Please go through the attached documents completely before providing the answer
paper
Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?
Your paper should meet the following requirements:
• Be approximately four to six pages in length, not including the required cover page and reference page.
• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Analytics
Part1)
a) Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.
225 Words + 2 References
Part2)
a) How do you describe the importance of data in analyt- ics? Can we think of analytics without data? Explain.
b) Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?
c) Where do the data for business analytics come from? What are the sources and the nature of those incoming data?
d) What are the most common metrics that make for analytics-ready data?
Min 200 words answer for each question.
Checklist:
APA Formatting
Part1 and Part2 needs to attached as two separate docs
Atleast 2 references for each part
Plagiarism report
practical report
(CWK2) – Practical Report: It contains 2 tasks: 1) Implementation (coding), 2) Presentation/demo
Module Learning Outcomes are assessed in in the research report, practical report and demo:
LEARNING OUTCOME
ASSESSMENT STRATEGY
Critically analyse architectural styles of software systems and evaluate the role of software architecture in the design and evolution of software.
Submission of research report. To include in-depth background analysis.
Apply the principles of software architecture construction particularly using component and service oriented programming.
Submission of research report. To include detailed analysis of component oriented architecture against other architectural styles.
Evaluate the benefits of software architectures and their corresponding programming paradigms in terms of software quality factors such reusability, maintenance, extendibility.
Submission of the research report. To cover the benefits of component software architectures in term of software quality factors.
Critically discuss legal, social and ethical issues associated with software construction.
Submission of the research report. To cover the ethical, social and professional issues.
Apply technical proficiency in component and service oriented analysis and design
The analysis and design part of the practical report.
Evaluate the strengths and weaknesses of service oriented and component technologies.
Service and component technologies evaluation part of the practical report.
Build a complex business application that satisfies an architectural design using a service oriented component technology.
The implementation part of the practical report and the demonstration/presentation (practical exam).
CWK2: One zipped file named surnames_CWK2_Practical_Report which contains the code, presentation/demo, associated with CWK2, and README file containing the name of the student and their specific contributions, and any specific instructions for installation/configuration/ that might be needed.
Submission details: The second part of the coursework should be submitted as a single zipped file to canvas, and it should contain the code and the presentation.
Module Learning Outcomes assessed in this piece of coursework
· Build a complex business application that satisfies an architectural design using a service oriented component technology.
· Evaluate the strengths and weaknesses of service oriented and component technologies.
1. Assignment Brief: Analysing and Building a Banking System Software Using Component and Service Oriented Cloud Architecture (Part 2).
Aim
The aim of the second part of the coursework is to demonstrate the knowledge and awareness of service oriented and other latest software development technologies in a given scenario. This should involve the following:
1. Apply technical proficiency in component, service and modular programming.
2. Implementation the demo system using a service oriented architecture and frameworks of your choice.
3. Produce a presentation/demonstration to discuss the used technologies and show a working prototype.
The Problem
In order to remain competitive and be able to expand its business ABC Banking Group must update its services to reflect the recent advances in information and communication technology. This will require the design and implementation of an adaptable technology migration strategy. Currently, ABC Banking Group system is a LAN based, able to be reached over the web using legacy software. Thus, the Group needs a migration strategy from a LAN based system to Cloud based system, however such a migration requires the consideration not only of the underlying Cloud service oriented architecture, and its benefits, but also should reflect the main business activities of the Group.
At the core of the Group’s business activities is its transaction processing system. The system is used to define accounts and transactions. Accounts refer to things like customers’ bank accounts, while transactions are things like deposits and withdrawals which are essentially time-stamped records. Each account keeps track of the transactions that affect it. It also has a set of attributes such as customer’s name, address, balance, overdraft, running totals (of deposits and withdrawals) computed from the transactions etc.
Once an account is set up, it is used by creating transactions and by querying the attributes of the account. Transactions can come from other systems, like direct debits, or from different branches and they can be created by program control or can be created by a user filling out an input screen. Customers can access their account and conduct transactions using their desktops, mobile phones etc.
Your task is to design new service based architecture of the system. It is up to you how to go along the task. However, you have to take into account the distributed nature of the problem and the possibility of accessing account details, on the server, using different clients and different graphical user interfaces. These interfaces are programmed so that they communicate with the server.
You define how an account handles transactions that are posted to it, one way of handling transactions, is by putting them in a list in order of their date. Queries can be from a simple interface, from reports such as bank statements or from programs that are creating transactions. All interactions with the system are achieved by creating transactions and querying attributes.
The system should be able to perform a number of operations including creating account for every customer, holding the customer’s name and address, allocating a numeric code (account number) for every customer, balance, cost for overdrafts, returning the statements etc. The system also should be able to add, delete customers and work out the total number of customers.
Coursework Documentation/Report
You are asked to address the aims and business requirements by producing a practical report which covers:
Implementation (80%)
You are asked to implement and construct your application using a programming language and programming environment that supports component/service oriented paradigm.
