Weely Sprint Report – Retrospectives

Our Project:

Education web platform which allows students to specify their desired degree and preferred University in order to determine the optimal course curriculum to graduate in the shortest amount of time. The platform would use GPS to identify near-by community colleges in which to augment the students schedule in order to reduce cost or time-to-completion. Additional pay functionality would allow a student to schedule course notifications, adjust classes based on personal preference, and pre-register at supporting Universities.

The thing you need to do:

Software Engineer Class Project Presentation(10 mins of talking) – Around 5 pages speaking notes

Talk about security, design:

Based on the Home Page and Login Page, tell me how these pages satisfy the user’s needs(student only).

Are they easy to use for user? And Why?

Why the user like/dislike the design? 

How can we improve the problems as a developer or security perspective?

Sprint Report:

what we should stop to do?

– Moblie Version (everything) because we want to focus on the Web application first.

what we should continue to do?

– Web Page Mock up

– meeting with Users during non-working hours.

what we should start to do?

– Create School Search page

– Sign up option in Login page for student account (including profile page)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database Diagram

 

Review the file “Appendix A

Design a distributed database for DreamHome and illustrate it in Microsoft® Visio®.

Include the following in your database:

  • Models representing the conceptual, logical, and physical database designs
  • Annotations identifying the appropriate elements. For example, the Physical Model annotations would include design base relations; identification of primary keys, foreign keys, and alternate keys; some data definitions (NOT NULL); relational integrity constraints; and general constraints

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Explain how cookies can show that a user has visited a site if that user’s history has been deleted.

Explain how cookies can show that a user has visited a site if that user’s history has been deleted.

Optional: install Windows Historian and see the sites visited by a particular user. 

Use your own words. Attach your WORD document here.

https://www.youtube.com/watch?v=dMoIocnElCY

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Analyzing-and-Visualzing-Data-Discussion

The chart you select to represent your data will be influenced by many factors. Kirk (2016) has put each chart into the five main families below:

  • Categorical: Comparing categories and distributions of quantities values
  • Hierarchical: Charting part-to-whole relationships and hierarchies
  • Relational: Graphing relationships to explore correlations and connections
  • Temporal: Showing trends and activities over time
  • Spatial: Mapping spatial patterns through overlays and distortions

Select a chart type from the text and discuss what the chart is used for and why you selected it. (The author has included a lot of different chart types in our course book)

 Kirk, A. (2016). Data Visualization: A Handbook for Data Driven Design (p. 50). SAGE Publications. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wk 4 Individual: CRM Design Proposal

Assignment Content

The stakeholders at WeLoveVideo, Inc. are interested in understanding what the CRM will look like prior to development. There are a variety of ways the project team can approach design, some being more effective in terms of giving the stakeholders a view into what the final product will look like. Some of the approaches include a storyboard and presentation. The storyboard provides a visual display, while the presentation provides the necessary information.

Develop a proposal presentation of how you will approach the design for the WeLoveVideo, Inc. CRM project.

Create an 8- to 10-slide multimedia-rich presentation and include the following:

  1. Identify the recommended design approach (User Interface, Pattern Based Design, or one of your choosing).
  2. Explain why this approach was chosen over others.
  3.  Highlight the steps and processes that will be adhered to, along with the output expected from the approach.
  4. Include a storyboard that represents general screen layout and user flow within the system.
  5. Highlight the pros and cons of the chosen approach against other options.
  6. Appropriate charts, images, graphics, video, or audio where appropriate.
  7. Cite at least 2 references using APA format.
  8. In-text Citations and speaker notes

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 2 – Cipher implementation in Python

The primary goal of this project is to understand how Caesar cipher works. Here, we are using the python programming language to implement the Caesar cipher algorithm. It is not mandatory to know python in order to run the program. The main focus is to understand how the input message is converted into ciphertext with the help of encryption logic and then use a similar pattern to perform decryption. You will be provided with a python code that has implemented encryption logic. Your task is to understand the logic and implement decryption by simply writing the logic explained in the pdf file.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

assignment 3 IT510

  

Continuing Case: Personal Trainer, Inc. 

Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new “supercenter” in the Toronto area. Personal Trainer’s president, Cassia Umi, hired an IT consultant, Susan Park, to help develop an information system for the new facility. During the project, Susan will work closely with Gray Lewis, who will manage the new operation.

Background 

During requirements modeling for the new system, Susan Park met with fitness center managers at several Personal Trainer locations. She conducted a series of interviews, reviewed company records, observed business operations, analyzed the BumbleBee accounting software, and studied a sample of sales and billing transactions. Susan’s objective was to develop a list of system requirements for the proposed system. 

Fact-Finding Summary

• A typical center has 300–500 members, with two membership levels: full and limited. Full members have access to all activities. Limited members are restricted to activities they have selected, but they can participate in other activities by paying a usage fee. All members have charge privileges. Charges for merchandise and services are recorded on a charge slip, which is signed by the member. 

