Mobile Devices – Information Governance

 Chapter 14 – From the week’s chapter reading, we learn from the authors that, the use of mobile devices in our society today has indeed become ubiquitous.  In addition, CTIA asserted that over 326 million mobile devices were in use within The United States as of December 2012 – an estimated growth of more than 100 percent penetration rate with users carrying more than one device with notable continues growth.  From this research, it’s evident that mobile computing has vastly accelerated in popularity over the last decade due to several factors noted by the authors in our chapter reading. 

Q1: In consideration with this revelation, identify and name these factors, and provide a brief discussion about them?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Application implimentation

 

includes the following:

  • Business Case Investigation
  • Identify 4 employees to interview to support business analysis. For each employee, state the topic(s) used for questioning. The interview topics and responses will be used to influence future design.
  • A possible use case diagram for making an appointment and verifying parts availability
  • Identify the users of the system and requests into and out of the system.
  • Implementation resources needed for the project
  • Identify people and hardware. Human resources may include internal or external resources.

I am delighted to announce that Emily Johns will be starting at Appliance Warehouse today! Emily will be undertaking the role of Service Manager and will be the force behind creating our new service department.

Emily comes to us with 25 years of experience in the service repair industry. Emily began her career as a service technician and quickly moved through the ranks to the first female service manager in ABC Appliance Service Company’s history. After 17 years, she went to work for Acme Appliance Repair. Over the last 8 years, the revenue for Acme increased by 200% after being stagnant for the preceding 5 years

Our new service manager starts work today! This is great news! As our business starts to expand, we must move our software project along.

need to talk to some of our employees to better understand the functionality and requirements for the proposed system. This is important because they are the key stakeholders of the system.  list of employees who will want to interview.  learn the process for scheduling an appliance repair appointment and how the parts are obtained for those repair visits. Also, it is important to understand what reports that managers are hoping to extract from the new system. I find it is helpful to write down questions prior to your meetings as to not forget the topics that you want to cover.

My suggestion is at least 10 questions per person prior to the meeting. Make sure to use open-ended questions (at least 7 questions) to get the employees talking. Also use closed response and range of response questions. I find that each type of question can provide valuable information and are quite useful in requirements gathering.

Please send the questions to me for at least two of the interviews.

We have previously used both the Joint Application Development technique and the Rapid Application Development technique. However, many colleagues of mine swear by the agile technique. Each of these methodologies offer up some great advantages. Since we need to get this project done as quickly as possible, which of these techniques should be used? I want to ensure that we’ve created software that will handle all of our users’ requirements and that it is a robust system

I almost forgot to mention to also send a questionnaire out to the users of the proposed system.Should it be sent out to all employees or as a stratified or systematic sample?

18 hours ago

department in order to get the service estimates out to the customer and get the parts for the repair quickly. Meredith Parks (programmer): I think it would be a good idea to name our new service system. Any ideas? Alan Marks (store mgr): Service Information System? SIS? Emily Johns (service manager): Service Information Manager? SIM? Meredith Parks (programmer): OK, let’s vote. Meredith conducts a quick vote and all are agreed on SIM. Maddox Farley (parts director): I’m a little worried about how this SIM will affect my inventory levels. Meredith Parks (programmer): I need you to break this down a bit for me. Who is involved in this new process? Emily Johns (service manager): We definitely have the customers, parts department, parts, technicians, appointment setters, and calendar. Meredith Parks (programmer): OK, now we have our entities. What are the processes that will take place? Alan Marks (store mgr): Well, we will need to generate estimates and final invoices. Emily Johns (service manager): Right. And we’ll make appointments, order parts, assign technicians to appointments. Meredith Parks (programmer): Anything else? Emily Johns (service manager): A calendar should be able to be viewed or printed for each technician. Each technician needs their daily schedule of appointments at the beginning of each day. Alan Marks (store mgr): I don’t think so. Payment will be accepted by the current cashier’s system. Meredith Parks (programmer): OK.

