1 page in APA 6th Format Operational Excellence

1 Page in APA 6th format with at least one professional references:

Which software-development methodology would be best if an organization needed to develop a software tool for a small group of users in the marketing department? Why? Which implementation methodology should they use? Why?

Select your final project topic. It must be unique. It should be a high level topic related to this course. Pick a topic that you will learn something from or that will be useful in your work. It must be specific not generic.

 

Select your final project topic. It must be unique. It should be a high level topic related to this course. Pick a topic that you will learn something from or that will be useful in your work. It must be specific not generic. Your final project will consist of a 12 minutes, 12 slide powerpoint presentation that you will present at residency and a 1 page single spaced summary and an annotated reference list as described below all of which will be submitted in Week 15. 

You must also respond to two of your peers’ proposals. Help them make a better, more focused, and more interesting presentation. 

Defend your choice of topic in 500 words or more. Include at least 3 expert supporting quotes surrounded by quotation marks and cited in-line. Provide an annotated reference list at the end. Annotations consist of two paragraphs of at least five sentences each about each of at least five references. The first paragraph should summarize the content of the source and the second are your thoughts or reflections about the source.

case study

Assignment: Create User Policy

Learning Objectives and Outcomes

  • Create a report detailing user access policies based on research.
  • Explain the details of user policy creation in organizations.

Scenario

You work for a large, private health care organization that has server, mainframe, and RSA user access. Your organization requires identification of the types of user access policies provided to its employees.

Sean, your manager, just came into your office at 6:00 p.m. on Friday and asks you to write a report detailing these user access policies. He needs you to research a generic template and use that as a starting point from which to move forward. He wants you to complete this task over the weekend as he has just been given a boatload of tasks in the management meeting which ended a few minutes ago. He is counting on you to take some of the load off his shoulders. The report is due to senior management next week.

Assignment Requirements

Look for existing policy templates and examples from organizations of similar type. Write a report detailing these user access policies based on your research, and place them into a table with an introduction explaining the following: who, what, when, why. Be sure to add a conclusion with a rationale for your selection. Reference your research so Sean may add or refine this report before submission to senior management.

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double-Space
  • Length: 3–4 pages

Self-Assessment Checklist

  • I created a professional report.
  • I included a table listing policies for the given scenario.
  • I used references.
  • I used my school’s preferred style guide and formulated my report clearly.
  • I provided a rationale and conclusion.

Project #4 CRC cards and Class diagram

CALIFORNIA STATE POLYTECHNIC UNIVERSITY, POMONA PROJECT CASE STUDY

Project #4 CRC cards and Class diagram

ACTIVITY DIAGRAM

The following activity diagram depicts the process of buying eye glasses from the viewpoint of the patient. The first step is to see an eye doctor who determines if the patient needs glasses then gives the patient a prescription. The patient goes to a glasses store, where he selects the frame and places the order for the glasses. Once the glasses have been made, the patient returns to the store for a fitting and pays for the glasses.

page1image3832948128

USE CASE DIAGRAM

The following use case diagram illustrates the process of buying eye glasses.

page2image3832981184

CRC CARDS AND CLASS DIAGRAM

The following concepts were identified from the Activity diagram and Use Case diagram above.

Patient Prescription Eyeglasses Frame

Lenses Order Doctor Store

ATTRIBUTES AND BEHAVIORS

The system needs to remember at minimum the following attributes and perform the following operations

System Attributes

System Behaviors

Eyeglasses getLenseID Eyeglasses getFrameID Order calculateTax
Order calculateItemCost Order calculateTotalCost Customer getContact Customer getPaymentInfo Prescription getSpecification Lens getStrength

Frame getStyle
Store getDirections Doctor getAppointment

Bill to address CC#
Email address ID

Customer
Customer
Customer
Customer
Customer
Customer
Customer
Doctor ID
Eye glasses Base cost Eyeglasses Description Eyeglasses Discount cost Eyeglasses Manufacturer Eyeglasses Model

Frame ID
Lens ID
Order Date
Order Discount price Order ID

Order Quantity
Order Retail price Prescription Date Prescription specification Product ID (eyeglasses) Ship to address

Store name Store phone Store address Store number

Name
Phone number (home) Phone number (work)

PROJECT REQUIREMENTS

1. Create a CRC card for each class
2. Use the classes that were outlined for you and create the CLASS diagram for the system.

