System Analysis and Design – Chapter 10 Minicase 1 solution

Subject: “Systems Analysis and Design”

Requirement: Chapter 10 Program Design.

Please complete Mini-case 1 (Attached) in, found on page 345 in the 6th edition text 

(page 403 in the 5th edition)  “Systems Analysis and Design”.

Task:

a. Develop a structure chart for this segment of the Holiday Travel Vehicles system.

You can use Visio, WORD, or any other modeling tool to display your structure chart 

b. What type of structure chart have you drawn in #a, a transaction structure or a transform structure? Why?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

System Analysis and Design – Chapter 12 Exercise A Develop a unit test plan for the calculator program in Window

Subject: “Systems Analysis and Design”

Requirement: Chapter 12 Moving Into Implementation

Please complete Exercise A (with the additions below), found on page 398 in the 6th edition text (page 469 in the 5th edition) “Systems Analysis and Design”.

Chapter 12 Exercise A: Develop a unit test plan for the calculator program in Windows (or a similar program for the Mac or UNIX).

MUST Requirements: 

1. Make sure you have 10 different and unique test cases.

2. Then identify 5 buttons on the calculator (non-numeric buttons).

3. Create short descriptions of what the key’s function is. This would display when the user right clicked on the button.

4. In your document, display a screen shot of the button, then a hyphen and then the description that you want to display

5. Submit the Unit test and Documentation on separate pages within one document.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

BYOD Registration Form

  

In Section 1, you will provide the specifications of your personal BYOD computing device. In Section 2, you will provide a brief description/explanation of the specifications of your device. You will learn about the specifications and capabilities of your machine in the process.

This task will require you to investigate your machine’s internals. How you locate your system information will vary by operating system.

Include a screenshot showing key system information.

How Will My Work Be Evaluated? 

For this assignment, you are asked to complete the Hudson Fisher Associates (HFA) Bring Your Own Device (BYOD) Registration Form to ensure your device meets the organization’s minimum information technology (IT) baseline specifications and security requirements. The first part of the assignment requires you to access and document your machine’s specifications. In the second part, you will provide explanatory details on the specifications.

By documenting your specifications and explaining your results in an effective narrative format, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.
  • 2.3.2: Incorporate relevant evidence to support the position.
  • 3.1.1: Identify quantitative information that is relevant to a problem or situation.
  • 10.1.2: Gather project requirements to meet stakeholder needs.
  • 12.8.1: Recognize the process to obtain approval from the business process owner.

This week, you will submit your first project, the BYOD Registration Form.

  • Two to three pages (including registration form)
  • Features a fillable template

To get started, download the BYOD Registration Form Template and follow the instructions in the document. 

 Delete the instructional text from the template before you submit.  

 When you are finished, click “add a file” to upload your work, then click the Submit button.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

System Analysis and Design – Chapter 13 Minicase 1 Nancy prioritize change requests

Subject: “Systems Analysis and Design”

Requirement: Chapter 13 Transition To The New System

Please complete Mini-case 1, found on page 426 in the 6th edition text (page 500 in the 5th edition) “Systems Analysis and Design”.

Questions: 

How do you recommend that Nancy prioritize these change requests for the client/management system?

Requirements: Minimum of three pages double spaced content to discuss the question asked. Include a title page and a reference page with at least two outside references.

Use APA formatting for the title page and the reference page.

———————————————————————————————————-

CH13-Transition..-> Mini-case 1 

Nancy is the IS department head at MOTO Inc., a

human resources management firm. The IS staff at

MOTO Inc. completed work on a new client management

software system about a month ago. Nancy was

impressed with the performance of her staff on this

project because the firm had not previously undertaken

a project of this scale in house. One of Nancy’s weekly

tasks is to evaluate and prioritize the change requests

that have come in for the various applications used by

the firm.

Right now, Nancy has on her desk five change

requests for the client system. One request is from 

a system user who would like some formatting changes

made to a daily report produced by the system. Another

request is from a user who would like the sequence of

menu options changed on one of the system menus to

more closely reflect the frequency of use for those

options. A third request came in from the billing department.

This department performs billing through the use

of a billing software package. A major upgrade of this

software is being planned, and the interface between the

client system and the billing system will need to be

changed to accommodate the new software’s data structures.

The fourth request seems to be a system bug that

occurs whenever a client cancels a contract (a rare

occurrence, fortunately). The last request came from

Susan, the company president. This request confirms the

rumor that MOTO Inc. is about to acquire another new

business. The new business specializes in the temporary

placement of skilled professional and scientific

employees, and represents a new business area for

MOTO Inc. The client management software system

will need to be modified to incorporate the special client

arrangements that are associated with the acquired firm.

