CMIS102 Homework Assignment

  

CMIS102 Homework Assignment 3 (Worth 13% of your grade)

http://questionssolved.com/multiplication-table/

In this assignment, you will design a program to perform the following task:

Write a program that would calculate and display the results for the multiplication table for values ranging from 1 to 100.

Before attempting this exercise, be sure you have completed all of chapter 4, 5 and course module readings, participated in the weekly conferences, and thoroughly understand the examples throughout the chapter. There are 3 main components of your submission including the problem analysis, program design and documentation, and sample test data.

1. Provide your analysis for the following problem statement: You need to write a program that would calculate the results for the multiplication table up from 1 to 100. (For example, 1X1, 1X2, 1X3 … 1X10, 2X1, 2X2 …. 10X2 … 10×10). Your program should print the output for each step and output a new line after 10 items. So the example output would be something like this Notice a new line appears after 10 steps:

1 2 3 4 5 6 7 8 9 10

2 4 6 8 10 … 20

10 20 30 … 100

To write the new lines you can just use code similar to : write “new line”. Hint: You will probably use a nested repetition loop.

Your analysis should be clearly written and demonstrate your thought process and steps used to analyze the problem. Be sure to include what is the required output? What is the necessary input and how you will obtain the required output from the given input? Also, include your variable names and definitions. Be sure to describe any necessary formulas and sample calculations.

2. Provide your program design for the program you analyzed for printing the multiplication table. Be sure to describe the fundamental tasks (i.e., things your program must do) needed to solve the problem so you can use a modular design. Provide pseudocode of your overall design that includes the Main module and the order of the module calls, and a Hierarchy chart for the program (see figure 3.8 page 148). Finally, display the flow charts (using Raptor, or your favorite graphics editor) for each module. (See figure 5.3 page 233 as an example.)

Include header and step comments in your pseudocode, using a similar approach as the example provided in section 2.3 (textbook page 86). See example 2.8 on pages 88).

3. Prepare any input data (Test data) along with expected output for testing your program (Note: Programs may not always have both input and output data. Just provide test cases for your application). Your test data can be presented in the form of a table as was shown in Assignment 1.

Design Class and Sequence Diagrams

  

Car Sharing – Design Class and Sequence Diagrams

With preliminary diagrams being produced that outline the events and relationships inherent in the Car Sharing system, there is a clear understanding of the type of design and data which will be utilized within the system. This will allow for the creation of a Design Class diagram which outlines the class attributes to a far higher degree of detail:

Mysql database

Create a MYSQL Database. (10 marks)

Create two/three Tables under the database; ensure there is one-to-many or many-to-many relationship in between tables. (15marks)

Write node code to insert data to all the tables. Create a generic function which will take the table name, query as parameter to insert data into the tables. (10 mark)

Write node code to get data from the tables. Create least 5 different queries to find data from database (the find queries must have combination of and/or/gt/ls/like commands available to retrieve data). Use table joins when you retrieving the data.(30 marks)

Write node code to update data into the table(20 marks)

Write node code to delete data from table. When you delete data ensure that related data in the other table also get deleted. (15mark)

How to submit the database:

1. Upload your node file.2. Create a screenshot of the output of read, insert, delete, and update functions

2

Final project

 TOPIC:  Cloud computing security technologies 

1. Five source annotated bibliography

2. Slide presentation with 12 or more slides

3. Summary or Abstract containing at least 750 words.

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use the Research Databases available from the Danforth Library not Google.

