Categories
Information Systems

A)  1. what do each of these terms refer to: copyright, patent, trademark, trade

A) 1. what do each of these terms refer to: copyright patent trademark trade secret? 2. Why is intellectual property entitled to legal protection? 3. Why did copyright laws become stricter and more punishing in the late 20th century? 4. What is the Fair Use doctrine? 5. Make an argument for legalizing the copying of music or software. 6. Do I or dont I own the books on my Kindle? If I own them why cant I transfer them? If I dont own them what is my legal right to them? 7. What was the 1984 Sony Supreme Court case about? 8. Was Napster responsible for the actions of its users? 9. Why did the court find in favor of Diamond in the Rio case? 10. What is Digital Rights Management? B) Watch the Movie War Games from 1983. According to the New York Times this movie had a tremendous effect on President Ronald Reagan.Discuss in 500 words your opinion on whether it should be required viewing in social studies classes in high school. Do not repeat the story. Discuss its use C) Do a bit of research on JSON and AJAX. How do they relate to the the Same-Origin policy? Using WORD write several short paragraphs on each. A total of -300 words. D) Use the Web to search for methods to prevent XSS attacks. Write a brief description of more than one method. Use your own words and supply references.

Categories
Information Systems

A)  You are the web master of a college website. You share a server with other s

A) You are the web masterof a college website. You share a server with other school departments such as accounting and HR. Based on this chapter create at least five security-relatedrules for staff members who are addingweb pages being added to your site. Include ajustification and explanation for eachrule. Rules should relate to college staff and student and system information security. B) Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer. 1. With all the stories about millions and millions of bytes of personal data having been exposed why is their still any faith at all in the Internet? 2. How has the term hacking changed meaning over the years? 3. What is the most dangerous hacker tool? 4. From the news: Howwere NSAshacker tools compromised? 5. What was the vulnerability in the Target Breach? 6. What do you think of hactivism? 7. How did Stuxnetwork? 8. What was the Arpanet? 9. Deep brain stimulation is a treatment for Parkinsons disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)? 10. What is the Red Team

Categories
Information Systems

A Usability Evaluation examines the way users interact with products and service

A Usability Evaluation examines the way users interact with products and services in order to achieve a goal. Often times there are measures that are tied to those goals that are quantified. Academic literature has a robust catalog of research on studies that examine various perspectives that explore user attitudes and experiences. Such attitudes and experiences include: Learnability Findability Satisfaction Efficiency Memorability Effectiveness Ease of Use Error Handling Remember usability is not one-dimensional. It is a complex system of properties that integrates many factors. It is subjective from user to user. For this assignment you are asked to explore one of these topics. You are to conduct an analytical research review of the assigned usability category/dimension above by evaluating 6-10 academic journals that focus on this topic. You MUST include the following as part of the assignment. Abstract Title Page Introduction Literature Review of Term Conclusion Considerations: Must provide a minimum of six sources and how it was evaluated by the authors/scholars in each study Must evaluate the study method used to complete the analysis. Identify any unique similarities or differences across each study. Define your own term based on your understanding of the literatureyouveevaluated. Explain how you derive this definition. Qualify/quantify the definition by explaining how many sources you used to come up with this definition. Make Recommendations of Additional Ideas For Future Literature Review Consideration The paper should be a minimum of 6 pages. This does not include the cover page abstract or citations. You must use APA format throughout the entire paper.

Categories
Information Systems

A wireframe is a visual guide to the layout of a site, focusing only on structur

A wireframe is a visual guide to the layout of a site focusing only on structure not on the sites look and feel. For example the above image is a wireframe for a website found online. Notice that it does not include the images and the font choice is deliberately random to indicate that its just placeholder text.Thats so that viewers will understand that theyre supposed to focus on the framework of the site ” where the different components of the site are located relative to each other ” rather than the details of the various elements.Your set of wire frames should include mock ups for your intended Home page Item page Visualizationheavy page Text-Based Details page and Generic About page. To draw your wireframes you can use Axure Photoshop Visio PowerPoint etc. Make sure though it is converted into a PDF for readability when being submitted.

Categories
Information Systems

a)  What is the aim of a business (large or small) when implementing an Informat

a) What is the aim of a business (large or small) when implementing an Information System? b) How has this rational evolved in the last 50 years? How are decision made by the CIO different from the ones made back then? c) What are the functions of an information system? d) List the components of an information system infrastructure. e) Explain what the difference between a binary and a decimal system is and why information system hardware only can process binary strings at their core. f) Explain in your own words the difference between human readable information and machine code. Is there any way to translate one into the other and vice versa? g) Define DATA INFORMATION KNOWLEDGE & WISDOM in your own words. h) Provide 5 real life examples on how implementing automated data handling improves business performance and profits. Can you list some business processes which were not possible to perform before the information age?

Categories
Information Systems

A projects Work Breakdown Structure (WBS) and Gantt chart provide structure for

A projects Work Breakdown Structure (WBS) and Gantt chart provide structure for a project. In this week you develop both the WBS and Gantt chart for a fictitious organization. The Manage Your Health Inc (MYH) scenario will be used in the weekly assignments for the rest of the course. Review the Manage Your Health Scenario and follow the directions below for completing a WBS and Gantt chart. Develop a work breakdown structure (WBS) for the project. Break down the work to Level 3 or Level 4 (do this for more than just one task) as appropriate. Upload the WBS in list form. The WBS should be based on the information that would be in the project scope of this scenario. You can review your project plan from Week 1. Create a Gantt chart using the WBS you developed with Microsoft Excel or another software of your choice (Excel or MS Project Excel is the easiest as most know how to use it). Do not enter any duration or dependencies. Submit 2 deliverables: the WBS and Gantt Chart. (this is important! No do-overs this week!) Resources Reference and Citation Generator

Categories
Information Systems

A simulated disaster and comprehensive recovery test may involve many of an orga

A simulated disaster and comprehensive recovery test may involve many of an organizations key personnel for several days: Is this a reasonable burden to place on a busy competitive company? How would you argue against the inevitable tendency to shortcut the procedure? A substantive post will do at least two of the following: Ask an interesting thoughtful question pertaining to the topic Provide extensive additional information on the topic Explain define or analyze the topic in detail Share an applicable personal experience Provide an outside source (that applies to the topic along with additional information about the topic or the source (please cite properly in APA 7) Make an argument concerning the topic At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources. Use proper citations and references in your post.

Categories
Information Systems

Business Continuity & Disaster Recovery Planning Discussion 6

A simulated disaster and comprehensive recovery test may involve many of an organizations key personnel for several days: is this a reasonable burden to place on a busy competitive company? How would you argue against the inevitable tendency to shortcut the procedure? Posting to be between -to-300 words. APA Format

Categories
Information Systems

A positive attitude helps you cope more easily with daily life and helps you avo

A positive attitude helps you cope more easily with daily life and helps you avoid worry. A positive attitude makes you happier and more successful. With a positive attitude you see the bright side of life and expect the best. If your attitude is positive enough it becomes contagious. How will you make sure to bring a positive attitude to the office every day? How will having a positive attitude at work help you professionally? Reply with 150 words and reference in APA 7th edition

Categories
Information Systems

A prestigious university has recently implemented a consolidation strategy that

A prestigious university has recently implemented a consolidation strategy that will require it to centralize their student records. In order to move forward the local university will need to develop a data model that will retain student records and perform various data extract transform and load (ETL) processes. Imagine that you have been hired as a database consultant to assist in the development of a data design strategy for the student records. You met with various university subject matter experts and have determined the following after performing various business analysis processes: Faculty groups are divided by core competencies that the university offers. For example there are groups such as the Art Faculty Computer Technology Faculty Language Faculty and Science Faculty. Each faculty member has an assigned Dean and is designated to teach at one particular campus and school. They are able to teach as many courses as required. Courses are categorized by course code and title. Certain courses have prerequisites and the university has asked for this to be cataloged as well. There are various schools within each campus. For example the Los Angeles campus holds the following schools: School of Science School of Law and School of Computer Technology. Additionally each school offers different professional study programs such as Forensic Computer Science Marine Biology Business Management and Civil Engineering to name a few. The study path for students requires that they be enrolled in a specific professional study program. The professional study program requires the students to complete a specific set of core courses. The university also requires that an online grade book be available. The online grade book should show grades awarded to students for specific courses and the term they completed the course. The university identifies each student by their name date of birth social and professional study program. Instructions Using these findings write a 3“4 page paper in which you: Analyze the universitys requirements and provide a proposal to organize all the required data elements. The proposal should include the following: Provide an entity relationship model (ERM) that will describe the data structure that will store all data elements. Note: The graphically depicted solution is not included in the required page length. Describe any assumptions or limitations for each relationship. For example professors are able to teach more than one course or students can only be enrolled in one program. Create the primary key and foreign keys using a UML class diagram for each table. Suggest at least four types of business intelligence reports that could help the university in course management student enrollment or historical tracking. Support your answer by providing specific business functions that these reports could be used for to assist executives of the university. Consider outsourcing the functions above as an alternative for development of the database. Research the Internet and other media sources for vendors who develop registrar and school management database systems. Suggest three vendors that developed and are employing efficient registrar and school management database systems and support your reasons to choose from one of these three vendors. Compare and contrast the key aspects that each system offers. Examples of system aspects include but are not limited to cloud based pricing model open source et cetera. Go to the Strayer Library to locate at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. Note:The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in any chart or drawing tool with which you are familiar. The completed diagrams or charts must be imported into the Word document before the paper is submitted. This course requires the use of Strayer Writing Standards. For assistance and information please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. The specific course learning outcome associated with this assignment is: Propose a database design.