- Inventory ManagementObjectives: Use inheritance to create base and child classes Utilize multiple classes in the same program Perform standard input validation Implement a solution that uses polymorphismProblem:A small electronics company has hired you to write an application to manage their inventory. The company requested a role-based access control (RBAC) to increase the security around using the new application. The company also requested that the application menu must be flexible enough to allow adding new menu items to the menu with minimal changes. This includes re-ordering the menu items and making changes tothe description of a menu item without having to change the code.Security:The company has suggested to start the application by prompting the user for a username and password to authenticate the user. There are two types of users at this company, managers and employees. If managers log on to the application, they will seeall options on the menu list. If employees log on to the application, they will see a limitedset of options on the menu list. User information is stored in Users.dat file, which may ormay not exist at the start of the program. A super user “admin” with password “admin” has already been hardcoded in the program to allow for the initial setup and the creationof other users. The Users.dat file contains the FirstName, LastName, Username (case insensitive), HashedPassword and a flag to indicate whether a user is a manager or not.The file is comma separated and it is formatted as follows:Joe, Last, jlast, 58c536ed8facc2c2a293a18a48e3e120, trueSam, sone, 2c2a293a18a48e3e12058c536ed8facc, falseJane, Best, jbest, 293a18a48e3e12052058c536ed8facc2c, falseNote: Ensure that the ‘AddUser’ function does not add duplicate values, and the ‘ChangePassword’ function does not change password if username/password is entered incorrectly. If adding a new user or changing the password is successful, return true, or else return false.
- Application Menu:The menu of the application is dynamically loaded and displayed to the user only after the user successfully logs on. The menu items will be loaded from file “MenuList.dat”, which may or may not exist at the start of the application. If the file doesn’t exist, the application should show at least an Exit menu item as default. The file will contain all menu items details, including the name of the command that will be executed when the menu item is selected. If a menu item is marked as restricted (Boolean flag), only managers can see that item. The file contains the following comma separated fields, Description, a Boolean flag to indicate if the option is restricted to managers only, and the name of the menu command that will be executed when the option is chosen. The order and option number of a menu item may change depending on how they are listed in the file. The Exit option will always be listed last and it will not be in the file.Below is a sample of how the MenuList.dat file looks like:Add User, true, AddUserCommandDelete User, true, DeleteUserCommandChange Password, false, ChangePasswordCommandAdd New Product, true, AddProductCommandNote:The command name of each menu item must match the name of the class that you will create in the code (See AddProductCommand class in the code for example).Inventory:The inventory consists of multiple products of type Product stored in class ProductCatalog. The ProductCatalog is responsible of all inventory operations that add, remove, find and update a product. When printing a product information, the product retail price should be calculated and displayed as well. Retail price = (cost + (margin * cost/100)). A list of functions has been added to this class in the provided code template. You must implement all listed functions. The inventory products will be saved in file Inventory.dat, which may or may not exist when the program first starts. The file will contain the product unique id (int), product name (string), cost (double), quantity (int)and margin (int, integer that represents margin percentage).The Inventory.dat file is comma separated and formatted as follows:3424, Smart Watch, 20.45, 23, 8065454, Flat Screen TV, 465.98, 15, 35435, Computer Monitor, 123.54, 84, 43Program Flow: Program starts in main() method Prompt user for username and password Authenticate user and maintain the logged-on user object Load inventory
- Load and create menu list Display menu list and prompt the user for option Execute selected option Keep displaying the menu until the user chooses to exitOutput Format:Enter username: some usernameEnter password: some password //Repeat prompts until useris authenticated OR show error andoption to exit.Invalid username or password!Press enter to continue or “Exit” to exit:Enter username: some usernameEnter password: some passwordWelcome Firstname LastName!Inventory Management System Menu //This is the header of the MenuList// The order and option number of a menu item may change depending on how they are listed in the MenuList.dat file. The Exit option will always be listed last and it will not be in the MenuList.dat file.1- Add user2- Remove user3- Change password4- Add new product5- Update product information6- Delete product7- Display product information8- Display inventory9- ExitEnter your selection: 7
- Enter product name: sMaRt wAtChId Name Cost Quantity Retail—————————————————-3424 Smart Watch $20.45 23 $36.81//Repeat the menu after each command is executedUnit Testing:A unit test method is required to test each of the methods listed below. These methods will be used by the unit testing framework to test the accuracy of your code. InventoryManagementSecurity.AuthenticateUser InventoryManagementSecurity.AddNewUser InventoryManagementSecurity.RemoveUser InventoryManagementSecurity.ChangePassword MenuList.AddMenuItem() ProductCatalog.AddUpdateProduct(Product product) ProductCatalog.RemoveProduct(int productId) ProductCatalog.FindProduct(int productId) ProductCatalog.PrintProductInformation(int productId) ProductCatalog.PrintInventoryList()Grading: Coding standards, style and comments (10 Points) Unit testing methods x 10, (2 points for each of the methods mentioned above – 20 Points) The rest of the grade will be broken down as follows: InventoryManagementSecurity.AuthenticateUser (5 Points) InventoryManagementSecurity.AddNewUser (5 Points) InventoryManagementSecurity.RemoveUser (5 Points) InventoryManagementSecurity.ChangePassword (5 Points) MenuList.AddMenuItem() (20 Points) //This includes implementing all commands for the menu list ProductCatalog.AddUpdateProduct(Product product) (10 Points) ProductCatalog.RemoveProduct(int productId) (5 Points) ProductCatalog.FindProduct(int productId) (5 Points) ProductCatalog.PrintProductInformation(int productId) (5 Points) ProductCatalog.PrintInventoryList() (5 Points)N
The Information Technology And Organizational Learning
Complete the following assignment in the Information Technology and Organizational Learning textbook:
- Chapter 7 – Review the section on dealing with multiple locations and outsourcing. Review figure 7.2 and note how virtual team communications further reiterates the importance of this model.
