

· Next write an is_left_truncatable function.

· Using the modulus operator with powers of 10 can cut off digits from the left side.

· Write the algorithm specified above.

· Start the algorithm with all possible single digit prime numbers.

Sample Output

The truncatable primes are:

2

23

3

313

3137

317

37

373

3797

5

53

7

73

739397

797

paper

 ACTIVITY 54ReferencesPinto, J. (2019). Project Management: Achieving Competitive Advantage(5th ed). Boston: . Pearson. 

write 500 words

 

  1. What are the practical implications internally (in terms of team motivation) and externally (for the customer) of making overly optimistic project delivery promises?
  2. Consider a project to build a bridge over a river gorge.  What are some of the resource constraints that would make this project challenging?
  3. It has been argued that a project schedule that has not been resource-leveled is useless.  Do you agree or disagree with this statement?  Why or why not?

…………………………………..

write in new document

 

Activity 6

Case Study 11.1: It’s an Agile World

This case illustrates a common problem in software and IT development, where programmers and IT staff are anxious to lock in specifications as early as possible so they can “get to work” without having to worry about invasive or disruptive input from the end users.  Unfortunately, what typically happens is that the finished product is not what the users needed or thought they needed and a long list of fixes and modifications are needed to make it work correctly.  This case is based on a true story in a hospital IT department that routinely struggled with these sorts of user conflicts until they sifted to an Agile methodology.

Questions

  1. Why does the classic waterfall project planning model fail in this situation?  What is it about the IT department’s processes that leads to their finished systems being rejected constantly?
  2. How would an Agile methodology correct some of these problems?  What new development cycle would you propose?
  3. Why are “user stories” and system “features” critical components of an effective IT software development process?
  4. Using the terms “Scrum,” “Sprint,” and “User stories,” create an alternative development cycle for a hypothetical software development process at Northwest Regional Hospital.

Case Study 12.2: “First Come, First Served”: Resource Challenges for Sunrise Restoration

This case is intended to highlight the challenges in resource assignment, particularly in the common cases where project managers within the same firm are competing with each other for the use of scarce and valuable human resources to accomplish their tasks.  Without clear guidance from top management and a valid priority system, the ability to acquire resources is often the result of chaotic bargaining and negotiation among equals. This case is based on a real situation and the outcomes were very much in line with the way they are described in the case.  The business owner did not want to simply invest in more resources for fear that they would be underutilized.  He much preferred the system of negotiating among his project managers, even if that led to inefficient utilization of the resources that were available.  Students can be asked to take the side of the owner or Tyler to debate the options that Sunrise can use to manage its resources.

Questions

  1. Describe some of the resource constraints that Sunrise and its project managers are facing.
  2. Is Sunrise’s current model of prioritizing resource assignments viable?  Why or why not?
  3. How could technology alleviate some of Sunrise’s resource management issues?
  4. Would Tyler’s suggestion to hire additional technicians and purchase more equipment solve the resource problems at Sunrise?  Why or why not?

discussion-4

 how virtualization may create it’s own security vulnerabilities . 

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Can IS create a sustainable competitive advantage, or only support a firm in achieving a sustainable competitive advantage based on a compelling value proposition?

Total: 7-8 Paragraphs with minimum 4 references and NO title page APA Format.

Can IS create a sustainable competitive advantage, or only support a firm in achieving a sustainable competitive advantage based on a compelling value proposition?

Use evidence to support your argument.Can a firm really protect an advantage based on the innovative use of information systems and IT? 

Can IT-dependent strategic initiatives deliver sustained competitive advantage? These questions engender much debate and continue to stir up controversy!

Consider below controversial situation and respond to the following question: 

When it comes to using information systems and IT, the primary objective of the modern general and functional manager is to use them to create added value. 

However, creating added value is just one facet of the job; the firm must be able to appropriate the value created over time to truly benefit. 

In other words, any competitive advantage the firm has created with the implementation of its IT-dependent strategic initiative 

must be defended over time to ensure that the firm will be able to reap the benefits of its innovation. 

Research Paper

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.