cloud computing Final Project

 

Your Research Project is due this week. It must consist of:

1. 5 source annotated bibliography

2. slide presentation with 12 or more slides

3. Summary or Abstract containing at least 750 words.

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use the Research Databases available from the Danforth Library not Google.

Application Development using Object Oriented Paradigm: A Case Study

Problem Statement:

A transportation company operates individual taxis and shuttles. It uses its taxis for transporting in the form of an individual or small group from one location to another. On the other hand, the shuttles have different scenario. They are used to pick up individuals from separate locations and provide them conveyance to several destinations. Any individual can call the company form anywhere. It may be a hotel, a mall, entertainment venue or any tourist company. When the company receives a call from such individuals, it tries schedule any available taxi for pickup service for a fare. If it has no free vehicles, it does not operate any form of queuing system. If the vehicles are available, then it confirms the individual for pick-up. After arrival at the pick-up place the driver notify the company that it has picked up the passenger. The driver notifies the company again at the time of dropping him off at his destination.

The company is now intending to have expansion in its volume. It thinks that this expansion will be vital to get more profit. For this purpose it needs more vehicles in addition to the existing ones. The company is willing to record details of lost fares and details of how each vehicle passes its time. These issues will help assess potential profitability.

Keeping the above mentioned problem statement, explain the following 5 steps in detail

  1. You need to discover all the classes from problem statement.[1 mark for discovering the classes from the problem statement given]
  2. Find out the methods associated with all the classes.[2 marks for the methods associated with the classes from the verbs of the problem statement]
  3. Create the CRC cards for all the classes found from the problem statement.[1 marks for creating all scenarios of CRC ]
  4. Create a Class relationship diagram using UML symbols [2 marks for creating the class relationship diagram using UML notations].
  5. As a final step Design (outline) classes and interfaces that have been discovered in the initial design phase [1 mark for outlining the classes and interface.]
  6. Give complete java programming implementation for at least two classes that were found in design phase. You must mention their most probable instance variables and methods. [2×1.5=3 marks]

Computer Intruders Operate

Although there are many different reasons what a person may decide to commit a computer intrusion, the basic methods and processes used are fairly common.  Discuss the common intrusion processes.

1) It should be a minimum of 300 Words not including references

2) APA Format and scholarly References needed

Work Breakdown Structure

 

A project’s Work Breakdown Structure (WBS) and Gantt chart provide structure for a project. In this week’s assignment you develop both the WBS and Gantt chart for a fictitious organization. The Manage Your Health, Inc (MYH) scenario will be used in the weekly assignments for the rest of the course.

Review the Manage Your Health Scenario and follow the directions below for completing a WBS and Gantt chart.

Develop a work breakdown structure (WBS) for the project. Break down the work to Level 3 or Level 4, as appropriate. Use the Work Breakdown Structure Template and Work Breakdown Structure example in this text as guides. Upload the WBS in list form. The WBS should be based on the information that would be in a project scope of this scenario. You can review your project plan from Wk 1. 

Create a Gantt chart using the WBS you developed with Microsoft Excel or another software of your choice and approved by your instructor. Do not enter any durations or dependencies. 

Submit 2 deliverables: the WBS and Gantt Chart. 

Discussion Post-cloud

 

Discuss  500 words or more discuss why Security as a Service is a good investment.

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

Block chain technology Reflection paper

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.  

Discussion

 

After completing the reading this week, we reflect on a few key concepts this week:

  1. Discuss and identify leader traits and attributes that are most beneficial in implementing the best decisions in an organization. 
  2. Explain the differences in charismatic and transformational leadership and how both leadership styles impact organizational effectiveness.  Please note how these leadership styles affect implementing new innovative technologies.
  3. Review table 8.1 in the reading this week, note the work characteristics and the traditional versus high-performance focus, note which focus is best for strategic decisions and which is best for operational decisions.  Please explain.

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive.  Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources from the UC Library.  Use APA references and in-text citations.

Please be sure to engage by Wednesday at 11:59pm ET and then engage on two more days throughout the week (for a total of three days of engagement, before Sunday at 11:59pm, ET.

Global Economy

Today’s Global Economy is very top-down driven with the government making all the decisions and regulations as it relates to doing business globally.  What are some advantages and disadvantages to this approach?  Is there another approach that might work better?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

Ask an interesting, thoughtful question pertaining to the topic

Answer a question (in detail) posted by another student or the instructor

Provide extensive additional information on the topic

Explain, define, or analyze the topic in detail

Share an applicable personal experience

Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

The Software Factory

It is necessary to explore all of the stakeholders involved within a software’s development to understand the pedigree of the software from a security standpoint. This will then allow a security professional to make informed decisions toward risk management.

Explore where and how the Adobe reader software is developed. In 500-750 words, report your findings. Make sure to address the following:

  1. Where does Adobe indicate their product is located/headquartered?
  2. Where is the software really developed and by whom?
  3. How many are involved in the development of Adobe and what threat might that pose to end users?
  4. What best practices should be considered during the development of the software to reduce security issues in reference to Software Development Life Cycle (SDLC)?

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

Control Objectives for Information and Related Technologies(COBIT)

Research the specific domains and components of the COBIT Framework.  Discuss the levels of security architecture as they relate to the principles of the COBIT Framework.  COBIT faced a variety of criticism.  Explain one criticism of COBIT and discuss if and how the criticism was addressed (if it was)

and assessment of how COBIT criticism was addressed and offer an opposite view of the criticism

3 pages