Software Engineering Discussion

> Select a mobile application you are familiar with, and assess it using the architecture considerations (economy, visibility, spacing, symmetry, emergence) from Pressman et al. (2020) Section 10.4. (attached chapter 10).

> What is a web app component?

> Chapter 13 has listed many quality attributes for mobile products. Select the 3 that you believe are most important, and make an argument that explains why each should be emphasized in mobile design work. (chapter 13 attached).

Need 3-4 pages with peer-reviewed citations. No introduction or conclusion needed.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT592 Unit 2

 

In this assignment, you assume you are a cybersecurity professional for an organization where this type of breach has occurred in an IoT architecture. You will now look at this problem from the cybersecurity professional’s perspective to determine how to mitigate against this type of attack in the future.

Assignment Instructions

Scenario

Imagine you are an IT professional, and your manager asked you to give a presentation about various financial tools used to help with decisions for investing in IT and/or security. The presentation will be given to entry-level IT and security employees to understand financial investing. To simulate a real-world presentation, you will create a PowerPoint® presentation that includes audio narration and a transcript. The presentation must define the following: cost benefit analysis, return on investment (ROI), total cost of ownership (TCO), net present value (NPV), and return on security investment (ROSI). In addition to defining these financial concepts or tools, provide an example of a cost benefit analysis use case for IT or security and examples for ROI, TCO, NPV, and ROSI. A transcript for each slide should be in the Notes section of the PowerPoint presentation.

Assignment Requirements

The PowerPoint presentation must have at least 6 slides, and each slide must include audio narration for it. Also, supply a transcript for your audio narration. For the transcript, be sure to use APA citation and formatting style.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT 544 Unit 2 Part 2

 PLEASE SEE ATTACHED ONLY NEED PART 2.

Part 2:

After you complete the Lab, you will write a 2-page report to stakeholders about the importance of patching and securing systems. You will compose this report within the same document as your Part 1 screenshots. Be sure to label your screenshots as Part 1 and your report as Part 2 in your Word document. Your report must include the security measures used from the Lab, clearly explaining why the security measures from the Lab are important to prevent breaches. Provide the stakeholders with real-world examples of the possible ramifications to an organization if the proper security measures are not taken.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Roles, Responsibilities, and Governance of Security

Develop a 10- to 12-slide presentation using your choice of software for the board of directors. Include a title slide, a reference slide, and detailed speaker notes. In your presentation:

  • Concisely describe cybersecurity governance, including major components like organizational oversight and security processes.
  • Recommend an information security control framework.
  • Logically explain how an information security control framework benefits a business.
  • Describe one organizational challenge of implementing information security and provide an example of how you, the CISO, would address the challenge.

Include supportive graphics and appropriate backgrounds and styles. Don’t use images unless you obtain permission from the copyright holder or you use copyright-free images.

Format all citations according to APA guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

power point project

For this project, you will apply the CompTIA 6-Step Troubleshooting Process to explain how you would tackle Hudson Fisher Associates Help Desk Tickets. There are three groups of tickets, Level 1, Level 2, and Level 3. You will pick two tickets from each group.

As you prepare to analyze and hopefully solve these typical IT help desk tickets, keep in mind that for this course, it is more about the process and less about finding the “correct” answer. You may not always find an exact answer from the information given. The problems are structured to approximate what you will find in the workplace. Use a logical and repeatable process (e.g., the CompTIA 6-Step Troubleshooting Process) and eliminate the improbable as you work your way through each scenario.

CompTIA 6-Step Troubleshooting Process:

  1. Identify the problem.
  2. Establish a theory of probable cause.
  3. Evaluate the theory to determine the actual cause.
  4. Establish a plan of action to resolve the problem and implement the solution.
  5. Verify full system functionality and if applicable implement preventative measures.
  6. Document findings, actions, and outcomes.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Software Engineering – Discussion

> Using your own words, describe the difference between verification and validation. Do both make use of test-case design methods and testing strategies?
> What is integration testing? What is a good integration test case? Who should perform integration testing?
> Describe the steps associated with user experience testing for a mobile app.
> What is the objective of security testing? Who performs this testing activity?