  •   Determine which class each attribute belongs to.
  •   Identify and add associations to the diagram
  •   Name your associations
  •   Add attributes and behaviors to the diagram
  •   Identify and add multiplicity indicators to the diagram
    PROJECT DELIVERABLES
    1. Upload your PDF version of the project to the assignment posting on blackboard 2. Use the cover page at the end of this handout as the first page of your assignment

Course: Assignment: Student Name:

CIS 3150 –Introduction to Systems 

Automatic coding. Discussion board

There is a trend in programming to make coding easier and more automatic. Some welcome this trend, but others are concerned about future programmers not learning necessary programming fundamentals if programming is no longer required. For instance, without understanding how looping and variable initializations work, how easily would an individual be able to find a logic error in a looping process? Do you think programmers of the future should still learn programming fundamentals, even if coding is no longer required? Why or why not?

AD

Explain three different ways that freedom of expression is limited in spite of the unequivocal language of the First Amendment.
Explain how common law state court rulings prompted Congress to pass the Communications Decency Act. What does the CDA do?
What constitutional and statutory protections of privacy existed before the Internet became prevalent?

Discussion 7 – Response to Peers

Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

security

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Building an AI machine/Deep learning application

 

  1. Part 1 –
    1. Following is the link of the Project and Dataset :

Quick Guide to Build a Recommendation Engine in Python & R

MovieLens 100K Dataset

  1. Run the code several times and show the intended output…you also need to EXPLAIN the output…
  2. You will also need to provide output for the following:
    1. Python file containing your code…
    2. Dimensions of the data…
    3. Sample of the data…
    4. Statistical summary of the data…
    5. Class distribution…
    6. One univariate and one multivariate diagram…
    7. Decision Tree…explain the best depth and why?…
    8. Results of training and new data, 80%-20% split…
      1. Accuracy report…what is it telling us?…
      2. Confusion matrix…what is it telling us?…
      3. Classification report…what is it telling us?…
    9. Results of training and new data, 50%-50% split…
      1. Accuracy report…what is it telling us?…
      2. Confusion matrix…what is it telling us?…
      3. Classification report…what is it telling us?…
  3. Part 2 – Updated Code…
    1. Now that you have a working base of code, let’s apply it to a “real world” scenario…
    2. Find an article or video that shows a potentially SIMILAR usage of the application you created in Part 1…
    3. Update the original application so that it “works” for the NEW application…
    4. In this “Movie Recommendation” project, you might find an article on “book recommendations” …you would then update the original program to handle the new scenario…
    5. YOU MUST UPDATE THE ORIGINAL CODE…do not provide entirely new code base.
    6. Run the code several times and show the intended output…you also need to EXPLAIN the output…
    7. You will also need to provide the same output for THIS application, as you did for the ORIGINAL application…specifically:
      1. Python file containing your code…
      2. Dimensions of the data…
      3. Sample of the data…
      4. Statistical summary of the data…
      5. Class distribution…
      6. One univariate and one multivariate diagram…
      7. Decision Tree…explain the best depth and why?…
      8. Results of training and new data, 80%-20% split…
        1. Accuracy report…what is it telling us?…
        2. Confusion matrix…what is it telling us?…
        3. Classification report…what is it telling us?…
      9. Results of training and new data, 50%-50% split…
        1. Accuracy report…what is it telling us?…
        2. Confusion matrix…what is it telling us?…
        3. Classification report…what is it telling us?…