Methodology of Software

1- Describe the components and quality which is necessary for the documents of software specification.

2- Define the blue print methodology.

3- What are the differences between verification and validation in software development, and the benefits of verification and validation in software development?

4- Explain the various types of models which used in software Engineering.

5- Explain the waterfall & agile model in detail.

Software System Design feb 3

In the folder, CS 620 Software Systems Design – Power Points, you will see a document called “NCCA Write Up”…for this assignment, you are to read the document carefully and create a CONTEXT DFD…make sure you review what a Context DFD diagram is…

Take your time…do this a piece at a time…remember, this is an ITERATIVE process…so making changes is to be expected…

REMEMBER: YOU MUST USE THE NOTATION WE USED IN CLASS…I WILL NOT ACCEPT ANY OTHER NOTATION!…

Technical Report

Following the instruction in the attachment:

– Introduction

– Overview

– Assumptions

– System Information

– Performance Monitoring and Database Efficiency

– Backup and recovery

TOTAL OF 4 PAGES BASED ON THE INFORMATION OF THE PAPER NO OUTSIDE INFORMATION( NO REFERENCES OR CITE FROM OTHER SOURCES)

Please label each parts to avoid the confusing.

data encryption

 Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. Explain your answer in 300 words or more with references(whether you believe all data should or should not be encrypted).  

R

Homework:

Review The Power of Good Design- https://www.vitsoe.com/gb/about/good-design   and select three of the ten principles noted for good design. Next in R, utilize these three principles in a problem that you will solve. First note the problem to solve, the dataset (where the information was pulled from), and what methods you are going to take to solve the problem.  Ensure the problem is simple enough to complete within a two-page document. For example, I need to purchase a house and want to know what my options are given x amount of dollars and x location based on a sample of data from Zillow within each location. 

Ensure there is data visualization in the homework and note how it relates to the three principles selected.

Parts of this assignment:

Part 1:  Review of the 3 Principles that are you going to use.

Part 2:  Discussion of the Problem.

Part 3:  The dataset (where you got the data)

Part 4:  Explain how you can solve the problem

Part 5:  Make sure you have a data visual (you can create the visual with R-Language)

Final Project

  

Final Project – Online Scams

Search the Internet for a real-life case of an online scam OR create a scenario depicting a new type of online scam. 

1. Provide details on who the victims are and how they were scammed?

2. Was there a corrective action implemented or discussed? 

3. If there is a corrective action, what measures can be taken?

4. Were you able to find a video explaining this particular type of scam? If so, please provide the link to this resource.

(750 words, Add references)

References/Useful Links:

https://www.scam-detector.com/article/list-of-scamming-websites/ 

https://www.youtube.com/watch?v=RpxBwaWBU-k 

https://us.norton.com/internetsecurity-online-scams-internet-scams.html 

https://www.scamnet.wa.gov.au/scamnet/Scam_types.htm 

https://usa.kaspersky.com/resource-center 

https://www.broadbandsearch.net/blog/common-online-scams 

https://www.fbi.gov/scams-and-safety/common-scams-and-crimes 

https://www.consumerprotection.govt.nz/general-help/scamwatch/how-to-avoid-scams/case-studies/ 

IMPACT OF IT -3

 

This week we will tackle the tough topics of anonymity, net neutrality, censorship, and controlling speech. All these topics can easily start a debate among the most conservative individuals. It is important to understand these concepts can sometimes counteract the progression of technology in society.

Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 200 words and appropriately cites your resources.

Topics:

  • What is the Telecommunications Act of 1996?
  • How has the idea of offensive speech changed since technology has progressed?
  • Do you consider the internet an appropriate tool for children? At what age do you introduce children to the internet?
  • What is data leakage? What does the term insider threat mean?
  • What are some kinds of Web sites that should prohibit anonymity?