Java – Process Synchronization

In this assignment, you will write a Java program that implements the solution to the bounded buffer problem between a producer and a consumer. The producer will produce forever and the consumer will consume forever. The producer will put data into the buffer and the consumer will remove data from the buffer. The buffer must implement a means of ensuring that the buffer never enters an under flow (take too much data out) or over flow put too much data into the buffer. Additionally the buffer must have functionality so that a critical region problem does not occur with parallel updates to the data. 

Test you application by creating a java thread for the produce, the consumer and having them access a shared buffer with declared size 5. 

Assignment and memo

 

1.Assignment

  • identify and apply the different analysis and design methods for business applications;
  • operate effectively within a team environment demonstrating team building and project management skills in information systems analysis and design; and
  • communicate information effectively in presentations with oral, written and electronic formats using media formats widely adopted for information systems development in business and government.

Create an alternative decision matrix for the case system. Using Excel or Word, develop a decision matrix to be used to evaluate three proposed design alternatives (alternatives A, B, and C).

The idea is to create a worksheet that can be applied to any set of alternatives.

Criteria: Decision matrix has columns for criteria weights and points available, and columns that represent three proposals. Within each proposal include columns for points assigned and

the product of points assigned times criteria weight. The bottom row of the matrix contains column totals.

Your essay should be 3 pages in content and fully explore all of the following items described above. Include at least 2 outside citations (not including your text) and use proper APA formatting.

Atleast 2 In-line citations and references required.

2. Weekly Memo – Memo should be related to the discussions , assignment and should be one page(citations,references, APA not required).

D9

Excel is probably the most popular spreadsheet software for PCs. Why? What can we do with this package that makes it so attractive for modeling efforts?

250-300 words with a minimum of 2-3 references in APA format

Aligning Risks, Threats, and Vulnerabilities to COBIT P09 Risk Management Controls

  Introduction

Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, first released in 1996. ISACA is an IT professionals’ association centered on auditing and IT governance. This lab will focus on the COBIT framework. The lab covers two released versions: COBIT 4.1, which is currently the most implemented version, and COBIT 5, which was released in June 2012. A newer version, COBIT 2019, was released in 2019.

Because COBIT 4.1 is freely available, with registration, at the time of this writing, the lab uses this version to present the handling of risk management. COBIT presents this topic using a set of COBIT control objectives called P09. COBIT P09’s purpose is to guide the scope of risk management for an IT infrastructure. The COBIT P09 risk management controls help organize the identified risks, threats, and vulnerabilities, enabling you to manage and remediate them. This lab will also present how COBIT shifts from the term “control objectives” to a set of principles and enablers in later versions.

In this lab, you will define COBIT P09, you will describe COBIT P09’s six control objectives, you will explain how the threats and vulnerabilities align to the definition for the assessment and management of risks, and you will use COBIT P09 to determine the scope of risk management for an IT infrastructure.

  1. Define what COBIT (Control Objectives for Information and related Technology) P09 risk management is for an IT infrastructure.
  2. Describe COBIT P09’s six control objectives that are used as benchmarks for IT risk assessment and risk management.
  3. Explain how threats and vulnerabilities align to the COBIT P09 risk management definition for the assessment and management of IT risks.
  4. Use the COBIT P09 controls as a guide to define the scope of risk management for an IT infrastructure.
  5. Apply the COBIT P09 controls to help organize the identified IT risks, threats, and vulnerabilities.

 Deliverables

Upon completion of this lab, you are required to provide the following deliverables to your instructor:

  1. Lab Report file;
  2. Lab Assessment (worksheet or quiz – see instructor for guidance).

wk-7

 Assignment 1

Examine Alexa’s skill in ordering drinks from Starbucks

Refer to Chapter 12 in the attached textbook:

Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6. 

Requirement: 

****Separate document for each assignment****

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add reference separately for each assignment question.

Strictly follow APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

Assignment 2

Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such as thermostats, microwaves, and much more. Find examples of other appliances that are connected to Alexa and write a report.

Refer to Chapter 13 in the attached textbook:

Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6. 

Requirement: 

****Separate document for each assignment****

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add reference separately for each assignment question.

Strictly follow APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

Assignment 3

Practical connection assignment

Refer to the “Required Practical Connection Assignment – Students(1)” word document for instructions. 

Other previous homework done from you has been attached for your reference. 

Requirement: 

****Separate document for each assignment****

Minimum 500-600 words. Cover sheet, abstract, graphs, and references does not count.

Strictly follow APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$10 max. Please bid if you agree.

  

Assignment 4:

Based on your readings in this course and research on the Internet and other sources, identify and discuss at least two trends or best practices related to key concepts and principles of operational excellence in any field of human endeavor. Use your own words and give credit to any sources referenced in your submission.

Text book attached: 

1. Information Systems for Business and Beyond

2. Information Technology and Organizational Learning Managing Behavioral Change in the Digital Age by Arthur M. Langer

Requirement:

****Separate document for each assignment**** 

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add reference separately for each assignment question.

Double Spaced and APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

Homework Discussion

If your boss asked you to create a database that integrated logical design best practices, what are the three most important features you would integrate in your end solution? Remember to not only just state them, but explain why and show examples. Don’t repeat the same examples of others. That constitutes cheating. 

Instructions

This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed. 

You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.

Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.

Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.

Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.

New Auditing roles in Oracle 12c

Write an essay of at least 500 words discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary? What problems do they solve? How do they benefit companies? 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.   Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

Organizational Ethical Analysis Paper

Summary: Each student will write a research paper on an organization of his or her choice (5-7 pages). The organizational analysis will utilize a minimum of five external, peer-reviewed academic sources and contain the following sections:

  1. What is the organization and how would you describe it?
  2. Who are the leaders of the organization?
  3. Is the organization successful?
  4. How do you determine whether an organization is ethical or not?
  5. Based on your assessment and research, is the organization ethical?
  6. What would you change about the organization to make it better, without sacrificing ethical standards?

Requirements:

  • Your assignment should be written in APA style format.
  • Double spaced with 12-point Times New Roman font and make sure to use headings.
  • Please answer all the questions (5-7 Pages).
  • Separate page for title and reference.