Exercise 4 &5

 
Review the section on Linear Development in Learning Approaches.  Discuss how learning changes over time impact organizational culture.  What is the impact of this cultural change on the success of IT projects?

Review the Roles of Line Management and Social Network and Information Technology sections.  Note the various roles in the organization and note the similarities and differences within each role.  Also, note how innovation technology management shapes how we communicate amongst coworkers within an organization.  

A suitable system to implement. This system must be a data processing system that concerns the creation, storage, management, processing and visualising of a set of data with which you are currently involved.

   

Specification

Introduction

A suitable system to implement. This system must be a data processing system that concerns the creation, storage, management, processing and visualising of a set of data with which you are currently involved. 

This implementation MUST be undertaken using the Python 3 programming language (as per the work you have done in your learning sessions).

Part 1 System Build

Provide a concise written description of your selected data processing system (guideline word count 500 words). This can include diagrams or images if this is required to best support your description. Also, include the user stories that describe the functionality of the system. Whilst this will not directly accrue any marks, it is required to establish if your software implementation satisfies the requirements of the system.

Produce a Python 3 implementation of your chosen system. This must provide the data processing and visualisation relevant to your system and provide a graphical user interface (GUI) to this processing and visualisation.

You must utilise object-oriented programming where appropriate and structure your solution using the module and package approach adopted by good idiomatic Python 3 implementations (also referred to as being Pythonic). It is expected that the structure of your submitted Python project will also reflect this

   

structure, utilising a main project folder (with any necessary sub-folders) and appropriate Python 3 script files.

You are also expected to provide full documentation of the details of your implementation by including appropriate code comments within your Python 3 script files.

Part 2 Automated Testing

Provide a set of automated unit tests (using a suitable Python 3 automated testing  framework  such  as  the  unittest module)  that  exercise  and demonstrate the correct functionality for 4 separate methods taken from a class (or classes) that is involved with part of the data processing in your system. You can choose methods related to any of the CRUD functions. Do not include any method which would require testing of the GUI (this is beyond what was included as part of your learning during the module). Ensure you fully document your test code using appropriate code commenting.

Your automated unit tests must be provided within the Python project in a way that properly separates these tests from the production version of your implementation. Also, the automated unit tests must be able to be run from within the PyCharm Community Edition IDE you have worked with in your learning sessions, using the automated unit testing integration offered by this IDE.

Part 3 System Function Traceability Report

Produce a report that traces the functionality provided in your software implementation back to the specific requirement for that function in your system description. This must be done by mapping the user stories that represent your system requirements to the various classes and methods of those classes that you have implemented in your software solution.

You must also provide for each trace back a short explanation as to how the mapped class and /or method directly contributes to satisfying the “So that…” aspect of the user story involved.

A recommended approach here is to tabulate your mappings so they can be easily traced.

Part 4 Reflective Report

You are to write a short reflective report (guideline word count 500 words) focussing on one future trend in computing and considering how new ideas and theories could be applied in the application domain you have developed for this assignment.

   

You should consider both the potential benefits of the new ideas as well as the inherent complexities and present your reasoned evaluation and conclusions regarding the application of those new ideas within your chosen domain.

If your application is work related, you could conclude your reflective evaluation with recommendations relevant to your employer regarding the adoption, or otherwise, of new advanced computing techniques.

For this reflective report you could consider any one of the following topics or chose any other current computing topic:

  Big Data / Data mining or analytics / Data visualisation

  Artificial Intelligence / Machine learning

  Robotics and Social Interaction

  Virtual or Augmented reality

  Security within Cloud computing

  The internet of things (IoT)

  Autonomous Transportation

  Wearable devices and sensors

You are not expected to reference research papers or present a very technical explanation of the topic – rather you are expected to focus on the advantages and complexities of applying the theory in your application area.

You should start your reflective report with a short description of your chosen topic (250 words or thereabouts would be appropriate for this) before presenting your evaluation of its application.

Citations of web sources for this is perfectly fine but your sources must be correctly cited and a reference list provided (as per the Harvard referencing scheme).

Quotations should be kept to a very minimum and 90% of the words should be your own.

Deliverables

A zipped archive of your main Python project folder which must include all relevant files need to both run your software implementation and run the automated unit tests. Also, include in this archive the word processed document that contains the concise description of the system and the associated user stories  (as  required in  Part  1).  Any details of  further  instructions  or  any additional Python 3 libraries (beyond those in the standard Python 3 installation) must also be provided in a  readme.txt file (to ensure your software implementation can be run). Provide this archive as a single zip file. This archive will be used when you provide your demonstration of your system.

