Purchase of hardware and software systems to operate the business(TM)s activities and perform accounting functions

Assignment for IIT, DF Sem 1&2 Scenario Your friend is in the process of setting up a company in order to start trading as a wholesaler and retailer of Chinese food through a shop premises, as well as providing high quality meals in a restaurant in Central London. Your friend realises that a major cost will be the purchase of hardware and software systems to operate the business's activities and perform accounting functions. He has no expertise in IT, and has come to you for expert advice. He has asked for a detailed description of the hardware and software required together with an estimate of costs, and is also very keen that all of your recommendations are justified in terms of cost/benefit and importance to the success of the business. Requirements Write a formal report to your friend, using word processing software, giving your recommendations. Your report should be supplemented by detailed descriptions and pricings of the equipment and software required written with a spreadsheet program. Your assignment can be produced with any software, but make sure that the files are compatible with MS Word and Excel. A copy of your actual document and spreadsheet files should accompany the final documentation. Limit: Report - 2000 words, spreadsheets - at least a page Maximum 70 marks, which will be awarded as follows: Introduction: 10 marks Discussion: 30 marks

  • Word count: 2231
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Advanced encryption Standars

ADVANCED ENCRYPTION STANDARD: HOW DOES IT WORK? Project Paper for Information Systems Audit and Control TABLE OF CONTENTS . Introduction 3 2. Cryptography 3 3. Algorithms 5 3.1. Asymmetric Key Algorithms 5 3.2. Symmetric Key Algorithms 5 3.3. Stream Chipers â€" Block Chipers 6 4. Data Encrypting Standard (DES) 6 5. Advanced Encryption Standard (AES) 7 5.1. How AES works 7 5.1.1. The State 8 5.1.2. Encryption Steps 9 5.1.2.1. SubBytes 10 5.1.2.2. ShiftRow 10 5.1.2.3. MixColumn 11 5.1.2.4. AddRoundKey 11 5.2. Strengths of AES 12 5.3. Attacks on AES 12 6. Summary 13 7. Bibliography 13 .Introduction Cryptography is the science of writing in secret code and is an ancient art; the first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network,

  • Word count: 3366
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

ANALYSIS OF THE INTERNET POLICY FOR GREEN SCREEN SOFTWARE Presented to Executive Management Group of Green Screen Software

ANALYSIS OF THE INTERNET POLICY FOR GREEN SCREEN SOFTWARE Presented to Executive Management Group of Green Screen Software - Quarterly Meeting in December - Prepared by Jia Yu Sven Rohloff Abhishek Kapoor November 25, 2005 MEMO Date: November 25, 2005 To: Executive Management of Green Screen Software From: Jia Yu Administrative policy manager Re: Submission of report on internet policies Here is the report regarding internet policies requested September XX, 2005 concerning the presentation of basic facts of internet policies for the special case of Green Screen Software. For this report, a large number of secondary data is used, mostly found through academic databases and public search engines. Recent evidence gathered indicates that our employees are using the internet for personal purposes during the working hours. These behaviours will result a loss of productivity, damage to our computer system and probable legal liabilities. In order to solve this problem, a internet policy at work place is recommended to be established. Resistance can be reduced by encouraging the participation from our employees. Also, Executive management should act as a good example to show their commitment of setting up such policy. If you have any questions, please contact me at (778) 858-1792 or [email protected]. I am happy to provide you with additional information if

  • Word count: 3710
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Complete Section 3 of 3

There are several methods one can use to implement a business system. The two methods are parallel and cut-over. The implementation stage for Riordan Manufacturing project is a display of the crucial moments that make a project an achievement or a failure. The implementation stage tells all the details of modifications made operational. The beginning started after the system had been tested and accepted by the user. This is like a packing slip for the code files in your implementation. Make note if you have added/removed/renamed/etc. any classes/methods/member variables/functions/etc. state the language (or languages) in which you will implement your project, (1) list the names of the source and header code files that will contain your implementation, (2) list the classes and functions that will appear in those files, saying whether each class or function is declared or defined in that file, and (3) list the associations (for example, inheritance, ownership, reference counting, etc.), between the classes and describes how each association will be declared. An information system is an integrated collection of software components. Components can be tested individually or in groups, or the entire system can be tested as a whole. Testing components individually ensuring that a final product is closer to completion.. Integration and system testing is a must.. Operation of

  • Word count: 786
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Security System for Ad-hoc Wireless Networks

Security System for Ad-hoc Wireless Networks based on Generic Secure Objects Matei Ciobanu Morogan 2005 Ph.D. Thesis Kungliga Tekniska Högskolan Submitted as the partial fulfillment of requirements for the degree of Doctor of Philosophy at the Department of Computer and System Sciences, Kungliga Tekniska Högskolan Department of Computer and Systems Sciences Doctoral Dissertation Department of Computer and System Sciences Stockholm University / Royal Institute of Technology ISBN 91-7178-019-X i Abstract As computing devices and wireless connectivity become ubiquitous, new usage scenarios emerge, where wireless communication links between mobile devices are established in an ad-hoc manner. The resulting wireless ad-hoc networks differ from classical computer networks in a number of ways, lack of permanent access to the global network and heterogeneous structure being some of them. Therefore, security services and mechanisms that have been designed for classical computer networks are not always the optimal solution in an ad-hoc network environment. The research is focused on analyzing how standard security services that are available in classical networks can be provided in an ad-hoc wireless network environment. The goal is to design a security system optimized for operation in ad-hoc wireless networks that provides the same security services -

