- Inventory ManagementObjectives: Use inheritance to create base and child classes Utilize multiple classes in the same program Perform standard input validation Implement a solution that uses polymorphismProblem:A small electronics company has hired you to write an application to manage their inventory. The company requested a role-based access control (RBAC) to increase the security around using the new application. The company also requested that the application menu must be flexible enough to allow adding new menu items to the menu with minimal changes. This includes re-ordering the menu items and making changes tothe description of a menu item without having to change the code.Security:The company has suggested to start the application by prompting the user for a username and password to authenticate the user. There are two types of users at this company, managers and employees. If managers log on to the application, they will seeall options on the menu list. If employees log on to the application, they will see a limitedset of options on the menu list. User information is stored in Users.dat file, which may ormay not exist at the start of the program. A super user “admin” with password “admin” has already been hardcoded in the program to allow for the initial setup and the creationof other users. The Users.dat file contains the FirstName, LastName, Username (case insensitive), HashedPassword and a flag to indicate whether a user is a manager or not.The file is comma separated and it is formatted as follows:Joe, Last, jlast, 58c536ed8facc2c2a293a18a48e3e120, trueSam, sone, 2c2a293a18a48e3e12058c536ed8facc, falseJane, Best, jbest, 293a18a48e3e12052058c536ed8facc2c, falseNote: Ensure that the ‘AddUser’ function does not add duplicate values, and the ‘ChangePassword’ function does not change password if username/password is entered incorrectly. If adding a new user or changing the password is successful, return true, or else return false.
Application Menu:The menu of the application is dynamically loaded and displayed to the user only after the user successfully logs on. The menu items will be loaded from file “MenuList.dat”, which may or may not exist at the start of the application. If the file doesn’t exist, the application should show at least an Exit menu item as default. The file will contain all menu items details, including the name of the command that will be executed when the menu item is selected. If a menu item is marked as restricted (Boolean flag), only managers can see that item. The file contains the following comma separated fields, Description, a Boolean flag to indicate if the option is restricted to managers only, and the name of the menu command that will be executed when the option is chosen. The order and option number of a menu item may change depending on how they are listed in the file. The Exit option will always be listed last and it will not be in the file.Below is a sample of how the MenuList.dat file looks like:Add User, true, AddUserCommandDelete User, true, DeleteUserCommandChange Password, false, ChangePasswordCommandAdd New Product, true, AddProductCommandNote:The command name of each menu item must match the name of the class that you will create in the code (See AddProductCommand class in the code for example).Inventory:The inventory consists of multiple products of type Product stored in class ProductCatalog. The ProductCatalog is responsible of all inventory operations that add, remove, find and update a product. When printing a product information, the product retail price should be calculated and displayed as well. Retail price = (cost + (margin * cost/100)). A list of functions has been added to this class in the provided code template. You must implement all listed functions. The inventory products will be saved in file Inventory.dat, which may or may not exist when the program first starts. The file will contain the product unique id (int), product name (string), cost (double), quantity (int)and margin (int, integer that represents margin percentage).The Inventory.dat file is comma separated and formatted as follows:3424, Smart Watch, 20.45, 23, 8065454, Flat Screen TV, 465.98, 15, 35435, Computer Monitor, 123.54, 84, 43Program Flow: Program starts in main() method Prompt user for username and password Authenticate user and maintain the logged-on user object Load inventory
Load and create menu list Display menu list and prompt the user for option Execute selected option Keep displaying the menu until the user chooses to exitOutput Format:Enter username: some usernameEnter password: some password //Repeat prompts until useris authenticated OR show error andoption to exit.Invalid username or password!Press enter to continue or “Exit” to exit:Enter username: some usernameEnter password: some passwordWelcome Firstname LastName!Inventory Management System Menu //This is the header of the MenuList// The order and option number of a menu item may change depending on how they are listed in the MenuList.dat file. The Exit option will always be listed last and it will not be in the MenuList.dat file.1- Add user2- Remove user3- Change password4- Add new product5- Update product information6- Delete product7- Display product information8- Display inventory9- ExitEnter your selection: 7
