+1(316)4441378

+44-141-628-6690

Archive for the ‘Information Systems’ Category

CIS 518 Discussion 1 & 2

Discussion 1


"Functional and Nonfunctional Requirements" Please respond to the following:


Discuss some examples of functional versus nonfunctional requirements. What would exemplify these requirements in a software development project for an online college student registration system?


Describe a requirement-specification technique that would be appropriate for an online college student registration system with an enrollment of 10,000 students. 


Provide a justification as to why you would use your chosen technique over other requirement-specification techniques that are available.


Discussion 2


"Testing Nonfunctional Requirements" Please respond to the following:


Among the many nonfunctional requirements that can be included in a specification are those related to safety and reliability. 


In yo

CIS 515 Discussion

The development of a database requires thorough methodology that ensures quality within the solution. Imagine you have been contracted to develop a finance database that will help an organization track monthly expenditures by departments. Using the DBLC, discuss the various activities that you would have to achieve each phase. Assess possible challenges that may exist within each phase. Suggest actions that one can perform in order to overcome these possible challenges.


In order to mitigate risks associated with a database, it is essential to consider common sources of database failures. Describe at least two possible database failures that may occur once a database is placed into operation. Suggest actions that may be performed in order to avoid or mitigate these possible failures.

CIS 505 Discussion

Please respond to the following:


Explore the various data communication technologies youve learned about this week. 


What are some things that stood out for you? 


What factors would you advise a company to consider when deciding on the way it connects to the Internet? 


How would you advice the CIO of a small, medium, or large company? 


Choose one and discuss the pros and cons of a couple of your selections. 

BUS 517 Discussion

1. You have been hired to lead a complex, two-year project (the project of your choice). As the Project Manager, you know it is important get the project off to a good start. Using the tools provided in the required readings (See attached), provide a quick summary of your project, including the scope and at least three goals and objectives of your project.


Big Data and Data Science Analytics

Big Data is data whose scale, distribution, diversity, and timeliness require the use of new technical architectures and analytics to enable insights that unlock new sources of business value.

Initial Post:

(1) Create a new thread and Name a few companies that dominate their sector through data science and data analytics. Mention on what basis are these companies effective in terms of data analytics.

(2) Chapter 1 discussed driving data deluge. Explain by giving example the concept of data deluge using four sources such as mobile sensors, social media, video surveillance, video rendering, smart grids, geophysical exploration, medical imaging, and gene sequencing?

(3) Chapter 2 described the data analytics lifecycle which is an approach to managing and executing an analytical project. What are the benefits of doing a pilot program before a full-scale rollout of a new analytical methodology? Discuss this in the context of the mini-case study of your selected or

Emerging threats and Risk Processing

For some additional reading, take a look at the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure:

https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/

After reading chapter 1 and looking at the link above, you're ready to participate in the first discussion.

Lets look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited and satellite communications are down (limiting the Department of Defenses [

Mobile Device & Network Analysis Response

Provide (3) 150 words response with a minimum of 2 APA references at the discussions below. Response provided should further discuss the subject or provide more insight.


Question 1:

If you were talking to a group of seniors about mobile security, what would you tell them? 



Discussion 1:

Discuss what type of evidence can be collected from and mobile device and the processes used to collect that evidence.


-There is a lot of information that can be gathered from a mobile device. This information includes call history, emails, text and other messages such as Facebook messenger and Skype, photos, videos, phone information, global positioning system, and network information. Things such as photos and videos generally have hidden information such as where the media was captured and what software or hardware was used to capture it. When seizing a device, there are certain considerations to take into account. Befo

CMGT/433: Cyber Security – Security Overview Presentation

 Assignment Content

  1. In your first meeting, you will have to present a security overview presentation.
    Create a 10- to 12-slide, multimedia-rich presentation in which you provide:
    • A definition of cybersecurity; further explain how cybersecurity differs from enterprise security
    • A timeline of cyber milestones; including graphics and a brief explanation of the milestone
    • An explanation of why knowing cyber milestones is important for improving security for the organization's current and future environment
    • A chart presenting 4 strategies that could be used to determine the organization's current security environment, the impact of the strategy, and resources (personnel, finances, etc.)
    • Your presentation should also include:
    • Speaker notes
    • At least 2 references to support the presented facts/etc. Format your citations according to APA guidel

Need to read and know what is required with non plagiarism. Who can commit?

 Assignment Essay 


Choose your sources carefully. Cite your sources, use APA style as required, check your spelling.

Do not just answer the questions. You should be able to explain the logic behind your answer You are expected to spend at least 3 hours studying the questions, finding and studying good sources, and understanding the nature of the answers and at least an additional 3 hours answering these questions and polishing your writing, so the answers are compelling. Invest your time wisely, giving more time to the complex answers in order to ensure that you demonstrate that you truly understand the answer. Typical assignment submissions should be roughly 3,000 word in length. Shorter compelling answers are fine. Answers with needless filler will be marked down.


Essay Questions

1. Discuss in scholarly d

CIS 500

Good day,


I need a one to three page memo completed by 5pm on January 20, 2020 for course CIS 500 Information Systems for Decision Making . Plagiarism free. I have attached the instructions that provides the information needed to be included in the memo.