Using the Internet, each member of your team should read at least One academically reviewed articles on Team designing. Summarize the articles in 300 words or more. Provide appropriate reference.
Note that sometimes, particularly with Windows, Excel has a hard time performing calculations on the pivot table results.
Part 1 CIS 220 Survey
Use pivot tables, and any additional calculations as necessary, to answer the following questions. Be
sure to put your answers in the Answers worksheet and have a separate worksheet renamed
Question 1, 2, 3, 4… showing your work for each question
English composition 6
assignment added the attached picture
practical report
(CWK2) – Practical Report: It contains 2 tasks: 1) Implementation (coding), 2) Presentation/demo
Module Learning Outcomes are assessed in in the research report, practical report and demo:
LEARNING OUTCOME
ASSESSMENT STRATEGY
Critically analyse architectural styles of software systems and evaluate the role of software architecture in the design and evolution of software.
Submission of research report. To include in-depth background analysis.
Apply the principles of software architecture construction particularly using component and service oriented programming.
Submission of research report. To include detailed analysis of component oriented architecture against other architectural styles.
Evaluate the benefits of software architectures and their corresponding programming paradigms in terms of software quality factors such reusability, maintenance, extendibility.
Submission of the research report. To cover the benefits of component software architectures in term of software quality factors.
Critically discuss legal, social and ethical issues associated with software construction.
Submission of the research report. To cover the ethical, social and professional issues.
Apply technical proficiency in component and service oriented analysis and design
The analysis and design part of the practical report.
Evaluate the strengths and weaknesses of service oriented and component technologies.
Service and component technologies evaluation part of the practical report.
Build a complex business application that satisfies an architectural design using a service oriented component technology.
The implementation part of the practical report and the demonstration/presentation (practical exam).
CWK2: One zipped file named surnames_CWK2_Practical_Report which contains the code, presentation/demo, associated with CWK2, and README file containing the name of the student and their specific contributions, and any specific instructions for installation/configuration/ that might be needed.
Submission details: The second part of the coursework should be submitted as a single zipped file to canvas, and it should contain the code and the presentation.
Module Learning Outcomes assessed in this piece of coursework
· Build a complex business application that satisfies an architectural design using a service oriented component technology.
· Evaluate the strengths and weaknesses of service oriented and component technologies.
1. Assignment Brief: Analysing and Building a Banking System Software Using Component and Service Oriented Cloud Architecture (Part 2).
Aim
The aim of the second part of the coursework is to demonstrate the knowledge and awareness of service oriented and other latest software development technologies in a given scenario. This should involve the following:
1. Apply technical proficiency in component, service and modular programming.
2. Implementation the demo system using a service oriented architecture and frameworks of your choice.
3. Produce a presentation/demonstration to discuss the used technologies and show a working prototype.
The Problem
In order to remain competitive and be able to expand its business ABC Banking Group must update its services to reflect the recent advances in information and communication technology. This will require the design and implementation of an adaptable technology migration strategy. Currently, ABC Banking Group system is a LAN based, able to be reached over the web using legacy software. Thus, the Group needs a migration strategy from a LAN based system to Cloud based system, however such a migration requires the consideration not only of the underlying Cloud service oriented architecture, and its benefits, but also should reflect the main business activities of the Group.
At the core of the Group’s business activities is its transaction processing system. The system is used to define accounts and transactions. Accounts refer to things like customers’ bank accounts, while transactions are things like deposits and withdrawals which are essentially time-stamped records. Each account keeps track of the transactions that affect it. It also has a set of attributes such as customer’s name, address, balance, overdraft, running totals (of deposits and withdrawals) computed from the transactions etc.
Once an account is set up, it is used by creating transactions and by querying the attributes of the account. Transactions can come from other systems, like direct debits, or from different branches and they can be created by program control or can be created by a user filling out an input screen. Customers can access their account and conduct transactions using their desktops, mobile phones etc.
