Category: Information technology (IT)

  • College essay rewrite it tell ur story cuzz

    write this story about my iterest in college but also my love mostly for soccer and technology (Coding) and my ambition to go to college 4 years while having an entry level job to stack experience and get the job more likely.
  • IST: Best Practices and Recommendations

    Success, whether organizational or individual, seldom comes strictly from individual experience and internal application. An ongoing requirement in todays fast-changing global business environment is understanding what is successful for others and why, and more importantly, what was not successful and why.

    That search should almost always broaden beyond locale, organizations of similar size, or those in the same industry or business area. Best practices are often identified and documented by organizations in the public, private, and military sectors. This assignment is an opportunity to consider why recognized best practices are effective and discuss how they could be applied to your business or organization.

    Identify 3 emerging best practices in IST.

    Write a 1,400- to 1,750-word essay explaining each practice, including recommendations for how to implement these practices in your organization. The summary should:

    • Describe each practice you selected.
    • Outline ethical considerations for each practice.
    • Summarize the applicability of each practice to your current organizational structure.
    • Recommend a specific implementation strategy for each practice.

    Develop or include at least 1 figure or table to support your assignment.

    Cite at least 3 academic sources to support your recommendations and any figures you did not develop.

    Verified Sources cannot be older than 6 to 7 years

    Format references according to APA guidelines.

  • Project 3

    This is an ongoing project. The completed week 1 and week 2 project is attached. The week 3 project details are below and need to be added to the week 1 and 2 project as a continuation. Please add section headings to the entire project.

    Building a business case for an information technology (IT) strategy is essential to demonstrate that there is an alignment between the IT that is implemented in the organization and the overall goals and objectives of the organization. Being able to build a business case means that the investment in resources can be justified.

    Write an information systems business case of 4-5 pages for the case study organization that includes the following:

    • Based on the information contained in the Business Systems Plan and the Strategic Information Systems Assessment, write an IT strategy statement that details the following:
    • Critical success factors for the IT manager
    • A general strategy for how the IT department will determine congruence between the goals of the IT department and the goals and objectives of the case study organization
    • A general strategy for how the IT department will support the goals and objectives of the case study organization
    • Add this section to the Information Systems Business Case section of your IT Management Plan.

    Attached Files (PDF/DOCX): IanMcLean_IT600__IP2doc.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Managing database privileges at the table level versus the c…

    For this Assignment, you will write a paper that focuses on analyzing the advantages and disadvantages of managing database privileges at the table level versus the column level. Explore how each approach impacts data security, control, and flexibility in managing access for different types of users. Evaluate real-world scenarios where both methods might be employed and discuss the importance of aligning privilege management with the principle of least privilege. Your paper should provide insights into how these privilege levels contribute to maintaining data confidentiality, integrity, and availability across different database platforms. Submission Instructions: A Word document of 8-10 pages (double-spaced), Times New Roman, 12 pt. font. The paper must have an abstract, table of contents, introduction, conclusion, and section headings. Use at least five (5) references outside of your textbook (you may use your textbook as well but are not required to). In addition to the required number of pages for the assignment, you must also include a reference page (bibliography) written in APA style and a title page. Be sure to give all of your papers a descriptive title! Typewritten in double-spaced format with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and the professor has approved other arrangements). Page margins: top, bottom, left side, and right side = 1 inch, with reasonable accommodation being made for special situations. Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than three to five lines, and use quotations sparingly! It is always better to paraphrase than to quote directly.
  • IFSM: Paper B

    Instructions

    Paper B: a matrix mapping of a key IT-related organizational (or personal) ethical issue concerning privacy and organizational policy designed to correct the ethical issue.

    The first step of this assignment is an opportunity to analyze a key IT-related organizational (or personal, if you are not in the job force) ethical issue, related to privacy, subject to relevant laws, regulations, and policies. Both of the following sites provide sources, and an excellent backdrop for issues relating to privacy protection and the law.

    See EPIC Privacy Issues at: See List on left and/or: EFF Privacy at [see list below in center on this page].