18 hours ago

Questionnaire results Results are ordered by importance. The top result (#1) is the most important to that group. Most common features requested by appointment setters: Reminder services calls/messages See technician’s availability Determination of discounts for customers See availability of parts to schedule repair View service history Most common features requested by technicians: Able to view own calendar See availability of parts to schedule repair Keep notes for each customer Mobile access of scheduling View service history Reminder services calls/messages Most common features requested by parts department: Can pull inventory requests every two hours. Database of requested parts. Most common features requested by management: Reporting by time period, type of appliance, brand Determination of discounts for customers Mobile access of scheduling Routing and mapping of technician’s driving to appointments See technician’s availability Suggest preventative maintenance to customers

The Appliance Warehouse is a facility that collects products and goods for the distribution to customers or other industries that may be able to use the products that are provided. The warehouse manager will be responsible for ensuring that all warehouse operations are done both effectively and efficiently by all staff involved with the said warehouse.

The case study concluded that millions of dollars are invested yearly purchase of materials and equipment needed for maintenance and development. The subsequent materials and equipment are then dispersed to three central warehouses and then shipped out to other warehouses and location sites as required. The management of the warehouse will be extremely important for this company as the warehouse will ensure maximum productivity with minimum investment through material handling and purchasing costs. An effectively managed warehouse will also be able to monitor the services and controls and even the flow of products. Being able to see what products the most demand and what products have can be scaled back a bit due to low demand. 

One reason for the functional accuracy issues is that of poor skills training. The training requirements for store-related personal must be looked at in depth. All personnel that have any association with the warehouse both internal and external must undergo proper warehouse training. Training completion documents should be kept not only at the human resources office at the corporate office but also on hand at each of the individual stores. Some employees are not as proficient with the computer as they should be and must be trained adequately.

Warehouse management is an integral part in most modern-day businesses. Warehouses of organizations if run and managed efficiently and effectively can serve as safe storage of goods, clear and transparent tracking and accountability at the organizational level. The effectively managed warehouse can also ensure the allocation of the right goods at the right time whenever needed to all client departments, maximum productivity with the least amount of expenditures through proper warehouse ordering. It will provide services and controls to the flow of goods entering and being dispersed by the company. 

Explanation:

Organizational Chart

SWOT Analysis

Mission

⦁ Organizations are committed to selling the most credible brands to the most competing products, avoiding the need for customer comparison shopping.

⦁ By maintaining a considerate and low stress purchasing environment, their goal is to be the leading store for all home appliances needs.

Problem Statement

⦁ Providing Constant service

⦁ Employee and Customer satisfaction

⦁ Creation of a low-stress environment helps clients select the right products

Opportunities

⦁ Rapid adjustment to the changes

⦁ Low startup costs

⦁ Customization and catering to individual needs is possible

⦁ Increase in responsiveness

⦁ Improvement in reliability 

⦁ Improvement in productivity through balancing Benefits

⦁ Bundling of product flows

PRELIMINARY INVESTIGATION REPORT

Subject:

Date:

INTRODUCTION 

[Provide a brief description of the system, the name of the person or group who performed the investigation, and the name of the person or group who initiated the investigation.]

SYSTEMS REQUEST SUMMARY

[Explain the basis of the systems request, including an explanation of major problems or opportunities mentioned in the request.]

PRELIMINARY INVESTIGATION FINDINGS

[Describe the results of the investigation, including the scope of the proposed project and the conclusions that were reached. Mention all significant findings, including the results of interviews and other fact-finding, and provide an estimate of current costs.]

RECOMMENDATIONS

[Present a specific recommendation for further action.]

TIME AND COST ESTIMATES

[Include an estimate of time and expenses necessary for additional IT department work. This should be quite specific for the next phase and should include a timetable and cost estimate for the entire project.]

EXPECTED BENEFITS 

[Explain all tangible benefits, with specific dollar estimates, using a range if appropriate. Also mention any intangible benefits.]

Questionnaire results

Results are ordered by importance. The top result (#1) is the most important to that group.

