Please develop an app to show the list of all branches of an organization. The branches should be located at different places. You can choose whatever organization you like, and it can be either realistic or fictional. For example, Walmart stores, KFC restaurants, Global Defense Initiative (fictional) bases, etc. Requirements: • The list of the branches should be displayed in a table. • The cells in the table must have a colorful background. You may use any color except black, white, and gray. • Each cell of the table should contain a thumbnail of that branch, with its name and city. • When the user taps on a cell, a new view will pop up, showing the location of the branch on the map. • The pin on the map should contain a thumbnail of the branch, with its address. • On the top-right corner of the map, there should be a button. When the user taps the button, the map should be closed, and the program shall return to the table of the branches. (Hint: Use unwind in Lecture 12.) • When you submit this assignment, please compress the entire project folder into a single zip file and upload it to the submission link. You can find more hints in Lectures 10, 11, 12, and 13.
Research Paper
What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?
Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
C++ I programming
Overview
For this assignment you will be building two main components. A menu system and several drawing routines.
The menu system will operate on a whitelist principle and prompt the user for the type of drawing they want and its size. A whitelist is a list of accepted inputs with anything not on the list rejected.
The drawings will all be ASCII shapes of user specified size.
Menu System
The menu should prompt the user for a command and if it is not a valid command, respond it is invalid and prompt again. The commands it needs to respond include:
- help – This will print a list of all accepted inputs and re-prompt the user.
- quit – This will terminate the program.
- square – This will initiate the square drawing.
- box – This will initiate a box drawing.
- diagonaldown – This will initiate a diagonal down line.
- diagonalup – This will initiate a diagonal up line.
- checkerboard – This will initiate a checkerboard pattern.
The matching for the commands should be case insensitive. That is “Help”, “help”, and “hElP” will all trigger the help command.
Drawings
There are several drawings that your program needs to support
Square
When a square is drawn it will first prompt the user for a size. Valid sizes are 1 through 15 inclusive. An example square of size 5 is
*****
*****
*****
*****
*****
Box
When a box is drawn it will first prompt the user for a size. Valid sizes are 3 through 15 inclusive. An example box of size 5 is
*****
* *
* *
* *
*****
Diagonal Down
When a diagonal down line is drawn, it will first prompt the user for a size. Valid sizes are 3 through 15 inclusive. An example line of size 5 is
*
*
*
*
*
Diagonal Up
When a diagonal up line is drawn, it will first prompt the user for a size. Valid sizes are 3 through 15 inclusive. An example line of size 5 is
*
*
*
*
*
Checkerboard
When a checkerboard drawn, it will first prompt the user for a size. Valid sizes are 5 through 15 inclusive. An example line of size 10 is
* * * * *
* * * * *
* * * * *
* * * * *
* * * * *
* * * * *
* * * * *
* * * * *
* * * * *
* * * * *
Tips
- Write your program iteratively. You shouldn’t ever write more than a few lines of code without compiling and testing it.
- Start with small pieces. It isn’t reasonable to sit down and write the whole program from beginning to end. The pieces you build should ultimately fit together to build the whole program.
- It is easiest to draw the various shapes using nested for loops.
- One way to build the program is as follows:
- Write a function that accepts user input and validates it against the list of command. Start with it being case sensitive and then add case insensitivity.
- Write the functionality to print out a help message, quit, and re-prompting the user on invalid input.
- Start with one of the drawings, say a square. Create a function to draw a square. Initially make it draw a fixed size, then allow for it to draw an arbitrary size.
- Write a function to prompt the user for a size within a specified range. This function should validate the input is in the specified range and re-prompt if it is outside. Make sure to write this function so that it can be used for multiple drawings which may have different size constraints.
- Integrate your size prompt function to fully draw your first chosen shape.
- At this point your program should have close to full functionality, with the only thing missing being other shapes.
- Add the remaining shapes to the program using the infrastructure you have already built.
