Java Project to be applied in Console

  

Description:

The Bank app is a console-based application that simulates banking operations. A customer can apply for an account, view their balance, and make withdrawals and deposits. An employee can approve or deny accounts and view account balances for their customers.

Purpose:

We want to see that you can meet deadlines and that you can code. You are expected to complete the following requirements and give a 5 minute presentation of your project.

Requirements:

● Build the application as a Maven project using Java 8

● All interaction with the user should be done through the console using the Scanner class

● Customers of the bank should be able to register with a username and password, and apply to open an account.

o Customers should be able to apply for joint accounts

● Once the account is open, customers should be able to withdraw, deposit, and transfer funds between accounts

o All basic validation should be done, such as trying to input negative amounts, overdrawing from accounts etc.

● Employees of the bank should be able to view all of their customers information. This includes:

o Account information

o Account balances

o Personal information

● Employees should be able to approve/deny open applications for accounts

● Bank admins should be able to view and edit all accounts. This includes:

o Approving/denying accounts

o withdrawing, depositing, transferring from all accounts

o canceling accounts

● All information should be persisted using text files and serialization via Object Input/Output Stream

● 100% test coverage is expected using J-Unit

o You should be using TDD

● Logging should be accomplished using Log4J

o All transactions should be logged

ERM

  

Enterprise Risk Management Integrating with Strategy and Performance Executive Summary. (2017, June). Retrieved from https://www.coso.org/Documents/2017-COSO-ERM-Integrating-with-Strategy-and-Performance-Executive-Summary.pdf

Do, H., Railwaywalla, M., & Thayer, J. (2016). Integration of ERM with Strategy (p. 35). Retrieved from Poole College of Management, NCSU website: https://erm.ncsu.edu/az/erm/i/chan/library/Integration_of_ERM_and_Strategy_Case_Study.pdf

  • Which case study in the paper was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources . Use proper citations and references in your post.

Article summary 1

 

– Find 2-3 recent peer reviewed articles (within the past 3 years) that closely relate to ‘Managerial Issues of a Networked Organization’

– Should be a minimum of 750 words

– There should be no plagiarism. Attach a turnitin report with 0% similarity index.

Legal-g assignement

write an essay with 500 words minimum on addressing the applications and implications of a  Gramm–Leach–Bliley Act (GLBA) discussed in this course to the conduct of your duties as an Information Technology professional(order management – payment module). Your essay should address the following.

  • a definition and overview of  Gramm–Leach–Bliley Act (GLBA)
  • consideration of the duties of an Information Technology professional(order management – payment module)
  • an analysis of the application of that law or regulation in the context of the identified duties
  • a reference page(s)
  • Your paper must include a minimum of 4 peer-reviewed resources (articles or papers) 

3 – Key Performance Indicators KPIs

  

Assignment Content

  1.     Consider the importance of Key Performance Indicators (KPIs) as an IT manager in the small retail organization from Week 2. The previous measurement period has concluded, and you must prepare an update to the chief information officer (CIO) on your IT team. Some KPIs are pre-determined. You must also recommend other KPIs for your team.

    Prepare a 14- to 16-slide media-rich or voice-over presentation in which you:

    • Discuss the provided Key Performance Indicators (KPIs) and comment on the direction and characteristics of the KPI.
    • Write three additional KPIs with appropriate justification for inclusion in the KPI report.
    • Discuss how KPIs can be tied to strategic vision and project planning.
    • Research IT performance applications or tools for monitoring and evaluation of the KPIs. Evaluate three products and how each tool effectively meets assurance practices and IT performance.
    • Format your citations according to APA guidelines.
      Submit your assignment.
  • NOTE: you have done my week2 works so you know what is this assignment is asking for. Please refer to week 2 assignment that you did for me. Thank you. 

Presentation

Create a PP 12 slides with below topics related to telecommunications and networking with applications for every parameters mentioned below. APA formatted.

overview of OSI model

Client-Server Network

TCP/UDP

Methods of Communication

Analog & Digital Transmission

Media Access Control

LAN/WLAN Components

Ethernet/Wireless Ethernet

Dedicated-Circuit Networks

VPN Networks

Network Security

references

Policy, Legal, Ethics

  

1) Do a bit of research on JSON and AJAX. How do they relate to the the Same-Origin policy?

Using WORD, write several short paragraphs on each. A total of 250-300 words. Use your own words.

2) Answer below questions, each of these questions in a paragraph with at least five sentences.Include the question and number your responses accordingly. Min 1 citation for EVERY question and it needs to be referenced. References & citations should be less than 6 years old. They also need to be an academic source something from the library or scholar Google not just any random website. It must be a peer reviewed academic source or an industry recognized type reference. Make sure your citations and your references use proper APA formatting if you are unsure consult the OWL website. 

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

11. Make an argument for legalizing the copying of music or software. 

12. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I  don’t own them, what is my legal right to them?

3) Watch this video about Joseph Shumpeter’s concept of Creative Destruction. For example, many think that the introduction of self-driving cars will disrupt the job market for drivers. 

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.  Write in essay format not in bulleted, numbered or other list format. It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. 

Ethical hacking

Wk -3 (2-3 Paragraphs)

Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.A reference citation is also required for this assignment. You may just include a link to your article.

WK -4(2-3 Paragraphs)

Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

Be sure ti include your reference citation.

WK -5

After responding to the weekly discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project. For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.).

Python Scripting

Need someone with a lot of experience in Python Scripting. Please read all of the directions on the file before attempting it.