Download the CMST_301_Final Examination.docx file attached to this assignment.

  • Type your responses to the essay questions directly in the attached exam and save the file as: CMST_301_Final Examination.docx.
    • Submit the completed document to the Final Exam assignment folder 
  1. You must answer 4 of the 8 essay questions. Should you answer more than 4, only the first 4 will be graded. Each essay is worth 25 points for a total of 100 points for the exam. The exam is worth 20% of your final grade. Be sure you organize your response covering all the aspects of the questions.
  2. Length Requirement: Each essay response is required to be at least 500 words in length. Essay responses that are shorter will receive deductions based on how many words under (the farther from the designated length, the higher the deduction). Between 400-499 words, you will lose 5 points, under 400 words, you will lose 10 points.  Direct quotes do not count toward the word total. Please keep direct quotes to a minimum. Your response should be at least 90% original thought.   Also, I am expecting to see analysis and the synthesis of ideas in your essays (not just a manipulation of direct quotes with your words spliced in between). 
  3. Content Requirements: Content must be comprehensive, accurate, and persuasive. Your response should be at least 90% original thought.  Must use data from a minimum of two scholarly sources to support statements and draw a thorough and convincing conclusion from the data. 
  4. Bibliographical Requirement: Please do not use unprofessional sources such as Wikipedia, About.com, Answers.com, Dictionary.com, How.com, or anything remotely similar.  Examples of scholarly sources include our course content (e.g. Read & Watch resources), textbooks, journal articles, trade magazines, and conference proceedings. UMUC has a top-notch, extensive online library. You can find many scholarly sources there. Note: “Personal communications (e.g. Twitter Posts, Blogs, and YouTube Videos)” are not considered professional or scholarly sources.  Include at least TWO in-essay citations in EACH essay and a reference list at the END of each essay.
  5. Formatting Requirements
    • The paper must follow APA guidelines throughout.  See Course Content>Course Resources>Sample Paper to Show Appropriate Document Formatting.
    • Double-spaced (including the reference page) with the first line of each paragraph indented.
    • 1-inch Margins
    • 12 point professional font 
    • Begin each essay on a separate page
  6. This exam is **not** a group project. Your answers should be yours alone.
  7. Please spell-check your work.

Research Report

  

This requires the completion of 3 elements: 1) Software Architecture, 2) Analysis & Design, 3) Report & Overview.

  

Coursework Documentation/Report

You are asked to address the aims and business requirements by producing a report, based on your own wider reading and research including relevant citations to recent literature, which covers:

1. Software Architecture (20%)

This should include selection, analysis and evaluation of architectural styles based on the work undertaken in the broader subject area. This should also include some recommendations for a suitable, to the above problem, architectural style.

2. Architecture Comparison (20%)

This should include the overview of the benefits of software architecture using software quality factors, highlighting advantages and disadvantages of two architectural styles such as object and service orientation, and a suitability analysis of the service based architecture. 

3. Analysis & Design (20%)

This should include a discussion of your analysis and design aspects decisions. It should also include requirement specification and design diagrams such as component, class and sequence diagrams.

4. Migration Strategy and Technologies (20%)

This should include selection and reviewing potential Cloud services, mapping of a selected architecture onto the Cloud with clear migration strategy. This should also include and the potential technologies for the implementation.

5. Report & Overview (20%)

This covers the report’s overall content, research, legal, social and ethical issues associated with software construction, referencing, flow and structure. 

Misleading Graphs

 1 page

For this discussion, you are to choose one graph, and complete these steps based on the graph you chose:

Steps

  • State the graph you chose.
  • Discuss how you interpreted the graph when you first saw it.
    • What did it tell you about the data represented?
    • Did you find it confusing?
  • Now, study the graph. Use your understanding of the topics Graphs, Pie Charts, and Bar Charts to interpret what is being presented.
  • Compare your first impression with your second more informed interpretation and answer the following:
    • Is the information presented in a biased way (that is, is it misleading?)
    • What information is being misinterpreted here? How?
    • What type of graph was used and was it used correctly?
    • How could you correct the graph so that it more accurately represents the data?
  • Discuss why someone might intentionally use a graph to mislead?

Privacy and Security Considerations for Information Governance

According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.   

For this discussion, find an example of a security breach which compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend be in place (be certain to remember to cite sources) that could have prevented this breach from occurring. Remember to critical respond appropriately to two other leaners for full points.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Initial post due Thursday