Agile Methodology

 

Agile Methodology

Overview

In this assignment you focus on the process methodology of Section 5, Standards and Procedures of your software development plan (SDP)—choosing, diagramming, explaining and finally applying your choice of Agile development methodology to CapraTek. The choices that you make here drive the rest of the SDP, so it is an appropriate starting point.

Preparation

Use the assignment Resources to complete the following:

  • View the CapraTek scenario in the CapraTek Overview document.
  • Download the Software Development Plan Template. Save it as “CapraTek_SDP_u1” and use it to complete and submit your assignments for this course.

Directions 

Consider the CapraTek scenario and address the items below in Section 5 of the CapraTek SDP document.

  • Select an Agile methodology and briefly justify why your chosen Agile methodology is appropriate for CapraTek.
  • Create a Unified Modeling Language (UML) activity diagram that illustrates the process methodology life cycle.
  • Describe each of the phases depicted in the process methodology diagram with relation to the software development process. Keep your descriptions generic—the point is to explain the processes involved in each phase to illustrate the concept.
    • Partial Example: Scrum initial requirements steps: “During the initial requirements steps, the product owner examines the product backlog and gets feedback from the customer and other stakeholders. The product owner then informs the development team of the items from the product backlog . . .”
  • Select two of the phases and describe how each would manifest itself in the context of CapraTek. Consider CapraTek’s requirements, resources, time constraints, et cetera. 

Save and submit your SDP.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

XOR gate exercise using Jupiter notebook

Create jupyter notebook file: Intro_NN_XORGATE.ipynb

The XOR Gate Of all logic gates the most important in computer science is the exclusive or or XOR gate. It turns out there is

****Exercise****

# Uncomment the xor_gate line and find out which neurons besides the or_gate neuron the
# network should have in its hidden and output layer to produce the right values.

in[]class Network():
def __init__(self, gate1, gate2, out_gate):
self.hidden_neuron1 = gate1
self.hidden_neuron2 = gate2
self.out_neuron = out_gate
def activate(self, x1, x2):
z1 = self.hidden_neuron1.activate(x1, x2)
z2 = self.hidden_neuron2.activate(x1, x2)
return self.out_neuron.activate(z1, z2)
#xor_gate = Network(…, …, and_gate)
make_truth_table(xor_gate)

****Exercise****

# Finish this version of an XOR gate that more closely resembles a neural network by determining the shapes the #weights and biases need to have.

#W1 = np.array(…)
#b1 = np.array(…)

#W2 = np.array(…)
#b2 = np.array(…)

in[?]hidden_layer = Layer(W1, b1)
output_layer = Layer(W2, b2)

in[]class Network():
def __init__(self, hidden, output):
self.hidden = hidden
self.output = output
def activate(self, X):
z = self.hidden.activate(X)
return self.output.activate(z)

xor_gate = Network(hidden_layer, output_layer)

xor_output = xor_gate.activate(X)
np.round(xor_output)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Benchmark – Developing Enterprise Framework for a Security Program

  

COMPANY PROFILE: 

Mission Statement

The mission of Across the States Bank is to provide superior customer service and tools that enable citizens of the United States to manage their money domestically and abroad.

Vision Statement

Our vision is to become the premier banking services provider across all business segments through offering outstanding customer-centered service.

Across the States Bank (ASB) takes pride in providing our customers with superior service and the ability to manage their finances 24/7 from anywhere in the world. As one of America’s largest banks, our 132,500 employees are available to address personal and business banking customer needs any time of the day or night by phone, e-mail, or through our online chat feature. Our seamless online and mobile banking and 24-hour customer support ensure that your money management needs can always be met.

Based in Metropolis, California, ASB offers over 17,000 branch offices and ATMs to service customers across the continental United States. When traveling abroad, ASB customers can easily access accounts and complete routine banking transactions in most European nations through our foreign partner, Across the EU Bank. Always looking for means of expanding our $10 billion business, we are developing additional foreign partnerships that will soon allow us to expand our services to South America and Asia to better meet our customer needs.

