Premium Essay

Cis-110 Technical Paper

In: Computers and Technology

Submitted By asianminpin
Words 873
Pages 4
Advantages of OOP has the following advantages over conventional approaches: OOP provides a clear modular structure for programs which makes it good for defining abstract data-types where implementation details are hidden and the unit has a clearly defined interface. OOP makes it easy to maintain and modify existing code as new objects can be created with small differences to existing ones. OOP provides a good framework for code libraries where supplied software components can be easily adapted and modified by the programmer. This is particularly useful for developing graphical user interfaces. Concepts of OOP: Objects which included classes, data abstraction and encapsulation, inheritance, polymorphism.
Purely in terms of total instruction path length, a program coded in an imperative style, without using any subroutines at all, would have the lowest count. However, the binary size of such a program might be larger than the same program coded using subroutines (as in functional and procedural programming) and would reference more "non-local" physical instructions that may increase cache misses and increase instruction fetch overhead in modern processors.

The paradigms that use subroutines extensively (including functional, procedural and object-oriented) and do not also use significant in-lining (via compiler optimizations) will, consequently, use a greater percentage of total resources on the subroutine linkages themselves. Object oriented programs that do not deliberately alter program state directly, instead using mutator methods (or "setters") to encapsulate these state changes, will, as a direct consequence, have a greater overhead. This is due to the fact that message passing is essentially a subroutine call, but with three more additional overheads: dynamic memory allocation, parameter copying and dynamic dispatch. Obtaining memory from the heap and…...

Similar Documents

Premium Essay

Cis 210 Term Paper

...the users’ requirements. The downside to MySQL is that it is time consuming to implement. MySQL has limited support for some database features that require a lot of user interface coding. Both of these applications chosen give Tony’s Chips solutions for their need of a database. System Design For this project, Red Hat enterprise Linux will be used for the operating system on the company’s server. The choice for Red Hat was made because it will fully satisfy the needs presented by Tony’s Chips. It also has a high capability of recovering from system failures (Guise, 2008). The security features of Red Hat are also ideal. Real time monitoring and call frame canary word utilities also provide protection from the threat of hackers. Technical support is also available from the OS vendor. Implementation and maintenance that is supported by the vendor is a great tool to use. This will allow for help finding any answers to problems that may arise in the OS. Vendor support is also available in the form of update software which is release periodically. This will ensure that the most up to date software will be used and any further improvements in the software will be implemented. For the web server, the system will be using Apache. Apache gives the project the most cost effective solution. Apache web servers are among the most widely used. Apache is used on 46% of web servers worldwide (Hunt & John 2011). With such a large user base and the source code readily......

Words: 2669 - Pages: 11

Premium Essay

Cis 341 Technical Paper

...* Technical Project Paper: Information Systems Security Due Week 10 and worth 110 points You are the Information Security Officer for a small pharmacy that has recently been opened in the local shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protected health information of your customers. Your supervisor has tasked you with identifying inherent risks associated with this pharmacy and establishing physical and logical access control methods that will mitigate the risks identified. 1. Firewall (1)   2. Windows 2008 Active Directory Domain  Controllers (DC) (1)  3. File Server (1)  4. Desktop computers (4) 5. Dedicated T1 Connection (1)     Write a ten to fifteen (10-15) page paper in which you: 6. Identify and analyze any potential physical vulnerabilities and threats that require consideration. 7. Identify and analyze any potential logical vulnerabilities and threats that require consideration. 8. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy. 9. Identify all potential vulnerabilities that may exist in the documented network. 10. Illustrate in writing the potential impact of all identified logical vulnerabilities to...

