Computational Evaluation of Software Security Attributes

Based on the question title, I need a IEEE paper format of at least 8 pages long (citations are must)and ppt slides of at least 25 which should summarize the written paper.The paper should contain 0(Zero) plagiarism. The uploaded files are the reference paper of the above title and IEEE format template.

Imp: Reference papers collected must be submitted at the end of the paper and ppt submission.

Computer and Information Networking

Note:  The following questions are regarding the Software Engineering Process, Software Engineering Quality, and Software Engineering Models, please select 5 of the questions from the listed to answer, each one cost 20 points, totally 100 points. 

Questions:

1. Describe the components and quality which is necessary for the documents of software specification.

2. Explain concept of data flow diagram, if possible giving a diagram.

3. Define the blue print methodology.

4. What are the differences between verification and validation in software development, and the benefits of verification and validation in software development?

5. Explain software reliability and define how software and hardware reliability related to each other.

6. Write short note on Software failure, Black box testing, White box testing and Stress Testing.

7. What are test cases in Software Engineering?

8. Explain the various types of models which used in software Engineering.

9. What is Coding Standard for Software Methodology/Software Engineering? Please explain the objectives of (1) coding (2) structured programming.

10. Explain the waterfall & agile model in detail.

MOBILE -5

 

. Download some new app onto your mobile device that you’ve heard about (if you do not have a mobile phone call me and we’ll come up with an alternative), and then you will

2. Write a 2-3 page  in MS-Word about SOME OF (but not ALL OF) these aspects from Chp 1-4 of the text, on this new app you downloaded:

  • Techno-fixation
  • Haptic Interface
  • Multi-Modality
  • Emotional Impact
  • Economical Impact
  • Safety-critical situations
  • Usability
  • User Experience
  • Interaction as Brand
  • Interaction as Package
  • technology acceptance
  • Innovation
  • Building on Past Success
  • Designing the Interaction
  • Platform Design
  • Prototyping

  Include citations. .

ISM – Analysis and Proposed Solution

This question describes a situation where software is required to support the operation of a new product developed by a start-up. The start-up is developing equipment that it will sell to households. This equipment will enable people who do repair or installation work in and around their homes, to be more effective. The start-up has just been granted a patent for their first product. This will be a replacement for both short and tall ladders. Their first product will be a drone, light enough to worn as a back-pack, with computer control for navigation and stability. This will be used as a ladder replacement, for access inside houses and buildings. 

The control software for the drone will need to:

maintain stability, 

support navigation 

and avoid collisions.

In Chapter 2 we learned about sourcing software. Propose sourcing for the software to control this drone. You can consider the sourcing alternatives as sourcing the entire control system or acquiring the three components: stability maintenance, navigation, collision avoidance separately and having these integrated, either in-house or by a supplier.

Note that this device will be controlled by the wearer, so there is need for automation to detect and avoid obstacles. 

Analysis:

What are the lowest cost and lowest risk alternatives that should be considered? You can consider sourcing by operating function (stability, navigation and collision avoidance) or for the total operating system. Discuss these alternatives.

Proposed Solution

Identify proposed software sourcing, either by operating function (stability, navigation and collision avoidance) or for the total operating range, with explanations. You should search the Web for COTS or Open Source opportunities for software acquisition and identify potential software that could be used.

Remember acquisition is lower cost than new development.

Write a program that allows users to perform maintenance for a given set of names. When the load button is pressed, read a se

Write a program that allows users to perform maintenance for a given set of names. When the load button is pressed, read a set of names, preferably 10 or less from an initialized array. Display the area into the comboBox or listBox

 Write a program that allows users to perform maintenance for a given set  of names. When the load button is pressed, read a set of names,  preferably 10 or less from an initialized array. Display the area into  the comboBox or listBox. The add button allows the user to add to the  existing list. Remove will delete a name from the list. Allow the user  to highlight or select one or more names from the listbox. When the user  presses the select button display a dialog box| indicating the names  selected. The reset button restores the listbox from the original array.  The exit button terminates the button. …Form1 OX Name Maintenance  Program Name Load Add Remove Select Reset Exit 

