1) Create a PowerPoint presentation with at least 1 slide for each of the following:
1. Title Slide (Name of your Information System, your name, course name, and your professor’s name)
2. Purpose of the Information System
3. Users of the Information System (identify different types/categories of users, and what they use the system for)
4. Server-Side Hardware of the Information System
5. Server-Side Software of the Information System
6. Client-Side Hardware of the Information System
7. Client-Side Software of the Information System
8. Three Main Functions of the Information System (include screenshots) [This should be at least 3 slides – one per main function].
9. References (list your references in APA format)
MY INFORMATION SYSTEM IS AMAZON SO THE PRESENTATION SHOULD BE ABOUT AMAZON ON EACH SLIDE
Category: Software and Applications
-
“Exploring the Information System of Amazon: A Comprehensive Overview”
-
Outline for Mobile App Proposal: “MyFitnessPal – A Health and Fitness Tracking App” I. Title: MyFitnessPal – A Health and Fitness Tracking App II. Executive Summary A. Brief overview of the app’s purpose and
You must submit a one page outline by the end of Week 3 for your 3-5 page App Proposal. The outline will provide the structure for the design document. Below are a few items to consider when creating the outline:
What is your targeted platform?
Is your targeted market high or low end devices?
Is your mobile application native or web?
How will that decision effect the content of your outline?
What type of testing will you need to do for your mobile application?
What mechanisms will you use to deliver your application to it’s target market?
How will you adapt your application to future mobile device changes?
Minimum items for the Outline:
Title
Executive Summary
Application Framework
Visual Design Tool Showing App (ie Storyboard)
Mobile Design Elements
Testing Strategy
Marketing strategy
Future Adaptations
Submission
Instructions:
Submit the completed assignment as a Microsoft Word document Including only minimum items in an outline form. Do not submit a 3-5 page paper or points will be deducted. -
“Reading Assignment: Core 1”
Please let me know if you have issues with the dropbox link
https://www.dropbox.com/scl/fi/8fqvcixwjz5jblefit5lg/reading_assignment_core_1.html?rlkey=tlf0h5apu3acsrlahyowzbcl1&st=u92pvuce&dl=0 -
“Architectural Drawings of a Modern House Plan” Title: Architectural Drawings of a Modern House Plan Page 1: Floor Plan Title: Floor Plan of Modern House Description: This drawing shows the layout and dimensions of the
Complete three drawings of the attached house plan set. The three drawings are: Floor Plan, Elevation and Section. Check internet/google if you want to know the definition of Plan, Elevation and Section. Once you have all the drawings put it on Titleblock. Make separate pdf of each one. Combine all the pdf in one single pdf. Send this one file with three pages back to me in this email.
-
Secure Code Review and Mitigation Plan for a Spring Framework Web Application Addressing Vulnerabilities in Code: A Comprehensive Plan
Overview
Writing code is difficult. Writing secure code can be even more challenging. As the developer, you are responsible for writing secure code. You’ll know your code is secure when you manually search for and identify possible security vulnerabilities. Developing this skill is important because it becomes more challenging as the number of lines and complexity of your code increase.
As you learned in this module, you can follow a workflow. You can also use tools widely accepted in software security and vulnerability assessments. You can focus your manual code inspection and narrow your search for possible security vulnerabilities within your code by following the vulnerability assessment process flow diagram.
Specifically, in this assignment, you will complete the following actions:
Determine relevant areas of security for a software application.
Identify software security vulnerabilities by manually reviewing source code.
Identify potential mitigation techniques that have been used to mitigate vulnerabilities associated with known exploits.
Scenario
You are a senior software developer on a team of software developers. You are responsible for a complex web application that uses the Spring framework. The team has been tasked with implementing an expressive command input function for the application. The team is using version 2.6.5 of the spring-data-rest-webmvc in the Spring framework. You also want to use the Spring Expression Language to accomplish the task.
Review the resources in this module’s Resources section to learn about the Spring framework.
Directions
As the lead person on this application, you are responsible for making certain that the code is secure. You will need to assess potential vulnerabilities in the code and create a mitigation plan for any existing vulnerabilities that the software development team must address.
To begin, see the vulnerability assessment process flow diagram linked in the Supporting Materials section to help guide your code review and mitigation plan.
Specifically, you must address the following rubric criteria:
Areas of Security: Review the scenario and use what you know about the architecture of the web application to identify relevant areas of security that are applicable for a software application:
Provide sufficient detail to address which of the seven areas of security are relevant to assess from the first level of the vulnerability assessment process flow diagram.
Document your findings for the software development team in the Module Two Written Assignment Template linked in the What to Submit section.
Areas of Security Justification: Provide a justification and rationale for why each area of security is relevant to the software application.
