Problem set & 2 discussions
Need help on
2 – discussions
1 – problem set
PFA
COURSE PROJECT
· State which solution you would choose for each security concern and indicate clearly with supporting documentation WHY you made that choice.
Write a MIPS program which
Write a MIPS program which will prompt the user for a string of up to 128 bytes, calculate the frequency of each character in the string and then report those frequencies (only the non-zero frequencies).
SE 492 week 3
Read chapter 4. 200 words and citations
You need access to Microsoft Project software. If you don’t have it installed in your computer you can at least download a trial version.
Go to Appendix on page 139 Microsoft Project and create a file as directed and enter the information from pages 139-145 on your Microsoft Project based on chapter 7.
Provide screen shots to show your work (i.e. tasks, resources, network diagram).
What did you learn from chapter 4 as you apply the concepts on chapter 4 to the Microsoft Project software?
computer Science
an explanation of the principles of different approaches, theories and models of
organisational and human behaviour that illustrate the factors that can influence how
individuals, groups and teams contribute to organisational success.
week 10 pt2
- Technical Paper: Proof of Concept (POC)
Your company is a 4-year-old startup called XYZ Software Enterprises. XYZ produces a point of sale system and was awarded a Proof of Concept (POC) to one of the largest and oldest restaurants in the industry (you know, the ones in the commercials all the time). The restaurant wants XYZ to prove that the software will do what the sales people said it could do.
Your Proof of Concept will include four parts:- Part 1: Gantt Chart.
- Part 2: Testing and User Acceptance Report.
- Part 3: Use Case Diagram.
- Part 4: Activity Diagram.
- Part 1: Gantt Chart
A Gantt Chart (see page 353, Figure 11-18 in your textbook) needs to be created for the entire process of the Proof of Concept. There is a two-month deadline from today to complete the POC.
Using Visio or Excel, create a Gantt Chart that includes all of the items listed below and adds five more tasks minimum from the concepts learned from the course: - The initial meeting—today.
- Should appear as the first line.
- Teams selected to participate in the project (1 week).
- Information gathering (add the information gathering methods you will use and how long each will take).
- System configurations based on information gathering methods (2 weeks).
- Create Activity Chart based on information gathering (information to create chart supplied).
- Create Use Case Diagram based on information gathering (information to create chart supplied).
- Show the finished configurations to the team and get feedback (1 day).
- Make changes based on feedback (3 days).
- Install the system in the test store (2 days).
- Train staff (1 day).
- Run a live test of POC (2 weeks).
- Note: The five or more additional tasks can be sub-tasks for information gathering methods as well some other sub-task or major task not in the initial list.
You may add items from the SDLC, specific item or items on testing, or any other concept you think should be part of the POC process learned in the course of this semester.
Note: Remember that events in a Gantt chart can happen at the same time as other events. Some items also cannot start until others are completed. Everything has an estimated time frame and it is displayed in the chart.
Part 2: Testing and User Acceptance Report
As part of the expected documentation in the POC, XYZ wants a report on Testing and User Acceptance.
Your manager is asking you to research the testing criteria they listed in the POC documents.
The POC document states that they are looking for the following: - System and Stress Testing.
- User Acceptance Testing (UAT).
- For both categories, research and report on the following:
- What these tests are.
- Why the industry leader would want these particular tests.
- The best ways, in detail, to accomplish the tests so that your company meets the criteria they are looking for.
- These items can be added to your Gantt Chart (Part 1).
Part 3: Use Case Diagram
The restaurant, as part of the information gathering, outlined a use case in a chart, which is below.
Your manager assigned you to create the Use Case Diagram using Visio, MS Word, or any other software. (See the diagrams on Page 84 and 85 of the textbook.)
- Paste the diagram into the created report.
- USE CASEACTOROrder FoodWaiter, Patron, ChefServe FoodWaiterCook FoodChefPay for foodWaiter, PatronEat FoodPatronPart 4: Activity Diagram
As a part of the information gathering process, a chart of items was provided by XYZ.
Your manager has asked that you use Visio, MS Word, or any other software with which you are familiar to create the Activity Diagram (see pages 138 Figure 5-5 and 139 Figure 5-6 in the textbook.) - Paste the diagram into the created report.
- POS SALES PROCESS Activity DiagramHost or Hostess seats patronServer takes drink orderServer opens order for table in POS systemServer places drink order in the POS systemSystem sends drink order to the BarBar makes drinksServer brings drinks to tableServer takes food orderServer adds food order in the POS systemOrder goes to kitchenChef and staff cook the orderFood Runner brings food to tableServer takes dessert orderServer adds dessert order to POSChef and Staff create dessertsFood Runner brings desserts to tableServer creates check in POSServer collects payment and enters it in POSServer adds tipped amount to POSServer closes table in POSAdditionally, you must do the following:
- Use at least 3 quality resources. Note: Wikipedia and similar websites do not qualify as quality resources.
- This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.
The specific course learning outcome associated with this assignment is: - Develop a proof of concept of a software system for a potential customer.
This question will reuse the same code
This question will reuse the same code you created for me last week. But, this time it needs to have user input. So the user must be able to enter in any Centigrade temprature and then its suppose to output the Fahrenheit temprature. User must be able to enter it numbers as many times as they want, but also have a quit option. Please add comments and documentation as to what the code is doing or what the code functionality is.
Business Redesign Process
If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.
4-5 pages
Creating policies – IT Strategy and policy – No plagiarism
Policies should always state required actions and cover mandatory compliance and disciplinary action as well as desired results. Please create the following policies:
- Acceptable Use
- Access Control
- Mobile Device Usage
- Change Management
- Information Security
- Remote Access
- Email/Communication
- Data Management
- Documentation
- Disaster Recovery
The template should be:
1.PURPOSE
This document establishes a policy for . . .
2.BACKGROUND
This document was developed because . . .
3.SCOPE
This policy applies to the use of . . .
4.OPERATIONAL POLICY
4.1. Section 1
4.2. Section 2
4.3. Section 3
4.4. Section 4
5.ROLES AND RESPONSIBILITIES
The following entities have responsibilities related to the implementation of this policy:
6.APPLICABLE LAWS/GUIDANCE
7.EFFECTIVE DATES
This policy becomes effective on the date that [xxx], Chief Information Officer (CIO), signs it and remains in effect until officially superseded or canceled by the CIO.
8.INFORMATION AND ASSISTANCE
Contact the . . . for further information regarding this policy.
9.APPROVED
[Director of Information Security Policies] Date of Issuance10.ASSOCIATED RESOURCES
This policy is augmented by . . .