Most common features requested by appointment setters:

Reminder services calls/messages

See technician’s availability

Determination of discounts for customers

See availability of parts to schedule repair

View service history

Most common features requested by technicians:

Able to view own calendar

See availability of parts to schedule repair

Keep notes for each customer

Mobile access of scheduling

View service history

Reminder services calls/messages

Most common features requested by parts department:

Can pull inventory requests every two hours.

Database of requested parts.  

Most common features requested by management:

Reporting by time period, type of appliance, brand

Determination of discounts for customers

Mobile access of scheduling

Routing and mapping of technician’s driving to appointments

See technician’s availability

Suggest preventative maintenance to customers

SYSTEM DOCUMENTATION 

NAME OF SYSTEM 

DATE

PAGE of

ANALYST

PURPOSE OF DOCUMENTATION

FIELD FIELD TYPE FIELD LENGTH

REQUEST FOR INFORMATION SERVICES 

Date:

System enhancement: Title:

Department: Location:

New system: E-mail:

REQUEST FOR:

URGENCY:

[ ] Correction of system error

[ ] Immediate attention required

[ ] System enhancement [ ] Handle in normal priority sequence

[ ] New system [ ] Defer until new system is developed

DESCRIPTION OF REQUESTED SYSTEMS SERVICES:

(ATTACH ADDITIONAL DOCUMENTS AS NECESSARY)

(To be completed by the Information Technology Department)

[ ] Approved Assigned to IT contact person:

User:

Urgency code (1 low to 5 high):

[ ] Modified (see attached notes)

[ ] Rejected (see attached notes)

Date:

Action:

SYSTEM REQUIREMENTS DOCUMENT

⦁ Introduction 

⦁ Summary

⦁ Findings

⦁ Recommendations 

⦁ Time and Cost Estimates

⦁ Expected Benefits

⦁ Appendix

SYSTEM DESIGN SPECIFICATION

1. Management Summary

2. System Components Details 

a. Program Design

b. User Interface Design

c. Output and Input Design

d. File and Database Design

e. Support Processing Design

3. Environmental Requirements

4. Implementation Requirements

5. Time and Cost Estimates

6. Appendices (as needed)

SYSTEM REQUIREMENTS CHANGE REQUEST

PRINT THE FOLLOWING INFORMATION: 

NAME

DEPARTMENT

JOB TITLE

DESCRIPTION OF CHANGE:

REASON FOR CHANGE:

ATTACH ADDITIONAL INFORMATION AND DOCUMENTS AS NEEDED:

CHECK THIS BOX IF ATTACHMENTS ARE INCLUDED:

SIGNED _________________________________________________________ DATE __________________________

CONTROL NUMBER

DATE RECEIVED

TO BE COMPLETED BY THE PROJECT COORDINATOR:

IMPACT ANALYSIS:

Include an estimate of resources needed, with specific costs and timetables.

ACTION:

ACCEPT

DEFER UNTIL (DATE)

REJECT FOR THE FOLLOWING REASONS:

SIGNED ___________________________________________________________ DATE _____________________

DATA DICTIONARY

DATA ELEMENT DESCRIPTION 

SYSTEM 

DATA ELEMENT NAME LABEL 

ALTERNATE NAMES

Type and LENGTH  OUTPUT FORMAT

DEFAULT VALUE  ACCEPTABLE VALUES 

PROMPT/COLUMN HEADER

SOURCE 

SECURITY 

RESPONSIBLE USER

DERIVATION FORMULA 

DESCRIPTION AND COMMENTS

DATA DICTIONARY

DATA FLOW DESCRIPTION 

ID  NAME 

ALIAS 

DESCRIPTION 

ORIGIN  DESTINATION 

RECORD 

VOLUME AND FREQUENCY 

COMMENTS 

PROCESS DESCRIPTION 

SYSTEM 

PROCESS NAME

PROCESS ID 

INPUT DATA FLOWS 

OUTPUT DATA FLOWS 

PROCESS DESCRIPTION 

RECORD DESCRIPTION 

SYSTEM 

RECORD ID 

RECORD NAME 

ALTERNATE NAMES

DEFINITION 

RECORD DATA ELEMENTS

DATA STORE DESCRIPTION 

LABEL 

ENTRY TYPE 

DESCRIPTION 

ALIAS 

COMPOSITION (ATTRIBUTES) 