  • Word count: 43019
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Types of IT Security Threats

In this report, I will examine various security threats, as well as methods through which these threats can be protected against. I will cover four threats in detail, these being; * Denial of Service * Password Crackers * Trojans / Worms / Viruses * Internal / External Threats Denial of Service Essentially, a denial of service attack, or DoS, is when a hacker attempts to make a system unusable by flooding the target with packets and communication requests. By doing this, the victim becomes saturated, is unable to handle the unusually high volume of traffic, and becomes unstable. There are a variety of ways in which an attacker may which to deploy a DoS against a target, each with varying outcomes. Some DoS will reduce the performance of its target, others may result in the victim coming to a complete standstill. Most modern DoS attacks are targeted at web servers. As already mentioned, there are a variety of differing types of DoS. I will examine a number of these, namely; Buffer overflow attacks, SYN attacks and DDoS. An attack using buffer overflow is a very simple concept. Attackers simply try to flood a system with more traffic than that system's buffer allows for. They do this by using traffic that the system does not flag as unusual. When a buffer attempts to store more data than it was intended to hold, the surplus will look to other buffers for space. This

  • Word count: 3391
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Usability Evaluation Methods

Table of Contents I I Table of Contents I Abstract 1 Introduction 1 Part I: Analytical and Empirical Methods for Usability Evaluation 2 Usability Concept 2 Evaluating Usability 2 Analytical approach 2 Empirical Approach 3 Choosing Among Methods 3 Usability Testing 4 Strengths 4 Weaknesses 6 Heuristic Evaluation 7 Strengths 8 Weaknesses 10 Part II: Heuristic Evaluation of the Usability of a Website 12 Findings 12 Selected Heuristics 13 Problems description 13 Problem severity, non conformed heuristic and reason for nonconformity 16 Conclusion 18 References 18 Appendix 18 Applied Heuristics 18 Snap shots of web site 21 Abstract Usability is becoming a weighting factor that determines the quality of finished software products (Abran et al., 2003). The increasing number of websites flooding the internet has created the awareness for usability of web applications. According to (Bevan, n.d), an organization only meets its needs when a website meets the needs of its intended users. However, designers most often than not take the end users for granted and assume a software product is easy to use so long as they and their colleagues can use it which is never likely so. (Sharp et al., 2007) identify that, users want interactive products that are effective, efficient, safe, satisfying to use and easy to learn. This is why it is imperative for designers to

  • Word count: 6250
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Website Review

Web Design (review) the different construction features used for the Ryanair website are tables, lists, action buttons, hyperlinks, hotspots, download speeds, email links and registration log in. Here are the following reasons why ryanair are using these constructions feature: Ryanair uses tables inside their website to separate things apart from each other and to layout data a lot clearer and to present the website in a more professional manner. Ryanair uses lists on their website to space the different countries apart instead of just bunching them together. Ryanair use action buttons on their website so that it's easy to navigate to another different webpage. Ryanair use hyperlinks on their website so that the user can access it for some latest information. Ryanair use hot spot on their website for easy linking to other websites and for easy browsing. Ryanair watches the download speed on their website because if the web page took very long to open, many of ryanair pass ticket bookers may forget about booking with ryanair and book with another airline instead. Ryanair uses email links on their webpage so that they can email information on any offers on flights or flight information to the user. The feature on this website is also good to use if the user wants to send and email directly to ryanair. Ryanair uses the login registration process on their website because

  • Word count: 773
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Hardware and Software Support

Hardware and Software Support Brianna Bridges CIS 205 University of Phoenix Supporting Multiple Computing Needs The advertising agency that I work for is a mid-sized full-service, independent integrated marketing services agency founded in 1974, headquartered in Brookfield, Wisconsin with service offices in Chicago and Lincoln, Nebraska. We recently implemented a corporate intranet in which employees can retrieve information such as agency announcements, newsletters, blog posts, and the company handbook, company code of conduct, and company policies and procedures. The company intranet is especially valuable for sharing and connecting with the remote offices. My company provides advertising, public relations, brand management, market research, and relationship marketing services to companies targeting sales to other companies, as we specialize in B2B marketing. We have a variety of different departments that provide these services, all with different hardware and software needs that range from basic computing requirements to higher functioning necessities for day-to-day activities. The Microsoft Office Suite was acquired by the agency for associates to organize presentations, and spreadsheets, and perform word processing. The core software tools used by everyone in the agency include the Microsoft Word processing software; Microsoft Excel spreadsheet software;

  • Word count: 935
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Critical Evaluation of a Multimedia Application

Critical Evaluation of a Multimedia Application Animated Beginning Phonics Critical Evaluation Multimedia Application Animated Beginning Typing Application Name: Animated beginning phonics Introduction A multimedia application designed for beginning readers aged 4-8 users to understand upper and lower case letters, beginning and ending sounds, middle short vowels sounds and beginning reading words. Application designed using a sound, text, animated objects. It also features with more than 200 3D objects and help also available for user. All menu items and directions are interactive this will help the pre-readers to navigate and operate the program. If user solve a certain number problems it will rewarded by a game. The game room has a parent/teacher control which controls number of problems user have to solve before going to a game room. Description The application contains 8 problem solving tasks which link by main menu page. Main navigational buttons placed bottom of the screen every screen consists with a Directions button, Help button and a Quit button. When user clicks on the directions button voice message plays and explain how to solve the problem in each screen. On help screen (which is one help screen throughout the application) explains, how each letter pronounce by a voice message. When user clicks the Quit button a message box will displays and ask user

  • Word count: 898
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay