A designer furniture and accessories company/

 

Your team has been assembled to provide Information Technology consulting services to a newly formed fictitious company.

Your team is to select one the following:

  • A semi-custom designer jewelry company
  • A designer furniture and accessories company
  • A specialty sporting accessories company (hiking, climbing, water sports, etc.)
  • An urgent medical care company
  • An automotive accessories company
  • An upscale cooking supplies company
  • A medical supply company
  • Other (requires instructor approval)

This medium-sized company was formed by combining several smaller companies within the same industry into a single entity. Each of the smaller companies had their own IT system, and some were not so good, usually because the systems were cobbled together from different sources over the years. The new organization intends to avoid that undesirable outcome.

This organization intends to bring all of the disparate systems together into one comprehensive system. The plan is for another team to implement an ERP system such as SAP or PeopleSoft as the core application for managerial control. That part of the transition will be outsourced to another team and is NOT part of your group’s charter.

Your team was assembled by selecting individuals from some of those smaller companies described above, so you have never worked together before. Also, the levels of experience and training for the various team members can be quite variable.

Your mission is to develop an overall systems architecture plan from top to bottom for the new organization. This will involve several different platforms from the data center to the smartphone level including some levels in between. You may or may not be concerned with the specific source or brand name for a platform or subsystem as your team sees fit.

The team needs to consider all the possible roles that need to be supported in this organization that includes light manufacturing, procurement, sales, distribution, and customer support. A good portion of the sales staff will operate from mobile platforms while traveling to customer sites. The primary business channel is wholesale to other businesses but the organization intends to provide some in-house retail operations through brick & mortar facilities as well as online operations.

The overall assignment is to develop a comprehensive plan for the systems architecture for this fictitious organization in a form that would be appropriate as a PowerPoint slideshow for management. You may consider this as the means of presenting your conceptual plan.

need asap

 have to find a problem to solve that deals with data and data sources. 

 

  1. The problem to solve.
  2. The data sources to pull from.
  3. The tool that will be used (R)
    1. Note high level graphics that will be used to solve the problem and how they will be used

Data Mining

Please click on the link above to submit this week’s assignment.

Find a dataset suitable for association rule mining and use Orange, Weka, or IPython Notebook to find interesting association rules. You can also use the Java-based SPMF tool:
https://www.philippe-fournier-viger.com/spmf/
With SPMF, you can try doing more advanced analysis, such as using multiple-supports and sequential pattern mining.

Make sure the data you find is in a suitable format. Generate the association rules and rank them by the various metrics such as support, confidence, lift, and others. Try to identify the most interesting, useful, and surprising rules based on the combinations of the metrics.

Describe the data, methodology, and results in a formal technical report. Make sure to analyze the results and describe the implications of the rules you have found. Discuss whether they follow from intuition and could they generalize to unseen data.

Use the attached template. Make sure to include figures and tables that describe the process and the outcomes, and reference them from the text. Submit your report using a PDF document format.

Grading Rubric (25 points total):
0-5: Data (suitable for problem, sufficiently large, non-trivial)
0-5: Methodology (appropriate methods and metrics used)
0-5: Results (non-trivial, interesting, data-driven results)
0-5: Presentation (well written report, good use of figures and tables, used references when appropriate, no spelling or grammar mistakes)
0-5: Following directions (submission format, software used, etc.)

4/2 Reading

  1. Read Chapters 7 and 8 in your textbook (Textbook: Principles of Information Systems)
  2. Using the discussion link below, respond to the following questions:
    1. What was the most useful takeaway for you from this workshop’s reading?
    2. What concept from the reading is the most applicable to you now in your profession, and how might you implement it?
  3. While responding to your classmates is not necessary for this discussion, you may read a couple of your fellow classmates’ posts to learn from their experiences. You must make your initial post first in order to see theirs.

Benchmark – Framework Compliance Assessment Report

 

Using all of the previous assignment information, students will create a Cybersecurity Risk Report that helps their proposed business manage cybersecurity risks.

Refer to the “Framework Compliance Assessment Report Guide,” located within the Course Materials, for full instructions.

