Create a program using the principles of inheritance based on the following scenario: Scenario: The teachers of a local school need a program to teach their students the basics about animals and their characteristics. The teachers want the program to contain a database of animals, from which the teachers can choose animals to add to a list. The list will be displayed on the students’ monitors so they can study the animals and their characteristics. Right now, the teachers want a program that handles only mammals and birds, but in the future they may want to add other types of animals. The teachers also expect the program to run smoothly and be thoroughly tested to handle extraneous input. Create a program that fulfills the specifications outlined in the scenario above. Use the concept of inheritance to allow for later additions to the program. Also use the TDD concepts from Unit 1 to test the program as you go.
Information Governance Final Research paper
You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.
The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.
The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company.
Requirements:
The paper should include at a minimum of the following sections:
a. Title page
b. Executive Summary (Abstract)
c. Body
i. Introduction (including industry discussion – 1-2 pages)
ii. Annotated Bibliography (2-3 pages)
iii. Literature review (2-3 pages)
iv. Program and technology recommendations, including:
1. Metrics
2. Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.
3. Regulatory, security, and privacy compliance expectations for your company
4. Email and social media strategy
5. Cloud Computing strategy
d. Conclusion
e. References
2. You must include at least two figures or tables. These must be of your own creation. Do not copy from other sources.
3. Must cite at least 10 references and 5 must be from peer reviewed scholarly journals (accessible from the UC Library).
4. This paper should be in proper APA format and avoid plagiarism when paraphrasing content. It should be a minimum of 8 pages in length (double-spaced), excluding the title page and references.
Computer Organization, C++
For your first AT-Robot programming assignment, I’d like to focus on: ● ensuring you can get a working AT-Robot simulation up and running from the AT-Robot/DOSBox bundle on our class website ● follow the video lectures about the architecture, instructions, assembly style, ports and constants To that end, rather than authoring a program from scratch, I have provided a file, “prog3.at2” for you. It does not contain a working program; instead, it contains a ton of comments telling you what code to write at each line. The idea is that I wrote a program, then commented every detail, then erased my code so you can reconstruct the code yourself, line by line. For every comment you see that starts with a single semicolon (‘;’), figure out a single instruction that could be put in front of the comment to do exactly that. These comments begin either at the left edge of the file or are a single tab from the left. This indicates whether the line of code you write should be to the left or exactly one tab from the left. Remember that in our assembly programs we NEVER use multiple tabs for indentation. Lines that begin with three semicolons, should be left alone. The three semicolons don’t mean anything special, they’re just something I came up with to let you know not to mess with them so they end up in the final program. Additionally, as commented, at the top of the file is a #msg directive for the assembler. whatever is written there will be printed out in your robot’s status area during matches. please modify this to your first initial followed by last name with no spaces. I’ve also posted an encrypted version of a working bot (“amos.atl”) so you can see how it should behave when working correctly. A short description might be that it wiggles forward until it hits something and sweeps backward while shooting to avoid getting stuck on walls. Upload only your .at2 file.
Programming project
- Inventory ManagementObjectives: Use inheritance to create base and child classes Utilize multiple classes in the same program Perform standard input validation Implement a solution that uses polymorphismProblem:A small electronics company has hired you to write an application to manage their inventory. The company requested a role-based access control (RBAC) to increase the security around using the new application. The company also requested that the application menu must be flexible enough to allow adding new menu items to the menu with minimal changes. This includes re-ordering the menu items and making changes tothe description of a menu item without having to change the code.Security:The company has suggested to start the application by prompting the user for a username and password to authenticate the user. There are two types of users at this company, managers and employees. If managers log on to the application, they will seeall options on the menu list. If employees log on to the application, they will see a limitedset of options on the menu list. User information is stored in Users.dat file, which may ormay not exist at the start of the program. A super user “admin” with password “admin” has already been hardcoded in the program to allow for the initial setup and the creationof other users. The Users.dat file contains the FirstName, LastName, Username (case insensitive), HashedPassword and a flag to indicate whether a user is a manager or not.The file is comma separated and it is formatted as follows:Joe, Last, jlast, 58c536ed8facc2c2a293a18a48e3e120, trueSam, sone, 2c2a293a18a48e3e12058c536ed8facc, falseJane, Best, jbest, 293a18a48e3e12052058c536ed8facc2c, falseNote: Ensure that the ‘AddUser’ function does not add duplicate values, and the ‘ChangePassword’ function does not change password if username/password is entered incorrectly. If adding a new user or changing the password is successful, return true, or else return false.