Products and Services

Personal Banking

As one of the nation’s leading personal banking service providers, ASB allows individuals to select from a wide range of banking services, including:

  • Savings and      checking accounts
  • Debit and credit      cards
  • Personal and      automobile loans
  • Home loans,      including first mortgages, home equity, and lines of credit
  • Insurance
  • Investment      banking services
  • Wealth management      and estate services

Business and Commercial Banking

To meet the diverse needs of business and commercial customers, ASB offers individually selected and bundled services, including:

  • Business savings      and checking accounts
  • Business loans
  • Merchant services
  • Payroll services
  • Insurance
  • Investment      banking
  • Trust services
  • Shareowner      Services

Strategic Goals

  • Increase annual sales to $12 billion within the next 3 years.
  • Improve customer relations and customer service response times through the implementation of a state-of-the-art customer resource management system.
  • Increase services in the commercial sector by 15%.
  • Achieve      an average customer service satisfaction survey score of 95%

1. Select a fictitious company to use for the duration of this course and create an associated abbreviation (e.g., Across the States Bank (ASB), Lopes Manufacturing (LM), or Pike’s Peak Health Care (PPHC)).

2. For the company selected, research online or use Chapter 2 of the textbook and identify, at minimum, two laws or regulations that include a set of standards the organization must implement to achieve compliance (i.e., PCI DSS, HIPAAHITECH, ISO/IEC 27001:2013, or NISPOM 5220.22).

3. Use the “NIST 800-53r5 Framework – Appendix C,” the two identified laws, and the “ITT-430 Developing Enterprise Framework Template,” to map the various standards to the controls within the framework. Refer to the “ITT-430 Developing Enterprise Framework Example.”

4. Map a minimum of two NIST controls per law or regulation. NIST 800-53 controls may duplicate across standards as shown in the Developing Enterprise Framework Example (see SC-13).

5. Complete at least 25 mappings.

6. In the “Notes” column, briefly explain the purpose that the two laws or regulations and the associated controls are trying to achieve. For example, the first row in the example is establishing a policy on risk assessment and the identification and management of threats and vulnerabilities.

7. Research and create a security program framework outline for your fictitious company that aligns to the mission and vision of the company. Your outline should include a table of contents; list the topics your company would need to address in order to resolve the many issues of its business concerning confidentiality, integrity, and availability.

8. In 500–750 words, explain your security framework outline and how it is specific to your company. Explain why you chose to include your specific topics and how they will help to secure your companies interests as well as systems long term, differentiating between legal, regulatory, and framework compliance needs. Describe the major components, policies, and processes related to cyber defense, security controls, and network security.

9. Include at least two references outside of the required reading.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

I need help with my computer class

  21FA CGF32 LECTURE INFO 1120 Microcomputer Applications |  

 Access 2019 Skills Approach – Ch 3 Challenge Yourself 3.3 

 

