5s week 1 assignment PL

****Need this assignment by today 19 PM EST****

In 350 words,

Article: https://www.wired.com/story/cambridge-analytica-facebook-privacy-awakening/

Read the above article about Cambridge Analytica in Wired Magazine. Discuss whether you think the premise of the article is correct and that people are more aware of privacy concerns.  

Research Databases available from the Danforth Library: https://libguides.nec.edu/az.php

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Impact of IT

Throughout this course we are going to critically assess the institutional forces that shape and create the demand for information technology. When responding to discussion boards, try to incorporate, when possible, your view as a student and your view as an employer. For example, how does social media impact you on a personal level and how would it impact your employer? They are both two very different answers.

Q1) Select one of the topics listed below and find a recent article that relates to this topic and post a summary of that article and express your views as well.

Listed Topics:

  • What is disruptive technology? Cite one example of a technology that has emerged in the last decade and what impact it has had. Who/what was affected?
  • What are some concerns that a typical cell phone user should have regarding privacy and how can they mitigate those concerns?
  • In your opinion, how was Facebook able to dethrone MySpace as the most popular social media site? What did Facebook offer that MySpace did not?
  • What technological improvement/invention has had the most impact on modern day business? Why?

Not more than 350 words total. Respond to at least two other students (150 words each peer)!!

2. Two (2) paragraphs (350 Words total) discussion response to main DQ questions. In addition, respond with two (2) students/Peers to Peer (identify peers) or two classmates. The responses should 150 words each and must focus on the discussion topic above. Examine related issues, ask questions, provide hypothesis and/or situation(s). A peer response may not be to a peer already responded to more than twice.

discussion

  1. Review and describe the application development and sustaining (AD&S) methodology your company implemented.
  2. List 3-5 documentations that are critical to the success of implementing AD&S along with description of each document and who uses those documents.

Discussion Need in 5 Hours

 his is a required assignment worth 20 points (20-points/1000-points). The assignment must be submitted by the due date. No late assignments are allowed. Please discuss the following topics and provide substantive comments to at least two other posts.
Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer. 
The discussion questions this week are from Chapters 12-13  (Jamsa, 2013).

Chapter 12 topics:

  • Discuss key items that should be included in an SLA.
  • Define predictive analytics and discuss how an IT manager might use such analytics.
  • Discuss how an IT manager might use load testing on a site.
  • Define and discuss vendor lock-in and identify steps a company should take to mitigate this risk.
  • With respect to cloud-based solutions, list and discuss 5 to 10 operations or tasks an IT manager should oversee.

Chapter 13 topics:

  • List and describe common system requirements one should consider before moving an application to the cloud.
  • Discuss why a company should consider using a consultant to oversee a cloud migration and list specific skills you would expect the consultant to have.
  • List and discuss resource utilization characteristics one should monitor for an application prior to moving the application to the cloud.
  • List possible training requirements for a SaaS solution integration, a PaaS application migration, and an IaaS application migration.
  • List and describe budget considerations one should evaluate before moving an application to the cloud.
  • List and describe IT governance considerations one should evaluate before moving an application to the cloud.
  • Define and describe cloud bursting.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  The initial post is due by Wednesday at 11:59 pm ET.  You must engage on at least three separate days (by Wednesday for the first post and two additional days of peer engagement).  Do not wait until Sunday to engage with peers, this should be an active conversation with your peers.  When replying to peers be sure to engage with substantial posts that add to the conversation. 

Kronos Company

 Write a 4 page Paper that describes the Kronos company:

Kronos

i. What do they do? ABSTRACT 

ii. Where are they headquartered? INTRODUCTION

iii. What is their history? HISTORY

iv. Successful Product Development Aspects- What does the firm believe are the most important aspects of successful new product development?   

Please include 3-4 APA references as well

DQ

http://scet.berkeley.edu/wp-content/uploads/BlockchainPaper.pdf

Ethical hacking Assignments

Wk 6 Writing Assignment(250 Words)

Select one network scanning software tool (there is a list in your required reading slides) and explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up.

Wk 8 Research Assignment (250 Words)

Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 2-3 paragraphs, briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.

Wk 9 Written Assignment(250 words)

Using the following link as your reference, select TWO and explain the differences

(viruses, worms, trojans, and bots).

What Is the Difference: Viruses, Worms, Trojans, and Bots?

Java program

Objectives:

  • Use inheritance to create base and child classes
  • Utilize multiple classes in the same program
  • Perform standard input validation
  • Implement a solution that uses polymorphism

Problem:

A small electronics company has hired you to write an application to manage their inventory. The company requested a role-based access control (RBAC) to increase the security around using the new application. The company also requested that the application menu must be flexible enough to allow adding new menu items to the menu with minimal changes. This includes re-ordering the menu items and making changes to the description of a menu item without having to change the code.

Security:

The company has suggested to start the application by prompting the user for a username and password to authenticate the user. There are two types of users at this company, managers and employees. If managers log on to the application, they will see all options on the menu list. If employees log on to the application, they will see a limited set of options on the menu list. User information is stored in Users.dat file, which may or may not exist at the start of the program. A super user “admin” with password “admin” has already been hardcoded in the program to allow for the initial setup and the creation of other users. The Users.dat file contains the FirstName, LastName, Username (case insensitive), HashedPassword and a flag to indicate whether a user is a manager or not. The file is comma separated and it is formatted as follows:

Joe, Last, jlast, 58c536ed8facc2c2a293a18a48e3e120, true
Sam, sone, samsone, 2c2a293a18a48e3e12058c536ed8facc, false
Jane, Best, jbest, 293a18a48e3e12052058c536ed8facc2c, false

Note: Ensure that the ‘AddUser’ function does not add duplicate values, and the ‘ChangePassword’ function does not change password if username/password is entered incorrectly. If adding a new user or changing the password is successful, return true, or else return false.

Application Menu:

The menu of the application is dynamically loaded and displayed to the user only after the user successfully logs on. The menu items will be loaded from file “MenuList.dat”, which may or may not exist at the start of the application. If the file doesn’t exist, the application should show at least an Exit menu item as default. The file will contain all menu items details, including the name of the command that will be executed when the menu item is selected. If a menu item is marked as restricted (Boolean flag), only managers can see that item. The file contains the following comma separated fields, Description, a Boolean flag to indicate if the option is restricted to managers only, and the name of the menu command that will be executed when the option is chosen. The order and option number of a menu item may change depending on how they are listed in the file. The Exit option will always be listed last and it will not be in the file. 

Below is a sample of how the MenuList.dat file looks like:

Add User, true, AddUserCommand
Delete User, true, DeleteUserCommand
Change Password, false, ChangePasswordCommand
Add New Product, true, AddProductCommand

Note: The command name of each menu item must match the name of the class that you will create in the code (See AddProductCommand class in the code for example).

Inventory:

The inventory consists of multiple products of type Product stored in class ProductCatalog. The ProductCatalog is responsible of all inventory operations that add, remove, find and update a product. When printing a product information, the product retail price should be calculated and displayed as well. Retail price = (cost + (margin * cost/100)). A list of functions has been added to this class in the provided code template. You must implement all listed functions. The inventory products will be saved in file Inventory.dat, which may or may not exist when the program first starts. The file will contain the product unique id (int), product name (string), cost (double), quantity (int) and margin (int, integer that represents margin percentage). 

The Inventory.dat file is comma separated and formatted as follows:

3424, Smart Watch, 20.45, 23, 80
65454, Flat Screen TV, 465.98, 15, 35
435, Computer Monitor, 123.54, 84, 43

Program Flow:

  • Program starts in main() method
  • Prompt user for username and password
  • Authenticate user and maintain the logged-on user object
  • Load inventory
  • Load and create menu list
  • Display menu list and prompt the user for option
  • Execute selected option
  • Keep displaying the menu until the user chooses to exit

Output Format:

Enter username: some username
Enter password: some password //Repeat prompts until user is authenticated OR show error and
option to exit.
Invalid username or password!
Press enter to continue or “Exit” to exit:
Enter username: some username
Enter password: some password
Welcome Firstname LastName!
Inventory Management System Menu //This is the header of the MenuList

// The order and option number of a menu item may change depending on how they are listed in the MenuList.dat file. The Exit option will always be listed last and it will not be in the MenuList.dat file.

1- Add user
2- Remove user
3- Change password
4- Add new product
5- Update product information
6- Delete product
7- Display product information
8- Display inventory
9- Exit
Enter your selection: 7
Enter product name: sMaRt wAtCh

Id Name Cost Quantity Retail
----------------------------------------------------
3424 Smart Watch $20.45 23 $36.81

//Repeat the menu after each command is executed

Unit Testing:

A unit test method is required to test each of the methods listed below. These methods will be used by the unit testing framework to test the accuracy of your code.

  • InventoryManagementSecurity.AuthenticateUser
  • InventoryManagementSecurity.AddNewUser
  • InventoryManagementSecurity.RemoveUser
  • InventoryManagementSecurity.ChangePassword
  • MenuList.AddMenuItem()
  • ProductCatalog.AddUpdateProduct(Product product)
  • ProductCatalog.RemoveProduct(int productId)
  • ProductCatalog.FindProduct(int productId)
  • ProductCatalog.PrintProductInformation(int productId)
  • ProductCatalog.PrintInventoryList()

Grading:

  • Coding standards, style and comments (10 Points)
  • Unit testing methods x 10, (2 points for each of the methods mentioned above – 20 Points)
  • The rest of the grade will be broken down as follows:
  • InventoryManagementSecurity.AuthenticateUser (5 Points)
  • InventoryManagementSecurity.AddNewUser (5 Points)
  • InventoryManagementSecurity.RemoveUser (5 Points)
  • InventoryManagementSecurity.ChangePassword (5 Points)
  • MenuList.AddMenuItem() (20 Points) //This includes implementing all commands for the menu list
  • ProductCatalog.AddUpdateProduct(Product product) (10 Points)
  • ProductCatalog.RemoveProduct(int productId) (5 Points)
  • ProductCatalog.FindProduct(int productId) (5 Points)
  • ProductCatalog.PrintProductInformation(int productId) (5 Points)
  • ProductCatalog.PrintInventoryList() (5 Points)

Notes:

  • The “InventoryManagement” Maven solution zip file has been provided to you in eLearning.
  • All *.dat files are assumed to be local to the current executable.
  • Do not change the methods stubs or constructors in the template. If in doubt, please ask.
  • Your program is expected to have basic input validation.
  • You may use ArrayList in this project
  • Part 1 deliverables: Unit Test methods + AuthenticateUser() function (no add or remove user is required in part 1). See eLearning for due date.
  • Part 2 deliverables: Functioning program including the Unit Test methods