Define the business model of the software project. Describe the use cases as well as the use cases diagram. Show how the use cases can be realized into sequence diagrams for ‘ Software Project (Estimating a vehicle’s velocity (that is, speed) based on skid marks, yaw marks and vault case)’ project. Describe a feasible domain model and ways to refine it into an analysis class diagram.
3 discussion
Business Considerations
Identify and discuss business considerations relating to security policy frameworks. When creating a security policy framework, it’s important to align business objectives with the correct framework. Discuss what can happen if the framework you choose as a foundation does not fit your organization’s business objectives. Why is it important to pay attention to business objectives? Discuss at least four things that could affect the organization if the security framework does not align with business objectives and rationale for each.
A15
Please go through the attached document for assignment details.
operational excellence
Select an organization that has a Global platform (they operate in more than one country), that has demonstrated operational excellence. In this paper, perform the following activities:
- Name the organization and briefly describe what good or service they sell and where they operate.
- Note how they are a differentiator in the market.Note the resources used to ensure success in their industry (remember resources are comprised of more than just people).
- Explain what actions the company took to achieve operational excellence.
- The above submission should be three pages in length.
Remember the total length does not include the APA approved cover page or the references. There should be at least three APA approved references to support your work
Wireshark Capture
- Download and install Wireshark
- Download the sample.cap.zip file
- Unzip the capture file.
- Load it into Wireshark.
- Answer the following questions:
- Make a list of all the protocols in that capture.
- Briefly explain what all the protocols do (approximately one paragraph per protocol). Please do not copy and paste from Wikipedia or some other source. Instead, write in your own words.
- What is the source MAC address of the computer making a RIPv1 request at IP address 10.0.0.2?
- What’s happening with capture # 67? Explain.
- Are there any FTP or Telnet sessions? Why are FTP and Telnet considered insecure protocols?
- Are there any SSH sessions? How does Telnet relate to SSH? Tell us why SSH v2 is better?
12_Imoprtance of strategic IT planning
Research Paper: COSO Framework
The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.
Your paper should meet the following requirements:
- Be approximately 3-4 pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Note: Please Use Scholar articles for APA references
Client/Server FIFO computer system analysis
exercice computer system analysis …i have attached the software you need to do the job
Physical Security
Complete a Physical Security Assessment (internal and external) of your place of work or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities. Refer to your text on the importance of Lighting and Access Control and be sure to cover the salient issues discussed in the text.
Research Paper
read about entrepreneurship in a global economy. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:
• Describe the organization’s environment, and evaluate its preparedness to go global, if not already, and it’s strategy for staying global if it is.
• Research other company’s strategy for going global and explain if this will or will not work for your company.
Make a recommendation for a global strategy in the organization, including a justification for your recommendations.
Submit your midterm research paper as a single document. Your paper should meet the following requirements:
• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.
• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Business Intelligence
When submitting work, be sure to include an APA cover page and include APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).
Discussion
1.What is an artificial neural network and for what types of problems can it be used?
2. Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial ones? What aspects are similar?
3. What are the most common ANN architectures? For what types of problems can they be used?
4. ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.
Excercise:
5. Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding.
Internet Exercise
6. Go to neuroshell.com. Look at Gee Whiz’s examples. Comment on the feasibility of achieving the results claimed by the developers of this neural network model.