Your task is to design new service based architecture of the system. It is up to you how to go along the task. However, you have to take into account the distributed nature of the problem and the possibility of accessing account details, on the server, using different clients and different graphical user interfaces. These interfaces are programmed so that they communicate with the server.
You define how an account handles transactions that are posted to it, one way of handling transactions, is by putting them in a list in order of their date. Queries can be from a simple interface, from reports such as bank statements or from programs that are creating transactions. All interactions with the system are achieved by creating transactions and querying attributes.
The system should be able to perform a number of operations including creating account for every customer, holding the customer’s name and address, allocating a numeric code (account number) for every customer, balance, cost for overdrafts, returning the statements etc. The system also should be able to add, delete customers and work out the total number of customers.
Coursework Documentation/Report
You are asked to address the aims and business requirements by producing a practical report which covers:
Implementation (80%)
You are asked to implement and construct your application using a programming language and programming environment that supports component/service oriented paradigm.
Presentation/demo (20%)
This should include a brief discussion of of the deployed technologies and a working prototype of your program which should demonstrate good knowledge of fundamental service/component oriented and modular concepts.
2. Feedback (including details of how and where feedback will be provided)
You will receive the feedback electronically using the feedback form (check the summary table for deadlines)
Marking scheme
Implementation: Coding Fundamentals ( /30)
**
VG
G
F
P
VP
Use of OO Concepts
Use of classes
Use of method invocation
Use of storage
Use of interaction and selection
Variables/Header box/Comments/
Implementation: Services/Components Integration ( /50)
**
VG
G
F
P
VP
Functionality
Completeness
Use of service orientation
Use of Components
Use of Interfaces
Presentation/demo ( /20)
**
VG
G
F
P
VP
Quality
Presentation
Technology
Traceability: from design to code
Overall mark ( /100)
** VG: Very Good, G: Good, F: Fair, P: Poor, VP: Very Poor
Assignment
Discussion #1: What is Big Data? Why is it important? Where does Big Data come from?
Discussion #3: What is Big Data analytics? How does it differ from regular analytics?
Safe Harbor Provisions
Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.
Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.
Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).
http://blog.securitymetrics.com/2014/05/hipaa-faq.html
https://www.hitechanswers.net/hipaa-hospitals-five-reasons-medical-data-storage-often-not-compliant/
https://www.careersinfosecurity.com/2-million-hipaa-penalty-after-patient-data-exposed-on-web-a-9465
https://www.medscape.org/viewarticle/810563_2
https://www.bankinfosecurity.com/ocr-considering-hipaa-privacy-rule-enforcement-changes-a-10750
Enterprise Risk Management
Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.
In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:
- Introduction
- Why should an organization Implement an ERM application?
- What are some key challenges and solutions to Implementing an ERM?
- What is Important for an effective ERM?
- Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
- Conclusion, final thoughts for future research
- Recommendation
Your paper should meet the following requirements:
- Be approximately seven to ten pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Prof Writing & Proposal Devel
Do a little bit of research on grant writing versus academic (scholarly) writing.
Then…
1) Write a one sentence statement that describes the difference in grant writing vs. scholarly writing.
2) Research a need in your community and write a 100-300 word needs section in an academic writing style, citing your references in APA format. Copy and paste into the discussion forum.
3) Write a quick one paragraph describing the mock dissertation topic (see list of topics below) that you will write about in this class and include your research question. Use academic writing style and standard. There is no word limit.
- Students must choose from the listed topics of their school/program:
IT Students:
- Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning
- Using Data Science Techniques To Enhance Data Security
Discussion
After reading chapter 6, analyze the structure of advanced encryption standards and why it makes them so strong. You must use at least one scholarly resource. Every discussion posting must be properly APA formatted
Module 9 Assignment – CyberLaw
Please run a Google search of the term, “United States Supreme Court Carpenter v. United States 2018.”
Please write an essay of 500 words, summarizing the court’s decision.
1. Please add references in APA format
2. use Correct legal citation
3. accurately summarizes the effects of this Court decision