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

This benchmark assignment assesses the following programmatic competencies:

MS Cybersecurity

2.2: Define and apply the NIST Cybersecurity Framework functional areas, implementation tiers, and profiles.

2.3: Apply the Cybersecurity Life Cycle, Cybersecurity Framework, and Methodologies to establish a Cybersecurity Program that supports an organization’s strategic initiatives.

Urgent 2

 

Case Study
LH Medical Company (LHM)
LHM is a London based privately owned hospital which provides healthcare to its patients. The hospital uses in-house software to manage and service its patients which they refer to as clients. It is an expanding venture and needs to accommodate for processing its information globally. The practice management system is web enabled and multi-platform for connectivity via web services, in addition it has connectivity to existing legacy systems. An enterprise document management system ensures patient documents are replicated globally and available per demand.
In addition to medical treatments, medicine and drugs, consultation and vaccinations are offered to its patients (with a variable additional fee) the company offers medical instruments to other companies either to purchase or to lease. LHM records the details of its clients with possibly their full medical history in their computer system. When a new patient requests an appointment (walk-in or on-line) a treatment course begins and a practitioner is allocated to the patient. A full history and previous medical records are printed showing different categories of Treatments during different time intervals. Analyses are drawn in terms of any possible allergies and previous histories. Treatments may involve many surgeons and consultants depending on its complexity.
The contact practitioner is responsible for estimating the costs of treatments that is agreed by the client at the start of the treatment. The duration of the treatment may be set at any time duration and may also be changed during the treatment depending on the complexity of possible operations. The final cost and completion date are recorded at the end of the treatment.
During a treatment process notifications may be sent to patients and other practitioners.
Repeat prescriptions may automatically be produced by the system if appropriate and are available for collection at any surgery by the patient. At any time a practitioner may suspend or cancel the prescriptions. The cost for a treatment is paid for by the client or an insurance policy provided by a number of insurers. Insurance policies may have additional surcharges and costing depending on treatment types and medicines. Long term treatment courses may be edited or cancelled by practitioners or clients. To re-start an existing treatment an additional fee is applied.
LHM may receive requests for specialise treatments from other hospitals or they may refer clients to other medical centres.
Each treatment course or service may include one or more of the following items:
• Operations and vaccinations
• Consultations and check-up
• Medicine and different types of tablets
• Clinical reports and attached documents and history
• Prescriptions and repeat Prescriptions
Payments by clients may be in full or part payments to cover a range of medical and non-medical services offered by the company. Payments may include possible applied surcharges for late payments and or special discounts for long term treatments. Tax allocations may also vary from one treatment item to another. Payments have to accommodate for price changes for medicines and medical services and track price changes for drugs purchased from pharmaceutical companies.
A treatment course comprising services from other hospitals carry additional changes set by the medical service providers. A full list of Treatment courses with corresponding payments may be requested by the site manager at any time. Clients’ outstanding balances may be retrieved at any time for current treatment and services indicating the payments for the treatment course.
Task Detail
This assignment is accompanied with a case study describing a high level system specification for an application. You are required to provide UML models for ONLY ONE appropriate use case. Your selected use case must be agreed by your module tutor.
Task 1
Develop a Use case model with one use case. As part of your answer produce the use case description and use case scenario.
Produce a Class diagram and domain model with appropriate refactoring and abstraction, related to the selected use case. As part of your model, produce a system class with clear set of public methods.
Produce a Sequence Diagram for the selected use case. Include possible guards, iteration, and message operations in your diagram. 
Task 2
Incorporate OCL to represent the business logic, rules and constraints for the selected use case. As part of your solution include the correct syntax for pre and post conditions, navigation, and multiplicities. 
Task 3
Produce a Component model with associated interface methods. As part of your model, illustrate various possible component composition and discuss the significance of your design. 
Task 4
Produce a software architectural design and associated interface methods. Discuss coupling and cohesion aspects of your design.
Task 5
Enhance your class diagram given as part of Task1 to contain the Mediator design pattern. Illustrate and discuss how your model can be extended with the observer pattern.

cloud computing

 

Search the Internet on the topic of ‘cloud computing, ‘data centers’ and ‘as-a-service’. 