Example Output
User input is in bold
Please enter a command: bad
Invalid command
Please enter a command: hElP
Acceptable commands: help, quit, square, box, diagonaldown, diaonalup, checkerboard
Please enter a command: square
Please enter a size between 1 and 15: -1
The value -1 is not in a valid range.
Please enter a size between 1 and 15: 16
The value 16 is not in a valid range.
Please enter a size between 1 and 15: 5
*****
*****
*****
*****
*****
Please enter a command: box
Please enter a size between 3 and 15: 2
The value 2 is not in a valid range.
Please enter a size between 3 and 15: 5
*****
* *
* *
* *
*****
Please enter a command: diagonaldown
Please enter a size between 3 and 15: 7
*
*
*
*
*
*
*
Please enter a command: diagonalup
Please enter a size between 3 and 15: 7
*
*
*
*
*
*
*
Please enter a command: checkerboard
Please enter a size between 5 and 15: 13
* * * * * * *
* * * * * *
* * * * * * *
* * * * * *
* * * * * * *
* * * * * *
* * * * * * *
* * * * * *
* * * * * * *
* * * * * *
* * * * * * *
* * * * * *
* * * * * * *
Please enter a command: quit
Questions
Information Systems for Business and Beyond Questions:
- Chapter 9 – study questions 1-10, Exercise 3 &4.
Information Technology and Organizational Learning Assignment:
- Chapter 7 – Review the section on dealing with multiple locations and outsourcing. Review figure 7.2 and note how virtual team communications further reiterates the importance of this model.
ISO
Lopes, M., Guarda, T. & Oliveira, P. (2019). How ISO 27001 Can Help Achieve GDPR Compliance. 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-6. https://ieeexplore.ieee.org/document/8760937?arnumber=8760937
Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43.
From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?
Present your discussion post as if you were presenting to senior leaders of your company.
Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
- Make an argument concerning the topic.
Business Impact Analysis (BIA)
Create a PowerPoint (5-6 slides) on a life event you may have coming up and apply the strategies you learned in the Business Impact Analysis (BIA) section.
What workarounds or “back up” plans/solutions can you put in place to ensure your event will still occur?
Your final slide should include a minimum of 2 references, which are formatted using APA standards.
Assignment
For this assignment, you will need the following: Ubuntu and VirtualBox.
Ubuntu can be downloaded at https://www.ubuntu.com/download/desktop.
VirtualBox can be downloaded at https://www.virtualbox.org/wiki/Downloads.
Next, create a virtual machine or instance in virtual box and load the Ubuntu desktop software on it. You may need to do additional research to get Ubuntu loaded on the virtual machine . Next, watch the video about installing a LAMP server; install the LAMP server on your Ubuntu virtual machine.
Use screencast-o-matic to document this assignment. Submit link to video on iLearn.
Assignment
Test out the Google App Engine – Quickstart for Python 2 Standard Environment
This quick start shows you how to create a small App Engine application that displays a short message.
https://cloud.google.com/appengine/docs/standard/python/quickstart
Use screencast-o-matic to record your self completing the quick start tutorial. Submit the video link for a grade.
Physical Security – individual project
When we think of ethics, we usually think of guidelines for differentiating between what is right and what is wrong. For example, consider the Golden Rule (“Do unto others as you would have them do unto you”) or the Hippocratic Oath (“First, do no harm”). We are exposed to ethical norms for behavior in many settings (home, school, church, etc.) and from an early age.
In this assignment, answer the following question 7-10 full pages, not including citations and title pages:
If ethical norms for behavior are so commonplace, and guidelines for ethical decision making are common sense, why must we consider the ethical implications of research in this course or any information technology class?
APA 6th Edition formate with in text citation
discussion help minimum 300 words
Discuss a particular type of Malware and how has it been used in “todays news” and the respective impact on cyber security. Add to your discussion ways the Malware could have been detected and potentially avoided.
Read Chapter 1 of the assigned textbook.
Book reference:
Computer Security: Principles and Practice
Fourth Edition By: William Stallings and Lawrie Brown