NOTES 

LONG NAME 

EXTERNAL ENTITY DESCRIPTION

LABEL 

ENTRY TYPE 

DESCRIPTION 

ALIAS 

VALUES & MEANINGS 

NOTES 

LONG NAME  

SYSTEM DOCUMENTATION

NAME OF SYSTEM

DATE 

PAGE of

ANALYST

PURPOSE OF DOCUMENTATION

PROGRAM IDENTIFICATION

PURPOSE

FILES – DATABASES – CLOUD REQUIREMENTS

WEB PROCESSING REQUIREMENTS AND RESOURCES

    Net Present Value (NPV) Template 

                        Note:            Cells B12:H12 and B16:H16 contain formulas to multiply discount factors * benefit and cost values   Cells I12 and I16 contain adjusted cost and benefit totals       Cell C18 contains the calculation for net present value (NPV)                  Year Year Year Year Year Year Year Total    0 1 2 3 4 5 6    Benefits           Factor           PV of Benefits          –            –            –            –            –            –            –            –                Costs           Factor           PV of Costs          –            –            –            –            –            –            –            –                 Net Present Value:           –                               

SYSTEM SECURITY CHECKLIST

⦁ Overview of System Security Issues and Concerns

⦁ Analysis of Physical Security 

⦁ Analysis of Network Security 

⦁ Analysis of Application Security 

⦁ Analysis of File Security 

⦁ Analysis of User Security 

⦁ Analysis of Cloud vulnerability, if any

⦁ Additional Comments and Recommendations  

  Payback Analysis Template             Note: Cells C8:C14 and E8:E14 contain formulas to accumulate costs and benefits                  Year Costs Cumulative Benefits Cumulative       Costs   Benefits   0                   –                     –     1                   –                     –     2                   –                     –     3                   –                     –     4                   –                     –     5                   –                     –     6                    –                      –   

  1                   –                     –     2                   –                     –     3                   –                     –     4                   –                     –     5                   –                     –     6                    –                      –                       –                     –              ROI: 

  #DIV/0!                           

    Net Present Value (NPV) Template                    Note:             Cells B12:H12 and B16:H16 contain formulas to multiply discount factors * benefit and cost values   Cells I12 and I16 contain adjusted cost and benefit totals       Cell C18 contains the calculation for net present value (NPV)                  Year Year Year Year Year Year Year Total    0 1 2 3 4 5 6    Benefits           Factor           PV of Benefits          –            –            –            –            –            –            –            –                Costs           Factor           PV of Costs          –            –            –            –            –            –            –            –                 Net Present Value:                     

           –                                                                   

Appliance Warehouse staffing

Parts Department – purchasing, inventory control, sales

Director: Maddox Farley 

Sales staff: Tyler Cummings, Steve Dawson, Amelia Warner

Purchasing: Celia Martel, Joe Perez

Inventory/warehouse: Ben Cooke, Melissa Benedict, Matt Jones

Appliance Sales – sales of new appliances in 4 departments

Director: Sonia Lopez 

Large Kitchen Appliance department: Mike Nelson (manager), Jessica Scott, Rachel Evans, Justin Cooper 

Laundry Appliance department: Tina Turner (manager), Mackenzie Scott, James Wright

Audio/Visual department: Samantha Campbell (manager), Tim Reynolds, Tracey Oliver

Small Appliance department: Peter Parker (manager), Ken Howell, Marti Castillo

Service Department

Service Manager: Emily Johns

Technicians: Liam Henson, Mark Robles, Lee Wong

Appointment setters: Lisa Shields, Jake Meyers

Equipment and parts: Rhonda Patel

Storewide Cashiers:  

Manager: Abby Franklin 

Cashiers: Nancy Richards, Joy Vasquez, David Goodman, Paul Patton, Maria Nunez

Administrative roles:

Owner (store manager reports to this role): Mae Roth

Store Manager (all department heads and assistant manager report to this role): Alan Marks

Store Assistant Manager (admin roles report to this assistant manager): Ali Miranda

Admin Assistant to store manager: Tim Stafford

Human Resources specialist: Joey Booker

Accounting, payroll, accounts payable/receivable: Doug Dorsey, Tia Carey

IT department: Carlie Davis (manager), Tony Barlett, Meredith Parks, you

      Costs for in-house development  Standard Development Times            As standard practice, use these costs for all in-house development.   As standard practice, use these guidelines (assume 8 hours of work per day).     Cost per hour (for first year)     Duration   Database Development  $               60    Database design 5 days   Web developers  $               75    Database build 10 days   App developers  $               75    Design of a report (web or app) 2 days   UX designers  $               60    Design of data entry page (web or app) 2 days   Business Analyst  $               50    Design of static text page (web or app) 1 day   Trainers  $               50    Build of a report (web or app) 1 day   Cybersecurity specialists  $               90    Build of data entry page (web or app) 1 day   System Admin  $               70    Build of static text page (web or app) 1 day       Connection to separate system or database (sys admin) 8 days       Analysis work (both web and app combined) 20 days       Training 5 days   Equipment:     Cybersecurity work 10 days   Servers  $         2,500        Routers  $             200            Expected Monthly Maintenance:         Development (web or app) 2 days       System Admin  3 days       Training 1 day           Key:        Web or app = activity must be done for both web and app. Same amount of time required for each deliverable.   Both web and app = time given includes development for both of the web and app deliverables.                          

Service Records Sample

Date Called Date of Service Appliance type Appliance serial number Parts Needed Technician assigned Customer Name Customer Address Customer Phone

1/6 1/6 Refrigerator KN-78-215-896 KN-1256 Robles Sophie Goldberg 123 Main St, Hopkinton, MA 508-555-1256

1/6 1/7 Dishwasher WP-55-311-698 WP-1788 Wong Mitch Chu 5525 Winter Rd, Medford, MA 617-555-9898

1/7 1/7 Refrigerator WP-78-956-694 WP-8877 Henson Jamie Fernandez 2 Hope St, Hull, MA 617-555-4125

1/8 1/10 Microwave AB-99-357-753 AB-3321 Wong Mike Singh 15 Arch St, Tewksbury, MA 508-555-3596

1/9 1/9 Washing machine GE-10-122-542 GE-2119 Robles George Kostanza 369 Pike Circle, Danvers, MA 508-555-6235

1/9 1/10 Dishwasher KN-55-396-477 KN-5511 Robles Felicia Parkinson 50 Central Ave, Hopedale, MA 508-555-2144

     Analysis and Design task durations             Project name Year Task name Duration    Accounts Payable 2018        Interview process 5 days      Development of User Questionnaire 2 days      Identification of risks 1.5 days      DFD diagram 4 days      UML diagram 4 days      Layout of 1 report 4 hours      Layout of 1 user screen 2 hours      Testing plan 5 days      Implementation plan 3 days           Human Resources 2017        Interview process 4 days      Development of User Questionnaire 2 days      Identification of risks 1 day      DFD diagram 3.5 days      UML diagram 2 days      Layout of 1 report 2 hours      Layout of 1 user screen 4 hours      Testing plan 7 days      Implementation plan 3 days           Payroll 2019        Interview process 6 days      Development of User Questionnaire 1 day      Identification of risks 2 days      DFD diagram 4.5 days      UML diagram 5 days      Layout of 1 report 1 day      Layout of 1 user screen 4 hours      Testing plan 5 days      Implementation plan 3.5 days of 1 report 1 day      Layout of 1 user screen 4 hours      Testing plan 5 days      Implementation plan 3.5 days  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Forensic

 

ou are an employee at D&B Investigations, a firm that contracts with individuals, companies, and government agencies to conduct computer forensics investigations. D&B employees are expected to observe the following tenets, which the company views as the foundation for its success:

  • Give concerted attention to clients’ needs and concerns.
  • Follow proper procedures and stay informed about legal issues.
  • Maintain the necessary skill set to apply effective investigative techniques using the latest technologies.