Need 2-3 pages with peer-reviewed citations. No introduction or conclusion needed.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Importance of Epic Integration in healthcare

What is the importance of epic integration in healthcare?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cybersecurity Threat Landscape Paper

Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors.

Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and presentation of a specific APT, which she will assign to the team.

.  

Your  report should use The Cybersecurity Threat Landscape Team Assignment Resources to cover the following five areas:

Part 1: Threat Landscape Analysis

  • Provide a      detailed analysis of the threat landscape today.
  • What has changed in the past few years?
  • Describe common tactics, techniques, and procedures to include threat actor types.
  • What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of?

Part 2: APT Analysis

  • Provide detailed analysis and description of the APT your group was assigned.      Describe the specific tactics used to gain access to the target(s).
  • Describe the tools used. Describe what the objective of the APT was/is. Was it successful?

Part 3: Cybersecurity Tools, Tactics, and Procedures

  • Describe current hardware- and software-based cybersecurity tools, tactics, and procedures.
  • Consider the hardware and software solutions deployed today in the context of defense-in-depth.
  • Elaborate on why these devices are not successful against the APTs.

Part 4: Machine Learning and Data Analytics

  • Describe the concepts of machine learning and data analytics and how applying them to cybersecurity will evolve the field.
  • Are there companies providing innovative defensive cybersecurity measures based on these technologies? If so, what are they? Would you recommend any of these to the CTO?

Part 5: Using Machine Learning and Data Analytics to Prevent APT

  • Describe how machine learning and data analytics could have detected and/or prevented the APT you analyzed had the victim organization deployed these technologies at the time of the event. Be specific.

Part 6: Ethics in Cybersecurity.  Ethical issues are at the core of what we do as cybersecurity professionals. Think of the example of a cyber defender working in a hospital. They are charged with securing the network, medical devices, and protecting sensitive personal health information from unauthorized disclosure. They are not only protecting patient privacy but their health and perhaps even their lives. Confidentiality, Integrity, Availability – the C-I-A triad – and many other cybersecurity practices are increasingly at play in protecting citizens in all walks of life and in all sectors. Thus, acting in an ethical manner is one of the hallmarks of cybersecurity professionals.

  • Do you think the vulnerability(ies) exploited by the APT constitutes an ethical failure by the defender? Why or why not? 
  • For the      APT scenario your group studied, were there identifiable harms to privacy or property? How are these harms linked to C-I-A? If not, what ethically significant harms could result from the scenario your group researched? 
  • For the      APT scenario, your group studied when the targeted organization identified in the breach were they transparent in their disclosure? Do you feel the organization acted ethically? 
  • Use additional sources of information but also describe the concept in layman’s terms.
  • Use visuals where appropriate.
  • While quality is valued over quantity, it is expected that a quality paper will result in a minimum length of 10–15 pages.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

**Java** Final Project Zoo Monitoring System

**JAVA** Please assist by providing pseudocode and functioning java program based on requirements below.

Zoo Monitoring System

As a zookeeper, it is important to know the activities of the animals in your care and to monitor their living habitats. Create a monitoring system that does all of the following:

1. Uses at least TWO classes

2. Uses well-constructed comments explaining each section of code.

3. Asks a user if they want to monitor an animal, monitor a habitat, or exit

Example:

Please select an option: 1 - Monitor Animals 2 - Monitor Habitats 0Exit Program

4. Displays a menu of animal/habitat options (based on the previous selection) as read from either the animals.txt or habitats.txt. Additional entries will be made into both .txt files so program must read and display the menus from the .txt files dynamically.

