Creating a Use Case

 In the textbook, Systems Analysis and Design in a Changing World, refer to the RMO CSMS marketing subsystem Figure 3-10d on page 83.

Write a paper in which you research use case diagrams:

e

  • Use Figure 3-12 on page 84 and Figure 3-14 on page 86 as exemplars. 
  • Remember to paste a copy of the diagram in the paper.
  • You need to create the diagram, not take one from the Internet. 

     2.  Write an analysis of the use case drawing that you created. Analyze the actors and how they relate to the use cases in the diagram. Your answer should show the purpose and importance of use case diagrams.

     3.  Use at least four quality resources. Note: Wikipedia and similar websites do not qualify as quality resources. 

The specific course learning outcome associated with this assignment is:

  • Create a use case diagram with supporting documentation that describes the use case and actors in detail.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Employee attributions and their impact on innovations

The attached journal article focuses on attribution theory and how it influences the implementation of innovation technologies. Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

1.    Provide a high-level overview/ summary of the case study

2.    Note how constructive intentionality impacts innovation implementations

3.    Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

Format Requirements:

1. The paper must be minimum 3 pages excluding title and references pages. 

2. Include references of at least 5 peer reviewed papers supporting your case study. 

3. The paper must comply APA Format and include a cover page, an  introduction, a body with fully developed content, a conclusion and  references.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 1 Assignment

Week 1 Assignment 

Complete the following assignment in one MS word document:

Chapter 1 –discussion question #1 & exercise 15 (limit to one page of analysis for question 15)

Chapter 2 – discussion question #1 & exercises 4, 5, and 15(limit to one page of analysis for question 15) Question 4 is not a group assignment.  It is an individual assignment.

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Chapter 1

Discussion question 1

Survey the literature from the past six months to find one application each for DSS, BI, and analytics. Summarize the applications on one page, and submit it with the exact sources.

Exercise 15

Find information about IBM Watson’s activities in the healthcare field. Write a report.

Chapter 2

Discussion question 1

Discuss the difficulties in measuring the intelligence of machines.

Exercise 4

In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed. (Note: This is a class project.)

Exercise 5

Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report.

Exercise 15

Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recognition product.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Active Directory Recommendations

Scenario

Assume you are an entry-level security administrator working for Always Fresh. You have been asked to evaluate the option of adding Active Directory to the company’s network.

Tasks

Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:

1. System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users?

2. How will the procedures for making changes to the user accounts, such as password changes, be different in Active Directory?

3. What action should administrators take for the existing workgroup user accounts after converting to Active Directory?

4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers [SIDs].)

Required Resources

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 to 4 pages

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cpsc 1050 networking data packets

 

  1. Start the “TCP/IP” (reliable connection simulator) applet.
  2. In the text field labeled “Your message:”, type the following: “Computer networking is essential in our world today.“. Then press the button “Send a message.”
  3. Watch the entire sequence of packets that are sent for the sample message. How many “DAT” packets were sent? How many “ACK” packets were sent?
  4. If each character or blank in a packet header counts for one character, and all “DAT” packets except the last carry 10 characters (including the blanks), and “ACK” packets have no data characters (though they do have a header), count up how many characters were sent in total.
  5. There are 52 characters in the above message, including blanks and punctuation. Subtract 52 from the total number of characters sent in both directions in all packets. Divide this number by the total number of characters to get the overhead (those characters which are not really data but yet you have to transmit them), represented as a percentage.
  6. Imagine that you have a million-character message to send, perhaps a large file. How many characters in total (and to your best estimate) would be sent in all packets necessary to move it from node 0 to node 1?
  7. What would be an obvious way to decrease the overhead?
  8. Repeat Steps 1 and 2.
  9. Select “Delete packets that are touched“.
  10. Delete some data packets by clicking on them as they move along the wire and watch the retransmission after timeout.
  11. What happens if you delete the re-transmitted packet?
  12. Now try deleting some ACK or NAK packets. What happens?
  13. See if you can compute the checksum as TCP/IP does. Run the applet, using any message. Select a data packet, but don’t select the last packet because it might be too short, less than 10 characters. Count up the characters, including blanks. If they do not equal 10, assume there are blanks at the end so that the character count is 10.
  14. Using the “Text Encoding in ASCII” applet, type in the characters from the data packet, and click on “translate text“.
  15. Add up the values for each of the characters. Then calculate the modulus of this number using 256.
  16. Compare your manually computed checksum for the first packet of the message “Introduction to Computer Science” against what the applet shows for the packet. Do they match?
  17. Now damage your packet by altering one character. Re-compute the checksum. You should realize how the applet can spot errors.
  18. Think of a way that a packet can be damaged and still have the same checksum as the undamaged version. Give one example for this scenario.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 4 assingment disaster recovery