Words: 520 - Pages: 3

Premium Essay

Cis333 Technical Paper

...Running head: Information System Security CIS 333 Technical Paper: Information System Security Donald Shipman CIS 333 Prof. Clapp March 11, 2012 In consideration of the security of the network of the pharmacy, the following physical vulnerabilities and threats are to be considered. The threat of disaster is considerable in almost any case. Such an occurrence would have a substantial impact on the network. Such threats include flooding, lightning, earthquake, wind, tornadoes, hurricanes, fire, environmental failure, and electrical interruption as these can destroy whole infrastructures and can cause valuable and important data to be lost. For example, in case of flood or fire it is certain that infrastructure will be destroyed that contains many hardware and storage system that contains valuable data such as detail of customers, product etc. so we would need to provide security to this data because loss of this information would have extreme consequences to the business, as well as being virtually impossible to recover at a total loss. We can use the method “backup and recovery” for to substantially reduce the impact of this disaster threat. Cloud technology can be deployed which would create a remote cold site that would allow access to critical system information with limited physical resources if necessary. When considering logical vulnerabilities and threats, the following is to be considered. Unauthorized modification of the database is a major......

Words: 2526 - Pages: 11

Free Essay

Adobe Creative Suite Technical Paper

...Adobe Creative Suite Technical Paper I will choose to write my paper of Adobe Creative Suite. I don’t have time to talk about them all so I will talk about the following: Dreamweaver Photoshop Acrobat Illustrator Fireworks Application Name: Adobe Creative Suite Category: Series of software suites by Adobe Systems Purpose: “Adobe Creative Suite (CS) was a series of software suites of graphic design, video editing, and web development applications made or acquired by Adobe Systems. The collections consisted of various groupings of Adobe's applications (e.g., Photoshop, Acrobat, InDesign, Premiere Pro, After Effects) based on various technologies (e.g., PostScript, PDF, Flash) and organized by industry. The last version, Adobe Creative Suite 6 (CS6), was launched at a release event April 23, 2012, and released on May 7, 2012.[1] On May 6, 2013 Adobe announced that CS6 would be the last version of the Creative Suite,[2][3][4] and that future versions of their creative software would only be available via their Adobe Creative Cloud subscription service. Adobe also announced that it would continue to support CS6 for OS compatibility and would provide bug fixes and security updates as necessary.[5] The Creative Suite packages were pulled from Adobe's online store,[6] but still remain available via a section of their website.[7].”(Source 6) Opinion: I really enjoy using Dreamweaver, it helps speed up web development, and helps to keep sites organized....

Words: 1487 - Pages: 6

Premium Essay

Technical Paper It Project Management

...Technical Paper Project Information Technology Project Management (CIS517) Date: Introduction There is an old adage which insists “time is money.” While simple, in concept, it has been proven true, in fact. In a global, technologically driven society, however, the very idea of time has changed. Having once implied a spanning space between the hours of “nine to five” relative to the person or organization from whose vantage money was viewed, time is now irrespective of person, organization, or location; it is, literally, “24/7.” With this shift in perception, organizations, especially, have taken on the greater challenge of ensuring efficiency in their operations, allowing their customers the freedom and peace of mind to have access to the products or services they purchased without interruption. Working behind the scenes, as it were, are the IT companies that make the realization of this freedom and peace of mind possible. In the scenario with Fiction Corporation, it is quite evident that the role of IT is paramount to the success of the business, in general, and to the company’s decision to- move, in particular. Big-Proj will receive the “big break” for which it is looking by ensuring compliance with the goals set forth in regards to the scope of the project, the timeline projections, and the budgetary requirement of $500,000.00. Scope Big-Proj has chosen to name this project “Fiction Corporation’s Data-Center Move” to avoid any confusion with......

Words: 2587 - Pages: 11

Premium Essay

Cis 510 Week 10 Technical Paper

...A++PAPER; CIS 510 WEEK 10 TECHNICAL PAPER CIS 510 Week 10 Technical Paper, CIS 510 Week 10 Technical Paper - Strayer Technical Paper: Final Project Plan Due Week 10 and worth 200 points Especially for You Jewelers is a small jewelry company in a college town. Over the last couple of years, it has experienced a tremendous increase in its business. However, its financial performance has not kept pace with its growth. The current system, which is partly manual and partly automated, doesn’t track accounts receivables sufficiently, and the company is finding it difficult to determine the reasons why the receivables are so high. The company runs frequent specials to attract customers but has no idea whether these efforts are profitable or if the benefit—if there is one—comes from associated sales. Especially for You Jewelers wants to increase repeat sales to its existing customers; thus, it needs to develop a customer database. It also wants to install a new direct sales and accounting system to help solve the outlined problems. The new direct sales and accounting system for Especially for You Jewelers will be an important element in the growth and success of the jewelry company. The direct sales portion must track every sale, be able to link to the inventory system for cost data, and provide a daily profit and loss report. The customer database must be able to produce purchase histories......

Words: 621 - Pages: 3

Free Essay

Cis 333 Week 10 Technical Project Paper – New 2015

...CIS 333 Week 10 Technical Project Paper – New 2015 To Get this Tutorial Copy & Paste above URL Into Your Browser Hit Us Email for Any Inquiry at: Visit our Site for More Tutorials: ( ) Preview : After looking at your network security structure there are various physical threats that we will focus on that could have a Hugh impact on your business intellectual property and availability. For example threat like fire, hurricanes, tornadoes, flooding, lighting, earthquakes and electrical failure that can destroy the network vital information to be lost. In the case of any of these events, to protect the pharmacy from losing important patient data we need to secure this data by implementing a backup and recovery plan to help reduce the downtime to get back online and not loss customer loyalty. Offsite storage like Cloud technology can allow access to all critical information without invests additional resource to maintain the storage solutions and the staff to maintain integrity of the network. When looking at logical threats we must protect the network from unauthorized access internally and external attacks. Hackers understand that every device on the network has it weakness and they are trying to take advantage of it, devices that are most looked at are: servers, switches, routers, desktops, security devices and internal employees themselves....

Words: 462 - Pages: 2

Free Essay

Cis 408 Wk 10 Technical Paper

...CIS 408 WK 10 TECHNICAL PAPER To purchase this visit here: Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 408 WK 10 TECHNICAL PAPER CIS 408 WK 10 Technical Paper - Planning an Application Server Migration Technical Paper: Planning an Application Server Migration Imagine you are working for a large international purchasing company that has just bought a growing local company that manufactures western wear at several locations (it’s a group of cottage industries; remember from the other scenarios that it now has eight (8) satellite offices, four (4) large and four (4) small ones). The previous owner, Sam Yosemite, tells his IT team to provide support and information to your IT staff to help with the transition to your forest domain. Gathering information from the other writing assignment descriptions, decide the best ways to bring the “Wild Frontier” network into your domain, “Foghorn Leghorn” and migrate to your current standards. The business acquisition is largely superficial and the existing personnel structures will remain in place. You have to bring the “Wild Frontier” under the “Foghorn Leghorn” domain and make sure production needs are met at all the satellite locations. Your budget is fairly generous due to allocated funds for the transition, but will likely be much more constrained in the future. Take maintenance costs (both money and man-hours) into consideration as you design your......

Words: 913 - Pages: 4

Free Essay

Cis 333 Wk 10 Technical Project Paper

...CIS 333 WK 10 TECHNICAL PROJECT PAPER To purchase this visit here: Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 333 WK 10 TECHNICAL PROJECT PAPER CIS 333 WK 10 Technical Project Paper - Information Systems Security Write a ten to fifteen (10-15) page paper in which you: 1. Identify and analyze any potential physical vulnerabilities and threats that require consideration. 2. Identify and analyze any potential logical vulnerabilities and threats that require consideration. 3. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy. 4. Identify all potential vulnerabilities that may exist in the documented network. 5. Illustrate in writing the potential impact of all identified logical vulnerabilities to the network and the pharmacy. More Details hidden... Activity mode aims to provide quality study notes and tutorials to the students of CIS 333 WK 10 Technical Project Paper in order to ace their studies. CIS 333 WK 10 TECHNICAL PROJECT PAPER To purchase this visit here: Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 333 WK 10 TECHNICAL PROJECT PAPER CIS 333 WK 10 Technical Project Paper - Information Systems Security Write a ten to fifteen (10-15) page paper in which you: 1. Identify and analyze any potential physical......

Words: 496 - Pages: 2

Premium Essay

Cis Week 6 Paper

... Normalization Rebecca Leonard Strayer University CIS 111 – Introduction to Relational Database Management Systems Diana Merkel March 20, 2016 * As a database developer for a local college, and tasked with providing database normalizing training material. The steps for moving from un-normalized to 3NF will be the key points to cover. The most important reason for a college is to ensure data integrity, keeping records associated with the proper student. Sample database: Student ID | First Name | Last Name | Date of birth | Course number | Course name | Level | Course length | Date completed | result | 1 | Jeff | Jones | 13/09/89 | 100 | Pre-algebra | 1 | 3 weeks | 10/10/04 | Pass | | | | | 200 | Arabic studies | 2 | 6 weeks | 23/06/05 | Pass | | | | | 250 | Statistics | 2 | 6 weeks | 05/03/04 | Pass | 2 | Elenore | Jobs | 30/07/86 | 330 | Humanities | 3 | 9 weeks | 10/10/05 | Merit | | | | | 345 | Trig | 3 | 9 weeks | 05/03/05 | Distinction | | | | | 210 | System Management | 2 | 6 weeks | 13/01/05 | Pass | 3 | Jake | Bloom | 17/01/87 | 200 | Arabic studies | 2 | 6 weeks | 23/06/05 | Unclassified | 4 | Makenzie | Tam | 16/10/90 | 100 | Pre-algebra | 1 | 3 weeks | 10/10/08 | Pass | | | | | 102 | English | 1 | 3 weeks | 02/07/04 | Merit | | | | | 250 | Statistics | 2 | 6 weeks | 05/03/04 | Merit | The first step to normalizing the database is to list out all the fields as seen below. To move in to 1NF find the fields without......

Words: 491 - Pages: 2

Free Essay

Term Paper Cis 500

... Assignment: 1 Error Handling in an Activity Diagram LaShantel Wilson Strayer University Dr. Richard Brown April 18th 2016 Error handling are routines in a program that responds to errors (Encyclopedia). The measurement of quality in error handling is based on how the system informs the user of such conditions and what alternatives it provides for dealing with them (Encyclopedia). This paper will give a narrative which describes the changes and added error handling pathways in the diagram within this paper. There will be an overview of the errors, an explanation as of the main changes checking are imperative within the process, and overview of possible errors. A diagram will illustrate the updates of two (2) error handling pathways. Error Handling Pathway Ridgeline Mountain Outliners (RMO) is a large retail company that specialize in clothing and related accessories for all types of outdoor and sporting activities (BOOK). One approach to handling errors in received data is for the receiving system to send the data back to the sending system, often with an indication that an error has been detected by the receiving system (GOOGLE). When an enterprise IT system includes a sales system and a financial system, the sales system may send data to the financial system, which is only capable of accepting data that passes particular types of validity checks and other types of data consistency checks. When data received by the financial system does not pass the......

Words: 408 - Pages: 2

Free Essay

Gend 110 Paper

...Zihua Wu 11237004 GenEd 110 section 01 Final Paper Impact of Invasion and Migration by Japan on the Chinese Society Introduction The Sino-Japanese Wars were the largest wars in the Asian battlefield during the World War II. The Sino-Japanese Wars were conflicts between China and Japan in the late nineteenth and early twentieth centuries. There were two Sino-Japanese Wars: the first one lasted from July 1894 to April 1895; the Second one, which was known in China as the war of resistance against Japan, lasted from the outbreak of the fighting on 7 July 1937 to 14 August 1945—although recent Chinese historiography tends to date the war from the Japanese occupation of Manchuria in 1931. Both wars were crucial in the formation and ultimate defeat of Japanese imperial expansion in East Asia and in the development of a sense of Chinese nationalism. Although the Sino-Japanese Wars were end in 1945 with the victory of China, it made up more than 50% of the casualties in the Pacific War if the 1937–1941 periods are taken into account. The impacts of invasion and migration by Japan on Chinese society are various. This essay will present these impacts on three aspects, which are politics, economy and culture. The Impacts on the Chinese Politics During the invasion and migration of Japan, Sino-Japanese War broke the confrontation between pre-war China's major political parties and other parties. As the Japanese attempt to monopolize China and launch a comprehensive war against......

Words: 1229 - Pages: 5

Premium Essay

Technical Controls Paper

...Technical Controls Paper A.M SE578 Gordon Francois Keller Graduate School of Management January 22, 2012 Technical Controls Technical controls use technology as a basis for controlling the access and usage of sensitive data throughout a physical structure and over a network. Technical controls are far-reaching in scope and encompass such technologies as: * Encryption * Smart cards * Network authentication * Access control lists (ACLs) * File integrity auditing software Logical controls (also called technical controls) use software and data to monitor and control access to information and computing systems. For example: passwords, network and host based firewalls, network intrusion detection systems, access control lists, and data encryption are logical controls. An important logical control that is frequently overlooked is the principle of least privilege. The principle of least privilege requires that an individual, program or system process is not granted any more access privileges than are necessary to perform the task. A blatant example of the failure to adhere to the principle of least privilege is logging into Windows as user Administrator to read Email and surf the Web. Violations of this principle can also occur when an individual collects additional access privileges over time. This happens when employees' job duties change, or they are promoted to a new position, or they transfer to another department. The access privileges required...

Words: 905 - Pages: 4

Premium Essay

Preparation of Papers for Aiaa Technical Conferences

...Preparation of Papers for AIAA Technical Conferences First A. Author[1] and Second B. Author, Jr.[2] Business or Academic Affiliation 1, City, State, Zip Code Third Author[3] Business or Academic Affiliation 2, City, Province, Zip Code, Country and Fourth C. Author[4] Business or Academic Affiliation 2, City, State, Zip Code These instructions give you guidelines for preparing papers for AIAA Technical Conferences. Use this document as a template if you are using Microsoft Word 2000-XP or later, or Word for Mac OS X. Otherwise, use this document as an instruction set. Define all symbols used in the abstract. Do not cite references in the abstract. The footnote on the first page should list the Job Title and AIAA Member Grade for each author. Nomenclature A = amplitude of oscillation a = cylinder diameter Cp = pressure coefficient Cx = force coefficient in the x direction Cy = force coefficient in the y direction c = chord dt = time step Fx = X component of the resultant pressure force acting on the vehicle Fy = Y component of the resultant pressure force acting on the vehicle f, g = generic functions h = height i = time index during navigation j = waypoint index K = trailing-edge (TE) nondimensional angular deflection rate Introduction T HIS document is a template for Microsoft Word version 2000-XP, Microsoft Word version 2003, or Word for Mac OS X. If you are reading a hardcopy or PDF version of this document, please......

Words: 5337 - Pages: 22

Premium Essay

Technical Paper and Seminar Report its weakest link. So, in order to make MANETs secure, all its The following are the advantages of MANETs: weak points are to be identified and solutions to make • They provide access to information and services all those weak points safe, are to be considered. Some regardless of geographic position. of the weak points and solutions to strengthen them are • These networks can be set up at any place and considered in this article. However the list is possibly time. incomplete, and some more weak points of MANETs are likely to be discovered in near future. So Security issues in MANETs will remain a potential research area Some of the applications of MANETs are in near future. • Military or police exercises. The rest of the paper is organized as follows. Section 2 will illustrate about MANETs. Section 4 will raise the • Disaster relief operations. 1 • Mine cite operations. 2.4.1 • Urgent Business meetings. Dynamic Source Routing (DSR) uses source routing to deliver packets from one node in the network to some other node. The source node adds the full path to the destination in terms of intermediate nodes in every packet . This information is used by intermediate node to determine whether to accept the packet and to whom to forward it. DSR operates on two mechanisms: Route Discovery and Route Maintainance. Route Discovery is used when the sender does not know the path upto the destination. In this mechanism, the sender broadcasts a ROUTE......

Words: 7796 - Pages: 32