Asks the user to enter one of the options

Examples:

OR

5. Displays the monitoring information by finding and reading from the appropriate section in the file.

Example:

OR

6. Separates sections by the category and selection (such as “Animal – Lion” or “Habitat – Penguin”)

7. Uses a dialog box to alert the zookeeper if the monitor detects something out of the normal range (These will be denoted in the files by a new line starting with *****. Do not display the asterisks in the dialog.)

Example:

8. Allows a user to return to the main menu.

Program contains:

1. Input/Output: program reads input from the user and uses system output.

2. Control Structures: program utilizes appropriate control structures for program logic.

3. Libraries: program utilizes standard libraries to pull in predefined functionality.

4. Classes Breakdown: program is broken down into at least two appropriate classes.

5. Methods: program utilizes all included methods correctly within the classes.

Text file contents:

Animals.txt

Details on lions

Details on tigers

Details on bears

Details on giraffes

Animal – Lion

Name: Leo

Age: 5

*****Health concerns: Cut on left front paw

Feeding schedule: Twice daily

Animal – Tiger

Name: Maj

Age: 15

Health concerns: None

Feeding schedule: 3x daily

Animal – Bear

Name: Baloo

Age: 1

Health concerns: None

*****Feeding schedule: None on record

Animal – Giraffe

Name: Spots

Age: 12

Health concerns: None

Feeding schedule: Grazing

Habitats.txt

Details on penguin habitat

Details on bird house

Details on aquarium

Habitat – Penguin

Temperature: Freezing

*****Food source: Fish in water running low

Cleanliness: Passed

Habitat – Bird

Temperature: Moderate

Food source: Natural from environment

Cleanliness: Passed

Habitat – Aquarium

Temperature: Varies with output temperature

Food source: Added daily

*****Cleanliness: Needs cleaning from algae

Show transcribed image text

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

C++ Coding assignment

Assg 02: Classes

COSC 2336 Data Structures

Objectives • Create a simple class • Practice using <cmath> math functions • Practice with C++ string types and I/O streams • Use a class constructor • Example of test driven development

Description Typically, most everyone saves money periodically for retirement. In this exercise, for simplicity, we assume that the money is put into an account that pays a fixed interest rate, and money is deposited into the account at the end of the specified period. Suppose the person saving for retirement depositsD dollarsmtimesperyear. Theaccountpaysr%compoundinterest rate. And the person will be saving for a period of t time given in years. For example, the person might save D = $500 every m = 12 months. The retirement account pays 4.8% compound interest per year. And the person as t = 25 years to save for retirement. The total amount of savings S accumulated at the end of this time is given by the formula S = Dh(1 + r/m)mt −1 r/m i For example, suppose that you deposit $500 at the end of each month (m = 12). The account pays 4.8% interest per year compounded monthly for t = 25 years. Then the total money accumulated into this account is

1

500[(1 + 0.048/12)300 −1]/(0.048/12) = 289,022.42

.

On the other hand, suppose that you want to accumulate S dollars in savings, and would like to know how much money you should deposit D each deposit period. The periodic payment you need to reach this goal S is given by the formula

D =

S(r/m) (1 + r/m)mt −1 Design a class that uses the above formulas to calculate retirement savings and to help plan retirement goals. Your class should have private instance variables (all of type double) to hold D the deposit amount, m the number of deposit periods per year, r the interest rate and t the time in years the plan will save for retirement. In the class style guidelines, I discourage using single letter variable names usually when writing code. However when we are directly implementing a formula in an engineering or scientific calculation, it is often clearer to use the variable names directly as given in the formula. For this assignment you need to perform the following tasks. 1. Create a class named RetirementAccount. The class should have a class constructor that takes the 4 variables, D, m, r, t as parameters. 2. Create a default class constructor as well. This constructor can set all of the private member variable values to 1.0. 3. You must have getter and setter methods for all 4 of the member variables of the class. The methods will be named set_D(), set_m(), set_r(), set_t() and get_D(), get_m(), get_r(), get_t(), respectively. 4. Create a member function named tostring(). This function will not take any parameters as input. It returns a string that represents the values/settings of the RetirementAccount class. See the example output below for the format of the string to be returned. 5. Create a member function named calculateRetirementSavings(). This function should implement the first formula to calculate the total amount of savings S the account will generate. This function has no parameters as inputs, and it returns a double amount (the amount of savings) as its result.