 Graded Assignments may be found at the end of each chapter of the required textbook under the title “Real-World Exercises”. Each assignment is due between Monday to Sunday evening by 11:59 p.m. EST. of the respective week. Each student is to select one exercise (per module exercise) from the grouping as identified below. Provide documented evidence, in Moodle, of completion of the chosen exercise (i.e. provide answers to each of the stated questions). Detailed and significant scholarly answers will be allotted full point value. Incomplete, inaccurate, or inadequate answers will receive less than full credit depending on the answers provided. All submissions need to directed to the appropriate area within Moodle. Late submissions, hardcopy, or email submissions will not be accepted. 

4.1. Using a Web browser, identify at least five sources you would want to use when training a CSIRT.

4.2. Using a Web browser, visit www.mitre.org. What information is provided there, and how would it be useful?

4.3. Using a Web browser, visit www.securityfocus.com. What is Bugtraq, and how would it be useful? What additional information is provided under the Vulnerabilities tab?

4.4. Using a Web browser, visit www.cert.org. What information is provided there, and how would it be useful? What additional information is provided at www.cert.org/csirts/?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cybersecurity Engineering Template

  

Create an annotated cybersecurity engineering template to be delivered to all applicable enterprise departments of an organization to guide them through securing their systems. This template must be tailored specifically to an organization of your choice.

Include the following components:

1. Privacy and Data Security

2. Scams and Fraud

3. Network Security

4. Website Security

5. Email

6. Mobile Devices

7. Employees

8. Facility Security

9. Operational Security

10. Payment Cards

11. Incident Response and Reporting

12. Policy Development, Management

13. Cyber Security Glossary

14. Cyber Security Links

APA style is not required, but solid academic writing? Is expected.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Learning Journal

  Part 1: Exercise 1.1 from your textbook recommends that you try to make mistakes when experimenting with a new programming feature. This kind of experiment helps you remember what you read; it also helps when you are programming because you get to know what the error messages mean. It is better to make mistakes now and on purpose than later and accidentally. (Downey, 2015, 7)For this Learning Journal, first, answer the following questions based on Exercise 1.1. Include example Python code and output with your answers.

  • If you are trying to print a string, what happens if you leave out one of the quotation marks or both and why?  
  • You can use a minus sign to make a negative number like -2. What happens for each of the following and why?  

>>> 2++2 >>> 2–2 >>> 2+-2 >>> 2-+2

  • In math notation, leading zeros are OK, as in 02. What happens if you try this in Python and why?  
  • What happens if you have two values with no operator and a space in between them and why?  

Part 2:Next, describe at least three additional Python experiments that you tried while learning Chapter 1. Show the Python inputs and their outputs, and explain what you learned from the results of each example. Reference:Downey, A. (2015). Think Python: How to think like a computer scientist. Green Tea Press. This book is licensed under Creative Commons Attribution-NonCommercial 3.0 Unported (CC BY-NC 3.0). link to text book PDF is below

https://greenteapress.com/thinkpython/thinkCSpy.pdf 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

How to work on spreadsheet document using the information given

 

Independent Project 3-4

Windows   Mac

For this project, you create a column chart to illustrate April–September revenue for Classic Gardens and Landscapes. You also build a pie chart sheet to graph the proportion that each category contributes to total revenue.

