Project 3: Training Guide

 Hide Assignment InformationInstructions

You’ve won the business! Faster Computing has agreed to the project. As the final stage of pre-implementation, you have been asked to produce a training guide that will demonstrate how to install Linux and provide an overview of several common commands, as follows:

(11.1.3: Install the software.) 

  • Use a hypervisor of your choice to install Linux. Many hypervisors are available, such as Oracle’s VirtualBox, which is a free download. In addition, as part of UMGC’s agreement with VMware, you can download VMware Workstation for free. See below for specific screenshot requirements. You should include at least 3 screenshots (e.g., disk partitioning, timezone selection, creating the default account). Each screenshot should be accompanied by a brief explanation of what you did.
    NOTE: It is not necessary to include screenshots of installing the hypervisor software.

(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)

  • Demonstrate command-line operations that will provide the following information:
    • A listing of files in a directory and common file attributes
    • The current directory (hint: also known as the present working directory)
    • Create a file, then copy it to a different directory
    • Create a second file and move it to a different directory
    • Remove the first file, as well as the copy you created
    • The manual page for a given command
    • Create a text file, then use an editor to modify the content. Then display the content of the modified file

(1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.)

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., ls, cp, mv, rm) in your documentation as well as in your screenshots. 

(11.2.1: Configure technology according to stakeholder specifications and requirements.)

  • Show running processes on the system. Demonstrate how to search for a specific process
  • Forcibly stop a running process

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., top, kill, -9, ps) in your documentation as well as in your screenshots. 

(13.1.1: Create documentation appropriate to the stakeholder.)

The deliverable for the final phase of the project is a written paper with screenshots. There is no minimum or maximum page requirement, but all of the requirements must be met.  Use the Training Guide Template to record your work. This section will be graded upon the overall usefulness of the training guide to the organization.

(11.3.1: Add and update systems as required.) 

This portion of the training guide helps determine your submission is unique.

Important Requirement

On the final screenshot, you need to open a command line and type in the following commands (without the quotes):

“date”

“echo CMIT391”

“echo <your name here>” (Replace your name here with your name)

The recommended format is to provide screenshots incorporated within the written narrative. The screenshots must all be your own. Screenshots from external sources are not permitted. You must include the specific screenshot listed above or your project will not be accepted.

(1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.)

The training guide must have a cover page, an introduction, summary, and at least 3-5 references.

(1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.)

Employ proper spelling and grammar. All Linux commands must be lower case.

(2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.)

In your conclusion of at least a paragraph, summarize why using Linux is beneficial for employees, management, and the organization as a whole.

How Will My Work Be Evaluated?

In this training guide, you will demonstrate how to install Linux and provide an overview of common commands for your client/customer. You’ll be combining your technical skills with effective communication techniques to provide learning resources for the client/customer.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension. 
  • 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal. 
  • 1.2.3: Explain specialized terms or concepts to facilitate audience comprehension. 
  • 1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience. 
  • 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions. 
  • 11.1.3: Install the software. 
  • 11.2.1: Configure technology according to stakeholder specifications and requirements. 
  • 11.3.1: Add and update systems as required. 
  • 13.1.1: Create documentation appropriate to the stakeholder. 

Due DateAug 3, 2021 11:59 PM 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

security requirements

 What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

c program, shell build in command

Shell built-in commands, unlike legacy executables such as /bin/ls or /usr/bin/vim, are internal features of a shell that the user may invoke. For example, alias (to create a shortcut such as ‘l’ for ‘ls’), cd, history are among common built-in commands supported by most shells. When a user enters a command, a shell must first check if it is a built-in command in which case forking a child to load and run a legacy executable is not required. If the entered command is not built-in, then a shell assumes that it is a binary executable that needs to found and executed by a worker process. Extending built-in commands into a programming language, called shell scripts, is a popular way to manage and automate tasks on UNIX based operating systems such as Linux and MacOS.

Use the code of main4.c as a starting point to extend its capability to support the following built-in commands:

$ cprompt <x>

where <x> is 0, 1, 2 or 3. The notation <x> means that x is a variable. When <x> is 0, the default prompt ‘$’ is output. If <x> is 1, the prompt is changed to ‘>’. <x> equals to 2 changes the prompt to the PID of the process. Implement your own prompt for the case where <x> equals 3. Annotate your code to describe what option 3 outputs.

$ mem <s>

where <s> is a string that is stored in a memo note. Implement the memo note as a 1-D array of maximum size 10, char *memnote[10], where each element is a pointer to a string. Use malloc() to allocate just enough memory to store the string <s>. When memnote[] is full, cycle to the beginning and overwrite memnote[0] with the new string. Hence memnote[] is a circular array that overwrites the oldest element if space is full. Keep track of the newest and oldest memo note so that when the user enters the command ‘mem’ without a string <s> then the memo note strings are output by recency, with the newest first and the oldest last, by the order the user has added them to the memnote string array.

$ d <sec> <binexec>

The command d asks that the shell delay running the legacy executable <binexec> by <sec> seconds. Perform this task by calling library function sleep() with <sec> as argument. Look up section 3 of the man pages (run % man 3 sleep) to check how to use sleep() including any header files. First fork a child process who checks if a delay is needed by inspecting a variable, int delayflag, set by the parent. If 1, sleep() is called with argument <sec> followed by execlp() of <binexec>. Otherwise, execlp() is called without delay. In the case delayed execution is requested by the user, the parent does not call waitpid() to wait until the child terminates. Instead, it returns to the beginning of the while loop to print a fresh prompt since the delay could be substantial.

$ x

The command x without arguments means to terminate the shell. The shell prints a suitable message to stdout, then calls exit(0) to terminate.

Although main4.c serves as the main skeleton code, implement the built-in features supported by the shell, call it mysh, in a modular fashion making calls to functions that are put in their own file in a folder v12. Create a README text file that describes what each file in a folder v12 contains and its role. Use a Makefile to compile your code. 20 points out of 150 will be assigned for modularity, clarity, and style. Although not necessary, you may use string processing library functions. The library function atoi() which converts a number represented as a string (e.g., “3075”) into an integer (3075) may be useful. Look up its man page if you decide to use it. Test and verify that mysh works correctly. the code should run under Mac terminal. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Excel Guided Project 6-3

 

The Wear-Ever Shoes company maintains inventory data and customer survey results in your workbook. You use Lookup & Reference, Database, and Logical functions to complete the data. You also use a Financial function to calculate depreciation and a Text function to enter email addresses.

[Student Learning Outcomes 6.1, 6.2, 6.3, 6.5, 6.6, 6.7]

File Needed: WearEverShoes-06.xlsx (Available from the Start File link.)