A single word processed document that contains the traceability and reflective reports required for the Part 3 and Part 4 tasks. Make sure this document is

  

clearly organised into titled sections and that any diagrams and images are referenced with a figure number. Ensure it is evident which of these sections relates to which assessment task to avoid any ambiguity when your work is considered during marking. 

Also, ensure you provide any referenced work within this document (as per the normal Harvard referencing scheme).

Portfolio project

 

Portfolio Project: This week discuss a current business process in a specific industry. Note the following:

-The current business process itself.

-The industry the business process is utilized in.

After explaining the current situation, take the current learning from the course and:

  • Explain a new technology that the business should deploy. Be specific, don’t only note the type of technology but the specific instance of technology. (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).
  • Note the pros and cons of the technology selected.
  • Note various factors the business should consider prior to deploying the new technology

The above submission should be three pages in length. Remember the total length does not include the APA approved cover page or the references. There should be at least three APA approved references to support your work.

Presentation

Imagine your organization is going to build an application utilizing Big Data and Machine

Learning. You are going to propose to upper management of your idea with supporting system

design. Develop an APA formatted paper that presents a detailed analysis and research-based

information pertaining to ALL of the following topics;

● List and describe the type of data you will need for your application, and how you will

ensure the quality of the data.

● List and explain the technologies, tools and software packages that will be used to build

the application.

○ Provide the design of your Big Data database. Explain why you chose the

database compared to others. Also, include supporting theories for the schema

you came up with.

○ Describe in detail why the chosen technologies are adequate to process the

data.

○ List and describe the types of the statistical analysis methods that will be used.

MSIT 690 Syllabus

18 of

● List and describe the benefits from the customer’s perspective and organization’s

perspective. Please pinpoint where the benefits are drawn from – data, technology,

software package, process, and etc.

● List and describe the concerns and downsides that may be introduced by the

application and the Big Data from multiple perspectives – law, regulations, social and

etc. Provide solutions, processes, application modules, and etc. that mitigates the

concerns, problems, issues.

● Provide data flow diagram, database design, and sample code of a module for your

application.

Present it in 10 slides.

Homework 1

Please find the attachment of home 1

Total words 600 excluding references and No plagarism

NS-13-D

explain the different security measures that each version of SNMP uses.  What is the different between SNMPv1, v2c and v3?  300 word

policy

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. What kind of speech was the First Amendment written to protect?

2. Does the First Amendment apply only to spoken words?

3. What does it mean that laws regulating speech must be content neutral?

4. Why are common carriers prohibited from controlling the content of the material they carry? 

5. How does the Supreme Court determine whether material is obscene?

6. Why have attempts to censor the Internet failed in the US?

7. Why not just ban spam? 

8. Why did Facebook ban Alex Jones and Louis Farrakan?

9. Should websites that show how to 3d print guns be banned? 

10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean? 

batch shell script processing.

THE CODE MUST BE IN C ONLY.  Every shell needs to support a number of built-in commands, which are functions in the shell itself, not external programs. Shells directly make system calls to execute built-in commands, instead of forking a child process to handle them. 

 Add a new built-in exit command that exits from your shell with the exit() system call. Also add support for signal handling and terminal control (Ctrl-C, Ctrl-Z). You do not want those signals to terminate your shell. Instead, you need to handle them and terminate processes that your shell started if any. Be aware that forked processes will inherit the signal handlers of the original process.

Final Exam

 

Answer the four questions noted below.  Please use at least one reference and ensure it’s in APA format (as well as the in-text citation).  Also, ensure to NOT COPY DIRECTLY from any source (student or online source), rather rephrase the author’s work and use in-text citations were necessary.

Describe the CIA triad and the defense in depth principle? Why are those concepts important when designing your network security strategy?

What are the steps for an incident response plan? How does network security play into an incident response plan? 

What are some major differences between open source and commercialclosed source software and solutions? Should you consider one over the other? 

What are firewalls? What are VPNs? What are some alternatives to a traditional firewall? What are some alternatives to traditional VPNs? How does the alternatives improve the traditional version of both?

Note: The essay should include an APA cover page and at least two reference (academic or professional literature) in APA v7 format.