- Application Menu:The menu of the application is dynamically loaded and displayed to the user only after the user successfully logs on. The menu items will be loaded from file “MenuList.dat”, which may or may not exist at the start of the application. If the file doesn’t exist, the application should show at least an Exit menu item as default. The file will contain all menu items details, including the name of the command that will be executed when the menu item is selected. If a menu item is marked as restricted (Boolean flag), only managers can see that item. The file contains the following comma separated fields, Description, a Boolean flag to indicate if the option is restricted to managers only, and the name of the menu command that will be executed when the option is chosen. The order and option number of a menu item may change depending on how they are listed in the file. The Exit option will always be listed last and it will not be in the file.Below is a sample of how the MenuList.dat file looks like:Add User, true, AddUserCommandDelete User, true, DeleteUserCommandChange Password, false, ChangePasswordCommandAdd New Product, true, AddProductCommandNote:The command name of each menu item must match the name of the class that you will create in the code (See AddProductCommand class in the code for example).Inventory:The inventory consists of multiple products of type Product stored in class ProductCatalog. The ProductCatalog is responsible of all inventory operations that add, remove, find and update a product. When printing a product information, the product retail price should be calculated and displayed as well. Retail price = (cost + (margin * cost/100)). A list of functions has been added to this class in the provided code template. You must implement all listed functions. The inventory products will be saved in file Inventory.dat, which may or may not exist when the program first starts. The file will contain the product unique id (int), product name (string), cost (double), quantity (int)and margin (int, integer that represents margin percentage).The Inventory.dat file is comma separated and formatted as follows:3424, Smart Watch, 20.45, 23, 8065454, Flat Screen TV, 465.98, 15, 35435, Computer Monitor, 123.54, 84, 43Program Flow: Program starts in main() method Prompt user for username and password Authenticate user and maintain the logged-on user object Load inventory
- Load and create menu list Display menu list and prompt the user for option Execute selected option Keep displaying the menu until the user chooses to exitOutput Format:Enter username: some usernameEnter password: some password //Repeat prompts until useris authenticated OR show error andoption to exit.Invalid username or password!Press enter to continue or “Exit” to exit:Enter username: some usernameEnter password: some passwordWelcome Firstname LastName!Inventory Management System Menu //This is the header of the MenuList// The order and option number of a menu item may change depending on how they are listed in the MenuList.dat file. The Exit option will always be listed last and it will not be in the MenuList.dat file.1- Add user2- Remove user3- Change password4- Add new product5- Update product information6- Delete product7- Display product information8- Display inventory9- ExitEnter your selection: 7
- Enter product name: sMaRt wAtChId Name Cost Quantity Retail—————————————————-3424 Smart Watch $20.45 23 $36.81//Repeat the menu after each command is executedUnit Testing:A unit test method is required to test each of the methods listed below. These methods will be used by the unit testing framework to test the accuracy of your code. InventoryManagementSecurity.AuthenticateUser InventoryManagementSecurity.AddNewUser InventoryManagementSecurity.RemoveUser InventoryManagementSecurity.ChangePassword MenuList.AddMenuItem() ProductCatalog.AddUpdateProduct(Product product) ProductCatalog.RemoveProduct(int productId) ProductCatalog.FindProduct(int productId) ProductCatalog.PrintProductInformation(int productId) ProductCatalog.PrintInventoryList()Grading: Coding standards, style and comments (10 Points) Unit testing methods x 10, (2 points for each of the methods mentioned above – 20 Points) The rest of the grade will be broken down as follows: InventoryManagementSecurity.AuthenticateUser (5 Points) InventoryManagementSecurity.AddNewUser (5 Points) InventoryManagementSecurity.RemoveUser (5 Points) InventoryManagementSecurity.ChangePassword (5 Points) MenuList.AddMenuItem() (20 Points) //This includes implementing all commands for the menu list ProductCatalog.AddUpdateProduct(Product product) (10 Points) ProductCatalog.RemoveProduct(int productId) (5 Points) ProductCatalog.FindProduct(int productId) (5 Points) ProductCatalog.PrintProductInformation(int productId) (5 Points) ProductCatalog.PrintInventoryList() (5 Points)N
The Information Technology And Organizational Learning
Complete the following assignment in the Information Technology and Organizational Learning textbook:
- Chapter 7 – Review the section on dealing with multiple locations and outsourcing. Review figure 7.2 and note how virtual team communications further reiterates the importance of this model.
