The Banking e-Teller system

  

The Banking e-Teller system allows bank customers to perform ATM transactions from their cell phone. BeT will allow customers to check balances, make remote capture deposits, and perform balance transfers to their checking or savings account. Balance transfers should only be processed if the funds are available. It is time to start organizing your solution for this system and to begin development on your design proposal.
 

Create the following for BeT:
 

•Flowcharts showing the program processing flow for remote capture deposits, balance transfers, and balance inquiries

Microsoft Word Project

 

 Purpose:

The purpose of this assignment is for students to use various sources (both print and online) to research a technology-related issue. Students will then write a paper in Microsoft Word that further describes the issue and communicates the student’s position. 

Content Requirements :

Search the Internet for a current technology-related issue/debate. An example of one, “which you cannot use for the project”, might be whether it’s right or wrong for potential employers to require applicants’ Facebook credentials so that they can peer into their personal lives. 

digital surveillance

 

Module 06 Content

  1. For your written assignment for this week, write a 2-3 page paper about the ways an individual might be tracked by digital veillance on an average day:
    • Discuss what devices might be used
    • What data might be collected and to what extent can a person reject or resist digital veillance?
    • Make sure to use APA formatting and proper references.
      Submit your completed assignment to the drop box below. Please check the Course Calendar for specific due dates.
      Save your assignment as a Microsoft Word document. (Mac users, please remember to append the “.docx” extension to the filename.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:
      Jstudent_exampleproblem_101504

Discussion 8 (Database)

250 words+

Topic: 

1. Since there are different data warehouse system available such as AWS, Snowflake,…etc.

If you want to retrieve some information/data/special topics from different warehouse system, what will you do? Such as what kind of steps needed to take and why shall we take those steps, or directly using keyword, etc. Note: you may need to concern about both of the efficiency and effectiveness (precision) performance.

2. What is data pipeline? List some advantages as using data pipeline.

Briefly 5 sentences each

  • 11.1 List and briefly define three classes of intruders.
  • 11.2 What are two common techniques used to protect a password file?
  • 11.3 What are three benefits that can be provided by an intrusion detection system?
  • 11.4 What is the difference between statistical anomaly detection and rule-based intrusion detection?
  • 11.5 What metrics are useful for profile-based intrusion detection?
  • 11.6 What is the difference between rule-based anomaly detection and rule-based penetration identification?
  • 11.7 What is a honeypot?
  • 11.8 What is a salt in the context of UNIX password management?
  • 11.9 List and briefly define four techniques used to avoid guessable passwords.

Problem 6- Org behavior

1. Discuss some of the errors in perceptual judgment made by interviewers in job interviews.

 should be at least 1.5 – 2 pages in length, Times New Roman 12-pt font, double-spaced, 1 inch margins and utilizing at least one outside scholarly or professional source related to organizational behavior. This does not mean blogs or websites. This source should be a published article in a scholarly journal. This source should provide substance and not just be mentioned briefly to fulfill this criteria. The textbook should also be utilized. Do not use quotes. Do not insert excess line spacing. APA formatting and citation should be used.

Text-

Title: Essentials of Organizational Behavior, Student Value Edition 

ISBN: ISBN-13: 9780135468890 

Authors: Stephen P. Robbins, Timothy A. Judge 

Publisher: Pearson 

Edition: 15TH

Homework

 Go  to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.
Using WORD, in your OWN WORDS, write an ORIGINAL with 300 words or more  :

  • Summarize the case
  • Give your opinion of the decision.
  • Describe how the case deals with the material in this chapter

Evaluating Research Articles

 Assignment:

  • Find and then evaluate a Research article – Mobile technology preferred; but any technology topic is acceptable (must follow APA and these formatting requirements:)
    • Write a four – six (4-6) page paper that evaluates a research article that you found – your paper should be: typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. See hand-outs provided on graduate and APA style research papers.
    • State the name of the article you found, use the questions below as context for evaluating your article; discuss what this article about; cite this article and include it in your reference list.
    • Use at least four different quality resources in this assignment. Note: Wikipedia, Blogs, Info articles, and similar Websites do not qualify as quality resources for research writing.
    • Include a cover page containing: the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference pages do not count toward the page count. Review the Helpful Information provided related to critical thinking and also follow the hand-outs provided in this folder.

Please use the example “Guidelines for Evaluating your Research Article” as your guide in addressing the questions below: 

  • What is an Information Technology Project?
  • What makes research writing different that ordinary information/observation writing? 
  • Identify & explain the major components of a research paper format.
  • What components of a research format is included in your article, and
  • How does this format contribute to the purpose of the writing?
  • Why use Peer Reviewed journals in research?
  • Why are keywords used during the Literature Review process?
  • Why use/apply APA basic citation style in your writing assignments?
  • Why is academic integrity important (see syllabus)?