Questions: 

How do you recommend that Nancy prioritize these

change requests for the client/management system?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Methodology

Research topic:  

  • Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning

Questions: 

  • What kind of study has been done on machine learning’s application in healthcare?
  • What are the primary areas of machine learning’s benefits in terms of healthcare security?
  • What role does machine learning play in improving patient outcomes?
  • Who is making use of machine learning?
  • When and how does machine learning come into play?

Overview: In week 1, you selected a topic and developed a research question for that topic. Then, you developed a data gathering instrument to measure the question either quantitatively or qualitatively. Now that you have had the opportunity to read how scholarly methodologies are written, you will write a condensed 2 page methodology section for your research question using the required headings.

Directions:

 Develop a 2 pages (more is fine) methodology section that includes the following: 

  1. Introduction
  2. Research Paradigm (qualitative or quantitative) Notes: Choose Qualitative or Quantitative based on what methodology you plan to use for your actual dissertation. You may not choose to do both qualitative and quantitative (mixed-methods)  
  3. Research- or project- Design
  4. Sampling Procedures and
  5. Data Collection Sources
  6. Statistical Tests Summary (quantitative) OR Data Organization Plan (Qualitative). Notes:  If you chose a quantitative research paradigm, you must choose a quantitative statistical test summary option in this section. If you chose a qualitative research paradigm, you must choose the qualitative organization plan option in this section.  

Please follow directions to complete this.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Quantitative research

You will review both quantitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic (cybersecurity) so that you can start viewing what is out there. 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References   

500 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Qualitative

 You will review qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic (cybersecurity) so that you can start viewing what is out there.

 Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 

500 words with references needed.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ITS-834: Emerging Threats & Countermeasures. Discussion, Research Paper

Subject: ITS-834: Emerging Threats & Countermeasures

Reading Resources:

Satapathy and L. M. J. Livingston. (2016). “A Comprehensive Survey of Security Issues and Defense Framework for VoIP Cloud,” in Indian Journal of Science and Technology, 9(6).  https://doi.org/10.17485/ijst/2016/v9i6/81980

D. B. Rawat, 2019. “Fusion of Software Defined Networking, Edge Computing, and Blockchain Technology for Wireless Network Virtualization,” in IEEE Communications Magazine, vol. 57, no. 10, 50-55.  https://ieeexplore.ieee.org/document/8875714

J. Tioh, D. M. Mina and D. D. W. Jacobson, “Cyber Security Social Engineers an Extensible Teaching Tool for Social Engineering Education and Awareness,” 2019 IEEE Frontiers in Education Conference (FIE), Covington, KY, USA, 2019, pp. 1-5.  https://ieeexplore.ieee.org/document/9028369

T. Surasak and S. C. -. Huang, “Enhancing VoIP Security and Efficiency using VPN,” 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 2019, pp. 180-184.  https://ieeexplore.ieee.org/document/8685553

Chapters 11, 12, 13, and 14 in the course textbook

Textbook Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide ISBN: 9781119475958, Authors: Mike Chapple, James Michael Stewart, Darril Gibson, Publisher: John Wiley & Sons, Publication Date: 2018-04-10  

Discussion: Wireless Networking

Word count: 300+ words

Chapters 11, 12, 13, and 14 in the course textbook 

What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also, discuss methods used to secure 802.11 wireless networking in your initial thread.

Make sure to back up your statements with scholarly support.

· Please cite properly in APA 7

· At least one scholarly source should be used. 

· Use proper citations and references in your post.

Research Paper:

Number of pages: 4+

Considering the importance of data in the organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

· 4+ pages in length, not including the required cover page and reference page.

· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Note: plagiarism check required, APA7 format, include References, within 8hrs

This post has 2 individual assignments (a discussion and a research paper). Please provide answers in separate documents. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Website Usability Business Case Study

 You have been assigned to one of websites to conduct a website usability study 

The assignment requires a 4-page review, not including the cover page, abstract, and reference page, of the business use case 

  • BestBuy.com

Answer the following questions:

Identify the study method used and why it was appropriate

Explore some of the qualitative or quantitative methods gathered.                                               

 Answer these two additional questions:

  • How would you conduct the study any differently?
  • Given the nature in the advance of technology, how do you foresee technology changing the way studies such as these are conducted in the future?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

discussion question (1 paragraph)

Please respond to the following:

  • Companies use web analytics to gather data and measure a website’s  design effectiveness among its users. Of the two web analytic categories  (on-site and off-site), speculate on which one is more effective.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now