Presentation/demo (20%)
This should include a brief discussion of of the deployed technologies and a working prototype of your program which should demonstrate good knowledge of fundamental service/component oriented and modular concepts.
2. Feedback (including details of how and where feedback will be provided)
You will receive the feedback electronically using the feedback form (check the summary table for deadlines)
Marking scheme
Implementation: Coding Fundamentals ( /30)
**
VG
G
F
P
VP
Use of OO Concepts
Use of classes
Use of method invocation
Use of storage
Use of interaction and selection
Variables/Header box/Comments/
Implementation: Services/Components Integration ( /50)
**
VG
G
F
P
VP
Functionality
Completeness
Use of service orientation
Use of Components
Use of Interfaces
Presentation/demo ( /20)
**
VG
G
F
P
VP
Quality
Presentation
Technology
Traceability: from design to code
Overall mark ( /100)
** VG: Very Good, G: Good, F: Fair, P: Poor, VP: Very Poor
Assignment
create a portfolio related to a specific topic from the list below. Make sure to explain and backup your responses with facts and examples.
- A case study assessing risk and proposing security for some chosen organization (real).
- Review of a security incident or threat, describing it in-depth and proposing a controls for future use
- Technology review, reviewing some security product or control technology
- Survey of technology, theory, or practice building on and expanding some topic covered
This assignment should be in APA format and have to include at least two references (Only peer reviewed articles/Technical white papers). Minimum of 1000 words
Assignment
- Now that you have R installed on your computer, you will begin to get some experience (hands-on) with the software. For this assignment, you are exposed to just 4 features of R: Arithmetic Operations; Operations on vectors; the Recycle Rule for adding/subtracting vectors; and Creating a S3 Class Object. A separate screen shot is required for execution of each feature. Open R (either command line or RStudio). Enter code that will handle the following (show all code, comment for each code line and the computed results in your screen shots). These are instructions; do NOT just write the instructions – actually show this within R and capture a readable screen shot to show that it works properly!!
Screen shot 1: Arithmetic Operations- assign a value of 144 to x
- assign a value of 6 to y
- add x and y
- subtract y from x
- multiply x times y
- divide x by y
- find the square root of x
- Screen shot 2: Operations on vectors
- create a vector (afc) and assign values 2,6,3
- create a vector (nfc) and assign values 6,4,2
- add afc and nfc
- Screen shot 3: Recycle Rule for adding and subtracting vectors
- assign values 2,1,8,3 to vector x
- assign values 9,4 to vector y
- add x to y
- notice the warning message – use the Recycle Rule for adding vectors; then
- add x to y and show results
- subtract 1 from x – apply the Recycle Rule for subtracting vectors; then
- subtract y from x and show results
- Screen shot 4: Create an S3 Class Object
- create a list – with components: name = Your name, date = today’s date, and score = score you desire on Assignment 2.
- name the class as “graduate student”
- Save the screen shots as a MS Word document (*.docx). Then, click the “Write Submission” link below and directly paste your screen shots into this forum OR add the screen shots as a Microsoft Word document attachment (Mac users, please remember to append the “.docx” extension to the filename).
Database Storage
In Weeks 1-5, you will be working on gathering information in a Database Management Plan that will culminate in Week 6 in a 20-minute presentation (10-12 slides) to explain how to staff and run the organization’s database administration.
The presentation will provide recommendations to an organization regarding how to develop a plan for the maintenance of databases that store business data and use in business analytics.
Create 700-word entry in your Database Management Plan. You will use information from this entry in your presentation due in Week 6. Ensure you:
- Assess the best way to organize data into your database.
- Distinguish how organizational data can be used in the most effective way through developing a database.
- Describe the relationship model and conceptual design to be used.
Submit your assignment.
project essay simple
DIrections are attached
C++ / Python
Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in either C/C++ or Python.
If you are not familiar with measuring execution time in C++, see the following website:
https://www.geeksforgeeks.org/measure-execution-time-function-cpp/
If you are not familiar with measuring execution time in Python, see the following website:
https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution
See the following steps.
1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.
2. Compute the hash of the password from step 1.
Your hash function H() is simply the checksum. (See Assignment 2)
3. Now you become an attacker and try to find the password of length N.
Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.
Measure execution time.
4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.
5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.
6. Now you become an attacker and try to find the concatenated password salt and password.
Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.
Measure execution time.
NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.
LOOKING FOR NATIVE WRITERS
Looking For Native Writers
I am Looking for *EXPERIENCED* Writers that can be able to handle 10-20 pages a day with, Top notch Grammar. Well constructed Paragraphs with Topic Sentences. They should be familiar with Spss and Data analysis tools will be an advantage
If you know you can’t meet High grammatical standards don’t engage me.
Email your samples to firstlanedollarshumanresource at g.m.a.i.l c.o.m indicating your name in the subject of your email and phone number
Call 0700152748