Service Delivery Models

 Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.  

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand-alone quotes will not count toward the 3 required quotes.

Write in essay format, not in bulleted, numbered, or other list formats

Business Intellegence

Discussion: What are the common business problems addressed by Big Data analytics?  In the era of Big Data, are we about to witness the end of data warehousing? Why? 

 Questions: 1. What is Big Data? Why is it important? Where does Big Data come from? 

2. What do you think the future of Big Data will be? Will it lose its popularity to something else? If so, what will it be? 

3. What is Big Data analytics? How does it differ from regular analytics? 

4. What are the critical success factors for Big Data analytics? 

5. What are the big challenges that one should be mindful of when considering the implementation of Big Data analytics? 

Exercise:  At teradatauniversitynetwork.com, go to the Sports Analytics page. Find applications of Big Data in sports. Summarize your findings 

cc-17

 

Write a brief reflection on this Cloud Computing and on how it will aid your professional career and development.

  • How will this  Cloud Computing impact your professional objectives?
  • What were the major work-related lessons that you learned?
  • How will this  Cloud Computing prepare you for further studies related to your chosen Software career?

paper

 

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignment 1 cryptography

  Question: Evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  Look at the reasons why cryptography was used and how it developed over the years.  Was it used or implemented differently in varying cultures?  

 –The writing assignment requires a minimum of two written pages to evaluate history.

  -You must use a minimum of three scholarly articles to complete the assignment.

– The assignment must be properly APA formatted with a separate title and reference page. 

 – No Plagiarism 

Internet Programming

 Internet Programming Term Project – Online Banking I. Introduction This project let you apply the programming skills you learned in Internet Programming class by developing an application for online banking using ASP.NET MVC Core with C# language. You will build a website which serves as an online service website, where one can register as a customer. Once registered, a customer can log in and log out the website. Customers can update their profile/personal information, review deposit/withdraw history, check balance, pay bills. Particularly, in the bill pay section, the customers can add/update payee information, pay one or more payees, and review payment history. Another role of the website is a teller. A teller can see the information of all the customers, can perform deposit/withdraw operation, can close customer accounts. II. Requirements 1. There are two roles in this website – customers and tellers. 2. A teller can see all customers’ information. 3. A teller can withdraw and deposit money for a customer. This is just a simulation of the operation that a teller performs at the bank counter when collecting and/or disseminate cash/check from a customer. 4. The website is free. Anyone can register as a customer. Upon registration, the customer information is collected and saved in the database; an id is assigned to the customer. 5. Registered customers can log in and log out the website. The only pages an unregistered person can access is the home page and registration page. 6. A customer can update his/her personal information on the website. 7. On the bill pay page, a customer can add new payee or update existing payee. One customer can have multiple payees. 8. A customer can pick one or multiple payees to pay. When payment is submitted, you only need to save the payment information in the database. A customer can review payment history which can be sorted and filtered by a date range. 9. You need to design a simple database. Three tables are required in the DB:  Customer –information of the registered customer  Payee — each customer can have a saved list of payees with all information necessary to send the payment  PaymentHistory – stores the payment history of all customers You can also add additional tables that you think are needed.  10. You will not only be graded by the correctness, but also by the quality of code. I expect your code to be clear and follow good programming practice. 11. When designing and building the website, keep security and user friendliness in mind! 12. You can work alone or in a team of 4 students maximum. 13. Bonus points will be given to projects with an additional role – manager. If you implemented this feature, make sure to describe it in your video demo and project report. Maximum 10 bonus points. III. Deliverables 1. Project Reports – You need to write a project report, where you need to:  Provide introduction of the project  Show screenshots of the pages you built  Explain how each page work, and how are the pages connected  What skills you learned from class are used in your project  If this is a teamwork, only one report is needed for the team. The report needs to have all team members’ names and clarify each team member’s contribution to the project. 2. Presentation – At the end of the semester, you will prepare a demo video using screen recording software such as “screen cast o matic”, “screencastify”, or zoom (meeting recording functionality). In the video, present your project by briefly going through the code structure and a demo of the website. 3. Code – Zip all the source code into one zip folder.  

Cloud Computing

 

Write a one-page organizational overview using APA (7th Edition) formatting.  The Title and Reference pages do not count towards the page count requirements. The organizational overview should include:

  • A brief history
  • Mission (If you quote the mission directly, be sure to follow APA for direct quotes)
  • Goals
  • Achievements

The paper must adhere to APA guidelines including Title and Reference pages (no abstract).  There should be at least one scholarly source listed on the reference page.  Each reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in text. APA requirements for this class include:

12-point Time New Roman font

Your paper should be typed and double-spaced with 1″ margins on all sides

The first sentence of each paragraph should be indented one tab space