Your manager has just scheduled a meeting with an important prospective client, and she has asked you to be part of the team that is preparing for the meeting. The prospective client is Brendan Oliver, a well-known celebrity. Last night, Mr. Oliver’s public relations team discovered that someone obtained three photos that were shot on his smartphone, and tried to sell the photos to the media. Due to the sensitive nature of the photos, Mr. Oliver and his team have not yet contacted law enforcement. They would like to know if D&B can provide any guidance or support related to the investigation—or, at the very least, if D&B can help them prevent similar incidents from occurring in the future. At this time, they do not know how the photos were acquired. The public relations team is wondering if a friend, family member, or employee could have gained direct access to Mr. Oliver’s phone and obtained the photos that way, although the phone is usually locked with a passcode when Mr. Oliver is not using it. In addition, Mr. Oliver emailed the photos to one other person several months ago. He has not spoken with that person in the last few weeks, but he does not believe that person would have shared the photos with anyone else.

Your manager plans to use this initial meeting with Mr. Oliver and his public relations team to establish rapport, learn more about the case, and demonstrate the firm’s expertise. The company sees this as an opportunity to build future business, regardless of whether they are retained to help with the investigation of this case.

Tasks

To help the team prepare for the meeting, your manager asks you (and your colleagues) to consider and record your responses the following questions:

  • What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation?
  • Based on the limited information provided in the scenario, what is the rationale for launching an investigation that uses computer forensic activities? Would D&B and/or law enforcement need
  • additional information in order to determine if they should proceed with an investigation? Why or why not?
  • What would you share with the client about how investigators prepare for and conduct a computer forensics investigation? Identify three to five key points that are most relevant to this case.
  • What sources of evidence would investigators likely examine in this case? Provide concrete examples and explain your rationale.
  • What should the client, investigators, and others do—or not do—to ensure that evidence could be used in a court of law? Using layman’s terms, explain laws and legal concepts that should be taken into account during the collection, analysis, and presentation of evidence.
  • What questions and concerns do you think the client will have?
  • What questions should the team ask the client to learn more about the case and determine the next steps?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Develop an IT planning process for ModMeters to accomplish the demands as set out above.

 

Develop an IT planning process for ModMeters to accomplish the demands as set

out above.

Read the ModMeters Case Study on pages 82-85 in the textbook. Answer the Discussion Question at the end of the Case Study. Your responses must be complete, detailed and in APA format.

Your responses must be complete, detailed and in APA format. All work must be 1 FULL page, single spaced, 12 font Times New Roman.

  

McKeen, James D; Smith, Heather (2013). IT strategy: Issues and practices (2nd ed.) Boston: Prentice Hall.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Stacks c++

Can someone solve?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 2

 

Complete Case Project 5 from Chapter 4 “OEM Printer Cartridge Versus Refilled Cartridges” (page196 in printed text). This project requires you to use presentation software such as Microsoft PowerPoint. If you do not have this software, it is available in computer centers on each campus, or there are shareware / freeware versions of similar software available.

  • Make sure your presentation is visually appealing.
  • Make sure you address the fact that this analysis is for the support team for a book publishing company.
  • You must include “Speaker’s Notes” to go along with the slides you develop, to point out the things you would highlight when making a presentation.
  • Make sure you include the four bullet points at the end of the case study.
  • Include the Web address (URL) of any sites where you find useful information.  There should be some research involved, so make sure you cite the source.

