case study

In a 3-5 page APA formatted paper, examine the requirements for the system engineering program you were working on during your internship. The following should be addressed in your paper

  • Identify and describe the importance of the system engineering management plan (SEMP along with the risk management plan.
  • Apply system engineering processes and disciplines to decompose a complex engineering problem your team has been struggling with.
  • Investigate the use of model-based system engineering tool(s) to simplify the business process and find an optimal solution to the problem at hand. Be sure to include the name of the tool you are recommending and how it can help solve the problem compared to any other competitive tool.

Your paper should be formatted in the 7th edition APA style and include references as required.

Week 12 Research Paper ERM

Please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

new tech bus leaders

 What role do you feel that VR/AR will play in the future for managing products within an enterprise supply chain system? 

augmented reality (AR) and virtual reality (VR) 

Computer Science Project Documentation

 Document a banking Application is a software majorly for controlling and managing financial transaction and a group activities ?

 It will focus on the major operation of the group that is; adding members, updating the group information, facilitate borrowing and returning of loans. 

Discussion 5 Cryptography

 

Question: Analyze the structure of advanced encryption standards and why it makes it so strong.  

  -You must use at least one scholarly resource.

  -Every discussion posting must be properly APA formatted.

– No Plagiarism

– 400 Words

-References 

Python coding

Question 1: Greetings Function! (4 points)

Start with the greeting program, the first program with functions we  used in Python Tutor. This time, the computer is very happy to meet  you.  Modify the function to return the user’s name in uppercase, with  !!!! after it.  So, if the user’s name is Miriam, the greeting function  will return ‘HELLO MIRIAM!!!!’

Question 2: Quiz question function (6 points)

Write a function that takes two arguments – a quiz question and the correct answer. 

In your function, you will print the question, and ask the user for  the answer. If the user gets the answer correct, print a success  message. Else, print a message with the correct answer.   Your function  does not need to return anything.

Call your function with two example quiz questions.   Here’s some suggestions, 

  • Q: What year did Apollo 11 land on the moon? A: 1969
  • Q: Who painted the Mona Lisa? A: Leonardo da Vinci

Question 3: Windows 10 Upgrade (10 points)

When installing Windows 10, a user can either wipe everything from  their computer and do a clean install.  Or if their computer meets  system requirements, the user can upgrade to Windows 10 without erasing  their current operating system.

To do the upgrade, according to Microsoft, a computer needs to have  at least 1GB of memory, and at least 1GHz processor, and either Windows 7  or Windows 8 currently installed.   All three requirements must be  met. 

Write a program that asks the user for

  • The current memory in their computer, in GB.  (For example, a user with 8GB of memory would enter 8)
  • The current processor speed, in GHz. (For example, a user with a 2.6GHz processor should enter 2.6)
  • The name of their current operating system. (For example, a user could enter Windows 8 or Windows 7 or Windows XP)

Write a can_upgrade function that takes three arguments, the amount of memory, the processor speed, and current operating system.

In can_upgrade, use conditions to figure out if the  user’s computer can be upgraded to Windows 10 or not.  Your function  should return one of the Boolean values True (if the computer can be  upgraded) or False (if it can’t be upgraded).

Call your can_upgrade function from main(), and use the return value to print a message to the user telling them if they can, or can’t, upgrade.

Extra Credit Question: (+5 points)

Start with the College ID card program from https://gist.github.com/claraj/b993219477d015d58341c4f3c1950a22.  This has no functions but it would benefit from being re-organized into  functions. Refactor this program. Suggestions – functions for  validation, functions to help print the college ID card, for example  printing a line of —-, printing centered text, printing text in  color. 

Concept Paper

In other words, in week 4 you are going tell the reader (the instructor) why you think your topic for your final project is worth doing. You are going to justify this as a proposal. Here is the purpose of writing a concept paper:

Purpose of a concept paper

The topic for your week 4 concept paper will be the same as your final project; they are linked together. The week 4 concept paper justifies the writing of your final project.

 

Requirements

Submit a 3 page concept paper IAW APA format on an approved topic (see pre-approved topics in the syllabus). Paper organization will include (use as headings):

 

Coversheet

Introduction.

Problem Statement.

Relevance and Significance.

References (at least five).

Pre-approved research topics:

 

Authentication/Digital signatures

Data collections tools (hardware & software)

E-business/e-commerce security

End user security issues.

Government vs. commercial organization security issues.

HIPAA

Identity Theft

ID&IH Management and Legal Issues

Instant Messaging security.

Intrusion detection.

Sarbannes Oxley

Security Threats & Vulnerabilities

Wireless technology security

Discussion (course – Bussiness Continuation Plan & Disaster Recovery Plan )

 

Compose and submit well-written paragraphs that contain a minimum of 200 words, which address the following: 

Assume you are a network administrator in your organization, describe the most cost-effective ways to secure your organization’s connection to the outside world. Briefly discuss the risk assessment components necessary to secure the organization’s asset (in this case, data).

The post should include adequate citations and references that adhere strictly to the APA format.

bda_researchpaper4

 

The recent advances in information and communication technology (ICT) has promoted the evolution of conventional computer-aided manufacturing industry to smart data-driven manufacturing. Data analytics in massive manufacturing data can extract huge business values while it can also result in research challenges due to the heterogeneous data types, enormous volume and real-time velocity of manufacturing data.

For this assignment, you are required to research the benefits as well as the challenges associated with Big Data Analytics for Manufacturing Internet of Things.

 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

linux

1. For this discussion topic, you will need to research methods of dealing with add in hardware devices and how they work with virtualization.  Add in hardware would be items outside of the standard server configuration and might include things like USB license keys, barcode scanners, specialty video cards etc.  As part of the discussion you will want to identify the type of hardware you found and some recommended solutions for making it work with a virtual server. 

2. For this assignment, you need to investigate what options the hypervisor you recommended in your type 1 hypervisor compare assignment have to provide highly available services.  How do these items tie into what you read about in the chapter and which ones would you recommend implementing?  While you investigate the process of making your virtual machines highly available, what else did you run across that could have an impact on the availability of your machines and services that is outside of the control of your hypervisor?  Write up a summary of the features of the hypervisor you choose, a brief section on the non-hypervisor factors and your recommendations for which features are most important to implement to ensure the best availability of your virtual machines. (which i used Oracle VM)