Consider starting with wikipedia.com, techopedia.com or webopedia.com to learn the basic and find additional references listed within the webpage.
Consider searching for these term in youtube.com.  Many major companies specialize in these topics and maintain their own data centers (i.e. Google, IBM, Facebook, etc.)

Think about the impact these technologies have on Systems Analysis and Design.
How does this impact an organization’s use and need for IT expert, hardware and software?
What experts, hardware, software and services could the data center provide?
How would these technologies impact processes, procedures, policies and security?

WordSplit Printer Material from Lecture 09 will be helpful here. In lecture, we talked about how we can use recursion exploration to print out all permutations of a given string. For example, we could use recursion on the input “goat”

  WordSplitPrinter,  

WordSplit Printer Material from Lecture  09 will be helpful here. In lecture, we talked about how we can use  recursion exploration to print out all permutations of a given string.  For example, we could use recursion on the input “goat” to print out:  tgoa tgao toga goat gota gaot gato gtoa gtao ogat ogta oagt oatg otga  otag agot agto aogt aotg atgo atog toag tago taog Most of these aren’t  actual anagrams, because they’re gibberish. We could check which are  actual words (like “toga”), but that wouldn’t be enough. There are also  cases like “atgo” where the full string isn’t a word, but we can break  it into the separate words “at” and “go”. To find all anagrams, then, we  need to find the ways we can take one of these permutations and split  it into separate English words. That’s where your method,  findWordsplits, comes in: public void findWordSplits(String input,  TreeSet allWords) { // TODO: Implement this. }   The method takes two parameters: input and allWords. input will be a  string like “atgo” or “goat” that you’re trying to split into separate  words. You do not need to find permutations of input, since that was  part of the demo we did in class. input will be a string whose character  ordering is already set. allWords is a set containing the words listed  in the “words.txt” file — nearly 10,000 English words. allWords is  already populated for you! You’ll need to use it when you’re splitting  up the input string, since each chunk needs to be an actual word. . Your  task is to implement findWordsSplits to find every way you can split  input into valid English words, where every character in input is used  exactly once. For example, if input is we would expect these two splits  to be printed: “goat”, go at goat Other arrangements, such as “g oat” or  “goat”, would not be printed because “g”, “goa”, and “t” are not  considered words. The main method uses “isawabus” as input. Once  findWordsSplits is correctly implemented, you should see the following  output: i saw a bus i saw ab us is aw a bus is aw ab us If the exact  ordering is not the same, that’s completely fine. I’ve provided an  already implemented method in the starter code called printWordsplit:  public void printWordSplit(ArrayList words) { // Already  implemented for you. } You should call printWordSplit to print out a  single arrangement. For the “i saw a bus” example above, you would call  printWordSplit passing in an ArrayList containing [“i”,  “saw”, “a”, “bus” ] to print it out. findWordSplits is a recursion  exploration problem, just like our permutations demo in lecture. Think  about how to apply the recursion exploration formula:   1. How do you represent a path of options you’re exploring? o  printWordsplit is a major hint — if you need an ArrayList  to print a word split, that would also be a convenient way to represent  a path. 2. At each step, what are your options? o Consider an example  like “isawabus”. We can actually list out every possible option for the  next word: i is isa isaw isawa isawab isawabu isawabus Not all of these  are words, so you’ll need to check for yourself which ones are valid  options using the allWords set. The TreeSet is just a  specific type of Set, so you can use any Set methods on it. 3. What do  you do when you’ve finished exploring a path? o Just call  printWordsplit! Another hint: in your implementation, you will need to  use the String’s substring method to split a string into two parts. • To  get a substring that contains the first i characters, use  str.substring(0, i) where str is the name of your String variable. To  get the rest of that string (i.e. everything other than the first i  characters), use str.substring(i). If you’re struggling to translate the  above into actual code, I strongly recommend revisiting Lecture 09 and  see how we applied the same formula to the permutations problem or the  password guessing problem. WordSplitChecker Material from Lecture 10  will be helpful here. If you were able to complete WordSplitPrinter,  then congratulations! You’ve already done most of the hard work for this  last step. In WordSplitChecker 

