project 1

  

Projects

  1. Submit a two-page report that discusses the      requirements of operating systems for use in embedded computers. Be sure      to cite your sources.
  2. Submit a two-page report that discusses the advantages      and disadvantages of cloud computing and the security risks involved. Be      sure to cite your sources.

Additional Resources

  1. Windows Products and Technologies History:

http://www.ibtimes.com/microsoft-windows-30-short-history-one-most-iconic-tech-products-ever-2194091

  1. History of UNIX: https://www.bell-labs.com/usr/dmr/www/hist.html
  2. The untold story behind Apple’s $13,000 operating      system: https://www.cnet.com/news/the-untold-story-behind-apples-13000-operating-system/

Discussions 6

 

While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. From your research, discuss what legal protections exist for Bitcoin users in the US and other countries.

Discussion 8

 

Discussion: In this scenario, hackers launch cyber attacks that affect several parts of the nation’s financial infrastructure over the course of several weeks. Specifically, sensitive credit card processing facilities are hacked and numbers are released to the Internet, causing 120 million cards to be canceled; automated teller machines (ATMs) fail nearly simultaneously across the nation; major companies report payroll checks are not being received by workers, and several large pension and mutual fund companies have computer malfunctions so severe that they are unable to operate for more than a week. Identify the countermeasures that need to be implemented to prevent these cyberattacks from occurring in the future

Write a response to this scenario of 1 page at least

discussion 8.1

 

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

Research Topic

paper must be from 6 – 10 pages excluding the required pages like title page, menu and so on.

The paper must consists of 4 sections – Introduction. Literature Review, Details and Conclusion

Assignment and memo

 

1.Assignment

  • identify and apply the different analysis and design methods for business applications;
  • operate effectively within a team environment demonstrating team building and project management skills in information systems analysis and design; and
  • communicate information effectively in presentations with oral, written and electronic formats using media formats widely adopted for information systems development in business and government.

Create an alternative decision matrix for the case system. Using Excel or Word, develop a decision matrix to be used to evaluate three proposed design alternatives (alternatives A, B, and C).

The idea is to create a worksheet that can be applied to any set of alternatives.

Criteria: Decision matrix has columns for criteria weights and points available, and columns that represent three proposals. Within each proposal include columns for points assigned and

the product of points assigned times criteria weight. The bottom row of the matrix contains column totals.

Your essay should be 3 pages in content and fully explore all of the following items described above. Include at least 2 outside citations (not including your text) and use proper APA formatting.

Atleast 2 In-line citations and references required.

2. Weekly Memo – Memo should be related to the discussions , assignment and should be one page(citations,references, APA not required).

Net

“History of Net Neutrality” with 1 academically reviewed article on Net Neutrality as a reference (no blogs, wiki’s etc.)