data flow diagram

dfd

 

. After reviewing the proposed project, you saw the following:
 

1) Client is using OMS with Fidessa and is sending in drop copies of post trade messages from themselves as well as orders via FIX 4.2 protocol.
2) Fidessa OMS sends out pre-trade compliance checks back to client and gets the results back.
3) Post trade information is sent back to client in two ways:
 

a) Batch file which is triggered at the end of the day and is placed on the Internet facing SFTP server managed by Fidessa.
 b) Post trade messages are sent to Fidessa hosted middleware in real-time and the results are sent to the client’s database via a Fidessa installed service in the client’s datacenter. The connection between Fidessa and the client is over a private circuit managed by Fidessa.
 

Please create a simple and clean data flow diagram using any program of your choice for the scenario described. Please copy/paste the diagram here as a picture. 

1 qtn

 You are the IT manager of a large corporation. You are planning to use Python to develop statistical models to aid in analyzing your sales data. You are preparing a report for management. Here are the basic requirements for your report:

  • Prepare in APA format
  • Include references
  • Report length: 500 – 700 words
  • Briefly describe your company
  • Briefly describe Python
  • Give overview of Machine Learning
  • Report on:’
    • Implementation plans
    • Technical training
    • Python libraries required
    • How Python will be used
    • Types of reports that will be produced

In addition, prepare a PPT presentation related to your Research Project 

2/3 Peer Review

Read and respond in at least 200 words to at least two of your classmates’ postings, as well as any follow-up instructor questions directed at you, by the end of the workshop. Include citations to at least one credible information source in your replies.

Attached are the posts, review and provide feedback/reply individually. 

SOFTWARE MANAGEMENT -4

1. Using Microsoft Project, add a project start time of 0 (or January 1) and a required project completion time of 180 days, calculate the ES, EF, LS, and LF times and total slack for each activity. If your calculations result in a project schedule with negative total slack, revise the project scope, activity estimated durations, and/or sequence or dependent relationships among activities to arrive at an acceptable baseline schedule for completing the project within 180 days. Describe the revisions you made.

Responses could be presented in a network diagram or in the schedule table format. The project should finish in 180 days. If the original plan is not completed by 180 days, the responses should describe what tasks were revised to meet the required completion date.

2. Determine the critical path and identify the activities that make up the critical path.

Responses can be presented in a list of activity names, highlighted in the network diagram, or highlighted in the schedule table.

make a University app to have a simple system to keep track of all the students (graduate and undergrads).To do that the following classes are needed

 

 make a University  app to have a simple system to keep track of all the students (graduate  and undergrads).To do that the following classes are needed for this  object-oriented database.

Student

  • StudentID : Integer
  • stdFirstName: String
  • stdLastName: String
  • stdMarks : Double []
  • stdAddress: Address

** Class Student should have set/get properties, constructor and have following methods:

Average() – that returns the average grade for students

toString() method that returns the above information as a String

  1. A class called Address which can be that can be added into the class student

Address

  • streetInfo: String
  • city: String
  • postalCode: String
  • province: String
  • country: String

** Class Address should have set/get properties, constructor and following method:

toString() method that returns the above information as a String

  1. A class called UndergraduateStudent that inherits from Student and has the following members:

Undergrad Student

  • subject: String
  • yearOfEntry :Integer

***Class Student should have set/get properties, constructor and following method:

Graduate()  – Boolean that returns true if the Student is eligible to graduate when  the average of their marks is greater than 50.

toString() method that returns the above information as a String

  1. A class called GraduateStudent that inherits from Student and has the following members:

Graduate Student

  • subject : String
  • yearOfEntry :Integer
  • thesisTopic: String

Class Student should have set/get properties, constructor and following method:

Graduate()  – Boolean that returns true if the Student is eligible to graduate when  the average of their marks is greater than 70.

toString() method that returns the above information as a String

Summary of Operations

System Menu:

  1. Add undergraduate student
  2. Add graduate  student
  3. View all the students
  4. View only eligible students for graduation
  5. exit

Overview:

  • You may use array or ArrayList to store all your students(graduate and undergrad) into one array of objects.
  • If you use an Array, you may assume the user does not enter more than ten students in total into the system

1 –Add undergraduate Students: this  menu should accept all the necessary parameters for undergraduate  students and create an instance from undergraduate class and store it  into students array.

2 –Add graduate student:  this menu should accept all the necessary parameters for graduate  students. It should create an instance from the graduate class and store  it in the students’ array.

3- View all the students: view all the relevant information of students (graduate and undergraduate) from students array

4- View only eligible students for graduation: view all the relevant information (graduate and undergraduate) from the students’ array only if they are eligible to graduate.

5 – Exit: exit the running menu (program)

CHRYPTOGRAPHY

determine the impact that cryptography plays on email exchange.  Should a company encrypt their email traffic and what would be the disadvantage for encrypting the data. You must use at least two scholarly resource. must be properly APA formatted. 300 WORDS