• At the end of each day, cash sales and charges are entered into the BumbleBee accounting software, which runs on a computer workstation at each location. Daily cash receipts are deposited in a local bank and credited to the corporate Personal Trainer account. The BumbleBee program produces a daily activity report with a listing of all sales transactions. 

• At the end of the month, the local manager uses BumbleBee to transmit an accounts receivable summary to the Personal Trainer headquarters in Chicago, where member statements are prepared and mailed. Members mail their payments to the Personal Trainer headquarters, where the payment is applied to the member account. 

• The BumbleBee program stores basic member information, but does not include information about member preferences, activities, and history. 

• Currently, the BumbleBee program produces one local report (the daily activity report) and three reports that are prepared at the headquarters location: a monthly member sales report, an exception report for inactive members and late payers, and a quarterly profit-and- loss report that shows a breakdown of revenue and costs for each separate activity. 

During the interviews, Susan received a number of “wish list” comments from managers and staff members. For example, managers want more analytical features, so they can spot trends and launch special promotions and temporary discounts. Managers also want better information about the profitability of specific business activities at their centers, instead of bottom-line totals. Several managers want to offer computerized activity and wellness logs, fitness coaching for seniors, and various social networking options, including e-mail communications, fitness blogs, Facebook, and Twitter posts. Staff members want better ways to handle information about part-time instructors and trainers, and several people suggested using scannable ID cards to capture data.

ASSIGNMENT:

Using the Continuing Case: Personal Trainer, Inc. case study, you will create a systems requirement checklist to be submitted as a Word document. To complete the assignment, describe your approach to this task, specifically regarding how a systems analyst transposes information into requirements. Consider in your document the problem of incorrect interpretation of a requirement. Is this normal? Describe how iterations of requirements can help resolve incorrect interpretation. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use out laptop or desktop computer.

 Topic: Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use out laptop or desktop computer. We use them when we use our phone or tablet. Find articles that describes the different types of operating systems (Linux, Unix, Android, ROS, z/OS, z/VM, z/VSE, etc). Do not select MS WINDOWS. Write a scholarly review of comparing any two or more OS; attach a copy of the article to your postings. Remember, this assignment is to be scholarly; it is not enough for you to simply post your article and add cursory reviews. Cited references are required. In addition you must read the postings of the other students and comment significantly on those areas. Please see Discussion Forum of the class syllabus for additional details on content.

The primary goal for the discussion forum assignment is to simulate the free sharing of ideas among peers that is typically experienced in graduate courses delivered in the more traditional, face-to-face environment. Evaluating a student’s performance on the assignment is not, therefore, very concrete. There are a number of factors that impact the quality of a student’s participation. The content of the contributions is, of course, one rather obvious factor, but the context in which the contributions have been made is equally important. In evaluating performance on this assignment, the following factors will be considered: Add value to the content of the discussion by posting well-written, on-topic contributions.Share resources with others by providing support for you contributions in the form of citations from the literature. Promote peer-to-peer discourse by:Initiating at least 2 quality major topics of discussion  and actively participating throughout the period of the forum with at least 3 quality engagement postings responses to follow student’s major topics of discussion thread – responding to postings of others in a timely manner (within 72 hours). Each contribution (treads and replies) is expected to be though provoking and critical (i.e. “While a database is sometimes consider to consist of a large single site repository, researchers have suggested…” and not simplistic (i.e. “Yes, I agree” or “Thanks for …”). Please see class syllabus for specific grading details. 

Please give 250 words for the above topi with no plaigarism and proper grammer

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Systems Requirement Checklist(advanced Info Tech. Class)

Using the Continuing Case: Personal Trainer, Inc. case study found in your module resources, you will create a systems requirement checklist to be submitted as a Word document. To complete the assignment, describe your approach to this task, specifically regarding how a systems analyst transposes information into requirements. Consider in your document the problem of incorrect interpretation of a requirement. Is this normal? Describe how iterations of requirements can help resolve incorrect interpretation

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 3 Discussion

 

An Intrusion Detection and Prevention System (IDPS) is in place to monitor the health and status of organizational networks and devices. Next Generation Firewalls typically have intrusion detection and other advanced machine analytics capabilities built in.

Discussion Checklist

  1. Discuss the concept of IDPS.
  2. Where should IDPS be implemented in your IT infrastructure?
  3. Your initial post should address the seed questions in either the technology or workflow group below.

Technology: What is the difference between an IDS and an IPS? Why is it important to perform a network traffic baseline definition analysis? If a Snort IDS captures IP packets off a LAN segment for examination, is this an example of promiscuous mode operation? Are these captured packets saved or logged? What is the difference between a host-based and network-based IDS?

Workflow: What are the benefits to increasing the levels of automation in network monitoring? What are the cognitive tradeoffs in offloading monitoring and analysis tasks to IDPS technology? What can people who work in cyber and security monitoring do with the time they get back via automation? Are there risks? What should the threshold be for an IDPS to take a direct action on the network without human intervention? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now