Archive for September 3rd, 2019

Module 3 Discussion

Part I

 

The information that you will need for the discussion can be found in Case 4k, p. 109; of Thinking Critically About Ethical Issues. For this case, identify the parties and the moral issue(s) at stake, keeping an eye out for similarities that it shares with the other cases. Concentrate on identifying the benefits and burdens that pertain to the parties affected in order to apply the principle of utility. 

 

Part II

 

In this week’s module we saw that because motives are not all that relevant according to Consequentialism, it wouldn’t matter who is doing the calculation of benefits and burdens in the assessment of utility. The calculation is purely objective. Indeed, to the utilitarian’s mind, the objectivity of the principle was intended to counterbalance the weight of archaic social customs and religious influences on social polices. Do you agree with the utilitarians that social and religious customs stand in the way of happiness? Briefly explain and defend your view.

 

We also saw this week that Mill’s justification for distinguishing higher and lower pleasures relies upon an empirical method of surveying those who have experienced a variety of pleasures, both high and low, and that Mill believed that those with the most varied experiences will agree that higher quality pleasures are well worth the effort (the pleasures of intellectual stimulation, friendship, and civic engagement, etc. were mentioned, as opposed to the satisfaction of only immediate physical pleasures). Mill thought that the weight of human experience allows us to predict that it is “better to be Socrates dissatisfied than a fool satisfied.” My question for you is, do you see any problems or shortcomings that might arise with Mill’s preferred method of justification? In this week’s module you were asked whether or not you wanted to step up in order to argue in defense of the fool? Provide your answer to that question here, along with your reasons for holding it.

create at least five rules for staff members who are adding web pages being added to your site

 

You Are The Web Master Of A College Website. You Share A Server With Other School Departments Such As Accounting And HR

create at least five rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. 

 
 
 

How has the term hacking changed meaning over the years?

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

 
 
 

Short Essay About Users Of The Priority Software

The Company we selected is APPLE.

 

The ERP package we choose for apple is Priority Software.

 

You need to write only one thing——the users for the apple’s ERP package——Priority Software.

 

The due date is Today, Sep 3rd, 11:00am.

 

You need to search resourses online and find out who use Priority Software.

 

Below is the prompt of the whole essay, but you only need to do the users part. I will bold and underline that part you need to do. In order to make you understand this essay better, I put up the whole promot, and you need to write at least 500 words:

 

Part1:As you do not have inside information on the company I will allow you some leeway in creating a realistic scenario for this company based on existing information available on internet, in annua financial reports(10K)

 

ii)Current Informational Technology environment, in cluding: IT platform used (Oracle, SAP, Microsoft, etc.)and some basic information on IT department (again I will allow some leeway as long asit is reasonable information).

 

iii)Your team will then identify an information system need for this Company and find an EXISTING real world IT application to propose to the Company for purchase and implementation. 

 

Part 2:Project Overview Document (100points –overview of point distribution on CANVAS)A strategic 

 

1)Introduction 

 

describe company and recommended system implementation (this should incorporate the summary document submitted in part I)

 

2)Business process flowsto be handled by system

 

3)System flowchart for transactions processed for one of systems in item #2

 

4)Data Overview

 

a.What types of data will be processed by the system?

 

l Manual input, electronic, etc.

 

b.What types of devices will be needed to process the respective types of data?

 

l Keyboards, scanners, RFID’s, etc.

 

5)Controls Requirements system controls that should be enforced:

 

a.Passwords, role based security for system enforced segregation of duties, module 

 

l based security, approval limits and configuration settings

 

b.Identify the risks these recommended controls will address.

 

6)Users

 

a.Describe departments and users within those departments that will have/need access to the system

 

l Accounting, Purchasing, Inventory, Payroll, Human Resources, Sales Department, etc

Identify security concerns and other nonfunctional requirements for this system.

You were talking to members of your favorite local band after a recent show. The topic of software came up, and the leader said she has a love-hate relationship with it. She loves the recording software they use, and is okay with QuickBooks for the band’s financial records. But, she does not like the available options to track bookings and create set lists that draw from their entire repertoire. 

 

In addition to their regular weekly gigs, the band performs for many school assemblies and community events. They have to pick music that’s appropriate for the audience and the theme without being repetitive. They are constantly adding new songs to their catalog, and putting others on hiatus.  The band likes to take requests, so they frequently update the set list after a gig. The band does not want to bother entering chords or lyrics because they don’t use computers or phones on stage.  

 

You offer to put together a system design to address the band’s needs. It’s okay to collect ideas by looking at off-the-shelf solutions, but the design must be your own for this assignment.  Include the following in your design: 

 

  1. A list and short explanation of each function to manage: 
  2.  the band’s song catalog, 
  3. bookings, 
  4. set lists, and 
  5. any other category you believe is important for this application. 
  6. A logical data design that supports all of these functions. Use either an entity-relationship or a UML class diagram, which should be in third normal form. Indicate all primary keys, relationships, and cardinalities. 
  7. Recommend a system architecture that identifies the hardware and software components and how they interact. Include a short (not more than 500 words) description and rationale. Illustrate using your choice of a static functional decomposition or object-oriented diagram. 
  8. Identify security concerns and other nonfunctional requirements for this system. 
  9. Propose at least three distinct and measurable criteria to evaluate the quality of the finished software.