Essay 12

 

Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your essay as well.  You cannot use information from the text book or any book/article by the author of the text book as a current event.  Make sure that your reference has a date of publication.  For the essay you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.  This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies.  You must include some information obtained from the reference in your answer.  The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. The citation should be in APA format. It should be at least 2 pages.

 

  1. (a) Identify and describe three difference (unique) potential social and ethical concerns (not mentioned in our text) arising as a result of converging technologies. (b) Defend your answer. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (knowledge)
  2. Evaluate the arguments that were examined for and against future research in nanotechnology. Given the potential advantages and disadvantages of future development in this area, which side’s arguments do you find more convincing? Dothe criteria provided by Weckert for when research in a particular area should and should not be allowed offer us any guidelines for research in nanotechnology? Which kinds of ethical guidelines need to be built into research and development in this field? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Operating Systems Project, Part II *NEED DIAGRAM SOFTWARE TO COMPLETE ASSIGNMENT*

 

Continue building your final project due in Week Five.

Complete the following steps for each Operating System you chose in Week Two to add to your team’s project:

  1. Create an Operating System File Management diagram for  one Mobile Device Operating System diagram). Include a  reference log that identifies the resources and/or references you used  in creating your diagram.
  2. The operating system is IOS that the diagram should be about.

 

Note:  You may use a diagramming software, such as Microsoft® Visio®,  or another diagramming software to complete the diagrams. All diagrams  and reference logs created will be used in your final project due in  Week Five.

Compile multiple files into a ZIP folder, if necessary.

Submit the ZIP folder to the Assignment Files tab above.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Aligning Auditing Frameworks for a Business Unit Within DoD

  

You identified the requirements and hardening guides that provide a frame to which a government network and business should adhere, you assessed the available sites under the Department of Defense (DoD) and identified agencies in charge of providing security guidelines, and you reviewed the hardening and best practice guidelines provided by DoD’s Defense Information Systems Agency (DISA), National Institute of Standards and Technology (NIST), and Information Assurance Support Environment (IASE). 

Lab Assessment Questions & Answers 1. What is the difference between DITSCAP and DIACAP? 

2. What is DCID 6/3, and why would you use DCID 6/3 as opposed to DIACAP for certification and accreditation of a system? 

3. What is C&A, and what are the following acronyms that are related to the C&A process: DISN, GIG, PAA, DAA, and DISA? 

4. What is the Defense Industrial Base Sector? 

5. Who develops the configuration and validation requirements for IT products and services within DoD? 

6. What is DoDD 8570.01? 

7. Find a copy of the DoDD 8570.01-M revision dated April 2010. What professional certifications comply with the 8570.01-M specification and workforce development program as defined by the DoD? 

8. What is the current, working URL for the DISA Military STIGs unclassified homepage? 

9. Which DISA STIGs are currently available on the DISA Military STIGs unclassified homepage? 

10. Why does the updated version of NIST 800-53a call for continuous monitoring?  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wk 2 Individual: Project Plans

After consideration of your proposal from Week 1, the WeLoveVideo, Inc. CIO is having a hard time envisioning how the project would be executed based on your recommendations. She has asked your company to develop a project plan in both waterfall and Agile so she can better understand the implications to her team.

Using Microsoft® Excel®, or Project (either tool is pre-approved), or another project management tool of your choice (requires approval by your instructor), develop two milestone-level project plans: one using the waterfall and one using Agile SDLC. The milestones should demonstrate a clear understanding of the inputs and outputs for each phase of a project, based upon the SDLC applied. At minimum, there should be a clear milestone at the end of each project phase, and potentially milestones within phases where applicable. Ensure that each project plan incorporates comprehensive SDLC phases based on each SDLC type.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Case Study – Discussion

 Answer the questions for the given case study. 

1. Why is operations management important in CDS?

2. Draw a four Vs profile for the company’s products/services.

3. What would you recommend to the company if it asked you to advise it in improving its operations?

Attached Case Study.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion: Mapping Business Challenges to Types of Control

 

Learning Objectives and Outcomes

  • Identify the business impact of several access controls.
  • Identify mitigation techniques for weaknesses of each of the access controls.

Assignment Requirements

Read the worksheet named “Mapping Business Challenges to Types of Control” and address the following:

Using what you have learned about access controls, identify the business impact of the challenge, and identify an access control method that will mitigate the impact to the business.

Respond to your peers with your point of view on their answers. Respond to at least two of your classmates’ original thread posts with between 100 – 150 words for each reply. Make sure your opinion is substantiated with valid reasons and references to the concepts covered in the course. In addition, initiate a discussion with the students who comment on your answer.

Required Resources

  • Worksheet: Mapping Business Challenges to Types of Control (ws_businesschallenges)

Self-Assessment Checklist

Use the following checklist to support your work on the assignment:

  • I have engaged in a discussion of the assigned topics with at least two of my peers.
  • I have raised questions and solicited peer and instructor input on the topics discussed.
  • I have articulated my position clearly and logically.
  • I have supported my argument with data and factual information.
  • I have provided relevant citations and references to support my position on the issue discussed.
  • I have compared and contrasted my position with the perspectives offered by my peers and highlighted the critical similarities and differences.
  • I have solicited peer and instructor feedback on my arguments and propositions.
  • I have offered a substantive and critical evaluation of my peer’s perspective on the issues that is opposite of mine, and supported my critical review with data and information.
  • I have followed the submission requirements.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Apply – Systems Requirements Presentation / Fundamentals Of Business Systems Development

  

Assignment Content

  1.    The board of directors has selected the student furniture project for the webstore. Now they have asked you to help them choose a method for determining the requirements.

    Prepare a 12- to 18-slide presentation to the board with detailed speaker notes. Use of multimedia and images is encouraged.

