webstore

Pine Valley Furniture’s board of directors is ready to review how to implement and maintain the new webstore system.

Write a 6- to 8-page implementation and maintenance plan for the new webstore. Include the following:

Recommend an installation strategy for PVF’s student furniture webstore. The installation strategies are direct installation, single-location, parallel installation, and phased installation. Justify your recommendation by stating the advantages and disadvantages as compared to the other three installation strategies.

Outline the documentation that you would suggest being created to document the system, train, and support users.

Outline the testing plan for the system. Include brief descriptions of the activities for each element of your testing plan.

Summarize the maintenance needs of the PVF webstore, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management.

Cite any references according to APA guidelines. For maximum points, include 3 academically acceptable references.

data structure and algorithm

You are requested to implement a simple IoT device management system. IoT devices

can be categorized into three main groups: consumer, enterprise, and industrial.

“Consumer connected devices include smart TVs, smart speakers, toys, wearables and

smart appliances. Smart meters, commercial security systems and smart city technologies

— such as those used to monitor traffic and weather conditions — are examples of industrial

and enterprise IoT devices. Other technologies, including smart air conditioning, smart

thermostats, smart lighting and smart security, span home, enterprise and industrial

uses.”1 An IoT device can be identified by many fields including category, Identifier, …

1- (2.5 mark) Describe the IoT data type, IoTdevice, using Java classes. Make sure

to use Java inheritance, an interface, and an abstract class.

2- (5 marks: 1mark/method) We want to implement a simple application that

manages the IoT devices. You are asked to develop a Java application that uses

an array to store all information regarding the IoT devices installed in a building and

using the newly created data type IoTdevice defined in 1). You should provide a

menu with the following options:

———————————————————————-

IoT Device Management System (CSC301, Fall2020)

———————————————————————-

1- Add a new IoT device

2- Delete all existing IoT devices given a category

3- List all existing IoT devices from one category

4- Check if an IoT devices exists based on its ID

5- Sort all IoT devices based on two criteria of your choice

0- Quit

———————————————————————-

Your choice? __

———————————————————————-

Please use the partial Java code provided with this assignment which prints the

menu. You MUST do this lab in groups of maximum two students. This Lab

counts for 7.5 marks. You should upload your work via the course website on time

before September 29th, 23:59. Any late submission will be penalized (-0.25 / day).

Evaluation: You will be evaluated based on a demo during which you will be asked

individually various questions.

Discussion 1

As stated in the text, “people and organizations are responsible for the results, good or bad, of the use of IT” (p. 576). For this discussion you will analyze the role of ethics in IT and business.  In your initial post, using an example of your choice, explain the differences between law and ethics.

Analyze the impact of ethical issues on IT, and provide an example of an ethical issue that has impacted an organization as well as an ethical issue that might impact you personally.  Explain the potential legal and ethical challenges associated with advancing technology, using at least one example from your research. Explain whether or not you believe the laws have caught up with technology. Support your position with examples from credible sources. 

Your initial post must be a minimum of 300 words.

History of Cryptography

In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page

week 6

 

This week’s journal article focuses on attribution theory and how it  influences the implementation of innovation technologies. Two types of  employee attributions are noted in the article (intentionality and  deceptive intentionality), please review these concepts and answer the  following questions:

Provide a high-level overview/ summary of the case study

Note how constructive intentionality impacts innovation implementations

Find another article that adds to the overall findings of the case  and note how attribution-based perspective enhances successful  innovation implementations. Please be explicit and detailed in answering  this question.

Be sure to use the UC Library for scholarly research. Google Scholar  is also a great source for research. Please be sure that journal  articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover  page, an introduction, a body with fully developed content, and a  conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to  transition thoughts. Don’t forget that the grade also includes the  quality of writing.

Develop a plan for an imagined “online payment company” to comply with Sarbanes-Oxley law and implement the Payment Card Industry Data Security Standard (PCI DSS)

Instructions

In order to complete assignment #3 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #3). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 4

1. Should dissatisfied consumers have the right to establish gripe sties that use the trademark of the offending company in the domain name? How likely is it that consumers will be confused as to the “origin, sponsorship, or approval” of the gripe site by the offending company? Whether or not you think that confusion is likely, should a gripe site be considered to tarnish the targeted company’s trademark and thereby violate the Federal Trademark Dilution Act? Why or why not?

Chapter 5

2. It is common practice for recipients of email messages to sometimes forward those messages to others. Does such forwarding constitute copyright infringement? In your answer, be sure to specify which, if any, of the exclusive rights may have been violated by the act of forwarding and whether the doctrine of fair use applies. What remedies, if any, might a successful plaintiff be able to obtain

3. Read the following laws and standards:

Sarbanes-Oxley and

PCI DSS .

Develop a plan for an imagined “online payment company” to comply with Sarbanes-Oxley law and implement the Payment Card Industry Data Security Standard (PCI DSS)

Organization leader and Decision making – Research Paper

Note : Please write Research paper in APA 7 format 

This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age.  Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.