Enter product name: sMaRt wAtChId Name Cost Quantity Retail—————————————————-3424 Smart Watch $20.45 23 $36.81//Repeat the menu after each command is executedUnit Testing:A unit test method is required to test each of the methods listed below. These methods will be used by the unit testing framework to test the accuracy of your code. InventoryManagementSecurity.AuthenticateUser InventoryManagementSecurity.AddNewUser InventoryManagementSecurity.RemoveUser InventoryManagementSecurity.ChangePassword MenuList.AddMenuItem() ProductCatalog.AddUpdateProduct(Product product) ProductCatalog.RemoveProduct(int productId) ProductCatalog.FindProduct(int productId) ProductCatalog.PrintProductInformation(int productId) ProductCatalog.PrintInventoryList()Grading: Coding standards, style and comments (10 Points) Unit testing methods x 10, (2 points for each of the methods mentioned above – 20 Points) The rest of the grade will be broken down as follows: InventoryManagementSecurity.AuthenticateUser (5 Points) InventoryManagementSecurity.AddNewUser (5 Points) InventoryManagementSecurity.RemoveUser (5 Points) InventoryManagementSecurity.ChangePassword (5 Points) MenuList.AddMenuItem() (20 Points) //This includes implementing all commands for the menu list ProductCatalog.AddUpdateProduct(Product product) (10 Points) ProductCatalog.RemoveProduct(int productId) (5 Points) ProductCatalog.FindProduct(int productId) (5 Points) ProductCatalog.PrintProductInformation(int productId) (5 Points) ProductCatalog.PrintInventoryList() (5 Points)N
Research Assignment
Draft a 5-6 page research prospectus (a short version of what will become your “research proposal”) that is a shortened description of a possible research project you’re looking into for your dissertation, including a description of the problem area, the purpose of your research project, and research question(s) that you would answer in your dissertation.
Short answer
Short answers. APA is necessary for any paraphrasing or direct quotes. Complete the four questions.
Short answer – describe a common attack against safes and vaults:
Short answer – describe a protection against your common attack in the previous question:
Short answer – describe criteria when selecting a safe or vault:
Short answer – describe a common deterrent control related to safes and vaults:
computer Archtecture
Q1. Describe the major components of a desktop or laptop personal computer that is not more than 3 years old. There should be four categories. Each category has many components. Some components, such as CPU has many more components. You must provide at least a complete sentence to describe this component.
Q2. Draw the layout of the following components: CPU, cache, ROM, RAM, DMA, and I/O modules. Use the line to show the interaction between every two components. For example there is a line between CPU and cache and another line between CPU and ROM. You can’t draw a line in the middle with all components hanging from the line. No other components should be included in the answer. No need to provide additional description.
700 words: Information Technology and Organizational Learning. Read the reference document and answer the questions in description
Please find the reference document in the attachment:
· Chapter 7 – Review the section on dealing with multiple locations and outsourcing. Review figure 7.2 and note how virtual team communications further reiterates the importance of this model.
· Chapter 8 – Review the Siemens AG case study. Note the importance of understanding the interrelationships amongst all the senior leaders at every location. Pay special attention to Figure 8.1 and Figure 8.2. Note how the corporate CIO should engage with each of the regional leaders. Why is this important?
Paper
Access Controls Procedure Guide
Scenario
Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences.
Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff:
▪ Understand and document the purpose of each access control change request
▪ Know what access controls were in place before any changes
▪ Get an approval of change by management
▪ Understand the scope of the change, both with respect to users, computers, and objects ▪ Have evaluated the expected impact of the change
▪ Know how to evaluate whether the change meets the goals
▪ Understand how to undo any change if necessary
Tasks
Create a guide that security personnel will use that includes procedures for implementing an access control change.