Spelling, grammar, correct citations, and content will all influence your project grade.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Programming project

  • Inventory ManagementObjectives: Use inheritance to create base and child classes Utilize multiple classes in the same program Perform standard input validation Implement a solution that uses polymorphismProblem:A small electronics company has hired you to write an application to manage their inventory. The company requested a role-based access control (RBAC) to increase the security around using the new application. The company also requested that the application menu must be flexible enough to allow adding new menu items to the menu with minimal changes. This includes re-ordering the menu items and making changes tothe description of a menu item without having to change the code.Security:The company has suggested to start the application by prompting the user for a username and password to authenticate the user. There are two types of users at this company, managers and employees. If managers log on to the application, they will seeall options on the menu list. If employees log on to the application, they will see a limitedset of options on the menu list. User information is stored in Users.dat file, which may ormay not exist at the start of the program. A super user “admin” with password “admin” has already been hardcoded in the program to allow for the initial setup and the creationof other users. The Users.dat file contains the FirstName, LastName, Username (case insensitive), HashedPassword and a flag to indicate whether a user is a manager or not.The file is comma separated and it is formatted as follows:Joe, Last, jlast, 58c536ed8facc2c2a293a18a48e3e120, trueSam, sone, 2c2a293a18a48e3e12058c536ed8facc, falseJane, Best, jbest, 293a18a48e3e12052058c536ed8facc2c, falseNote: Ensure that the ‘AddUser’ function does not add duplicate values, and the ‘ChangePassword’ function does not change password if username/password is entered incorrectly. If adding a new user or changing the password is successful, return true, or else return false.
  • Application Menu:The menu of the application is dynamically loaded and displayed to the user only after the user successfully logs on. The menu items will be loaded from file “MenuList.dat”, which may or may not exist at the start of the application. If the file doesn’t exist, the application should show at least an Exit menu item as default. The file will contain all menu items details, including the name of the command that will be executed when the menu item is selected. If a menu item is marked as restricted (Boolean flag), only managers can see that item. The file contains the following comma separated fields, Description, a Boolean flag to indicate if the option is restricted to managers only, and the name of the menu command that will be executed when the option is chosen. The order and option number of a menu item may change depending on how they are listed in the file. The Exit option will always be listed last and it will not be in the file.Below is a sample of how the MenuList.dat file looks like:Add User, true, AddUserCommandDelete User, true, DeleteUserCommandChange Password, false, ChangePasswordCommandAdd New Product, true, AddProductCommandNote:The command name of each menu item must match the name of the class that you will create in the code (See AddProductCommand class in the code for example).Inventory:The inventory consists of multiple products of type Product stored in class ProductCatalog. The ProductCatalog is responsible of all inventory operations that add, remove, find and update a product. When printing a product information, the product retail price should be calculated and displayed as well. Retail price = (cost + (margin * cost/100)). A list of functions has been added to this class in the provided code template. You must implement all listed functions. The inventory products will be saved in file Inventory.dat, which may or may not exist when the program first starts. The file will contain the product unique id (int), product name (string), cost (double), quantity (int)and margin (int, integer that represents margin percentage).The Inventory.dat file is comma separated and formatted as follows:3424, Smart Watch, 20.45, 23, 8065454, Flat Screen TV, 465.98, 15, 35435, Computer Monitor, 123.54, 84, 43Program Flow: Program starts in main() method Prompt user for username and password Authenticate user and maintain the logged-on user object Load inventory
  •  Load and create menu list Display menu list and prompt the user for option Execute selected option Keep displaying the menu until the user chooses to exitOutput Format:Enter username: some usernameEnter password: some password //Repeat prompts until useris authenticated OR show error andoption to exit.Invalid username or password!Press enter to continue or “Exit” to exit:Enter username: some usernameEnter password: some passwordWelcome Firstname LastName!Inventory Management System Menu //This is the header of the MenuList// The order and option number of a menu item may change depending on how they are listed in the MenuList.dat file. The Exit option will always be listed last and it will not be in the MenuList.dat file.1- Add user2- Remove user3- Change password4- Add new product5- Update product information6- Delete product7- Display product information8- Display inventory9- ExitEnter your selection: 7
  • Enter product name: sMaRt wAtChId Name Cost Quantity Retail—————————————————-3424 Smart Watch $20.45 23 $36.81//Repeat the menu after each command is executedUnit Testing:A unit test method is required to test each of the methods listed below. These methods will be used by the unit testing framework to test the accuracy of your code. InventoryManagementSecurity.AuthenticateUser InventoryManagementSecurity.AddNewUser InventoryManagementSecurity.RemoveUser InventoryManagementSecurity.ChangePassword MenuList.AddMenuItem() ProductCatalog.AddUpdateProduct(Product product) ProductCatalog.RemoveProduct(int productId) ProductCatalog.FindProduct(int productId) ProductCatalog.PrintProductInformation(int productId) ProductCatalog.PrintInventoryList()Grading: Coding standards, style and comments (10 Points) Unit testing methods x 10, (2 points for each of the methods mentioned above – 20 Points) The rest of the grade will be broken down as follows: InventoryManagementSecurity.AuthenticateUser (5 Points) InventoryManagementSecurity.AddNewUser (5 Points) InventoryManagementSecurity.RemoveUser (5 Points) InventoryManagementSecurity.ChangePassword (5 Points) MenuList.AddMenuItem() (20 Points) //This includes implementing all commands for the menu list ProductCatalog.AddUpdateProduct(Product product) (10 Points) ProductCatalog.RemoveProduct(int productId) (5 Points) ProductCatalog.FindProduct(int productId) (5 Points) ProductCatalog.PrintProductInformation(int productId) (5 Points) ProductCatalog.PrintInventoryList() (5 Points)N