Completed Project File Name: [your name]-WearEverShoes-06.xlsx

Skills Covered in This Project

  • Nest INDEX and MATCH functions.
  • Use SUMIFS from the Math & Trig category.
  • Use DAVERAGE.
  • Create an IFS formula.
  • Use a Text function to concatenate text strings.
  • Calculate depreciation with the DB function.
  1. Open the WearEverShoes-06 start file. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  2. Click the Inventory sheet tab.
  3. Select cells A3:I39, click the Name box, type Inventory as the range name, and press Enter.
  4. Select cell L5 and type WE006.
  5. Create a nested function with INDEX and MATCH to display inventory for a product.
    1. Select cell L6.
    2. Click the Lookup & Reference button [Formulas tab, Function Library group] and choose INDEX. Select the first argument list array, row_num, column_num and click OK.
    3. For the Array argument, press F3 (FN+F3) and select Inventory.
    4. Click the Row_num box and click the Name box arrow. Choose MATCH in the list or choose More Functions to find and select MATCH. The INDEX function uses this MATCH statement to find the row.
    5. Click cell L5 for the Lookup_value argument.
    6. Click the Lookup_array box and select cells A3:A39. This MATCH function finds the row that matches cell L5 in column A.
    7. Click the Match_type argument and type 0.
    8. Click INDEX in the Formula bar. (Click OK if the argument list opens.)
    9. Click the Column_num argument, click the Name box arrow, and choose MATCH (Figure 6-92).Both the row_num and col_num arguments are MATCH functions.Figure 6-92 MATCH is nested twice
    10. Type quantity in the Lookup_value box.
    11. Click the Lookup_array box and select cells A3:I3. This MATCH function finds the cell in the “Quantity” column after the row is located by the first MATCH function.
    12. Click the Match_type box and type 0. The formula is =INDEX(Inventory,MATCH(L5,A3:A39,0),MATCH(“quantity”,A3:I3,0)).
    13. Click OK. The result is 2.
    14. Click cell L5, type WE015, and press Enter. The quantity is updated.
  6. Use SUMIFS to calculate total pairs in stock by specific criteria.
    1. Select cell M13.
    2. Click the Math & Trig button [Formulas tab, Function Library group] and choose SUMIFS.
    3. Select cells E4:E39 for the Sum_range argument and press F4 (FN+F4) to make the references absolute.
    4. Click the Criteria_range1 box, select cells C4:C39, the “Color” field, and press F4 (FN+F4).
    5. Click the Criteria1 box and select cell K13. Leave this as a relative reference.
    6. Click the Criteria_range2 box, select cells D4:D39, and make the references absolute.
    7. Click the Criteria2 box and select cell L13. The criteria specifies the number of black pairs, size 8 (Figure 6-93).The sum and criteria ranges must have the same dimension.Figure 6-93 SUMIFS to calculate number by color and size
    8. Click OK. The result is 7.
    9. Copy the formula in cell M13 to cells M14:M21.
  7. Click the Satisfaction Survey worksheet tab and review the data.
  8. Select cells A4:H40 and name the range as Survey. Note that the “Comfort” field is the fifth column and that the other attributes follow in the sixth, seventh, and eighth columns.
  9. Use DAVERAGE to summarize customer survey data.
    1. Click the Criteria sheet tab.
    2. Select cell B2 and type rug*, criteria for the Rugged Hiking Boots.
    3. Click the Average Ratings worksheet tab and select cell C5.
    4. Click the Insert Function button [Formulas tab, Function Library group].
    5. Choose Database in the Or select a category list.
    6. Select DAVERAGE and click OK to calculate an average comfort rating for the boots.
    7. Press F3 (FN+F3), choose Survey for the Database argument, and click OK.
    8. Click the Field box and select cell C4.
    9. Click the Criteria box, select the Criteria sheet tab, select cells B1:B2, and make the references absolute (Figure 6-94).DAVERAGE ignores values that do not match the criteria.Figure 6-94 DAVERAGE for comfort rating
    10. Click OK. The result is 7.75.
    11. Copy the formula in cell C5 to cells D5:F5.
  10. Use DAVERAGE to summarize survey data.
