Need a project report and presentation

  

Using the internet, search for an enterprise company (i.e Amazon) that you feel follows this enterprise architecture and consider the implications of each function represented. For each function in this diagram, define the purpose and interaction with other function, give examples. Define and discuss credible attack surfaces for each function, if any. Does the function include interactions with third party systems? If so, should they be trusted at the same level as the internal systems. Discuss threat agents and what targets may be of interest.  

Conceptual Sample Enterprise Architecture (attached diagram): Representations of the business functions and their interrelationships.

Project Report:

  

•Report should be no less than 10 pages of content. 

•You need to include outside sources and properly cite and reference your sources. 

•You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles. 

•In addition to the 10 pages of content, you will want a title page and a reference sheet. 

•Please ensure to use the proper APA citations.

Report format:

Title Page

Introduction of Company and brief background (Establish date, Location, what makes this company an enterprise, etc.)

Company Architecture (What exactly does this company do…)

Company Functions (define each function that relates to the company)

Function Integration (how/if the functions integrate with other functions)

Discuss Credible Attack Surfaces for the functions 

Discuss interactions with 3rd party systems and trust levels

Discuss Threat agents and targets

Your thoughts/improvements/gaps, etc.

Conclusion

References

attached-presentation format

information and communication innovation drives change in educational settings

This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age.  Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM). 

In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

C++ programming coding

 

Assume that we want to create a linked list structure to items.  We are given 

struct item
{
  string data;  item *next;
  item(string x, item* t)
   { 
      data = x; next = t;
    } 
};

In our implementations we used first and last pointers to keep first items and last item of linked list. Once we add new item, a new structure is created and add as last item. 

In this quiz, assume that we have only first pointer, and do not have last pointer. Complete the following function to add an item to at the beginning (front) of Linked Listed using only “first” pointer.  Just submit function implementation, not the whole program.

bool Bag::insertFront(string str)
{

}

Draw a diagram

  

  1. This      is problem 5.13 from your text book. You can use any Free UML tool      (see the list on the Moodle or Visio software tool) You need to draw a UML      diagram for a system.

Consider a hospital’s patient monitoring system. Each patient is connected to machines monitoring blood pressure, heart rate, and EKG. These machines issue a Boolean signal indicating a FAIL or WORKING condition. The results of each of these machined are ‘ORed’ together to form a signal called ALARM. The ALARM signals for each of the rooms (one patient per room) are then ‘ORed’ together and sent to the nurse’s station. If any machine on any patient indicates a failure, the emergency alarm is sounded and the nurse is directed to the appropriate patient and machine. Draw a data flow diagram/ UML diagram for such a system.

COM303 Week 2 Discussion 4

  

Choose one of the proverbs listed in this week’s reading on pages 45-47 and articulate how someone in the non-dominant culture may interpret that message? Is there a proverb, adage, or saying from today that you think speaks from a place of power, from the dominant culture in the United States?  How are non-dominant citizens implicated by that saying?

Research Paper

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.