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Business analytics

  

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

1 Discussion Case Study And Lab work

Discussion 6.1

Compare and contrast simple random sampling and systematic sampling. List the strengths and weaknesses of each concept.

Discussion ( 150 words Excluding the references)

Case Study 6.1  – Full 3 Pages In length excluding References.

  • Read the following Case Study
    Case 8.3 Delivery Times at Snow Pea Restaurant
  • Write a summary analysis and answer the questions. 

Writing Requirements

  • 3 pages in length  (excluding cover page, abstract, and reference list)
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Lab 5

Complete the following problems by Thursday

Chapter 7 

C8 and C9 -PAGE NUMBER 321

Chapter 8 –

Problem #35 – PAGE Number 360

the assignment must be an APA formatted paper with embedded excel files

Lab work Should be in word Documents with clear explanation and References with Excel file screen shots in word document……

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Vulnerability Management Presentation to Stakeholders

This week, you will make your PowerPoint presentation, making the case for your vulnerability management process and that the company to purchase the vulnerability management software, Nessus. With the current buzz about the ransomware attack on a rival company, key Mercury USA stakeholders are concerned that this type of attack could lead to a significant loss of revenue for the company as well as damage to the company’s reputation.

They are looking for your guidance and technical expertise to not only come up with a better way to protect their resource but also to make them feel confident that they can calm stockholders’ fears about any ransomware or cyberattacks. You need to provide the stakeholders with a presentation that relays the technical information in a way they can understand so they can make an informed decision about your vulnerability management process and your recommendation to purchase cybersecurity software.

The ransomware attack has made your company realize that cybersecurity cannot be an afterthought. The stakeholders are aware that if they don’t spend money on addressing issues now, a cyber incident might lead to a more costly bill in the future and could even threaten the very existence of the company.

Remember to be clear about what action you are recommending. Executive management will want to understand not only what you discovered, but also what you propose as a solution. The company’s leaders will want to know what decisions they need to make based on your findings. Give them the actionable information they need to decide.

  • five to 10 slides maximum; limit bullets to no more than six per slide
  • a reference slide with one to two quality sources

How Will My Work Be Evaluated?

As you progress in your cybersecurity career, you may find yourself making presentations to customers, client audiences, and management. By summarizing your results and recommendations to management in an effective presentation, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your recommendations to provide information for decision makers in a format that uses the right mix of technical detail in a business context is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
  • 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
  • 2.1.3: Explain the significance of the issue or problem.
  • 12.3.2: Describe the implementation of controls.
  • 12.8.1: Recognize the process to obtain approval from the business process owner.
  • 13.2.1: Evaluate vendor recommendations in the context of organization requirements.

If you haven’t already downloaded it last week, download the Presentation to Management Template now and follow the instructions in the document.

Remember to delete the instructional text from the template before you submit.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now