It243-2 System analysis and design

1-The Packaged Software has a property, “Rarely a perfect fit with business needs”. What do you mean by this property? Explain in your own sentences.

2-In terms of client-server architectures, can you explain the difference between the two-tier, three-tier, and n-tier?
3-Visit a commercial Web site (e.g., CDnow, Amazon.com).  If files were being used to store the data supporting the application, what types of files would be needed?  What data would they contain?
4- Distinguish between transaction structures and transform structures on a structure chart. Can we have one module that will be a part of both types of structures? Satisfy your answer.

Risk Modeling

write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.

Your paper should meet the following requirements:

Be approximately four pages in length, not including the required cover page and reference page.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. 

Project Management

   

 You are working on a project to develop a new or enhanced system to help people at your college, university, or organization to find jobs. The system must be tailored to your student or work population and be very easy to use.

  • Write a two page paper describing how you would collect requirements for this system, and include at least five requirements in a requirements traceability matrix

 

  • A minimum of 500 words excluding the title page and references is required.
  • Use APA format – Refer to APA Style 

mysql and database (MySql WorkBench)

Show the results (using screenshots) of executing each SQL statement against the database you created for assignment #1. Do not highlight your SQL statement in MySQL Workbench before taking the screenshot (this makes it difficult to read the output).

also show the results of executing a SELECT * … statement against the VIEW. All screenshots and text must be submitted as a single Word document.

py

  

In this assignment you will compare two implementations of storing text files:

(1) One continuous string (newline char as separator).

(2) List of strings where each string represents a line

Each of these representations has to be implemented as a separate set of functions and, of course, with separate Python file For each implementation, you will write editor functions to move the “cursor”. In each representation, you use a cursor to represent the current position. For example, for (1) the cursor is just the position (index). For (2), the cursor is a pair: the index of the line and the position within the corresponding line string. Finally, for (3) the cursor is a pointer to the node (containing the line) and the position within that line.

Write (and test) the following 10 functions (names are taken from old vi editor) for each implementation

(1) cmd_h: move cursor one character to the left 

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(2) cmd_I: move cursor one character to the right

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(3) cmd_j: move cursor vertically up one line 

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(4) cmd_k: move cursor vertically down one line

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(5) cmd_X: delete the character to the left of the cursor

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(6) cmd_D: remove on current line from cursor to the end

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(7) cmd_dd: delete current line and move cursor to the 

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

beginning of next line

(8) cmd_ddp: transpose two adjacent lines

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(9) cmd_n: search for next occurrence of a string (assume that string to be searched is fully in one line.

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(10) cmd_wq: write your representation as text file and save it

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

Think of and implement any other 5 functions (your choice)

(11)~(15)

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

For testing, you will read the following “nerdy” poem (from the “Zen of Python”) into your “file representation”. 

Beautiful is better than ugly.

Explicit is better than implicit.

Simple is better than complex.

Complex is better than complicated.

After each command, print the contents of your file with character ‘^’ as cursor. 

Example: your initial configuration is 

^Beautiful is better than ugly.

Explicit is better than implicit.

Simple is better than complex.

Complex is better than complicated.

After executing cmd_n(‘better”), your representation should print:

Beautiful is ^better than ugly.

Explicit is better than implicit.

Simple is better than complex.

Complex is better than complicated.

FTK Imager to create a triage, or “custom content,” image

 

Using a Virtual Machine as your suspect device, you will use FTK Imager to create a triage, or “custom content,” image. Remember, your instructor will provide links for any evidence that you might need.

This is done so that you can get a look at some important artifacts without having to image and process an entire drive. It is useful because it can allow you to focus on devices that will give you the most evidence up front and put aside devices that may not be relevant to the case.

Instructions:

Your deliverable for this assignment will be a screen capture of FTK running your custom content image and a short report. Save the custom content image for use later in the course. To create your screen capture, follow these steps:

  1. If you have not already done so, download the latest version of FTK Imager.
  2. Create a USB drive with FTK Imager installed. This is a simple process of downloading FTK Imager and installing it on a connected USB drive (SEE TRIAGE USB CREATION INSTRUCTIONS IN LESSON 2.1). Or use FTK Imager Lite, which does not require installation.
  3. You should be running the provided suspect disk image .vhd file, which you can download from the class resources folder.
  4. Connect your FTK USB drive to the VMWare machine. This will also be your destination drive for the image you will create, so make sure it is big enough (32 to 64 GB).
  5. The first step in creating a triage image is to capture RAM! Be sure to do that first. Save the memdump.mem file to your USB.
  6. Use the VMWare virtual disk as your target, and create a “custom content image” using FTK.

Please write a forensic report which describes the steps you took to complete this assignment. Include the screen capture you took as proof. This does not have to be a narrative report, just a screencap and brief description of the relevant activity to document what you did.    

Use of medical information online and barriers facing telehealth

Week 5 Written Assignment

Each assignment will be an essay written in APA format (see below). Each essay should be no less than 1500 words on the topic (s) noted below.

The title page and bibliography do not count towards the word count.

Complete the assignment in a Word document using APA formatting with your last name as part of the file name. Omit the abstract and outline. A Word APA template and APA sample paper are provided for reference

After completing the essay, save and upload the document in the Assignments section of the e-classroom.

Each essay will be checked by Turnitin automatically upon submission. You will have access to the originality reports.

Topic: After conducting independent research using at least three sources not used in the class write an essay that examines the use of medical information found online and current barriers facing telehealth or telemedicine.