[Student Learning Outcomes 3.1, 3.2, 3.3, 3.4, 3.5, 3.6]

File Needed: ClassicGardens-03.xlsx (Available from the Start File link.)

Completed Project File Name: [your name]-ClassicGardens-03.xlsx

Skills Covered in This Project

  • Create a chart object.
  • Size and position a chart object.
  • Edit and format chart elements.
  • Edit the source data for a chart.
  • Build a pie chart sheet.
  • Use texture as fill.
  • Add and format data labels in a chart.

Alternate Instruction for Microsoft 365 Apps icon This image appears when a project instruction has changed to accommodate an update to Microsoft 365 Apps. If the instruction does not match your version of Office, try using the alternate instruction instead.

  1. Open the ClassicGardens-03.xlsx start file. If the workbook opens in Protected View, click the Enable Editing button so you can modify it. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  2. Create a Clustered Column chart object for cells A4:G9.
  3. Move the chart object so that its top-left corner is at cell A12. Size the bottom of the chart to reach cell H30.
  4. Edit the chart title to display CGL Major Sales Revenue and press Enter to start a new line. On the second line, type Second and Third Quarters.
  5. Apply chart Style 14 to the chart.
  6. Format the first line and the second line of the chart title to a font size of 20 pt.
  7. Apply a 1 pt Black, Text 1 (second column) outline to the chart area.
  8. Verify that the chart is still selected. In the highlighted range in the worksheet, drag the resize pointer to remove the Design Consulting data series from the chart (Figure 3-71).Resize the chart by dragging the resize pointerFigure 3-71 Resize the chart by dragging the resize pointer
  9. Create a 3-D Pie chart sheet for cells A4:A9 and cells H4:H9. Move the chart to its own sheet named Revenue Breakdown. Hint: Use the Move Chart button [Chart Design tab, Location group].
    Alternate Instruction for Microsoft 365 Apps icon Create a 3-D Pie chart sheet for cells A4:A9 and cells H4:H9. Move the chart to its own sheet named Revenue Breakdown. Hint: Use the Move Chart button [Chart Tools Design tab, Location group].
  10. Edit the chart title to display Revenue by Category. Change the font size to 32.
  11. Select the legend and change the font size to 12.
  12. Apply the Woven mat texture fill (first row, fourth column) to the Patio and Furniture slice.
  13. Select the pie shape and add data labels to display in the center of each slice.
    1. Display the Format Data Labels task pane, choose the Accounting format [Label Options button, Number group], and set 0 decimal places.
    2. Change the data label font size to 14 pt and apply bold [Home tab, Font group].
  14. Deselect the chart.
  15. Save and close the workbook (Figure 3-72).Excel 3-4 completed worksheet and chartFigure 3-72 Excel 3-4 completed worksheet and chart
  16. Upload and save your project file.
  17. Submit project for grading.

Reset Progress Back to top

SUPPORT

FOLLOW MCGRAW HILL

SIMnet Blog

© 2021 McGraw-Hill Education. All rights reserved.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment : PKI and Encryption at Work

Assignment 1:

Assignment Requirements

In this assignment, you play the role of chief information technology (IT) security officer for the Quality Medical Company (QMC). QMC is a publicly traded company operating in the pharmaceutical industry.

QMC is expanding its arena of work through an increase in the number of clients and products. The senior management of the company is highly concerned about complying with the multitude of legislative and regulatory laws and issues in place. The company has an internal compliance and risk management team to take care of all the compliance-related issues. The company needs to make important decisions about the bulk of resources they will need to meet the voluminous compliance requirements arising from the multidimensional challenge of expansion.