- Chapter 8 – Review the Siemens AG case study. Note the importance of understanding the interrelationships amongst all the senior leaders at every location. Pay special attention to Figure 8.1 and Figure 8.2. Note how the corporate CIO should engage with each of the regional leaders. Why is this important?
Complete the assignment using narrative paragraphs and explain your thoughts and findings in detail. Adhere to APA format requirements and do not use lists or bullets. Identify your answers by its chapter # to help the reader find your answers to specific items. Use Times New Roman 12 font, double-spaced. Include a coversheet with your name, class ID and the title of the assignment. Your submission needs to be at least two pages in length (one page per chapter). The coversheet, figures, tables, and reference list doesn’t count toward the page count. Post the assignment as one MS Word document by the due date in the syllabus. Do not submit any other format such as PDF. Please provide and cite two references IAW APA.
Hypothetical Situaton
Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service.
Project Management
- Discuss the key components of human resource management. Pick at least four concepts from chapter nine and describe how these concepts interrelate to individual performance on a team.
- Review table 9.2 and select one of the dimensions listed, note why it was chosen and how you relate to this behavior. If you have a personal experience, please share.
- How do leaders select the best talent? What are some tools they can use to select the best-talent
Security breach
Review a Security Breach which occurred over the past year and present a research paper providing the below point!!
Describe the incident
Provide Specifics about the incident.
What data or information was impacted?
Describe threat modeling techniques which could have assisted in the mitigation of breach.
How can the organization be better postured for future attacks?
This assignment should be in APA format and have to include references and 650 words
OPERATING SYSTEM
- Explain the purpose of an operating system for a personal computer.
- Give a brief description of the hardware components of a computer that the OS interfaces with. Motherboard, CPU, RAM, hard drive, sound controller, power supply, input and output devices, etc.
Week 5 Assignment
Discussion 1 (Chapter 8): Excel is probably the most popular spreadsheet software for PCs. Why? What can we do with this package that makes it so attractive for modeling efforts?
Discussion 2 (Chapter 9): What are the common business problems addressed by Big Data analytics? In the era of Big Data, are we about to witness the end of data warehousing? Why?
Your response should be 250-300 words. Respond to two postings provided by your classmates.
1.How does prescriptive analytics relate to descriptive and predictive analytics?
2. Explain the differences between static and dynamic models. How can one evolve into the other?
3. What is the difference between an optimistic approach and a pessimistic approach to decision making under assumed uncertainty?
4. Explain why solving problems under uncertainty sometimes involves assuming that the problem is to be solved under conditions of risk.
Exercise
Investigate via a Web search how models and their solutions are used by the U.S. Department of Homeland Security in the “war against terrorism.” Also investigate how other governments or government agencies are using models in their missions.
1.What is Big Data? Why is it important? Where does Big Data come from?
2. What do you think the future of Big Data will be? Will it lose its popularity to something else? If so, what will it be?
3. What is Big Data analytics? How does it differ from regular analytics?
4. What are the critical success factors for Big Data analytics?
5. What are the big challenges that one should be mindful of when considering implementation of Big Data analytics?
Exercise:
At teradatauniversitynetwork.com, go to the Sports Analytics page. Find applications of Big Data in sports. Summarize your findings.
Practical Connection Assignment
course name: Cryptography (ISOL-535-B05)
This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.
Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
· Provide a 500 word (or 2 pages double spaced) minimum reflection.
· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
· Share a personal connection that identifies specific knowledge and theories from this course.
· Demonstrate a connection to your current work environment.
· You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Block Chain Technologies and Business
The theme of this research paper is Block Chain technologies. For this assignment, you must
research the theme with a focus on potential business applications of it (including yet beyond
Fintech). You must research current trends and summarize your research as a report. The
general structure of the report is as follows:
1. An introductory section about the current hype surrounding block chain technologies,
providing context for your report;
2. A description of select applications of Blockchain to business (minimum 3). Choose 1
particularly business areas (of your interest) in mind (e.g., HR, Marketing and Sales,
or Operations) and provide three applications of Block Chain int those business areas. You must also describe and analyze these technologies based on
their potential to be game changers;
3. The challenges for such applications to become widespread and beneficial to
companies;
4. A conclusion section (with your takeaway from the discussion).
requirements
Your report must adhere to APA formatting;
2. You must research at least 5 recent (i.e., less than 5 years) peer-reviewed articles.
Exceptionally, highly regarded industry sources (e.g., IBM, Oracle, SAP, McKinsey,
Accenture, Deloitte, Capgemini) will be accepted;
3. Other than APA formatting, the structure for the paper is not fixed, as long as there is
a logical flow of ideas. The length of the paper is 5-6 pages
431F3
CHECK ATTACHMENT