2

6. Create a member function named planRetirementDeposits(). This function takes a double parameters S as input, which is the savings goal you wish to achieve. This function should implement the second equation given above. The function returns a double result, D which is the amount of money that should be deposited each period to meet the savings goal S.

As before you will be given a starting template for this assignment. The template contains all of the tests your class and member functions should pass for this assignment. You should write your program by uncommenting the tests/code in main 1 at a time, and writing your class incrementally to work with the test. If you perform all of the above tasks correctly, the tests given to you in the starting template will produce the following correct output:

=== Testing class creation using constructor……………….

=== Testing getter methods………………. Account: D (deposit amount) = $100.00 m (periods per year) = 10.00 r (interest rate) = 0.0350 t (time in years) = 22.00

=== Testing tostring() method………………. Account: D (deposit amount) = $100.00 m (periods per year) = 10.00 r (interest rate) = 0.0350 t (time in years) = 22.00

=== Testing setter methods………………. Account: D (deposit amount) = $500.00 m (periods per year) = 12.00 r (interest rate) = 0.0480 t (time in years) = 25.00

=== Testing retirement savings calculations……………….

3

My retirement savings: $289022.42

=== Testing retirement planning calculations………………. In order to save 1 million dollars, we need to make monthly deposits of $1729.97 If we set our deposit to this new amount… Account: D (deposit amount) = $1729.97 m (periods per year) = 12.00 r (interest rate) = 0.0480 t (time in years) = 25.00

My retirement savings: $1000000.00

=== Second test on account2 of savings and planning………………. Account 2: D (deposit amount) = $650.00 m (periods per year) = 9.00 r (interest rate) = 0.0350 t (time in years) = 30.00

My retirement savings: $309521.45

In order to save 2 million dollars, we need to make deposits of $4200.03 If we set our deposit to this new amount… Account: D (deposit amount) = $4200.03 m (periods per year) = 9.00 r (interest rate) = 0.0350 t (time in years) = 30.00

My retirement savings: $2000000.00

=== Larger number of tests, compare effect of increasing monthly deposit amount………………. Plan 0: D (deposit amount) = $500.00 m (periods per year) = 12.00 r (interest rate) = 0.0400 t (time in years) = 30.00 Total Savings: 347024.70 Plan 1:

4

D (deposit amount) = $600.00 m (periods per year) = 12.00 r (interest rate) = 0.0400 t (time in years) = 30.00 Total Savings: 416429.64 Plan 2: D (deposit amount) = $700.00 m (periods per year) = 12.00 r (interest rate) = 0.0400 t (time in years) = 30.00 Total Savings: 485834.58 Plan 3: D (deposit amount) = $800.00 m (periods per year) = 12.00 r (interest rate) = 0.0400 t (time in years) = 30.00 Total Savings: 555239.52 Plan 4: D (deposit amount) = $900.00 m (periods per year) = 12.00 r (interest rate) = 0.0400 t (time in years) = 30.00 Total Savings: 624644.46 Plan 5: D (deposit amount) = $1000.00 m (periods per year) = 12.00 r (interest rate) = 0.0400 t (time in years) = 30.00 Total Savings: 694049.40 Plan 6: D (deposit amount) = $1100.00 m (periods per year) = 12.00 r (interest rate) = 0.0400 t (time in years) = 30.00 Total Savings: 763454.34 Plan 7: D (deposit amount) = $1200.00 m (periods per year) = 12.00 r (interest rate) = 0.0400 t (time in years) = 30.00

