paper

 

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Analytics

Part1) 

   a) Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics. 

   225 Words + 2 References

Part2) 

   a) How do you describe the importance of data in analyt- ics? Can we think of analytics without data? Explain.

   b) Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?

   c) Where do the data for business analytics come from? What are the sources and the nature of those incoming data?

   d) What are the most common metrics that make for analytics-ready data?

   Min 200 words answer for each question.

Checklist:

APA Formatting

Part1 and Part2 needs to attached as two separate docs

Atleast 2 references for each part

Plagiarism report

practical report

  

(CWK2) – Practical Report: It contains 2 tasks: 1) Implementation (coding), 2) Presentation/demo

Module Learning Outcomes are assessed in in the research report, practical report and demo: 

  

LEARNING OUTCOME

ASSESSMENT   STRATEGY

 

Critically analyse   architectural styles of software systems and evaluate the role of software   architecture in the design and evolution of software.

Submission of research report.   To include in-depth background analysis.

 

Apply the   principles of software architecture construction particularly using component   and service oriented programming.

Submission of research report.   To include detailed analysis of component oriented architecture against other   architectural styles.

 

Evaluate the   benefits of software architectures and their corresponding programming   paradigms in terms of software quality factors such reusability, maintenance,   extendibility. 

Submission of the research   report. To cover the benefits of component software architectures in term of   software quality factors.

 

Critically discuss legal, social and   ethical issues associated with software construction.

Submission of the research   report. To cover the ethical, social and professional issues.

 

Apply technical proficiency in component   and service oriented analysis and design

The analysis and design part of   the practical report.

 

Evaluate the strengths and weaknesses of   service oriented and component technologies. 

Service and component   technologies evaluation part of the practical report.

 

Build a complex business application that   satisfies an architectural design using a service oriented component   technology.

The implementation part of the   practical report and the demonstration/presentation (practical exam).

CWK2: One zipped file named surnames_CWK2_Practical_Report which contains the code, presentation/demo, associated with CWK2, and README file containing the name of the student and their specific contributions, and any specific instructions for installation/configuration/ that might be needed.

Submission details: The second part of the coursework should be submitted as a single zipped file to canvas, and it should contain the code and the presentation.

Module Learning Outcomes assessed in this piece of coursework

· Build a complex business application that satisfies an architectural design using a service oriented component technology.

· Evaluate the strengths and weaknesses of service oriented and component technologies. 

1. Assignment Brief: Analysing and Building a Banking System Software Using Component and Service Oriented Cloud Architecture (Part 2).

Aim

The aim of the second part of the coursework is to demonstrate the knowledge and awareness of service oriented and other latest software development technologies in a given scenario. This should involve the following:

1. Apply technical proficiency in component, service and modular programming.

2. Implementation the demo system using a service oriented architecture and frameworks of your choice.

3. Produce a presentation/demonstration to discuss the used technologies and show a working prototype.

The Problem

In order to remain competitive and be able to expand its business ABC Banking Group must update its services to reflect the recent advances in information and communication technology. This will require the design and implementation of an adaptable technology migration strategy. Currently, ABC Banking Group system is a LAN based, able to be reached over the web using legacy software. Thus, the Group needs a migration strategy from a LAN based system to Cloud based system, however such a migration requires the consideration not only of the underlying Cloud service oriented architecture, and its benefits, but also should reflect the main business activities of the Group. 

At the core of the Group’s business activities is its transaction processing system. The system is used to define accounts and transactions. Accounts refer to things like customers’ bank accounts, while transactions are things like deposits and withdrawals which are essentially time-stamped records. Each account keeps track of the transactions that affect it. It also has a set of attributes such as customer’s name, address, balance, overdraft, running totals (of deposits and withdrawals) computed from the transactions etc.

Once an account is set up, it is used by creating transactions and by querying the attributes of the account. Transactions can come from other systems, like direct debits, or from different branches and they can be created by program control or can be created by a user filling out an input screen. Customers can access their account and conduct transactions using their desktops, mobile phones etc.

Your task is to design new service based architecture of the system. It is up to you how to go along the task. However, you have to take into account the distributed nature of the problem and the possibility of accessing account details, on the server, using different clients and different graphical user interfaces. These interfaces are programmed so that they communicate with the server. 

You define how an account handles transactions that are posted to it, one way of handling transactions, is by putting them in a list in order of their date. Queries can be from a simple interface, from reports such as bank statements or from programs that are creating transactions. All interactions with the system are achieved by creating transactions and querying attributes.

The system should be able to perform a number of operations including creating account for every customer, holding the customer’s name and address, allocating a numeric code (account number) for every customer, balance, cost for overdrafts, returning the statements etc. The system also should be able to add, delete customers and work out the total number of customers. 