 Write a program that allows users to perform maintenance for a given set of names. When the load button is pressed, read a se 

Write a program that asks the user to input

  

Problem 1
Write a program that asks the user to input a starting number of beer bottles and an ending number of beer bottles. The beer song lyrics should start and end accordingly. Your program should pass this codecheck and have the following output:Problem 2Write a program that reads in two integers M and N from the user. Print out N letters of the alphabet starting at the Mth letter. You should be careful to not exceed the letter ‘z’, even if the user types an unreasonably large value for M.CodecheckProblem 3Write a program that continually prints “Are we there yet?” to the user. The program should stop asking this question when the user types y, Y, or yes.Codecheck

Assignment 300 words

 In a few short paragraphs, explain which cloud services you use (Google, Amazon, iCloud, Verizon, Microsoft One, Dropbox, etc) and what type of information you store (docs, photos, music, other files?). How much space do you have and what does this cost per month? 

IMPACT OF IT -ASSG

 Required Assignment 1: Submit one to two-page summary of a journal article on a relevant topic of your choice. You are required to use IGU’s learning resources such as university’s digital library and online resources and confirm your use of these resources with your instructor. See “LRS” section above.

Assignment Week 4
1. Use Library Database in Syllabus to find an article related to Organizational Behavior:
2. Capture five major points of from the article and use APA to acknowledge this is captured or copied by (authors last name, date)
3. Write a short paragraph explaining why you think this article interest you as Introduction
4. Summary: Write your conclusion of what you have learned from the article
5. List the title and author of the article
6. Reference put the article reference in APA format 

Lab Goal : This lab was designed to teach you more about Binary Trees. Lab Description : Write a binary search tree class. Fo

Lab Goal : This lab was designed to teach you more about Binary Trees. Lab Description : Write

 Lab Goal : 

 

Java – Binary Tree. Will leave an upvote.

Lab Goal : This lab was designed to teach you more about Binary Trees. Lab Description : Write a binary search tree class. Fo

This lab was designed to teach you more about Binary Trees.  Lab Description : Write a binary search tree class. For the base lab,  you must write the following methods :: preOrder, postOrder, inOrder,  revOrder, getNumLeaves, getNumLevels, getWidth, getHeight, getNum Nodes,  toString, is Full. The following method groups are extra credit. Each  group will net you an extra ten points on your base 100 point lab grade.  You can complete any or all of the options in any order you prefer.  Complete as many of these options as you can. Group 1 :: write a method  to search the tree for a value and return true or false Group 2 :: write  getLargest and getSmallest methods to return the smallest and largest  tree values Group 3 :: write a level order traversal using the Java  LinkedList as a Queue Group 4 :: write a method to remove a node from  the tree – must be recursive Group 5 :: write a method to display the  tree like a tree-level order traversal might be useful Sample Output :  IN ORDER 70 80 85 90 98 100 120 ROOT 90 80 100 70 85 98 120 PRE ORDER 90  80 70 85 100 98 120 POST ORDER 70 85 80 98 120 100 90 height = 2 width =  5 numLevels = 3 numLeaves = 4 numNodes = 7 isFullTree = true REVERSE  ORDER 120 100 98 90 85 80 70 Tree height is 2 Tree width is 5 Number of  leaves is 4 Number of nodes is 7 Number of levels is 3 Tree as a string  70 80 85 90 98 The tree is full. 100 120 © A+ Computer Science –Binary  Trees – www.apluscompsci.com BONUS SECTION The tree contains 100! The  does not contain 114! The smallest tree node 70 The largest tree node  120 Tree before removing any nodes – using level order traversal. 90 80  100 70 85 98 120 Tree after removing 90. 98 80 100 70 85 120 Tree after  removing 70. 98 80 100 85 120 Tree after removing 85. 98 80 100 120 Tree  after removing 98. 100 80 120 Tree after removing 80. 100 120 Tree  after removing 120. 100 Tree after removing 100.