Java Programming

 JAVA PROGRAMMING LANGUAGE
Online Book Store 
This project is mainly developed for bookstores & shops to computerize the book purchasing process as with the development of technology the working mechanism in all stores is under the process of digitization. The project aims to create an efficient & reliable online bookselling & buying platform to help buyers and sellers. There are three types of users in this system: admin, buyer, and seller. It saves buyers time by facilitating access from anywhere & providing home delivery service. The main features of the project are: 
1. Admin handles the whole system and has the right to access all data. Admin can add buyer, seller, or any admin member. 
2. Admin can delete buyer, seller, or any admin member. 
3. Admin can modify the records of the buyer, seller, or any admin member. 
4. Only registered users can access the system. 
5. Books can be grouped based on the price, title, etc. 
6. The proposed project also records sold & stock books automatically in the array. 
7. Buyers can check the history of sold and stock books. 
8. The seller can check the purchase history.

Note implement the java theory such as Operator, Condition, Looping, Arrays, Method, Inheritance. 

Discuss the connections that you made from the evidence

 Learning Goal: I’m working on a writing multi-part question and need an explanation and answer to help me learn.
Assessment Traits
Assessment Description
Synthesis is the act of creating something new from multiple existing entities. Synthesis of research, then, is creating a new idea from existing ideas. This assignment is designed to help you identify how themes can emerge from reading literature and how you can synthesize this information in a way that creates new knowledge. You will use your understandings of the Topic 2 readings to complete a synthesis worksheet.
General Requirements:
This assignment will be used as a pre-writing activity for the synthesis paper in Topic 5.
Locate and download “Synthesis Worksheet” from the Topic Resources.
Review the articles by Baker & Pifer (2011), Gardner (2009), and Smith & Hatmaker (2014) located in the Topic Resources.
This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
Doctoral learners are required to use APA style for their writing assignments. Review the GCU APA Style Guide for Writing located in the Student Success Center.
You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Class Resources if you need assistance.
Directions:
Complete the Synthesis Worksheet for the articles by Baker & Pifer (2011), Gardner (2009), and Smith & Hatmaker (2014). The completed worksheet will include the following sections:
An Introduction that introduces and provides context for the topic, presents three common themes that emerged from the readings, and provides organization for the paper with a thesis statement.
A description of the evidence to support three common themes that emerged from the articles. Since this is likely your first experience with this depth of synthesis, we have provided two of the themes found in the articles. Your task is to identify a third theme and to provide evidence from each article for all three common themes.
A conclusion where you will return to your thesis and provide evidence showing you successfully addressed your thesis statement. Discuss the connections that you made from the evidence and how each theme emerged from the central topic of doctoral identity.
Attachments 

CMIT 350 Subnetting Project.

  

CMIT 350 Subnetting Project.
 

You are a consultant for being brought in by XUMUC to assist with a merger with another company.
Background:
XUMUC is has the WAN links in place to the new locations in the Houston Region. XUMUC currently has 2 other Regions San Francisco and Denver. Originally, XUMUC was only in one region (San Francisco). The previous consultant did a poor job with the integration resulting in a poor IP address scheme as a result routing tables at the summarization points and at the San Francisco Campus are very large. In addition, no VLAN structure was developed to isolate broadcast traffic. There are 4 main departments in XUMC: sales, finance, human resources, and research and development. Also, there has been some concern that the WAN transport was not able to accommodate the network traffic. Finally, all addresses in the network are statically assigned resulting in high administration overhead when changes are needed XUMC would like this changed to lower administrative overhead.
 

IP ADDRESSING TABLE
Location Number of IP Addresses Required Address Block Assigned
San Francisco 1290 172.16.0.0-172.16.7.255/21
Denver Region
Denver Campus 441
Remote Office 1 28
Remote Office 2 35
Houston Region
Houston Campus 329
Remote Office 3 21
 

Deliverables:
Provide a document that addresses all issues described above.
The document should be written in APA format and contain:
• Cover page
• Index Page
• Executive summary
o One page,
• a brief statement of the problem (covered in the paper)
• background information
• concise analysis and main conclusions
• Technical details (including any assumptions)
o Details that address all issues described above
o Completed IP addressing table (including summarized routes for the Denver and Houston regions),
o Updated network diagram and a conclusion.
o business impact
• Conclusion
• Reference page 

Project 2: Nations Behaving Badly Step 16: Deliver to Your CISO

 

As a synthesis of the previous steps in this project, you will now submit the following for grading a packaged deliverable to the CISO that contains the following:

  1. Cybersecurity Risk Assessment including Vulnerability Matrix
  2. Incident Response Plan
  3. Service-Level Agreement
  4. FVEY Indicator Sharing Report
  5. Final Forensic Report

Based on the feedback you have received, you should have revised the deliverables. Although many of these deliverables were initially developed in a team setting, each team member is responsible for submitting his or her own documents for individual assessment.

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

  • 2.2: Locate and access sufficient information to investigate the issue or problem.
  • 4.4: Demonstrate diversity and inclusiveness in a team setting.
  • 5.3: Support policy decisions with the application of specific cybersecurity technologies and standards.
  • 5.8: Apply procedures, practices, and technologies for protecting web servers, web users, and their surrounding organizations.
  • 6.1: Knowledge of methods and procedures to protect information systems and data by ensuring their availability, authentication, confidentiality, and integrity.
  • 8.1: Employ ethics when planning and conducting forensic investigations, and when testifying in court.
  • 8.2: Incorporate international issues including culture and foreign language to plans for investigations.

Take Action

For this assignment, each team must designate a member who will submit the initial deliverable for the team. Other team members must submit their assignment folder entries for this deliverable in order to receive a grade and feedback. To avoid confusion, please add a comment to your submission, e.g., “I am a member of team [xyz]. [Student name] will submit the deliverable for our team.”

Revisions should made be made as a team and resubmitted using the same process. However, if a team member disagrees with the team’s deliverable, he or she is allowed to submit a separate revision based upon the original deliverable.

Take Action

Submit your assignment to your instructor for review and feedback.

Follow these steps to access the assignment:

  • Click Activities and Assessments in the top navigation bar.
  • Click Assignments.
  • Select the relevant assignment.

Week 4 Assignment – Risk Methodologies and Analysis

 

Overview

In order to successfully manage risk,  one must understand risk itself and the assets at risk. The way one goes  about managing risk will depend on what needs to be protected, and from  what to protect it. 

Instructions

Write a 3–4 page paper in which you: 

  1. Discuss at least three rationales for performing an information systems security risk assessment.
  2. Explain the differences in quantitative, qualitative, and hybrid  information systems risk assessment and illustrate the conditions under  which each type is most applicable.
  3. Describe the type of information that is collected to perform an  effective information systems security risk assessment. Include at least  three different types. Fully describe each and justify why you made  your selections.
  4. Describe at least five common tasks that should be performed in an information systems security risk assessment.
  5. Use at least two quality resources in this assignment. Note:  Wikipedia and similar websites do not qualify as quality resources. The  Strayer University Library is a good source for resources.

The specific course learning outcome associated with this assignment is: 

  • Evaluate risk analysis methodologies to determine the optimal methodology based on needs, advantages, and disadvantages.

Tokenization

This week we explored the concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.  

Case analysis study

1- Identify the main problem/opportunity of the case

2- Perform an analysis of the company (issues, internal and external analysis, proposed solutions)
3- Develop an implementation plan for the solution you select and discuss the change management activities required for the implementation
4- Consider the data of the case, what variables would you use to develop the analytics model?
5- Develop a presentation using Mento-Pyramid method to present your analysis.