Software -8

 

Answer the following questions based on chapters 8 and 9.

1. Describe what needs to be done to manage risk on a project. When should this be done? How can a risk assessment matrix help in this process?

2. Discuss what needs to be done as part of closing a project. Why are these activities important?

_____________________________________________

Mobile App

 From a development team of one to two people to an enterprise-level team with multiple divisions, the topic of mobile development will eventually come up. Write a four page research paper in which you:

  • Compare & Contrast mobile applications vs websites (what makes mobile apps different from websites and necessary?).
  • Research and discuss issues in developing a mobile strategy – use these issues about 3) to drive your research and the results you find.
  • Discuss different system mobile functionalities.
  • Explain the social aspect of mobile interfaces.
  • Discuss two – three mobile application development myths.
  • Argue the need for adaptive vs dedicated mobile websites.

dv wk 1

Therefore, after reviewing all of the content this week, answer all of the following questions 

  1. What is your definition of data visualization?
  2. What are the key components of data visualization?
  3. What techniques do you hope to learn from this course?

Malware Variant

Using a Web browser, perform some research on a newer malware variant that has been reported by a major malware containment vendor. Using a search engine, go to the vendor’s Web site; this could be Symantec, McAfee, or any of their competitors. Visit one malware prevention software vendor. Search for the newest malware variants and pick one. Note its name and tryto understand how it works. Now look for information about that same malware from at least one other vendor. Were you able to see this malware at both vendors? If so, are there any differences in how they are reported between the two vendors?

Your submission should be between 1000-1200 words with references and following APA writing standards. 

Exp19_Excel_Ch06_ML2_Deck_Builders

Exp19_Excel_Ch06_ML2_Deck_Builders

  

Exp19_Excel_Ch06_ML2_Deck_Builders

Project Description:

You are the business manager for Indy Deck Builders, a local construction company that specializes in new deck installation. Your company offers three deck models. Model A which costs $2,000, model B costs $3,500, and model C costs $5,000. You currently have 45 contracts to build model A, 55 for model B, and 75 for model C. Once the contracts have been completed, you will have a surplus of materials (wood, hard-ware, and paint) remaining in inventory. After expenses your company’s net profit is $492,031.25. You would like to use Solver to forecast how many additional contracts you can accept to maximize profit while not exceeding the raw materials in inventory.

     

Start   Excel. Download and open the file named EXP19_Excel_Ch06_ML2_HW_DeckBuilders.xlsx. Grader has automatically added   your last name to the beginning of the filename.

 

Calculate total building   expensive for model A in cell C16. Total expense is calculated by multiplying   manufacturing cost (C4) and total contracts (C8). Then use the fill handle to   copy the formula into cells D16 and E16.

 

Calculate total profit for model   A in cell C17. Total profit is calculated by multiplying profit marging (C6)   and total contracts (C8). Then use the fill handle to copy the formula into   cells D17 and E17.

 

Create range names based on the   values in the range C19:C20 based on the values in the range B19:B20.

 

In cell C19 use the SUM function   to calculate total building expenses. The total building expenses are the sum   of the range C16:E16.

 

In cell C20 use the SUM function   to calculate total profits. The total profit is the sum of the range C17:E17.

 

If not loaded, load the Solver   add-in. Set the objective cell to Max Net Profit (cell C21).

 

Assign Total Contracts (range   C8:E8) as the Changing Variables Cells.

 

Set a constraint to ensure   contracts are whole numbers.

 

Set a constraint to ensure the   raw material used do not exceed inventory.

 

Set a constraint to ensure that   the Total Contracts are greater or equal to the existing contracts.

 

Create an Answer Report to   outline your findings.

 

Create a footer with your name   on the left side, the sheet name code in the center, and the file name code   on the right side of both worksheets.

 

Save and close Exp19_Excel_Ch06_ML2_HW_DeckBuilders.xlsx.   Exit Excel. Submit the file as directed.

CSE 461 Project I

CSE 461 Project I

The first part of this project requires that you implement a class that will be used to simulate a disk drive. The disk drive will have numberofblocks many blocks where each block has blocksize many bytes. The interface for the class Sdisk should include :

Class Sdisk

{

public :

Sdisk(string diskname, int numberofblocks, int blocksize);

int getblock(int blocknumber, string& buffer);

int putblock(int blocknumber, string buffer);

int getnumberofblocks(); // accessor function

int getblocksize(); // accessor function

private :

string diskname;        // file name of software-disk

int numberofblocks;     // number of blocks on disk

int blocksize;          // block size in bytes

};


An explanation of the member functions follows :

  • Sdisk(diskname, numberofblocks, blocksize) This constructor incorporates the creation of the disk with the “formatting” of the device. It accepts the integer values numberofblocks, blocksize, a string diskname and creates a Sdisk (software-disk). The Sdisk is a file of characters which we will manipulate as a raw hard disk drive. The function will check if the file diskname exists. If the file exists, it is opened and treated as a Sdisk with numberofblocks many blocks of size blocksize. If the file does not exist, the function will create a file called diskname which contains numberofblocks*blocksize many characters. This file is logically divided up into numberofblocks many blocks where each block has blocksize many characters. The text file will have the following structure : Bytes 0 – blocksize-1Block 0Bytes blocksize – 2*blocksize-1Block 1Bytes 2*blocksize – 3*blocksize-1Block 2……Bytes ?-?Block numberofblocks-1
  • getblock(blocknumber,buffer) retrieves block blocknumber from the disk and stores the data in the string buffer. It returns an error code of 1 if successful and 0 otherwise.
  • putblock(blocknumber,buffer) writes the string buffer to block blocknumber. It returns an error code of 1 if successful and 0 otherwise.

IMPLEMENTATION GUIDELINES : It is essential that your software satisfies the specifications. These will be the only functions (in your system) which physically access the Sdisk. NOTE that you must also write drivers to test and demonstrate your program.

Assignment 600 words

Since even the best supervisors can only watch a few employees at a time, companies like Drishti are creating AI surveillance systems that track and time employee movements and gather data. This data is intended to allow managers to understand where employees can improve and then help them do so. Although AI and robotics aren’t advanced enough to do a lot of the processes workers currently do themselves, the data collected will allow them to learn the best ways to do these things in the future.Key Points

  • AI systems are being designed to track, measure and time employee movements and actions
  • This can lead to improvements in training and employee performance
  • These systems tend to cause employees to fear for their jobs or performance

Case study questions

  1. What do you believe are the pros and cons of an AI system like this?
  2. How can these systems change how we work in different industries?
  3. Should managers use AI systems to monitor employee email and Internet usage? Why or why not?
    Rubric_ExportFile_40297202204_1657573612540.zip

Cloudcomputing

Select three topics of interest in cloud computing and note: What you learned about the topic Why you selected the topic How you will utilize the topic in the future Also, write a reflection of the material you’ve learned in the course.  What did you like?  What could be improved? 

Discussion board

 

  • What are the implications of vehicle hacking for autonomous vehicles? Today’s vehicles have complex computer code and autonomous vehicles will have even more complex code. Do you think we will ever have widespread use of safe autonomous vehicles? Why or why not?
  • One of the suggestions to improve vehicle security is for car manufacturers to release their code open source to allow for public scrutiny. Do you think this would help improve vehicle security? Why or why not?