    This includes sub-topics discussing information privacy, privacy laws, applications and court rulings (case law is usually an extension of the basic law based on the facts from specific cases and real-world court decisions), and key privacy and anonymity issues. While the sites provide many interesting topics, be sure to focus on our class IT topics.

    1. Use the template below and the list of suggested workforce privacy topics from one of the sites above to produce a matrix to map a key organizational ethical (or personal, if not in the job force) issue and how this issue is affected by laws, regulations, and policies. Use the list of normative ethics below to help you complete the matrix. Choose any three (only three) of the following list of twelve (12) principles of normative ethics described below.
    2. Prepare the Ethical Issue matrix (single-space in the cells) and include the following explanation (200 words) double-space your narrativebelow the matrix:
    3. Why I chose the dilemma;
    4. Why I chose the three principles; and
    5. An analysis of the research used to identify the actions in the matrix.

    The completed matrix allows you to weigh the different issues involved and assign a rank as to the importance of the actions based on the effect on the stakeholders.

    1. Indicate appropriate APA in-text and source citations for all sources. In addition to critical thinking and analysis skills, your assignment should reflect appropriate grammar and spelling, good organization, and proper business-writing style.

    Normative Ethics List

    1. Autonomy: is the duty to maximize the individual’s right to make his or her own decisions.
    2. Beneficence: is the duty to do good both individually and for all.
    3. Confidentiality: is the duty to respect privacy of information and action.
    4. Equality: is the duty to view all people as moral equals.
    5. Finality: is the duty to take action that may override the demands of law, religion, and social customs.
    6. Justice: is the duty to treat all fairly, distributing the risks and benefits equally.
    7. Non-maleficence: is the duty to cause no harm, both individually and for all.
    8. Understanding/Tolerance: is the duty to understand and to accept another viewpoint if reason dictates doing so is warranted.
    9. Publicity: is the duty to take actions based on ethical standards that must be known and recognized by all who are involved.
    10. Respect for persons: is the duty to honor others, their rights, and their responsibilities. Showing respect others implies that we do not treat them as a mere means to our end.
    11. Universality: is the duty to take actions that hold for everyone, regardless of time, place, or people involved. This concept is similar to the Categorical Imperative.
    12. Veracity: is the duty to tell the truth.

    A sample template for the matrix is shown below. To reconstruct the sample template, you may use the Table Tool in MS Word or copy and paste this template.

    Ethical issue:

    Stakeholders

    (Principle 1)

    (Principle 2)

    (Principle 3)

    1

    2

    3

    4

    Step 1: Identify the ethical issue that you want to analyze, as described above. An example might be the falsification of your personal profile in a social networking site.

    Step 2: Identify the stakeholders involved. You, someone who reads your personal profile in a social network site, potential employers, etc. Be sure that each stakeholder category is unique and not similar to another category you use.

    Step 3: Choose any three (only three) of the Normative Ethics principles that might apply to your issue such as autonomy, publicity, and veracity.

    Step 4: Identify how the ethical issue affects each stakeholder based on the principles you identified. Put this statement in the matrix next to the stakeholder.

    Sample Completed Matrix

    Ethical issue: falsifying your profile on a social networking site

    Stakeholders

    autonomy

    publicity

    veracity

    1: Yourself

    You have the duty to maximize the right to make your own decisions.

    You have the duty to take actions based on ethical standards that must be known and recognized by all who are involved.

    You have the duty to tell the truth

    2: Other users of the networking site

    They have the duty to make their own decisions

    They make these decisions based on ethical standards that should be recognized by the person falsifying their profile

    They assume that the person falsifying the profile has the duty to tell the truth.

    3: The social networking site

    The autonomy of the site is limited by law (Goldman, 2007)

    Users of social networking sites are content publishers, as such the site must take actions based on legal and ethical standards and must notify users of these standards so they are known by all.