    1. Select the Criteria sheet tab and select cell B5. Type the criteria as shown here for the shoe styles.The table lists the criteria to be entered on the Criteria sheet.CellCriteriaB5com*B8laz*B11ser*B14gli*
    2. Click the Average Ratings sheet tab and select cell C6.
    3. Click the Recently Used button [Formulas tab, Function Library group] and select DAVERAGE.
    4. Press F3 (FN+F3) and choose Survey for the Database argument.
    5. Click the Field argument box and select cell C4.
    6. Click the Criteria box, select cells B4:B5 on the Criteria sheet, and press F4 (FN+F4).
    7. Click OK. The result is 7.5.
    8. Copy the formula in cell C6 to cells D6:F6.
  11. Build DAVERAGE functions for the remaining shoe styles on the Average Ratings sheet.
  12. Select cells G5:G9 on the Average Ratings sheet, click the AutoSum arrow [Home tab, Editing group], and choose Average.
  13. Create an IFS function.Note: If your version of Excel does not include the IFS function, build the following nested IF function =IF(G5>=9,$J$5,IF(G5>=8,$J$6,IF(G5>=5,$J$7,$J$8))) to show the ratings.
    1. Select cell H5, click the Logical button [Formulas tab, Function Library group], and choose IFS.
    2. Click the Logical_test1 argument, select cell G5, and type >=9.
    3. Click the Value_if_true1 box, click cell J5, and press F4 (FN+F4) to make the reference absolute.
    4. Click the Logical_test2 box, click cell G5, and type >=8.
    5. Click the Value_if_true2 box, click cell J6, and press F4 (FN+F4).
    6. Click the Logical_test3 box, click cell G5, and type >=5.
    7. Click the down scroll arrow to reveal the Value_if_true3 box, click cell J7, and press F4 (FN+F4).
    8. Click the down scroll arrow to reveal the Logical_test4 box, click cell G5, and type <5.
    9. Click the down scroll arrow to reveal the Value_if_true4 box, click cell J8, and press F4 (FN+F4) (Figure 6-95). The complete formula is:=IFS(G5>=9,$J$5,G5>=8,$J$6,G5>=5,$J$7,G5<5,$J$8)The Logical_test1 argument is scrolled out of viewFigure 6-95 IFS function with multiple logical tests
    10. Click OK and copy the formula to cells H6:H9.
    11. Format column H to be 13.57 (100 pixels) wide.
  14. Calculate depreciation for an asset using a Financial function.
    1. Click the Depreciation sheet tab and select cell C11. Depreciation is the decrease in the value of an asset as it ages. The DB function calculates the loss in value over a specified period of time at a fixed rate.
    2. Click the Financial button [Formulas tab, Function Library group] and choose DB.
    3. Select cell C6 for the Cost argument, and press F4 (FN+F4) to make the reference absolute. This is the initial cost of the equipment.
    4. Click the Salvage box, select cell C7, and press F4 (FN+F4). This is the expected value of the equipment at the end of its life.
    5. Click the Life box, select cell C8, and press F4 (FN+F4). This is how long the equipment is expected to last.
    6. Click the Period box and select cell B11. The first formula calculates depreciation for the first year (Figure 6-96).DB stands for declining balance depreciation.Figure 6-96 DB function to calculate asset depreciation
    7. Click OK. The first year depreciation is $39,900.00.
    8. Copy the formula in cell C11 to cells C12:C18. Each year’s depreciation is less than the previous year’s.
    9. Select cell C19 and use AutoSum. The total depreciation plus the salvage value is approximately equal to the original cost. It is not exact due to rounding.
  15. Use CONCAT to build an email address. (If your version of Excel does not include CONCAT, use CONCATENATE.)
    1. Right-click any worksheet tab, choose Unhide, select E-Mail, and click OK.
    2. Select cell C5, type =con, and press Tab. The text1 argument is first.
    3. Select cell A5 and type a comma (,) to move to the text2 argument.
    4. Select cell B5 and type a comma (,) to move to the text3 argument.
    5. Type “@weshoes.org” including the quotation marks (Figure 6-97).CONCAT was CONCATENATE in earlier versions of Excel.Figure 6-97 CONCAT references and typed data
    6. Type the closing parenthesis ()) and press Enter.
    7. Copy the formula in cell C5 to cells C6:C8.
  16. Save and close the workbook (Figure 6-98).Completed worksheets for Excel 6-3