The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved. Ensure that your procedures include the following:
▪ Status or setting prior to any change
▪ Reason for the change
▪ Change to implement
▪ Scope of the change
▪ Impact of the change
▪ Status or setting after the change
▪ Process to evaluate the change
Required Resources
▪ Internet access
▪ Course textbook
Submission Requirements
▪ Format: Microsoft Word (or compatible)
▪ Font: Arial, size 12, double-space
▪ APA Citation Style
Self-Assessment Checklist
· I created a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow.
· I created a well-developed and formatted procedure guide with proper grammar, spelling, and punctuation.
· I followed the submission guidelines.
Data visualization
According to Kirk (2016), most of your time will be spent working with your data. The four following group actions were mentioned by Kirk (2016):
Data acquisition: Gathering the raw materialData examination: Identifying physical properties and meaningData transformation: Enhancing your data through modification and consolidationData exploration: Using exploratory analysis and research techniques to learnSelect 1 data action and elaborate on the actions performed in that action group.
Remember your initial post on the main topic should be posted by Thursday 11:59 PM (EST). Your 3 following posts should be commenting on your classmates’ post on different days by Sunday 11:59 PM (EST). You should end the week with 4 total discussion posts.
A quality post is more than stating, “I agree with you.” Maybe you should state why you agree with
You must do the following:
1) Create a new thread to write your initial response to the discussion prompt.
2) Select AT LEAST 2 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.
3) Provide a thoughtful research-based response and include references to support your thoughts.
4) Exclude attachments and cover page in your submission. Type your response in the message box. When responding to your peer, address your peer by name.
5) ALL original posts ( two to three paragraphs supported by resources) and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)
6) Paraphrase text from resources used and cite. If quoting text, use double-quotes and cite.
Reference: Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.
security architecture 15.1
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Minimum of 400 words
What does a peer review process look like? When does an assessment require peer review? Who should perform the peer review?
Week 2 Project
*ROUGH DRAFT and PROJECT TIPS ARE ATTACHED*
Graduation Party Location
It is now time to revisit your graduation planning activities by choosing your location and entertainment for the party. You will do this by creating tables to compare the attributes and issues of your various choices.
Click on the link below, Week 2 Project Tips, for some visual aids on how to tackle this week’s project.
Create a new Microsoft Word document and save it as W2P_LastName.docx. Note that you might want to change your page orientation to landscape to better fit your data.
- Create a table to compare the different locations you chose in Week 1. You can add a table to your document by using the Table icon in the Insert ribbon of Microsoft Word. Your table should include the following columns – you can see an example of this layout in the Week 2 Project Tips:
- Location: List the three possible locations.
- Web site: Include the URL hyperlink for each location’s Web site.
- Positives: Include a bulleted or numbered list* of positive attributes of each.
- Negatives: Include a bulleted or numbered list of issues for each location.
- Estimated Cost: Include the cost(s) associated with using the location/facility.
*You can create a list using the icons in the Paragraph panel of the Home ribbon (Bullets, Numbering, or Multilevel). Changing the margin settings of the cells with bullets can be helpful.
- Beneath your table, write a paragraph of at least 50 words to include:
- Identify which location you chose.
- Justify why you made the choices you did using the information in the tables to guide your decision.
- Check the Status bar at the bottom of the window to see the word count.
- Finally add the finishing touches to the paper.
- Add page numbers in the Footer (bottom of your page).
- Add a Header that includes the name of your event and your name.
- Add some formatting and color to your table.
- Bold and center the table headings.
- You can change the color of your text or the color of the background to color code your table or make it more readable. Be creative and have fun!
By the due date assigned, submit your completed document to the Submissions Area. In the Comments box, briefly share your experiences with completing this project.
Imoprtance of strategic IT planning 7
Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented? Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.
At least one scholarly source should be used in the initial discussion thread. Use proper citations and references in your post.
Note: Answer should be a minimum of 300 words and APA format