  1. Open the start file AC2019-ChallengeYourself-3-3.
  2. If the database opens in Protected View, click the Enable Content button in the Message Bar at the top of the database so you can modify it.
  3. Create a new query named: GreenhouseTechsFT
    1. Add all the fields from the Employees table.
    2. The query should list all employees whose Position begins with the word greenhouse and whose weekly hours are greater than or equal to 20. Hint: Include a wildcard character in the criterion for the Position field.
    3. Modify the query design so results are sorted alphabetically by last name.
    4. Add the MaintenanceLog table to this query and include the MaintenanceDate field after the WeeklyHours field.
    5. Run the query to review the results. There should be 16 records in the results.
    6. Save and close the query.
  4. Export the GreenhouseTechsFT query to an Excel spreadsheet.
    1. Name the Excel file: GreenhouseTechsFT
    2. Include formatting and layout.
    3. Save the export steps with the name: GreenhouseTechsFTExport
  5. Create a new query named: NewPlants.
    1. Add all the fields from the Plants table except ScientificName.
    2. The query should list all white or blue colored plants whose DatePlanted is greater than or equal to 1/1/2019.
    3. Modify the query design so results are sorted by values in the DatePlanted field with the newest plants listed first.
    4. Run the query to review the results. There should be three records in the results.
    5. Save and close the query.
  6. Export the NewPlants query to a text file.
    1. Name the text file: NewPlants
    2. Use Tab as the delimiter.
    3. Include the field names in the first row.
    4. Save the export steps with the name: NewPlantsExport
  7. Create a new query named: RedPlantSale
    1. Add the following fields from the Plants table to the query: CommonName, PrimaryColor, PurchasePrice
    2. Select only those plants with a red color, but don’t show this field in the query results.
    3. Add a calculated field that displays a sale price that is 75 percent of the purchase price. Hint: Use an expression that calculates the value of the PurchasePrice field multiplied by 0.75. Use the name SalePrice for the new field.
    4. Run the query to review the results. There should be five records in the results.
    5. Save and close the query.
  8. Use the Find Unmatched Query Wizard to create a new query that identifies the plants that have no entry in the MaintenanceLog.
    1. Include all fields from the Plants table except the PlantID.
    2. Name this query: PlantsMissingMaintenance
    3. Review the query results. There should be 15 records in the results.
    4. Close the query.
  9. Create a new parameter query named: PlantsByColor
    1. Add the following fields from the Plants table to the query: CommonName, PrimaryColor, DatePlanted, PurchasePrice
    2. Configure the PrimaryColor field so the user is prompted to enter the primary plant color with this message: Enter plant color
    3. Test the query using the color violet. There should be three records in the results.
    4. Save and close the query.
  10. Open the MaintenanceLog table. Apply a filter that shows only those plants that have been watered and pruned. Close the table. There should be one record in the results.
  11. Close the database and exit Access.
  12. Upload and save your project file.
  13. Submit project for grading.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Python (four Formulas)

 Write a computer program that implements all four formulas. Write your program in Python  since that is the computer programming language taught in this course. You will need to import  the Math library for the program 

files attached, 1- for info assignment. 2- slides will help you  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

System Requirements- IOT

 

This is a required assignment, worth 100 points, and must be submitted by the due date.
Review the Grading Rubric before completing this assignment.

Create a list of requirements. Details on the Project:  Project2 Smart Systems Assignment.pdf Project2 Smart Systems Assignment.pdf – Alternative Formats

You must use the following Template for your solution:  Project2 Requirements template.docx Project2 Requirements template.docx – Alternative Formats

Use the following Template when writing your paper:  Project2 Paper template.docx Project2 Paper template.docx – Alternative Formats

A 20% penalty will be applied if the templates are not used

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Corporate Infrastructure Part VI: Wireless Network

in a Microsoft Word document, create a Wireless Security Policy.   

  1. Describe if the wireless network will be on a different subnet     to protect your wired network.
  2. What type of encryption will     be utilized, including the attributes of the encryption methodology?     What kind of logon security will be employed to keep unauthorized     users out of your network?

Then, in 250 words, summarize your findings and provide a   recommendation to your company CIO.

attached is the company that this needs to be written for:

https://lc.gcumedia.com/itt115/company-website-profiles/v2.1/tri-arrow/#/

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Accounting Information Systems Assignment using Access

 This assignment requires you to convert a UML class diagram into a relational model, physically create tables in Microsoft Access, and enter data into the tables.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Python Vending machine

 

•For This Assignment, You Need to Create a Vending Machine…

•You Need to Do the Following:

1.Create a Program That Allows Displays and Allows Someone to Purchase Items from a Vending Machine…

2.You Should Have a Least 5 Items in the Vending Machine, Each With Varying Prices…

3.You Need to Display the Item and the Price…

4.People Can Purchase More Than One of Any Single Item…and They Can Purchase More Than One Item During the Transaction…

5.You Need to Keep a Running Total of the Purchase…

6.Allow the User to Enter How Much Money They Are Giving the Vending Machine…Calculate the Change…

7.As Always, Make Sure You Create Exception Handling…

8.You Should Have “X” Functions and “X” Files…

9.And Make Sure You Create a Flowchart FIRST!…

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Network Plan- Computer science expert only

For an entry level computer science class.

I need someone with computer science knowledge and experience to create a simple network plan.

Original work.

No plagiarism.

APA style

Find the attached file for instructions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now