    As providers of content the site must conform to the laws regarding truth or be held responsible for legal issues as defamation (making harmful false statements about someone else) or copyright infringement. (Goldman, 2007)

    Reference:

    Goldman, E. (2007, May). Social Networking Sites and the Law. Retrieved from

    [Note: Plug the above URL directly into your browser, in its entirety to open]

    The second step of this assignment requires that you write an organizational policy (or personal policy, if you are not in the job force) to correct the IT-related ethical issue that you had previously described, where you mapped a key organizational or personal issue and identified how the digital ethical issue was affected by relevant laws, regulations, and policies.

    The following elements must be addressed:

    You may take a look at other policies to see how they are written. While the following site: – For other possible SANS resources, go to the and click on the free resource link which provides credible examples of templates for policies, an Internet search may provide other templates, however there is no need to copy a template for this assignment, as the template should only be utilized to provide guidance regarding the following headings.

    Your policy should include appropriate information for the following major headings:

    • Overview of the policy an Introduction
    • Purpose of the policy the aim of the policy
    • Scope (roles and responsibilities of stakeholders) who is involved in policy execution.
    • Policy Points to follow – (Note: you should be aware that a policy only describes “what,” the staff of an organization will do, while a procedure describes “how,” the staff of an organization will accomplish a required action. As a result, this section should only discuss the specific measures, needs, or changes to behavior within the organization in terms of policy points, i.e., what they must do to conform to the policy. Any procedures that are needed to assist in doing the what, are usually included by reference later in the policy procedures should not be included in the policy points).
    • Sanctions/enforcement of policy what happens in case of non-compliance

    This assignment requires a minimum of three external references. Indicate appropriate APA source citations for all sources you use.

    In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style.

    Prepare a 4-6 page, double-spaced paper with your Ethical Matrix and your Organizational or Personal Policy (if not in the job force).

    Please submit your Paper B to the LEO Assignments Module as an attached Microsoft Word file. Paper B is due at the end of the fourth week of this course. Include a Cover Page with your Name, the UMGC/Name of the Class, and the Title of the Paper.

    Attached Files (PDF/DOCX): Paper B Rubric.pdf, EPIC – Workplace Privacy.pdf, Paper B Instructions.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Natural Disaster Recovery

    Disasters take place around the globe on a regular basis, creating challenges for various stakeholders responsible for managing the aftermath of such disasters. Large-scale disasters bring about many challenges regarding human rights, research, ethics, and social policies.

    Search the web for recent natural disaster recovery stories (i.e., hurricanes, tornadoes, and tsunamis). Review the article from your search and then write a report on how different businesses, in different industries, handled the disaster and the associated recovery steps. Then, answer the following questions:

    • What were the gaps in their recovery plans?
    • If the gap(s) is not known or published, provide your own thoughts on their disaster recovery gap(s) that you see.

    Please note, you have an option of selecting one business from one industry or a few businesses from different industries.

  • IT Risks

    Below are the instructions for the slides that you have to do. They are all from the IT AUDIT class, which is an accounting class. Please provide all the IT RISKS, and you have to make atleast 18 slides.

    Attached Files (PDF/DOCX): IT Audit SNAP A Control In Person.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • IT 140 PROJECT TWO

    IT 140 Project Two Guidelines and Rubric

    Competencies

    In this project, you will demonstrate your mastery of the following competencies:

    • Write scripts using syntax and conventions in accordance with industry standard best practices
    • Develop a fully functional program using industry-relevant tools

    Scenario

    You work for a small company that creates text-based games. You recently pitched your design ideas for a text-based adventure game to your team. Your team was impressed by all of your designs, and would like you to develop the game! You will be able to use the map and the pseudocode or flowcharts from your designs to help you develop the code for the game. In your code, you have been asked to include clear naming conventions for functions, variables, and so on, along with in-line comments. Not only will these help you keep track as you develop, but they will help your team read and understand your code. This will make it easier to adapt for other games in the future.

    Recall that the game requires players to type in a command line prompt to move through the different rooms and get items from each room. The goal of the game is for the player to get all of the items before encountering the room that contains the villain. Each step of the game will require a text output to let the player know where they are in the game, and an option of whether or not to obtain the item in each room.