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Activity 7- Executing the project

  1. Simulation Experiental Exercise – SEE- 2
    Purpose
    To estimate the cost vs time expenditures. {Project Team}
    Instructions
    Build a graph of the budgeted cost of work scheduled (BCWS) vs the project periods. Discuss any obvious issues with the project as it is planned.
    Deliverable
    BCWS vs. time chart and short discussion of issues.  BCWS = Budgeted Cost of Work Scheduled
    BCWS is also = Planned Value (PV)

    • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
    • Include your best critical thinking and analysis to arrive at your justification.
    • Approach the assignment from the perspective of a project management of a company.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

End week- Project HR & Stakeholder Mngt

Case: Uber and Stakeholder: Managing a New Way of Riding Subject Area: Change Agents & Stakeholders, Resistance, New Product Challenges

  • An APA formatted, which should include a cover page, five pages of content, and a references page, should be written to answer the following questions regarding the case:
    • Assess Uber’s position in mid-2015. What challenges does it face? Would it have been able to achieve its staggering success without raising such controversy?
    • Do upset stakeholders threaten future growth? What options does Uber have to overcome resistance from different groups?
    • Advise Travis Kalanick and Uber about Uber’s direction for the future?
    • Can a “sharing economy” company insulate itself from critics (and liability for various issues) by claiming its just a marketplace, or just the Tech?
    • What lessons did you learn from this case study from a leadership and overall organizational perspective?

Case Link:https://hbsp.harvard.edu/import/853991

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

3 Discussions 250 -300 words

1)

Big Companies Are Embracing Analytics, But Most Still Don’t Have A Data-Driven CultureFor six consecutive years NewVantage Partners has conducted an annual survey on how executives in large corporations view data. This year, results show nearly every firm is investing in some form of analytics, and most are seeing value. But only one-third say they have succeeded in creating a data-driven culture. And many fear disruption by firms better equipped to use AI. Almost four in five respondents said they feared disruption or displacement from firms like those in the fintech sector or firms specializing in big data. The technology judged most disruptive is AI — by far. Seventy-two percent chose it as the disruptive technology with the most impact — far more than cloud computing (13%) or blockchain (7%).Discussion Questions1. How do executives in large corporations view data?
2. What has made big data and AI projects virtually indistinguishable?
3. Why does it take large established firms so long to shift to a data-driven culture?
Corea, F. (2017, March 6). Big data strategy: Is your company data driven. Retrieved from Medium: https://francesco-ai.medium.com/big-data-strategy-part-iii-is-your-company-data-driven-acf871c38001Discussion Topics requirements

  • This Post and Replies be minimum  250 words minimum per Post/Reply.
  • Post your initial responses by Wednesday night  of the module week so that your classmates have a good chance to read and reply before the end of the week.
  • Respond to at least two of your peers by Sunday night. Peer responses should be approximately 250 words.
  • Provide cogent responses by either supporting or debating your fellow students’ posts, and explain your viewpoint(s) clearly.
  • References must be cited and in current APA format.
  • Minimum of 2 references to support your views
  • Refer to Discussion board Rubric for additional requirements discussionrubric22.pdf

2)

The digital transformation of the workplace is an ongoing process for firms that are striving to stay relevant within today’s business environment. Moving towards a digital profile is to some extent inevitable, as information technology (IT) pervades all types of branches and sectors. The Internet of things (IoT) is a catch-all name for the growing number of electronics that aren’t traditional computing devices, but are connected to the Internet to send data, receive instructions or both (Fruhlinger, 2020). IoT encompass many different industries, healthcare, manufacturing, transportation, construction, and consumer electronics. IoT devices include wireless sensors, software, actuators, and can be embedded in to industrial equipment,
environmental sensors, medical apparatus, and mobile phones (ARM, 2020). According to Statista, there were 22 Billion IoT devices in use in 2018 and that number is expected to increase to 50 billion in 2050 (Statista, 2020).Discussion Questions

  1. What role has information technology and the IoT played in helping organizations benefit their business?
  2. What are some of the IoT challenges?

Discussion Topics requirements

  • Post and Replies should be minimum  250 words minimum for each.
  • Post your initial responses Wednesdays by midnight of the module week so that your classmates have a good chance to read and reply before the end of the week.
  • Respond to at least two of your peers by  Sunday night. Peer responses should be approximately 250 words.
  • Provide cogent responses by either supporting or debating your fellow students’ posts, and explain your viewpoint(s) clearly.
  • References must be cited and in current APA format. Minimum of 2 references to support your views
  • Refer to Discussion board Rubric for additional requirements discussionrubric22.pdf Click for more options Click for more options

3)