QMC will be required to conform to the following compliance issues:

  • Public-company regulations, such as the Sarbanes-Oxley (SOX) Act
  • Regulations affecting financial companies, companies that make loans and charge interest, such as the U.S. Securities and Exchange Commission (SEC) rules and Gramm-Leach-Bliley Act (GLBA)
  • Regulations affecting healthcare privacy information, such as Health Insurance Portability and Accountability Act (HIPAA)
  • Intellectual Property Law that is important for information asset protection particularly for organizations in the pharmaceutical and technology industry
  • Regulations affecting the privacy of information, including personal identification information, such as personally identifiable information (PII) regularly collected from employees, customers, and end users
  • Corporate governance policies including disclosures to the board of directors and the auditors and the policies related to human resources, governance, harassment, code of conduct, and ethics

Compliance with regulatory requirements implies encrypting sensitive data at rest (DAR) and allowing access to role-holders in the enterprise who require the access. It also implies that sensitive data in motion (DIM) or data that is being communicated via e-mail, instant message (IM), or even Web e-mail must be suitably protected and sent only to the individuals who have a right to view it. The company is conscious about the loss they may face in terms of penalty and brand damage if they fail to abide by the compliance laws, especially in the online information transfer phase. Therefore, as a dedicated employee, your task is to develop a content monitoring strategy using PKI as a potential solution. You will need to determine a process or method to identify multiple data types, processes, and organizational policies. Incorporate them into a plan, and select a PKI solution that will effectively address the content management needs of your company.

You need to present your PKI solution in the form of a professional report to the senior management.

Submission Requirements 

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double-Space
  • Citation Style: APA
  • Length: 1–2 pages

Assignment 2:  

Remote Access Method Evaluation

 

Assignment Requirements

Discuss with your peers which of the two remote access solutions, virtual private networks (VPNs) or hypertext transport protocol secure (HTTPS), you will rate as the best. You need to make a choice between the two remote access solutions based on the following features:

  • Identification, authentication, and authorization
  • Cost, scalability, reliability, and interoperability

 

Case Assignment 3:

•Consider the organization where you work, or an organization where you would like to work if you are not currently employed.•Create a Policy that would benefit your organization•Suggest some controls for your policy•Suggest an audit mechanismUse the following Format for your policy: 

Overview

You should put one or two sentences here that summarize the policy and its purpose for management. This is typically an explanation of why the policy exists. Don’t be too technical.

Scope

This is where you define who or what the policy applies to, from all employees to only cashiers that handle cash in the front office. If it applies to equipment, it could be all equipment, all servers, all network connected equipment, or just company issued cell phones. Be specific.

Policy

This is where the policy is actually defined. Don’t be too specific, leave that to the procedures and controls that support the policy.

For example, a password policy might state that users cannot share passwords, passwords must be complex, help desk personnel never request passwords, and passwords must rotate periodically. The details of good password construction can be then put in a guideline document, instructions for the help desk on reseting passwords can be a procedure, and that Group Policy is used to force password changes every 60 days is a technical control. None of that should be in the policy, but it all needs to be properly documented and communicated to the people that need it – the guidelines to all staff, the help desk procedure to help desk staff, and the technical controls to the domain admins.

If you are in doubt remember that good policy statements talk about what the policy is trying to accomplish, and are addressed to a wide audience. Procedures and controls talk about how it is to be accomplished and are addressed to the staff that must carry it out.

Compliance Measurement

Typically, this section includes the job title of the person responsible for overseeing its implementation or the department if multiple people are responsible, a reference to audit mechanisms, and the consequences for failure to abide by policy.

Definitions, Related Standards, and Policies

This section usually contains definitions of technical or ambiguous terms, cross-references to applicable regulations, and other policies that relate to this policy. Examples include union contracts, discipline policies, and implementation guidelines. In our password policy example, this where readers would be told to consult the password construction guideline document.

Exceptions

If there any circumstances that might allow temporary exception to the policy, such as during an emergency, define them here. If there is anyone with the authority to temporarily waive the policy, they should be identified by job title. This section is often omitted since many policies do not allow any exceptions.

  • 3-5 pages in length.
  • APA format.. citations, references etc…

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now