CIS 524 Small Parser

Write a Python 3 program tlparser.py to parse the five given timelog data files in the folder “Homepage/Course Project/Small Parser” of the Blackboard to get how many hours and minutes the author spent in each file. The timelog file name will be an argument for your Python program. For example, you run your program on the spirit machine like “python3 tlparser.py TimeLogCarbon.txt” a. Your program needs to report the line number if there is something wrong with the format of the time data in that line that your Python program cannot parse. We cannot assume that there will be a time data value in each line. The line like ‘- 10.remove “other”’ is a perfect line. b. Your program start to count the time after it found the hard-coded “Time Log:” (case insensitive, there is a space between Time and Log). c. The “pm” and “am” should be case insensitive, i.e., 9:10pm or 9:10PM or 9:10pM or 9:10Pm are all valid time value. d. “9:10pm – 11:40pm” or “9:10pm-11:40pm” or “9:10pm -11:40pm” are all valid time periods, i.e., the spaces between “-” and the time value are not important. e. Do not use the regular expression module “re” in your source code. f. We assume there will be no space within “9:10pm”. Please issue “python3 tlparser.py TimeLogCarbon.txt” on the spirit machine (Python version 3.8.10) to test your Python program before you turnin it. Please use “if __name__ == ‘__main__’:” in your code and avoid global variables (read sections 2.5 and 3.17 at Google Python Style Guide (https://google.github.io/styleguide/pyguide.html)). Two articles about the variable __name__ in Python: https://medium.com/python-features/understanding-if-name-main-in-python-a37a3d4ab0c3 https://www.geeksforgeeks.org/what-does-the-if-__name__-__main__-do/ ease type your solutions in a Word document file hwch4_xxxxxxx.docx where xxxxxxx is your CSU ID number. Choose File -> Save As from Word to save your solutions as a hwch4_xxxxxxx.pdf. The cover page should contain your name, your CSU ID and the login id you used to turnin the project. Turning it in You have to submit your program electronically by using the following command on the grail machine: turnin -ccis524x -p sparser tlparser.py Start on time and good luck. If you have any questions, send e-mail to [email protected], [email protected], or [email protected].

draft

 In a minimum 5-pages,  choose any dissertation on any topic by searching the ProQuest library database  where you clearly explain the overall research topic, literature gathering process, and the scope and organization of the literature review. The introduction should conclude with a paragraph that describes the sequence of the literature you will include and the literature analysis process. After the introduction, you should incorporate possible headings/subheadings that you plan to cover and include at least 20 scholarly references. 

dq

1..As outlined within this weeks topic, there are several benefits as well as challenges associated with the use of Big Data Analytics in the e-Healthcare industry. Pick one of the four concepts below and then identify the benefits and challenges associated with that concept. Do not simply list the benefits and challenges but detail them in a substantive, thorough post as it relates to that concept in the e-healthcare industry.

  • Data Gathering
  • Storage and Integration
  • Data Analysis
  • Knowledge Discovery and Information Interpretation

project 1

 

Project Part 1 Task 1: Risk Management Plan

For the first part of the assigned project, you must create an initial draft of the final risk management plan. To do so, you must:

  1. Develop and provide an introduction to the      plan by explaining its purpose and importance. 
  2. Create an outline for the completed risk      management plan. 
  3. Define the scope and boundaries of the      plan. 
  4. Research and summarize compliance laws and      regulations that pertain to the organization. 
  5. Identify the key roles and      responsibilities of individuals and departments within the organization as      they pertain to risk management. 
  6. Develop a proposed schedule for the risk      management planning process.
  7. Create a professional      report detailing the information above as an initial draft of the risk      management plan. 

Write an initial draft of the risk management plan as detailed in the instructions above. Your plan should be made using a standard word processor format compatible with Microsoft Word. 

Evaluation Criteria and Rubrics

  • Did the student demonstrate an understanding      of the competencies covered in the course thus far?
  • Did the student include all important      components of a risk management plan in the outline?
  • Did the student demonstrate good research,      reasoning, and decision-making skills in identifying key components and      compliance laws and regulations?
  • Did the student create a professional,      well-developed draft with proper grammar, spelling, and punctuation?

  

Submission Requirements

All project submissions should follow this format:

  • Format: Microsoft Word or compatible
  • Font: Arial, 10-point,      double-space
  • Citation Style: Your school’s preferred style      guide
  • Minimum 2 pages per task

  

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors. 

Company Products 

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

· Loss of company data due to hardware being removed from production systems

· Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

· Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

· Internet threats due to company products being accessible on the Internet

· Insider threats

· Changes in regulatory landscape that may impact operations 

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined.

Project management

Develop a Resume in Cloud engineering, Scrum master and project management, include the skills required in  each resume in order for a recruiter to consider hirering you if possible make up some job experience.