Code Review Summary: Once you have identified the relevant areas of security to review from the first level of the vulnerability assessment process flow diagram, work through the second level. At this stage, you should complete the following actions:
Manually inspect the code base provided to identify which vulnerabilities exist. To do this, upload the Module Two Written Assignment Code Base linked in the Supporting Materials section as a new project into Eclipse.
Refer to the Uploading Files to Eclipse Desktop Version Tutorial linked in the Supporting Materials section to learn how to open the code base for review.
Document your findings in detail for the software development team in the Module Two Written Assignment Template.
Mitigation Plan: Once you have manually inspected the code and identified the security vulnerabilities, complete the following actions:
Describe potential mitigation techniques. For example, describe secure software designs that you could use to address the software security vulnerabilities you identified.
Refer to the Module Two Resources section for help with this response.
Document your findings for the software development team in the Module Two Written Assignment Template. The software development team will use this plan to address all vulnerabilities in the code.
What to Submit
Submit a completed Module Two Written Assignment Template as a 1- to 2-page Microsoft Word document.
Supporting Materials
The following resources support your work on this assignment:
Diagram: Vulnerability Assessment Process Flow Diagram
This diagram illustrates the process flow for conducting an architecture review and code review to identify security vulnerabilities in code. Reference this diagram as you complete the assignments for this module.
A text-only version is available: Vulnerability Assessment Process Flow Diagram Text-Only Version.
Code Base: Module Two Written Assignment Code Base
This resource provides the code base needed for the Module Two written assignment.
Tutorial: Uploading Files to Eclipse Desktop Version Tutorial
This tutorial highlights how to upload files to Eclipse. -
“Maximizing Business Performance through Data Analytics: A Reflection on NIC Partners in Rancho Cucamonga”
Competency 1 Statement
Utilizing statistical and data analytic frameworks, you will be able to evaluate and analyze the role big data plays in business decision-making. You will also demonstrate the ability to analyze and graphically describe key business data in Excel, allowing business leaders to achieve competitive advantage.
Reflection
Consider the following:
How is data analytics different from statistics?
What are the main differences between descriptive, predictive, and prescriptive analytics tools?
How do businesses use analytics to convert raw operational data into actionable information?
Reflect on the following in a minimum of 500 words.
Think about the organization you work for (or any other organization you are familiar with). Does the organization use data analytics?
If so, how is it used? How can the organization improve the way it uses data analytics? What opportunities is the organization missing out on?
If not, how could data analytics be used to improve the organizations performance?
Submit your reflection.
THE COMPANY NAME IS NIC PARTNERS IN RANCHO CUCAMONGA PLEASE. -
Title: The Components and Importance of Management Information Systems (MIS)
Compose an essay to address the following:
Identify the components of an information system using the five-component framework and provide a brief summary of each.
Explain Porter’s five forces model.
Management information systems incorporate software and hardware technologies to provide useful information for decision-making. Explain each of the following information systems and use at least one example in each to support your discussion:
A collaboration information system.
A database management system.
A content management system.
A knowledge management/expert system.
A customer relationship management system.
An enterprise resource planning system.
A social media information system.
A business intelligence/decision support system.
An enterprise information system.
Identify and discuss one technical and one human safeguard to protect against IS security threats.
Sum up your paper by discussing the importance of MIS.
You must use at least two resources. Be sure to cite all sources used in APA format and format your essay in APA style. -
Title: Analyzing Data to Inform Strategic Decisions for Medical Office Buildings As a data analyst, one of my key responsibilities is to utilize statistical regression and time series analysis models to evaluate and analyze how multiple variables impact an organization. In this reflection
Competency 3 Statement
Utilizing statistical regression and time series analysis models, you will be able to evaluate and analyze how multiple variables impact an organization. You will also be able to create forecasts and interpret data to analyze performance as it impacts strategic planning and comparative advantage for an organization.
Manipulating data to create models helps us describe and summarize relationships between variables. Understanding how variables relate to each other helps businesses predict performance and make informed strategic plans. For example, to make an informed recommendation to management regarding which types of office buildings to acquire or sell, you would model the relationship between assessed value and given variables.
This reflection gives you an opportunity to develop, evaluate, and apply bivariate and multivariate linear regression models, and then reflect on office buildings you recommend acquiring and selling, and why.
Pre-Reflection Exercise
Download the Competency 3 Reflection Data Set. The data set is information about the tax assessment value assigned to medical office buildings in a city. The following is a list of the variables in the database:
Floor Area: square feet of floor space
Offices: number of offices in the building
Entrances: number of customer entrances
Age: age of the building (years)
Assessed Value: tax assessment value (thousands of dollars)
As you work through the following exercises, note your answers to the given questions so you can easily summarize them in your reflection.
