Week 8 Assignment

 

Complete the following assignment in one MS word document:

Chapter 14–discussion question #1, #3, #4 & exercise 2

APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Discussion 8- Exe Proj

Assigned Readings:Chapter 8. Cost Estimation and Budgeting Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Imagine you are developing a software package for your company’s intranet. Give examples of the various types of costs (labor, materials, equipment and facilities, subcontractors, etc.) and how they would apply to your project.
  2. Think of an example of parametric estimating in your personal experience, such as the use of a cost multiplier based on a similar, past cost.  Did parametric estimating work or not?  Discuss the reasons why.
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text-

Title: Project Management 

ISBN: 9780134730332 

Authors: Pinto 

Publisher: Pearson 

Edition: 5TH 19

Diagrams in Modeling Spaces

List the two most important diagrams in one of the three modeling spaces. The three modeling spaces are: the problem space, the solution space, and the architectural space. Some of the diagrams include: Use case, activity, package, class, sequence, interaction overview, and state machine diagrams. More information can be obtained from chapter three of the book: Software engineering with UML by Unhelkar, B., ISBN 9781138297432. Provide a sample diagram created in Lucidchart (https://www.lucidchart.com/pages/).

marketing strategies

  In 350 words

After reviewing this week’s resources, define and discuss the product life cycle and apply this to your redefined or new product or service.  Estimate how much time your product will stay in each phase of the lifecycle and define why you are making this assessment? 

Draw a representative graph of your product/service lifecycle. 

Note:  Because of the importance of the visual of the graph,  

Weeks Resource:

Online business 

The Marketer’s Handbook to Product Life Cycle

 https://partners.livechat.com/blog/product-life-cycle/  

Video:

The Product Life Cycle Model – Simplest Explanation ever 

https://www.youtube.com/watch?v=Nq7Zj18DJU8&t=25s  

Discussion

  

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.

In your final research project for the course, your task is to write a 7 page paper discussing the following concepts:

  • Introduction
  • Why should an organization Implement an ERM application?
  • What are some key challenges and solutions to Implementing an ERM?
  • What is Important for an effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
  • Conclusion,      final thoughts for future research
  • Recommendation

Wk 4 – Apply: Project Documentation [due Day 7] Wk 4 – Apply: Project Documentation

 The assignment will be based off of the project plan that is attached for Lowkey Inc.

To complete this assignment, you will create the below based on the attached proposed project for Lowkey Inc:

  • A system diagram that shows, in graphic form, the components of your project.
  • Your system diagram should follow the system description you submitted in your Week 2 project plan (but may differ based on the research you have conducted since Week 2).
  • You may create your system diagram in Microsoft PowerPoint or a graphics program of your choice.
  • A network diagram that shows, in graphic form, the flow of data within your project.
  • Your network diagram should follow the network description you defined in the Week 2 project plan (but may differ based on the research you have conducted since Week 2).
  • You may create your network diagram in Microsoft PowerPoint or a graphics program of your choice.
  • A database design document, including an entity-relationship diagram, a data dictionary, and table definitions, representing all of the data that must be stored and maintained within the context of your project and how that data is organized.
  • A clearly articulated cybersecurity plan that explains how you plan to secure project data and processes.
  • Source code (may be partial) for at least one software application.
  • Your source code may be implemented in HTML/JavaScript, Java, C++, or another programming language.
  • Download and unzip the HTML/JavaScript/CSS sample code files for an example of a partial software application implementation.
  • A quality assurance and software test plan.
  • Download the Software Test Plan for an example of what information is typically included and how it is typically organized in a software test plan.

Note: All deliverables must be portfolio ready, which means as complete and error-free as possible.

Submit your assignment.

GSR–6.2 Literature Review Funnel

This week, we looked at the components of a literature review funnel.  

For this assignment you will develop a literature review funnel for your research topic.  

See included example. 

Research Paper on Security Issues and solutions for E commerce Websites

To write a proposal and Research paper, you need to attention to the following points: Generally, start with an overview or a background about the problem that you want to solve. But before writing a background, you need to understand the problem then try to find an answer or a solution for that.

Background: Security issues in eCommerce are causing a lot of damage to businesses such as financial and their reputation. the attacks on e-commerce website are gowning gradually for more that 30% of the total e-commerce websites from small to large businesses.So, the first step would be:  

Step-1: Finding a problem (what is the function of the writing the proposal)

We need to have a problem then we can suggest various ways to answers it or suggest a method to resolve the issue. In this case, you need to answer, that means for example, we have a security problem on client-server architecture based on E-commerce structure, such as the security and privacy of online transactions, including

  • Denial of Service, (DoS) 
  • Unauthorized access,
  • Malicious Alterations to websites,
  • Theft of customer information, 
  • Damage to computer networks,
  • Creation of counterfeit sites. 

Step-2: Method and Solution

We need to focus on the problem and find a solution or a way to answer to the problem, that means for example, my method is to design a secure client and server architecture, so we can create or use an exiting model then find a solution for the above problems and how to minimize the vulnerability of this structure. That means to find a solution for each part of the problem.for example, in terms of DoS, the attackers stop authorized users from accessing a website, resulting in reduced functioning of the website.How the attackers doing DoS, or what’s the type of DoS attacks? the DoS attacks are based on Network, Protocol, Storage, Processor,…. We can consider using a password management, password encryption techniques, using multi-factor authentication, using security questions, creating a uniquid accessing for each device.In case of secure network, all we want to stop or to access or make a requests to a service. then, we need to think about each DoS simulation and the method (for example in the network layer) that we want to work on it. 

Step-3: Result and Analysis and outcome expectation

At this stage, we want to know , and ? So I expect to see your proposal that can present a problem and be able to write the answer to above questions and above steps in any format. You can write or make a flowchart and/or demonstrate step-by-step work actions, also creating a job duties for each member (optional).Let me know if you have any other questions,