WordSplitPrinter.java

package edu.csc220.recursion;

import java.io.*;
import java.util.*;

public class WordSplitPrinter {
   /**
    * Finds and prints out every possible way to split the input String into individual, valid English words (including
    * if input is itself a single valid word). You must call printWordSplit below to actually print out the results.
    */
   public void findWordSplits(String input, TreeSet allWords) {
       // TODO: Implement this.
   }

   /** Prints out a word split, i.e. one particular arrangement of words. This is implemented for you! */
   private void printWordSplit(ArrayList words) {
       if (words.isEmpty()) {
           System.out.println("(empty word list)");
       } else {
           System.out.print(words.get(0));
           for (int i = 1; i < words.size(); i++) {
               System.out.print(" " + words.get(i));
           }
           System.out.println();
       }
   }

   public static void main(String[] args) {
       TreeSet dictionary = readWords();
       WordSplitPrinter wordSplitPrinter = new WordSplitPrinter();

       // Expected to print out:
       // i saw a bus
       // i saw ab us
       // is aw a bus
       // is aw ab us
       wordSplitPrinter.findWordSplits("isawabus", dictionary);
   }

   // Reads the "words.txt" file and returns the words in a TreeSet. This is completely implemented for you!
   private static TreeSet readWords() {
       TreeSet allWords = new TreeSet<>();
       try {
           BufferedReader bufferedReader = new BufferedReader(new FileReader("words.txt"));
           String line;
           while ((line = bufferedReader.readLine()) != null) {
               if (line.trim().isEmpty()) {
                   continue;
               }
               allWords.add(line.toLowerCase());
           }
           bufferedReader.close();
       } catch (IOException exception) {
           throw new RuntimeException(exception);
       }
       return allWords;
   }
}

In this assignment

  

In this assignment, you will design a program to perform the following task:
Write a program that would calculate and display the results for the multiplication table for values ranging from 1 to 100.
 

There are 3 main components of your submission including the problem analysis, program design and documentation, and sample test data.
 

1. Provide your analysis for the following problem statement: You need to write a program that would calculate the results for the multiplication table up from 1 to 100. (For example, 1X1, 1X2, 1X3 … 1X10, 2X1, 2X2 …. 10X2 … 10×10). Your program should print the output for each step and output a new line after 10 items. So the example output would be something like this Notice a new line appears after 10 steps:
 

1 2 3 4 5 6 7 8 9 10
 

2 4 6 8 10 … 20
 

10 20 30 … 100
 

To write the new lines you can just use code similar to : write “new line”. Hint: You will probably use a nested repetition loop.
 

Your analysis should be clearly written and demonstrate your thought process and steps used to analyze the problem. Be sure to include what is the required output? What is the necessary input and how you will obtain the required output from the given input? Also, include your variable names and definitions. Be sure to describe any necessary formulas and sample calculations.
 

2. Provide your program design for the program you analyzed for printing the multiplication table. Be sure to describe the fundamental tasks (i.e., things your program must do) needed to solve the problem so you can use a modular design. Provide pseudocode of your overall design that includes the Main module and the order of the module calls, and a Hierarchy chart for the program . Finally, display the flow charts (using Raptor, or your favorite graphics editor) for each module. (See figure 5.3 page 225 as an example.)
 

Include header and step comments in your pseudocode, using a similar approach as the example provided in section 2.3 (textbook page 86). See example 2.8 on pages 87-88).
 

3. Prepare any input data (Test data) along with expected output for testing your program (Note: Programs may not always have both input and output data. Just provide test cases for your application). Your test data can be presented in the form of a table as was shown in Assignment 1. 

questions

 

  • 2.1 What are the essential ingredients of a symmetric cipher?
  • 2.2 What are the two basic functions used in encryption algorithms?
  • 2.3 How many keys are required for two people to communicate via a symmetric cipher?
  • 2.4 What is the difference between a block cipher and a stream cipher?
  • 2.5 What are the two general approaches to attacking a cipher?
  • 2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
  • 2.7 What is triple encryption?
  • 2.8 Why is the middle portion of 3DES a decryption rather than an encryption?

Complete your answers on a WORD Document,