While some disruptions are nearly impossible to prepare for and even more difficult to recover from, others can be addressed with a thorough disaster recovery plan. In almost all cases, disruptions of your IT infrastructure fall in the second category and can be fixed. The goal of a disaster recovery plan is to provide organizations with the means to address unplanned incidents as quickly as possible to minimize their operational, financial, and reputational impact. 
Discussion Questions1. If you were developing a business continuity plan for your company, where would you start?2. What aspects of the business would the plan address? Provide reasons for your answer. Discussion Topics requirements

  • Post/.Replies are 250 words minimum for each.
  • Post your initial responses no later thanWednesdays of the module week so that your classmates have a good chance to read and reply before the end of the week.
  • Respond to at least two of your peers by  Sunday night. 
  • References must be cited and in current APA format. Minimum of 2 references to support your views
  • Refer to Discussion board Rubric for additional requirements discussionrubric22.pdf 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Gradute Research course

week 3 Discussion

week 3 Assignment 

week 4 discussion

Final Submission 

Writing Style and APA

Writing Style and APA
• Includes paragraph transitions
• Appropriate tone.
• Range in sentence structure.
• Correct use of punctuation, grammar, and capitalization.
• Follows APA Guidelines

Maximum score

25

Critical Thinking and Independent Thought

• Understands central concepts.
• Thoughtfully evaluates major alternative perspectives.
• Appropriate synthesis of literature.
• Addresses all prompts in a thorough manner.

Maximum score

25

Evidence-Based Theory and Practice; Relevance to Passion

• Application to professional practice is evident.
• Uses sufficient peer-reviewed/scholarly resources.
• Analyzes implications for the institution, the larger context, and personal professional growth.
• Demonstrates best practices in profession.
• Demonstrates value for organizational success.

Maximum score

25

Synthesis and Application

• Creates new ideas based upon previous knowledge and experiences.
• Relates knowledge to draw insightful conclusions.
• Transitions ideas into real-life application.

Maximum score

25

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

UML Modelling and Programming with EMF (Eclipse Modelling Framework)

  

In this homework you will develop software models for a system designed to support a business. You will choose the business and the main functionality of the system as part of Task 1 below. This choice is important as the models you will develop in the remaining tasks must match with your choice. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cloud Computing, SaaS, and Business Systems Roles

1. Describe cloud computing as well as its benefits and disadvantages. Explain three cloud-based solutions for individuals and three cloud-based solutions for businesses. 

The answer must be 300-350 words. A minimum of two scholarly journal articles are required. Apply APA 7th edition style (including headings, in-text citations, and references).

Textbook for reference Q1 and Q2

Title: Cloud Computing 

ISBN: 9781284248203 

Authors: Dr. Kris Jamsa 

Publisher: Jones & Bartlett Learning 

Publication Date: July 14, 2022

2. Software as a service (SaaS) as a solution model that allows users to use a web browser to access software in the cloud. Prepare a research paper that defines and discusses software as a service. Explain the advantages and disadvantages of the software as a service. 

Companies leverage SaaS solutions to eliminate the need to house and administer an equivalent on-premise solution. Salesforce.com was one of the companies to leverage the power of the cloud. Discuss the features Salesforce.com provides that are well suited for companies large and small and why the Salesforce solution was well suited for the cloud. 

The paper should be approximately 5 pages long, not including the title and reference pages. Apply APA 7th edition style and include three major sections: the Title Page, Main Body, and References.

3. Research a scholarly paper or professional video on “Business Systems Roles” and reflect on the following: 

What is the difference between a Systems analyst, a Business Analyst, a Data Analyst, and super-users, and what other ‘people’ roles deal with business systems?

This paper must be between 250-300 words. You must provide at least 2 APA references for your resource and corresponding in-text citations. Also, provide the referenced resource URL/DOI in the APA reference.

Textbook for reference

Title: Systems Analysis and Design, Global Edition 

ISBN: ISBN: 13: 978-0-13-478555-4 

Authors: Kenneth E. Kendall, Julie E Kendall 

Publication Date: 2019-11-25 

Edition: 10th ED

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now