Computer Science-Urgent

  • 1. Compare and contrast SaaS, PaaS, and IaaS, and provide an example of each.
  • 2. Define scalability and discuss how the cloud impacts it.
  • 3. List three advantages and three disadvantages of cloud computing

NO PLAGIARISM. Use only 2 peer-reviewed sources. 100% original. 400 words.

Assignment-2-CT-2 ECOM-500: Business and IT

  

Enterprise System Recommendation (100 Points) 

Extra Sweet Sugar, Inc. manufactures candy in Riyadh and distributes its products throughout KSA. The organization has over 350 employees in three locations. Its functional business units currently work in silos, with data pertaining to their various departments held in separate, legacy systems. The company’s revenues are growing, and it has an online retail site. 

As the company’s IT manager, you have been tasked with recommending a Customer Relationship Management (CRM) enterprise system to senior management. Address the following: 

· Which type of enterprise system would you recommend and why? 

· What are the benefits of implementing such a system? 

· What challenges do you foresee in implementing this system? How would you address these? 

· What are some of the vendors that offer such systems? Is there one that’s preferable given the organization’s needs? Why? What business factors should be addressed in order to make this determination? 

  

Regulations: 

· This assignment is an individual assignment. 

· All students are encouraged to use their own words.  

· Student must apply APA style guidelines.  

· Support your submission with course material concepts, principles, and theories from the textbook along with at least two scholarly, peer-reviewed journal articles. 

· A mark of zero will be given for any submission that includes copying from other resource without referencing it.  

· Write at least 4-5 pages in length, excluding the title page, abstract and required reference page, which are never a part of the minimum content requirements. 

· It must submit your assignment into the safe assignment Originality Check 

assignment

  

1. Please share your thoughts about Important Threats and Attacks.

2. Please define Threats, Vulnerabilities and common Attacks(detailed) 

CAPS

  1. The use of playbooks is very common in sports. They can also serve very important purposes in business—as a user manual that outlines knowledge needed so anyone on your team can help ensure business continuity. But most importantly, security playbooks can keep your business running smoothly if a business experiences attacks or intrusions that can occur at any time.  

    For this assignment, you work for an enterprise business. The board of directors is worried about recent ransomware attacks that have happened across several industries that have made the news. They want to make sure the organization is prepared for potential attacks. You have been asked to present to the board of directors 3 playbooks that would be utilized as part of the incident response plan specifically for risk management at the business level. Create a playbook for each of the following:

    • SQL Injection 
    • Website Compromise 
    • Exploitation of Windows 7 Workstations
    • Read Cybersecurity in 2021 from All Hands on Tech for help completing this assignment.  

      To complete this, you should create a 12- to 16-slide presentation with speaker notes and media such as images, video, or tables that will be presented to the board of directors. Specifically, your presentation should do the following:  

    • Explain the importance of using playbooks to risk management.  
    • Summarize the risks of the 3 threats listed above and recommendation of remediation plan presented in the labs associated with SQL Injection, Website Compromise, and Exploitation of Windows 7 Workstations. 
    • Summarize incident response plans for each of the 3 attack scenarios listed above.  
    • Justify NIST implementation, including an explanation of why it is the best option rather than another quicker and easier process. 
    • Identify additional tools and systems that might reduce or mitigate the risk of the 3 identified threats.
    •  

MIS433- Module 2: Database Project Phase 1 Instructions

Following are instructions for Phase 1 of your Database Project. Remember that each phase is built on the instructor-approved outcome of the previous phases and reflects all recommended changes and corrections.  

Phase 1:  Project proposal: Find a topic, for personal use or at work, that is suitable for a database.  Ample examples are provided in the course textbooks.  For best result, pick a topic that is meaningful to you.  You’ll get the best result this way.  The proposal should be a minimum of 300 words and contain the following main sections:

  • Project Title:  Assign a descriptive title to your database project.
  • Project Scope:  Describe the boundaries of the project.  For example, if the project is for a daycare center, the scope of the project may be: keeping records of all necessary details of children including name, parent’s phone number, age, special needs, etc.; information about the teacher, including name, degree, specialty, etc.; details of activities, toys in the daycare, food available in the canteen, etc.
  • Project Description:  Here you will describe the nature of the business and the type of business activities that take place.  Going back to the daycare example, a description would include the number of children and teachers/care providers, the number of the week days it operates, activities for each day, expenses, income, etc.
  • Outline type of inquiries, reports, views that users of this system are interested in having in order to get the information they need.  For the daycare example, a user may be interested in a list of all the children and information about each child, a list of activities, a list of care providers, income and expenses.  Here you want to indicate the type of data retrieval or updates to the database that you will be performing on your database. 
  • Possible Issues/Challenges:  This is where you can list the roadblocks that you foresee may get in the way of progress on your project.  The more descriptive you are, the better your instructor can guide you and help you resolve challenges before you get too far into the project.
  • Submit your proposal in a Word document to the assignment submission folder in Module 2.

Computer science

You are the Lead of the Test team in your Department.  Your team is typically exposed to software for testing once it is developed, packaged and ready to be deployed on the web.  They ask that you test and approve it before it is deployed.  Your team usually finds errors with every feature on the site.  The department thinks your team does a great job finding defects.  They then fix the code, and in a few weeks you can test it again.  To accommodate this cycle of test and retesting, your team schedules three full cycles of testing for every project you receive to test. 

Your Department manager ask you to collaborate with him and the other team leaders to shorten the time it takes to design, develop, test and deploy software.  What will you suggest? 

Write down a few points you would like to bring up at the meeting.

Article about cyber security

 Prepare a brief written summary  about cyber attacks (2-4 paragraphs that describe the article. Include a LINK to the article or a reference citation so the work can be located

From my home directory

  

QUESTION 1 From my home directory, copy the file called cards to your home directory. Copy the following script to a file in your home directory. This will be your first shell script. You can name the file any name that you would like. Once the file exists, execute the script. #!/usr/bin/ksh grep -i ‘Mantle’ cards if [ $? ] then echo “The name Mantle was found” fi The above script will locate the string “Mantle” within the file called cards and output the lines and a success statement. True False 10 points 

QUESTION 2 Copy the following script to a file in your home directory. You can name the file any name that you would like. #!/usr/bin/ksh if [ -f /etc/passwd ] then echo “The file exists” else echo “The file does not exist” fi Execute the file (script) The script will locate the /etc/passwd file and tell you that it exists True False 10 points 

QUESTION 3 Copy the file called list from my home directory. Copy the following script to a file in your home directory. You can name the file any name you would like. #!/usr/bin/ksh for index in `cat list` do echo $index done Execute the file (script). The script will output each line contained in the file called list. True False 10 points Click Save and Submit to save and submit. Click Save All Answers to save all answers.