    Directions

    In Project One, you designed pseudocode or flowcharts for the two main actions in the game: moving between rooms and gathering items. In this project, you will write the code for the full game based on your designs. You will also need to include some additional components beyond your original designs to help your game work as intended. You will develop all of your code in one Python (PY) file, titled TextBasedGame.py.

    IMPORTANT: The directions include sample code from the dragon-themed game. Be sure to modify any sample code so that it fits the theme of your game.

    1. First, create a new file in the PyCharm integrated development environment (IDE), title it TextBasedGame.py, and include a comment at the top with your full name. As you develop your code, remember that you must use industry standard best practices including in-line comments and appropriate naming conventions to enhance the readability and maintainability of the code.
    2. In order for a player to navigate your game, you will need to develop a function or functions using Python script. Your function or functions should do the following:
    • Show the player the different commands they can enter (such as go North, go West, and get [item Name]).
    • Show the players status by identifying the room they are currently in, showing a list of their inventory of items, and displaying the item in their current room.
    1. You could make these separate functions or part of a single function, depending on how you prefer to organize your code.
    2. #Sample function showing the goal of the game and move commands
    3. def show_instructions():
    4. #print a main menu and the commands
    5. print(“Dragon Text Adventure Game”)
    6. print(“Collect 6 items to win the game, or be eaten by the dragon.”)
    7. print(“Move commands: go South, go North, go East, go West”)
    8. print(“Add to Inventory: get ‘item name’”)
    9. #In this solution, the players status would be shown in a separate function.
    10. #You may organize your functions differently.
    11. Next, begin developing a main function in your code. The main function will contain the overall gameplay functionality. Review the Project Two Sample Text Game Flowchart, located in the Supporting Materials section, to help you visualize how main() will work.
    12. For this step, simply add in a line of code to define your main function, and a line at the end of your code that will run main(). You will develop each of the pieces for main() in Steps #47.
    13. In main(), create a dictionary linking rooms to one another and linking items to their corresponding rooms. The game needs to store all of the possible moves per room and the item in each room in order to properly validate player commands (input). This will allow the player only to move between rooms that are linked or retrieve the correct item from a room. Use your storyboard and map from Project One to help you create your dictionary.
    14. Here is an example of a dictionary for a few of the rooms from the sample dragon text game.
    15. #A dictionary linking a room to other rooms
    16. #and linking one item for each room except the Start room (Great Hall) and the room containing the villain
    17. rooms = {
    18. ‘Great Hall’ : { ‘South’ : ‘Bedroom’, ‘North’: ‘Dungeon’, ‘East’ : ‘Kitchen’, ‘West’ : ‘Library’ },
    19. ‘Bedroom’ : { ‘North’ : ‘Great Hall’, ‘East’ : ‘Cellar’, ‘item’ : ‘Armor’ },
    20. ‘Cellar’ : { ‘West’ : ‘Bedroom’, ‘item’ : ‘Helmet’ },
    21. ‘Dining Room’ : { ‘South’ : ‘Kitchen’, ‘item’ : ‘Dragon’ } #villain
    22. }
    23. #The same pattern would be used for the remaining rooms on the map.
    24. The bulk of the main function should include a loop for the gameplay. In your gameplay loop, develop calls to the function(s) that show the players status and possible commands. You developed these in Step #2. When called, the function(s) should display the players current room and prompt the player for input (their next command). The player should enter a command to either move between rooms or to get an item, if one exists, from a room.
    25. Here is a sample status from the dragon text game:
    26. You are in the Dungeon
    27. Inventory: []
    28. You see a Sword
    29. ———————-
    30. Enter your move:
    31. As the player collects items and moves between rooms, the status function should update accordingly. Here is another example after a player has collected items from two different rooms:
    32. You are in the Gallery
    33. Inventory: [Sword, Shield]
    34. ————–
    35. Enter your move:
    36. Note: If you completed the Module Six milestone, you have already developed the basic structure of the gameplay loop, though you may not have included functions. Review any feedback from your instructor, copy your code into your TextBasedGame.py file, make any necessary adjustments, and finish developing the code for the gameplay loop.
    37. Within the gameplay loop, you should include decision branching to handle different commands and control the program flow. This should tell the game what to do for each of the possible commands (inputs) from the player. Use your pseudocode or flowcharts from Project One to help you write this code.
    • What should happen if the player enters a command to move between rooms?
    • What should happen if the player enters a valid command to get an item from the room?
    1. Be sure to also include input validation by developing code that tells the program what to do if the player enters an invalid command.
    2. Note: If you completed the Module Six milestone, you have already developed a portion of this code by handling move commands. Review any feedback from your instructor, copy your code into your TextBasedGame.py file, make any necessary adjustments, and finish developing the code.
    3. The gameplay loop should continue looping, allowing the player to move to different rooms and acquire items until the player has either won or lost the game. Remember that the player wins the game by retrieving all of the items before encountering the room with the villain. The player loses the game by moving to the room with the villain before collecting all of the items. Be sure to include output to the player for both possible scenarios: winning and losing the game.
    4. Hint: What is the number of items the player needs to collect? How could you use this number to signal to the game that the player has won?
    5. Here is a sample from the dragon text game of the output that will result if the player wins the game:
    6. Congratulations! You have collected all items and defeated the dragon!
    7. Thanks for playing the game. Hope you enjoyed it.
    8. If the player loses the game, they will see the following output:
    9. NOM NOM…GAME OVER!
    10. Thanks for playing the game. Hope you enjoyed it.
    11. Note: If you completed the Module Six milestone, the gameplay loop ended through the use of an exit room. You will need to remove the exit room condition and adjust the code so that the game ends when the player either wins or loses, as described above.
    12. As you develop, you should be sure to debug your code to minimize errors and enhance functionality. After you have developed all of your code, be sure to run the code and use the map you designed to navigate through the rooms, testing to make sure that the game is working correctly. Be sure to test different scenarios such as the following:
    • What happens if the player enters a valid direction? Does the game move them to the correct room?
    • When the player gets an item from a room, is the item added to their inventory?
    • What happens if the player enters an invalid direction or item command? Does the game provide the correct output?
    • What happens if the player wins the game? What happens if the player loses the game?

