Information Systems- Answer 21 Info System. Questions

Attached are 21 questions. All 21 Questions should be answered with a minimum of three (3-5) sentences response, with reference to where the information was gathered. All 21 Questions should be answered with a minimum of three (3-5) sentences response, with reference to where the information was gathered.

-502-
1. “Role-Based Access Controls” Please respond to the following:
Consider at least one (1) alternative to role-based access controls, and indicate where you believe this alternative method would help the security of the organization prosper. Perform research as needed and justify your answer.

From the e-Activity(http://csrc.nist.gov/groups/SNS/rbac), consider role-based access control (RBAC) methods in terms of file-level and database permissions, and formulate what you believe are the main advantages to using these methods in order to achieve ample security.

2. “The Security Problem in Software Development Life Cycle (SDLC)” Please respond to the following:
From the e-Activity (http://www.symantec.com/connect/blogs/francophoned-sophisticated-social-engineering-attack), contemplate the main reasons why you believe the Francophoned attacks were successful, and explore the key factors that made the social engineering aspect of the attacks so complex and so difficult to identify as malicious.

From the e-Activity(http://www.symantec.com/connect/blogs/francophoned-sophisticated-social-engineering-attack), based on the complexity of the Francophoned attacks, give your opinion of overall strategies that you believe security professionals could use in order keep up with the sophisticated nature of the attacks that result from the progression and sophistication of technologies.

3. “Business Continuity Planning and Disaster Recovery Planning” Please respond to the following:
Imagine that you are trying to receive funding for select planning projects. Compare and contrast the attributes of business continuity and disaster recovery plans, and suggest the primary ways in which you would explain these differences to your employer’s Board of Directors.

From the e-Activity (Read the “Disaster Recovery Plan”, located at http://www.sans.org/reading_room/whitepapers/recovery/disaster-recovery-plan_1164, and the “Contingency Planning Guide for Federal Information Systems”, located at http://csrc.nist.gov/publications/nistpubs/800-34-rev1/sp800-34-rev1_errata-Nov11-2010.pdf. Be prepared to discuss. ), analyze each company’s plans, and provide three (3) examples of the key ways in which the business continuity and disaster recovery plans of the two (2) organizations are alike and three (3) examples of the ways in which they are different.

-505-
4. Mainframes. Please respond to the following:
Take a position on the following statement, “Mainframe computers are still needed even though personal computers and workstations have increased in capabilities.” Defend your position by providing at least one example to support your position.

Analyze the differences between distributed data processing and centralized data processing. Provide an example of each. Then compare each to the processing used in cloud computing

5. Circuit Switching and Packet Switching. Please respond to the following:
Cite two examples of a circuit switch and packet switch environment. Base one example on a circuit switch and the other on a packet switch. Describe the trade-off between the two technologies and the reason why packet switching is more appropriate for the Internet.

Assuming your daily routine stayed the same, speculate the problems you would have if the Internet didn’t exist. Speculate the problems of a familiar organization given the same scenario.

6. IPv6 Adoption. Please respond to the following:
Take a position on the idea of IPv6 being hailed as the next generation of the Internet. Support your response with evidence or examples.

Critique the adoption and deployment of IPv6, and determine the security and networking issues associated with this process.

7. Fat Clients and Servers. Please respond to the following:
Provide a scenario in which the use of fat servers would be preferred over the use of fat clients. Describe why fat servers, rather than fat clients, should be used in your scenario.

Compare the pros and cons of Intranets to those of the Internet from an organizational perspective. Suggest one way to integrate the two and the benefits this may bring.

8. HTTP and HTTPS. Please respond to the following:
Analyze the current uses of HTTP and HTTPS, and predict the future outlook for both protocols. Describe any foreseen changes in the frequency or way each protocol is used.

Identify the various uses for HTTP and HTTPS, and justify the use of one over the other. Include two examples to demonstrate the use of each protocol.

9. Elastic and Inelastic. Please respond to the following:
Provide three examples of inelastic traffic not discussed in the text and validate their inclusion as inelastic.

Analyze the characteristics of elastic traffic to determine why this is used on the Internet.

-524-
10. “Electronic Ballots” Please respond to the following:
One criticism of electronic ballots for elections is that while intuitive for younger voters who are familiar with using a mouse to point and click, elderly voters and motor-impaired users will have difficulty controlling a mouse. Discuss how you would correct this issue so that every demographic would have an equal opportunity to vote. Support your answer.

Imagine you have just finished interviewing a recent college graduate for a design position within your company. At the end of the interview, the college graduate remarks that design would be much easier if people conformed to the design, rather than the design having to be accessible to diverse populations. Respond to this comment, addressing the legal, societal, and ethical issues that designers face in regard to human-computer interaction.

