Click for more options

discussion

 

Discuss the relationship between the Waterfall model, work breakdown structure (WBS), RACI chart, scheduling and cost, when a decision has been made to migrate to the Cloud.  Please be sure to explain why.  Do not forget to follow the discussion forum guidelines. Click for more options

Milestone 3 for project for online food ordering system

 Milestone 3: Design Modeling – Due 11/11 

The Design Modeling part should contain the following components: 

a. Final Class Diagram (see page 299, fig 8-15 (5th Ed))

 b. Package Diagram (see page 267, fig 7-21 (5th Ed)) 

c. Database Design (see page 353, fig 9-16 (5th Ed))

 d. Data Access and Manipulation Design (see page 358, fig 9-21 (5th Ed)) 

QUANTITATIVE Journal Article Review

 

You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.) 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References  

discussion

 Task1 (Around 500-600 words)

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

Ask an interesting, thoughtful question pertaining to the topic

bharg research paper

 

Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use  Google Scholar to find these types of articles (https://scholar.google.com/ )

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

project 8

  

Project 8 

1. You are approached by a hospital to maintain the data records of its patients. Which file organization technique would you suggest? Why?

2. What are the advantages and disadvantages of each access control method? Which of these methods would you recommend for a highly secure system with several files and several users?  Provide reasons for your answers.

Prepare the slide with a diagram and link to the reference 

2 slide each question 

IA week9 DB

 

Hello,

i need this paper by 10/21 afternoon.

Strictly No plagiarism please use your own words.

Describe two cryptographic applications and how they are used in Information System Security.

An initial post must be 300 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Cloud Computing in Education – Paper – 13 hrs

The topic of the paper is “Cloud Computing in Education”. Paper should consist of following sections and I have listed the section by resources to.

1. Abstract (1/2 page)

2. Introduction ( 1/2 page)

3. (2 pages)

a. Cloud Computing in Higher Education

b. The Challenges of Cloud Computing in Higher Education

– https://www.librarystudentjournal.org/index-php/lsj/article/view/289/321/#need?CSRF_TOKEN=1451c54f7aa59da7d6999c2281cefc17892a7939

4. Proposed Architecture for HE institutes (3 page)

– section 7 in paper- https://www.sciencedirect.com/science/article/pii/S221256711400224X

5. Advantages of using e-learning in the cloud (1/2 page)

– section 4 in paper- https://www.orizonturi.ucdc.ro/arhiva/2014_khe_6_pdf/khe_vol_6_iss_2_100to103.pdf

6. Conclusion (1/2 page)

Abstract, introduction and conclusion can be grabbed from below links(latest paper is the preference)

https://d1wqtxts1xzle7.cloudfront.net/44685282/IJIRSTV2I10084.pdf?1460530711=&response-content-disposition=inline%3B+filename%3DCloud_Computing_in_Education_Sector.pdf&Expires=1602376924&Signature=Bt2TMamjaN5OrthY7dGqyvrJ4LQ3CgctpRpaZTN~n6PA-dtKcjGjU5Mt3SeKQGTHW-t3IvWgomad29U9ZNWKWJKAAl68XvJtOloYi6VlhAQqttNrb52YNLr-yRPiR7kf5JFBtr1pMJk5KIdrXqMq08~iUGCpK0tjFrIJV~2t-cVjoDwQ12O44Y8ii8~HOB1QJ6zTZRcIHbhzlxFzrPSlJplCgssG0NF7FYIjbB5wnLABeo4ldCrbzyVhmg0YPQ9FzTrYpC0~DuMmSAg5AUM3dyfBOPcHRNexKROg7bZDPR5-FXlBrL5hv1vS~rvzOiQ58cptnRMV4NT4JVrylcJuYA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA

https://link.springer.com/chapter/10.1007/978-1-4614-3329-3_2

http://www.ijcte.org/papers/511-G1346.pdf