    Compare traditional, contemporary, radical, and agile methodologies for requirements gathering. Be sure to include advantages and disadvantages in your comparison.

    Recommend the methodology you think will work best for Pine Valley Furniture’s student furniture webstore.

    Explain the Level-0 data flow diagram from Figure 7-22 on p. 203. 

    Cite any references according APA guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Use java to write the program WordFisher.

The goal of this project is to: 1. Practice working with the data structures we have learned this semester. 2. Practice I/O. 3. Use Java APIs in a software project.

I uploaded the information and details about this project as PDF file called Lab13-WordFisher. And I need you to work on the java file that I uploaded to you that do not need to create a java file, and also there are specific information tell you what to do at the inside of Java file. For the java files and text files, they are included at Lab13.zip file.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

C++ hangman

Need help with the code

Background:

Stepwise refinement is a low level design technique in which the programmer writes pseudo-code for what the program is supposed to do in steps, expanding non-obvious steps at each iteration of the process. Eventually, the stepwise refinement will be an almost step by step guideline to the implementation of the program. 

Objective: 

The main objective of this assignment is to assess students’ ability to apply the stepwise refinement process to develop a new algorithm and carry that through to the implementation of the program. Implementation must follow the top-down design approach, where the solution starts by describing the general functionality of a program. Next, more details are provided in successive steps to refine the implementation.

Problem Description:

You are to implement a variant of the Hangman game, where a player must find a hidden, knowing only the first letter and number of letters in the word. The player selects a letter. If the letter is part of the word, the hidden word is updated with all occurrences of the letter. All used letters must be displayed to the player. 

In this variant, the player has 5 lives. Every time a letter is guess correctly the player gains a life. If a letter is guessed wrong, a life is removed. The game terminates if all lives are lost. If a player guesses a word correctly, another word is displayed, and game continues until the player chooses all words correctly or loses all lives. There is a total of 15 words which are read from a file.

Task:

Your task is to apply the technique of stepwise refinement to design an algorithm for the Hangman game. 

You are provided with a function to read the words and store in a string array.

Hint

A string’s individual characters can be accessed as if it was an array of characters.

string x = “hello”;

char y = x[1] //stores character ‘e’ in y

How to Write Step-Wise Refinement

Use a text editor (e.g., the Code::Blocks editor or Notepad) to write the first pseudo-code statement of the problem. Next, add more statements that support the implementation of that first pseudo-code statement. Each time you refine a step, copy and paste the current version of the program design to the end of the text file, then make the change within that pasted version. Stick to the instructor’s convention of using a different number of *s to indicate the level of expansion applicable to each statement (see example below). When the design is complete, the text file will contain a complete record of the design process used to reach the final design. The text file you submit may be quite lengthy and should show the entire process. Do not remove anything and do not just submit the final iteration. Below is a partial example of stepwise refinement (Note it is only a partial example and has nothing to do with the program for this assignment.):

main.cpp

#include <iostream>

#include <fstream>

#include <ctime>

#include <cstdlib>

#include <iomanip>

using namespace std;

void ReadWords(string words[], int numWords);

int main()

{

    int numWords = 15;

    string words[numWords];

    return 0;

}

void Play(string words[], int numWords){

}

void ReadWords(string words[], int numWords){

    ifstream infile;

    infile.open(“words.txt”);

    if(!infile)

        cout<<“Could not open file”<<endl;

    else{

        for(int i=0; i<numWords; i++)

            infile>>words[i];

    }

    infile.close();

}

void PressKeyToContinue(){

    string x;

    cout<<“Press any key to continue:”;

    cin>>x;

}

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Class diagram and sequence diagram

As the head of information systems for a college you are tasked with developing a new student 
registration system. The college would like a new client-server system to replace its much older system 
developed around mainframe technology. The new system will allow students to register for courses 
and view report cards from personal computers attached to the campus LAN. Professors will be able to 
access the system to sign up to teach courses as well as record grades.
Due to a decrease in federal funding, the college cannot afford to replace the entire system at once. The 
college will keep the existing course catalog database where all course information is maintained. This 
database is an Ingres relational database running on a DEC VAX. Fortunately the college has invested in 
an open SQL interface that allows access to this database from college’s Unix servers. The legacy system 
performance is rather poor, so the new system must ensure that access to the data on the legacy system 
occurs in a timely manner. The new system will access course information from the legacy database but 
will not update it. The registrar’s office will continue to maintain course information through another 
system.
At the beginning of each semester, students may request a course catalogue containing a list of course 
offerings for the semester. Information about each course, such as professor, department, and 
prerequisites, will be included to help students make informed decisions.
The new system will allow students to select four course offerings for the coming semester. In addition, 
each student will indicate two alternative choices in case the student cannot be assigned to a primary 
selection. Course offerings will have a maximum of ten students and a minimum of three students. A 
course offering with fewer than three students will be canceled. For each semester, there is a period of 
time that students can change their schedule. Students must be able to access the system during this 
time to add or drop courses. Once the registration process is completed for a student, the registration 
system sends information to the billing system so the student can be billed for the semester. If a course 
fills up during the actual registration process, the student must be notified of the change before 
submitting the schedule for processing.
At the end of the semester, the student will be able to access the system to view an electronic report 
card. Since student grades are sensitive information, the system must employ extra security measures to 
prevent unauthorized access.
Professors must be able to access the on-line system to indicate which courses they will be teaching. 
They will also need to see which students signed up for their course offerings. In addition, the professors 
will be able to record the grades for the students in each class.
Give below are the UML Use Case Diagram and Use Case Specifications (Descriptions). Your task is to 
draw the Sequence and Class Diagram(s).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now