Assessment

inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.

Instructions: Attached  Door and Window Lock Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit to the appropriate assignment folder. Also review any additional files attached for more information.

File

Portfolio Assignment

Portfolio AssignmentAttached Files:

Create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future.  The plan will follow the template/example provided.

 Should request prior authorization of company to be addressed to ensure that all students are working on unique companies.

**Even though this is a technical document, for academic purposes, all sources should be cited and referenced.

Portfolio assignment will be due the end of Week 15.

***Yout may modify some of the sections per the company they have selected but all students will need to complete a DR Plan for the Portfolio Requirement. 

****SafeAssign should be turned on and reviewed since it will flag a lot of the common elements but we want to make sure the students are writing the content from scratch.

for Dr Elahi

Oliver’s business is now growing. He built a company and has sales agents and sales supervisors working for him all over England. He realizes using google spreadsheets is not sustainable. 

He wants to invest in a scalable system and he is thinking to recruit a software engineer and a data engineer (you). 

The software engineer has to come up with a mobile app that allows the sales agents to report their sales from the app. 

The app should be connected with a data pipeline that would eventually make the data ready for analysis. 

– What would be your strategy to build a strong and reliable data pipeline and how will you structure it ? Explain the different steps for processing the data, what makes each step important? 

Mention which tools would you use for each of these steps. Feel free to argument as much as you feel it relevant You’re free to make assumptions about the mobile app e.g. The raw data is stored in a No-Sql database… 

Research Paper

 “There should be no plagiarism. Attach a plagiarism report with 0 % similarity index

 Task 1:

 Any one of the below topics

 1. Cloud Computing 

2. Big Data Analytics

 3. Database Security 

4. Enterprise Architecture 

5. Data Warehouses

 6. Ethics in IT 

7. Web 2.0 

8. E-Commerce 

 The research paper must be at least 10 pages but no more than 12 pages.

 • The paper needs to be supported by evidence (citations from peer-reviewed sources). 

• A minimum of four (4) peer-reviewed journal citations are required. 

• No references should be more than 5 years old.  

Task 2:

  • Your PPT should reflect a summary of your Individual Research Report.
  • You should have 12-15 slides.

 

Project #4 CRC cards and Class diagram

CALIFORNIA STATE POLYTECHNIC UNIVERSITY, POMONA PROJECT CASE STUDY

Project #4 CRC cards and Class diagram

ACTIVITY DIAGRAM

The following activity diagram depicts the process of buying eye glasses from the viewpoint of the patient. The first step is to see an eye doctor who determines if the patient needs glasses then gives the patient a prescription. The patient goes to a glasses store, where he selects the frame and places the order for the glasses. Once the glasses have been made, the patient returns to the store for a fitting and pays for the glasses.

page1image3832948128

USE CASE DIAGRAM

The following use case diagram illustrates the process of buying eye glasses.

page2image3832981184

CRC CARDS AND CLASS DIAGRAM

The following concepts were identified from the Activity diagram and Use Case diagram above.

Patient Prescription Eyeglasses Frame

Lenses Order Doctor Store

ATTRIBUTES AND BEHAVIORS

The system needs to remember at minimum the following attributes and perform the following operations

System Attributes

System Behaviors

Eyeglasses getLenseID Eyeglasses getFrameID Order calculateTax
Order calculateItemCost Order calculateTotalCost Customer getContact Customer getPaymentInfo Prescription getSpecification Lens getStrength

Frame getStyle
Store getDirections Doctor getAppointment

Bill to address CC#
Email address ID

Customer
Customer
Customer
Customer
Customer
Customer
Customer
Doctor ID
Eye glasses Base cost Eyeglasses Description Eyeglasses Discount cost Eyeglasses Manufacturer Eyeglasses Model

Frame ID
Lens ID
Order Date
Order Discount price Order ID

Order Quantity
Order Retail price Prescription Date Prescription specification Product ID (eyeglasses) Ship to address

Store name Store phone Store address Store number

Name
Phone number (home) Phone number (work)

PROJECT REQUIREMENTS

1. Create a CRC card for each class
2. Use the classes that were outlined for you and create the CLASS diagram for the system.

  •   Determine which class each attribute belongs to.
  •   Identify and add associations to the diagram
  •   Name your associations
  •   Add attributes and behaviors to the diagram
  •   Identify and add multiplicity indicators to the diagram
    PROJECT DELIVERABLES
    1. Upload your PDF version of the project to the assignment posting on blackboard 2. Use the cover page at the end of this handout as the first page of your assignment

Course: Assignment: Student Name:

CIS 3150 –Introduction to Systems 

IA week12 DB

 

Hello,

i need this paper by 11/11 afternoon.

Strictly No plagiarism please use your own words.

Pick one of the many information security standards organizations and describe what they do and what type of standards they are responsible for.

An initial post must be between 350 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Supply Chain Management

There are fundamental challenges in managing effective supply chains (those activities that largely affect a company’s COGS and working capital deployed).  The effective supply chain manager must recognize then lead the way through these challenges.  The best explanation of the challenges is:
A.  Trying to understand true Customer Expected Lead Time (CELT) and effort to make supply chains more responsive
B.  Trying to change production mindsets from push to pull while illuminating muda.
C.  Trying to make the purchase of milk more Make-to-Order
D.  Use techniques like postponement and vendor managed inventory to shift inventory holding responsibility from our balance sheet to another supply chain partner
E.  Identifying the adjectives that describe potential supply chain segments then implementing them throughout the company.

CC W 16 D

 Select three topics of interest and note:

  • What you learned about the topic
  • Why you selected the topic
  • How you will utilize the topic in the future
  • Also, write a reflection of the material you’ve learned in the course.  What did you like?  What could be improved?

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.   

The 3 topics are :

 Cloud Computing

Virtualization

Cloud Governance 

Access control Assignment 11

Discuss the best practices for implementing an access control system.

Length, 2 – 3 pages.

All papers are written in APA formatting, include title and reference pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.