Apply: Signature Assignment: Internet Systems Technologies Comparison

 

Assignment Content

  1. Imagine this scenario: Pine Valley Furniture wants to use Internet systems to provide value to its customers and staff. There are many software technologies available to Internet systems development teams, including SOAP, HTML, JSON, XML, CSS, ASP.NET, Objective-C, PHP, Java™, Python, Ruby, AJAX, Swift™, AngularJS, Bootstrap, jQuery, and R.

    Choose 1 of the following formats for this assignment:

    • Comparison table (3–4 pages)
    • Tabbed spreadsheet with a supporting narrative
    • Address the following items in your assignment:
    • Compare at least 3 Internet systems developments software technologies for use at Pine Valley Furniture.
    • Analyze how the selected Internet systems developments software technologies support Pine Valley Furniture’s core business processes.
    • Justify why an Internet systems developer might choose a specific type of technology instead of another type of technology for Pine Valley Furniture.
    • Explain how these technologies can bring value to Pine Valley Furniture.
    • Incorporate additional research to support your comparison.
    • Cite references to support your assignment.

      Format your citations according to APA guidelines.

      Submit your assignment.

Contrasting local and public test blockchains

Minimum 500 words. 

In chapter 4, the author discusses different options for testing blockchain applications. For our course, we have chosen to use Ganache, a local test blockchain. Explore some of the advantages and disadvantages of using local and public blockchains to test apps and contrast the two options.  

  • Create a new thread (by the FIRST DUE DATE)
    • Contract the advantages and disadvantages of using local and public blockchains to test applications.
    • Explain how each advantage and disadvantage impacts blockchain application development, and why each is important to a successful blockchain implementation.

I’m interested to read what YOU learned from this week’s reading. Do NOT submit a research paper. Tell me what you think.

  • Think of three questions you’d like to ask other students and add these to the end of your thread.
    • The questions must be taken from material you read in Chapter 1 or 2, and each question should start a discussion topic.
    • You’re not trying to test each other, but you are trying to start a discussion.
  • Finally, go to three other students’ threads and post comments, answering at least one of their questions.
    • For EACH comment you post, use the 3CQ approach (described above.)
    • When someone asks you a question, answer it!

ALL threads and comments must be substantive AND ORIGINAL. (I’m looking for about a paragraph – not just a short answer.) Do not plagiarize!! Use your own words.

The discussions in this class exist to simulate face-to-face discussions. To reach that goal, we will adhere to the 3CQ model. After posting each thread, you will post at least 3 comments on other students’ threads, and each comment must conform to the 3CQ model (Compliment, Comment, Connect, Question). This model encourages discussions that extend class learning and participation.

Here is a description of the 3CQ model:

1.            Compliment – Start off positive. Compliment the person on something specific you have read or observed in the person’s blog post.  For example:

  • Thanks for sharing your thoughts! I really liked …

2.            Comment – Comment on something relevant and meaningful about what the person wrote. Be specific! Remember your comment might not always be agreement. You can “politely” disagree.  For example:   

  • I agree with you about …
  • I respect your opinion, but I think …

3.            Connect – Connect with something the person wrote (Text-to-Self, Text-to-Text, Text-to-World). Explain your connection with details giving your audience a clear idea of what you’re talking about by using sensory details.   For example:

  • I can connect with you about …
  • I once read a story about …
  • I had the same thing happen to me…

4.            Question – Ask a specific question about something written or the writer. Keep the conversation going!

Footpriting

After responding to the weekly discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project. For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.).

Building Web Applications

 

Do a bit of research into File Inclusion Vulnerability.

  • What is it?
  • Why is it dangerous?
  • What is the difference between low and remote inclusion?
  • What methods can be employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

Post between 100 – 300 words

emerging threats and measures discussion

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

At least two scholarly sources should be used in the initial discussion thread. Use proper citations and references in your post.

UML diagram

Plot a      Package Diagram for the Online Student Registration System. Use the      Package Diagram class-based syntax.

Cloud Computing Research paper

For this project, select an organization that has leveraged Cloud Computing technologies to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

  • Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
  • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
  • Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
  • Conclusion:  Summarize the most important ideas from the paper and make recommendations or how they might have achieved even greater success.

  • The paper must adhere to APA guidelines including Title and Reference pages.  
  • There should be at least three scholarly sources listed on the reference page.  
  • Each source should be cited in the body of the paper to give credit where due.  
  • Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. 
  • The body of the paper should be 3 – 5 pages in length.  
  • The Title and Reference pages do not count towards the page count requirement

Homework

Question is regarding IT Management & Digital Transformation In the Business. On the HW 10 just do part 1 and part 2. Just answer to the question, keep it simple, straight forward.