- Chapter 8 – Review the Siemens AG case study. Note the importance of understanding the interrelationships amongst all the senior leaders at every location. Pay special attention to Figure 8.1 and Figure 8.2. Note how the corporate CIO should engage with each of the regional leaders. Why is this important?
Complete the assignment using narrative paragraphs and explain your thoughts and findings in detail. Adhere to APA format requirements and do not use lists or bullets. Identify your answers by its chapter # to help the reader find your answers to specific items. Use Times New Roman 12 font, double-spaced. Include a coversheet with your name, class ID and the title of the assignment. Your submission needs to be at least two pages in length (one page per chapter). The coversheet, figures, tables, and reference list doesn’t count toward the page count. Post the assignment as one MS Word document by the due date in the syllabus. Do not submit any other format such as PDF. Please provide and cite two references IAW APA.
Hypothetical Situaton
Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service.
Project Management
- Discuss the key components of human resource management. Pick at least four concepts from chapter nine and describe how these concepts interrelate to individual performance on a team.
- Review table 9.2 and select one of the dimensions listed, note why it was chosen and how you relate to this behavior. If you have a personal experience, please share.
- How do leaders select the best talent? What are some tools they can use to select the best-talent
Security breach
Review a Security Breach which occurred over the past year and present a research paper providing the below point!!
Describe the incident
Provide Specifics about the incident.
What data or information was impacted?
Describe threat modeling techniques which could have assisted in the mitigation of breach.
How can the organization be better postured for future attacks?
This assignment should be in APA format and have to include references and 650 words
OPERATING SYSTEM
- Explain the purpose of an operating system for a personal computer.
- Give a brief description of the hardware components of a computer that the OS interfaces with. Motherboard, CPU, RAM, hard drive, sound controller, power supply, input and output devices, etc.
Week 5 Assignment
Discussion 1 (Chapter 8): Excel is probably the most popular spreadsheet software for PCs. Why? What can we do with this package that makes it so attractive for modeling efforts?
Discussion 2 (Chapter 9): What are the common business problems addressed by Big Data analytics? In the era of Big Data, are we about to witness the end of data warehousing? Why?
Your response should be 250-300 words. Respond to two postings provided by your classmates.
1.How does prescriptive analytics relate to descriptive and predictive analytics?
2. Explain the differences between static and dynamic models. How can one evolve into the other?
3. What is the difference between an optimistic approach and a pessimistic approach to decision making under assumed uncertainty?
4. Explain why solving problems under uncertainty sometimes involves assuming that the problem is to be solved under conditions of risk.
Exercise
Investigate via a Web search how models and their solutions are used by the U.S. Department of Homeland Security in the “war against terrorism.” Also investigate how other governments or government agencies are using models in their missions.
1.What is Big Data? Why is it important? Where does Big Data come from?
2. What do you think the future of Big Data will be? Will it lose its popularity to something else? If so, what will it be?
3. What is Big Data analytics? How does it differ from regular analytics?
4. What are the critical success factors for Big Data analytics?
5. What are the big challenges that one should be mindful of when considering implementation of Big Data analytics?
Exercise:
At teradatauniversitynetwork.com, go to the Sports Analytics page. Find applications of Big Data in sports. Summarize your findings.