11. “Interface Design Models” Please respond to the following:
Evaluate interface design models and describe design issues across human-computer interaction environments associated with these models. Support your response.

Building an interface can be broken down into the phases of design and development. Analyze the activities that take place in both phases, and explain why certain activities should be included in design but not in development.

12. “Direct Manipulation and Virtual Environments” Please respond to the following:
Your software development company has been contracted to build a tool that will manage user accounts and rights in an Active Directory environment. One of your developers tells you that he wants the tool to make use of direct manipulation. A second developer argues that a command line structure would be a better and more secure approach. Take a stand on this argument, providing at least three positives of each approach, and then make a decision for this project and support it.

Describe virtual and augmented reality. Suggest a way in which this technology could be used in the future; either to improve a current process / procedure or create a new process / procedure. Provide an example of your suggested use of the technology.

13. “Menu Selection and Organization” Please respond to the following:
Describe the considerations that you would take into account when selecting the menu style for an application and why. Support your response with examples.

Imagine you have been asked to help a novice designer effectively organize his menu content in an application. Provide the novice designer with the advice you feel would be most helpful when organizing content for menus. Support your response.

-554-
14. “Disciplines” Please respond to the following:
The software development process framework may be adapted to the specific needs of a project as illustrated in Figure 2.1b in Chapter 2 of the text. Categorize the development phases that exist within the system engineering and software development disciplines of the development process framework.

Describe the similarities that exist among the phases of system engineering and software development. Explain how phases under each discipline complement one another to provide an efficient solution. Determine which discipline would be optimal for Web development, cloud computing, and security systems. Support your answer with a specific rationale or illustration.

15. “Software Development Process Model” Please respond to the following:
The needs for software development along with the organization’s business objectives influence the required software development process model for a project. Review the various traditional and iterative software development process models. Compare and contrast the planning and control mechanisms required by one traditional software development process model with one iterative development process model.

Differentiate between traditional and iterative software process models with respect to project activities and customer interaction. Present example(s) to support your answer.

16. “Disciplines” Please respond to the following:
The software development process framework may be adapted to the specific needs of a project as illustrated in Figure 2.1b in Chapter 2 of the text. Categorize the development phases that exist within the system engineering and software development disciplines of the development process framework.

Describe the similarities that exist among the phases of system engineering and software development. Explain how phases under each discipline complement one another to provide an efficient solution. Determine which discipline would be optimal for Web development, cloud computing, and security systems. Support your answer with a specific rationale or illustration.

17. “Software Development Process Model” Please respond to the following:
The needs for software development along with the organization’s business objectives influence the required software development process model for a project. Review the various traditional and iterative software development process models. Compare and contrast the planning and control mechanisms required by one traditional software development process model with one iterative development process model.

Differentiate between traditional and iterative software process models with respect to project activities and customer interaction. Present example(s) to support your answer.

18. “Contract Development” Please respond to the following:
Gathering software requirements requires gathering of functional requirements,operational requirements, and technical specifications. These requirements can then be described in the contract development process. Describe what may happen if declarative statements contain ambiguous phrases such as “ands”, “ ors”, “ifs”, or “buts” as described within the operational requirements. Present example(s) to support your answer.

Determine the typical items that should be included within a contractual agreement of a software project. Analyze how the inclusion of these items may help avoid risks in future phases of the software project life cycle

19. “Project Planning” Please respond to the following:
Operational requirements, software specifications, process constraints, and product constraints are all necessary inputs for project planning. Describe how each is used for defining the project planning processes. Provide specific examples to justify your answer.

Synthesize the project management challenges that may occur without an explicitly written project plan. Summarize how this impacts a project manager’s ability to lead a technology project.

20. “Guidelines for WBS” Please respond to the following:
The Work Breakdown Structure is an essential tool for planning and managing the activities of a software project. Suggest three guidelines that may be used when developing a WBS. Explain why each guideline is critical to the development of the WBS.

Analyze how each guideline identified in Part 1 of this discussion can enhance a project manager’s ability to manage the project during the planning and controlling phases of the project.

21. “Critical Path Method (CPM)” Please respond to the following:
The Critical Path Method can be used as a project management tool for determining the durations and slack times of project activities. Describe how this tool can be used to recover from schedule overruns of specific activities that are not on the critical path. Provide an example to justify your answer.

Analyze how the Program Evaluation and Review Technique (PERT) method may be used in conjunction with CPM to schedule activities throughout the project life cycle.

We are always aiming to provide top quality academic writing services that will surely enable you achieve your desired academic grades. Our support is round the clock!

Type of paper Academic level Subject area
Number of pages Paper urgency Cost per page:
 Total: