Aspect Oriented programming project

 

I need assistance on this Aspect Oriented Programming project. The first requirement for this project is that the programming must use AspectJ on Eclipse java IDE.

The project details description in attached.

This program must run please.

You only need to turn in the actual software by exporting the project from Eclipse. You do not need to turn in any type of design document.

To export a project in Eclipse, follow these steps.

1. Right click on the project and select Export

2. In the General folder select Archive File

3. Click the Browse button

4. Give is a file name with a .zip extension

5. Click the Save button

6. Click the Use Zip button

7. Click the Finish button

Please, this program must run on Eclipse Java IDE.

Order # 12600

Title: Enterprise Architecture

Paper type Essay

Paper format APA

Course level Undergraduate

Subject Area Other (Not listed)

# pages 2   ( or 600 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

Note: Developing a business proposal requires specific steps that need to be executed in a sequence. The assessments in this course are presented in sequence and must be completed in order.

Preparation

•Review the Zachman framework for enterprise architecture. You can get a copy of this framework by checking the Internet resources identified as part of the Resources in this assessment. After reviewing the Zachman framework, have you considered everything necessary for the proposed project? For example, does the current architecture of the IT infrastructure within the company allow for ease of integration? Do you have the appropriate personnel to work on the project? Does a budget exist for the project? Can security standards be met? Can users be trained properly? What other IT systems need to be included as part of your proposal?

•Review the presentation that you created in Assessment 3. Using the Zachman framework, how can you strengthen the proposed solution to ensure that both the business and technology stakeholder needs are met?

Directions

Prepare a 3–5-page assessment in which you do the following:

•Identify the components of the Zachman framework that are going to be included in your proposed solution.

•Explain your rationale for including these other components from the Zachman framework.

•Evaluate the challenges you expect these additional components to add to your proposed solution.

•Add another slide to your PowerPoint presentation that succinctly identifies the components of the Zachman framework you are including, and your proposal for integrating these IT and business components to the proposed solution.

•Include any additional APA citations that support your rationale on the citation slide in your presentation.

Additional Requirements

Ensure that your assessment is professionally written and free of errors, and that APA formatting is applied throughout.

plain view doctrine

 

Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

Use your own words and do not copy  the work of another student.

Attach your WORD document here.

Discussion 13 – Enterprise Risk Management – Initial post

In the last week of class, we are going to complete a reflection activity.

 This discussion topic is to be reflective and will be using your own words (500 words) and not a compilation of direct citations from other papers or sources. You can use citations in your posts, but this discussion exercise should be about what you have learned through your viewpoint and not a re-hash of any particular article, topic, or the book.

Items to include in the initial thread: 

  • “Interesting Assignments” – What were some of the more interesting assignments to you? 
  • “Interesting Readings” – What reading or readings did you find the most interesting and why? “Interesting Readings”
  • “Perspective” – How has this course changed your perspective? 
  • “Course Feedback” – What topics or activities would you add to the course, or should we focus on some areas more than others? 

The Role of Privacy in the Workplace

 

The Role of Privacy in the Workplace

Conduct research via the internet and provide a brief yet detailed paper on Privacy in the Workplace. You may select a position as to whether you believe there should be Privacy in the Workplace, or that employees do not have the right to privacy at work. Things to take into consideration are outlined below:

 ·  What are the laws and regulations that impact privacy in the workplace?

 ·  Why would an employer want to monitor the activities of its employees?

 ·  What benefits / drawbacks are associated with monitoring employees?

 ·  What could an organization use to ensure that all employees are well aware of their rights and responsibilities with regard to privacy?

 ·  What type of monitoring systems are used in the workplace today?

For this assignment, submit a 5-6-page paper answering these questions as succinctly and completely as possible. 

Paper should conform to APA style. 

The page total does NOT include the title page or the reference page(s). 

Do not include an abstract of table of contents.

You should have a minimum of 4 references, none of which can be Wikipedia or Techopedia.

Your paper should be more of a narrative, and not just a series of bullet lists

Questions on Logistic Regression using R

From the text book attached below, I need solutions for the questions below from Chapter10: Logistic Regression

Problem 1: Financial conditions of banks (b, c, e)

Problem 4: Competitive auctioning on ebay (a, b, c, d, e, f)

incident response in the cloud

Discuss in 500 words or more best practices for incident response in the cloud. Refer to at least one incidence response framework.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

InfoTech Import in Strat Plan (ITS-831)

Discussion: IT Project Management

Word Count: 300+ words

What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents.

Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

At least one scholarly source should be used in the discussion. Be sure to use information from your readings and other sources. Use proper citations and references in your post.

Reading resources:

Chapter 13, “Privacy and Ethical Considerations in Information Management”. Managing and Using Information Systems, Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta, John Wiley & Sons 

Chapter 11, “Managing IT Projects” pp. 246-259. Jenkin, T. A., Chan, Y. E., & Sabherwal, R. (2019). Mutual Understanding in Information Systems Development: Changes within and across Projects. MIS Quarterly, 43(2), 649–671. Retrieved from  https://doi.org/10.25300/MISQ/2019/13980  

plagiarism check required, APA format, within 8hrs