Use the data set to construct a model that predicts the tax assessment value assigned to medical office buildings with specific characteristics.
1. Construct a scatter plot in Excel with Floor Area as the independent variable and Assessment Value as the dependent variable. Insert the bivariate linear regression equation and R2 in your graph.
Do you observe a linear relationship between the 2 variables?
2. Use Excels Analysis ToolPak to conduct a regression analysis of Floor Area and Assessment Value.
Is Floor Area a significant predictor of Assessment Value?
3. Construct a scatter plot in Excel with Age as the independent variable and Assessment Value as the dependent variable. Insert the bivariate linear regression equation and R2 in your graph.
Do you observe a linear relationship between the 2 variables?
4. Use Excels Analysis ToolPak to conduct a regression analysis of Age and Assessment Value.
Is Age a significant predictor of Assessment Value?
Construct a multiple regression model.
Use Excels Analysis ToolPak to conduct a regression analysis with Assessment Value as the dependent variable and Floor Area, Offices, Entrances, and Age as independent variables.
What is the overall fit R2? What is the adjusted R2?
Which predictors are considered significant if we work with α=0.05? Which predictors can be eliminated?
What is the final model if we only use Floor Area and Offices as predictors?
Suppose our final model is: Assessed Value = 115.9 + 0.26 x Floor Area + 78.34 x Offices.
What would be the assessed value of a medical office building with a floor area of 3500 sq. ft., 2 offices, that was built 15 years ago?
Is this assessed value consistent with what appears in the database?
Reflection
In a minimum of 500 words, reflect on the types of medical offices you would advise management to close and open, and why. Use your exercise notes to support your rationale. -
Title: Leveraging Data Analytics in Network Infrastructure Construction Companies Data analytics and statistics are both essential tools for understanding and interpreting data. However, they have distinct differences in their approach and application. Statistics focuses on collecting, organizing, and analyzing data to
Competency 1 Statement
Utilizing statistical and data analytic frameworks, you will be able to evaluate and analyze the role big data plays in business decision-making. You will also demonstrate the ability to analyze and graphically describe key business data in Excel, allowing business leaders to achieve competitive advantage.
Reflection
Consider the following:
How is data analytics different from statistics?
What are the main differences between descriptive, predictive, and prescriptive analytics tools?
How do businesses use analytics to convert raw operational data into actionable information?
Reflect on the following in a minimum of 500 words.
Think about the organization you work for (or any other organization you are familiar with). Does the organization use data analytics?
If so, how is it used? How can the organization improve the way it uses data analytics? What opportunities is the organization missing out on?
If not, how could data analytics be used to improve the organizations performance?
Please choose a company within Network Infustructure Construction (building data centers, laying cabling and wiring, cameras, speakers, security, cisco products, etcl) [use this company for the other two reflections] -
Title: “Utilizing Statistical Probability Models in Business Data Analysis: A Case Study of a Laptop Manufacturing Company”
Competency 2 Statement
Utilizing statistical probability models, you will be able to evaluate and analyze business data under uncertainty conditions. You will also be able to create and test hypotheses and draw conclusions based on samples of data.
Reflection
Consider the following:
Many business activities generate data that can be thought of as random. An example described in the textbook is the servicing of cars at an oil change shop. Each car entering the shop can be considered an experiment with random outcomes. A variable of interest in this experiment could be the amount of time necessary to service the car. Service time will vary randomly with each car. Often, we can capture the most relevant characteristics of a stochastic process with a simple probability distribution model. We can then analyze the model to make predictions and drive decisions. For instance, we could estimate the number of technicians the oil change shop needs to service demand on a Saturday afternoon.
Respond to the following questions:
What is a random variable?
How would you differentiate a discrete from a continuous random variable?
A laptop manufacturing company has implemented a 2-step process to test the quality of each production batch. In the first step, a technician randomly selects 15 laptops from the batch and determines whether they meet specifications. The batch is considered acceptable provided no more than 1 laptop fails to meet specifications. Otherwise, the entire batch has to be tested in the second step. Historical data shows that 95% of the laptops produced adhere to specifications.
Reflect on the following in a minimum of 500 words:
What are the 4 characteristics of a binomial experiment?
Can we use a binomial distribution to model this process?
What is the probability that the entire batch unnecessarily has to be tested if in fact 95% of its laptops conform to specifications? (Hint: Use Excels =BINOMDIST() function to find the probability)
What is the probability that the batch is incorrectly accepted if only 75% of its laptops actually conform to specifications?
What situations in your organization might this type of analysis apply to? Explain.
wORK OFF OF THE SAME COMPANY CHOSEN FROM PREVIOUS REFLECTION 1.