Coursework Documentation/Report

You are asked to address the aims and business requirements by producing a practical report which covers:

Implementation (80%)

You are asked to implement and construct your application using a programming language and programming environment that supports component/service oriented paradigm.

Presentation/demo (20%)

This should include a brief discussion of of the deployed technologies  and a working prototype of your program which should demonstrate good knowledge of fundamental service/component oriented and modular concepts.

2. Feedback (including details of how and where feedback will be provided)

You will receive the feedback electronically using the feedback form (check the summary table for deadlines)

Marking scheme

Implementation: Coding Fundamentals ( /30)

  

**

VG

G

F

P

VP

 

Use of   OO Concepts

 

Use of   classes

 

Use of   method invocation

 

Use of   storage

 

Use of   interaction and selection

 

Variables/Header   box/Comments/

Implementation: Services/Components Integration ( /50)

  

**

VG

G

F

P

VP

 

Functionality   

 

Completeness   

 

Use of service orientation

 

Use of Components

 

Use of   Interfaces

Presentation/demo ( /20)

  

**

VG

G

F

P

VP

 

Quality

 

Presentation

 

Technology

 

Traceability:   from design to code

             

Overall mark  ( /100)

** VG: Very Good, G: Good, F: Fair, P: Poor, VP: Very Poor

Assignment

 

create a portfolio related to a specific topic from the list below. Make sure to explain and backup your responses with facts and examples.

  • A case study assessing risk and proposing security for some chosen organization (real).
  • Review of a security incident or threat, describing it in-depth and proposing a controls for future use
  • Technology review, reviewing some security product or control technology
  • Survey of technology, theory, or practice building on and expanding some topic covered

This assignment should be in APA format and have to include at least two references (Only peer reviewed articles/Technical white papers).  Minimum of 1000 words

Assignment

 

  1. Now that you have R installed on your computer, you will begin to get some experience (hands-on) with the software. For this assignment, you are exposed to just 4 features of R: Arithmetic OperationsOperations on vectors; the Recycle Rule for adding/subtracting vectors; and Creating a S3 Class Object. A separate screen shot is required for execution of each feature. Open R (either command line or RStudio). Enter code that will handle the following (show all code, comment for each code line and the computed results in your screen shots). These are instructions; do NOT just write the instructions – actually show this within R and capture a readable screen shot to show that it works properly!!
    Screen shot 1: Arithmetic Operations

    • assign a value of 144 to x
    • assign a value of 6 to y
    • add x and y
    • subtract y from x
    • multiply x times y
    • divide x by y
    • find the square root of x
    • Screen shot 2: Operations on vectors
    • create a vector (afc) and assign values 2,6,3
    • create a vector (nfc) and assign values 6,4,2
    • add afc and nfc
    • Screen shot 3:  Recycle Rule for adding and subtracting vectors
    • assign values 2,1,8,3 to vector x
    • assign values 9,4 to vector y
    • add x to y
    • notice the warning message – use the Recycle Rule for adding vectors; then 
    • add x to y and show results
    • subtract 1 from x – apply the Recycle Rule for subtracting vectors; then
    • subtract y from x and show results
    • Screen shot 4: Create an S3 Class Object
    • create a list – with components: name = Your name, date = today’s date, and score = score you desire on Assignment 2.
    • name the class as “graduate student” 
    • Save the screen shots as a MS Word document (*.docx). Then, click the “Write Submission” link below and directly paste your screen shots into this forum OR add the screen shots as a Microsoft Word document attachment (Mac users, please remember to append the “.docx” extension to the filename).

Database Storage

 

In Weeks 1-5, you will be working on gathering information in a Database Management Plan that will culminate in Week 6 in a 20-minute presentation (10-12 slides) to explain how to staff and run the organization’s database administration.  

The presentation will provide recommendations to an organization regarding how to develop a plan for the maintenance of databases that store business data and use in business analytics. 

Create 700-word entry in your Database Management Plan. You will use information from this entry in your presentation due in Week 6. Ensure you:   

  • Assess the best way to organize data into your database.
  • Distinguish how organizational data can be used in the most effective way through developing a database.
  • Describe the relationship model and conceptual design to be used.  

Submit your assignment.

C++ / Python

 

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in either C/C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

LOOKING FOR NATIVE WRITERS

Looking For Native Writers

I am Looking for  *EXPERIENCED* Writers that can be able to handle 10-20 pages a day with, Top notch Grammar. Well constructed Paragraphs with Topic Sentences. They should be familiar with Spss and Data analysis tools will be an advantage

If you know you can’t meet High grammatical standards don’t engage me. 

Email your samples to firstlanedollarshumanresource at g.m.a.i.l c.o.m indicating your name in the subject of your email and phone number

Call 0700152748