    What to Submit

    To complete this project, you must submit the following:

    TextBasedGame.py

    Develop and submit the TextBasedGame.py file using PyCharm. Include your full name in a comment at the top of the code. Be sure to submit the code that you have completed, even if you did not finish the full game.

    Supporting Materials

    The following resources may help support your work on the project:

    Video: (8:24)

    This video shows a sample dragon-themed text game. There is a brief description of the game, as well as a video that shows the game running and a player moving through different rooms and gathering items based on the commands. Review this video to help you understand how a text-based adventure game works. A video transcript is available:

    Reading:

    This flowchart outlines a sample design for the whole text-based game. The Get Item and Move Between Rooms processes are intentionally vague. You designed more detailed flowcharts or pseudocode for these processes as a part of your work on Project One. Use this flowchart as a guide when developing your code.

    Reading:

    This document shows the sample inputs and outputs for the dragon-themed text game. Review the sample inputs and outputs to better understand how a text-based adventure game works.

    Reading:

    This document walks you through a step-by-step process for downloading PyCharm to get started with your first PyCharm project. You will also need to download Python in order for PyCharm to run, which is detailed in its own section of this tutorial.

    Video: (12:21)

    This tutorial will orient you to the integrated development environment (IDE) PyCharm, where you will be writing and testing code for labs and projects. The tutorial will walk you through how to access and navigate PyCharm, how to run code, and how to write code. After watching the tutorial, practice logging in and creating files. If you have any questions, please reach out to your instructor. A video transcript is available:

    Attached Files (PDF/DOCX): IT 140 Project Two Sample Text Game Flowchart.pdf, IT 140 Project One.docx, IT 140 Sample Dragon Text Game Output.pdf, IT 140 Project Two Sample Text Game Flowchart.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Chapter 7 Assignment

    No AI or Plgarism

    -Must be 250+ words

    4 sources +

    Read attachment for instrcutions

  • Natural language processing

    Tensorflow text classification using embedded space