5

Total Savings: 832859.29 Plan 8: D (deposit amount) = $1300.00 m (periods per year) = 12.00 r (interest rate) = 0.0400 t (time in years) = 30.00 Total Savings: 902264.23 Plan 9: D (deposit amount) = $1400.00 m (periods per year) = 12.00 r (interest rate) = 0.0400 t (time in years) = 30.00 Total Savings: 971669.17

Hints • You can use the string type and string concatenation to write the required tostring() member function. For example, if I had variables x and y of type int and double, and I wanted to create a string from them to return, I could do something like

#include <string> using namespace std;

int x = 5; double y = 0.035 string s = “x (example int) = ” + to_string(x) + ‘\n’ + “y (example double) = ” + to_string(y) + ‘\n’; However, you cannot control the precision (number of decimal places shown)oftheoutputusingtheto_string()method. Iwillacceptthis, but if you want to get exactly the same output I showed in the correct output, you will need to use the string stream library <sstream>. This library allows you to create a stream, like the cout stream, but stream into a string. Thus you can use the io manipulator functions like setprecision() and fixed to format the decimal numbers. You can look at the starting template for many examples of using these I/O manipulators to format the output. • You should use the pow() function from <cmath> for calculating the

6

savings and planning the goal deposits functions. It might make it easier on you, and be more readable, to define something like:

// r is yearly rate, so amount if interest each period is // given by r/m double ratePerDeposit = r / m; // total number of deposits double numberOfDeposits = m * t; • Almost all of the code given in the template is commented out. You should start by only uncommenting the first line that creates an object using your constructor, this one:

// RetirementAccount account(100.00, 10.0, 0.035, 22.0); Get your constructor working first for your class. Then you should uncomment out the first line testing the get_D() getter method, etc. E.g. if you are not used to coding incrementally, try it out. Code only a single function and get it working before doing the next one. This is a type of test driven development.

Assignment Submission A MyLeoOnline submission folder has been created for this assignment. You should attach and upload your completed .cpp source file to the submission folder to complete this assignment.

Requirements and Grading Rubrics Program Execution, Output and Functional Requirements 1. Your program must compile, run and produce some sort of output to be graded. 0 if not satisfied. 2. 25 pts. The class must have the requested member variables. These member variables must be private. 3. 25 pts. The constructor is created and working correctly. 4. 10 pts. All setter and getter methods for the 4 member variables are implemented and work as asked for.

7

5. 10pts. YouhavecorrectlyimplementedthecalculateRetirementSavings() function, and it is calculating savings correctly. 6. 10pts. YouhavecorrectlyimplementedtheplanRetirementDeposits() function, and it it calculating goal deposits correctly. 7. 10 pts. You have correctly implemented the tostring() method. The method is returning a string (not sending directly to cout). 8. 2 pts. (bonus) You used <sstream> string streams, and have correctly formatted the string to have 2 or 4 decimal places as shown in correct output. 9. 5 pts. All output is correct and matches the correct example output. 10. 5pts. Followedclassstyleguidelines, especiallythosementionedbelow.

Program Style Your programs must conform to the style and formatting guidelines given for this class. The following is a list of the guidelines that are required for the assignment to be submitted this week.

1. Mostimportantly, makesureyoufigureouthowtosetyourindentation settings correctly. All programs must use 2 spaces for all indentation levels, and all indentation levels must be correctly indented. Also all tabsmustberemovedfromfiles,andonly2spacesusedforindentation. 2. A function header must be present for member functions you define. You must give a short description of the function, and document all of the input parameters to the function, as well as the return value and data type of the function if it returns a value for the member functions, just like for regular functions. However, setter and getter methods do not require function headers. 3. You should have a document header for your class. The class header document should give a description of the class. Also you should document all private member variables that the class manages in the class document header. 4. Do not include any statements (such as system(“pause”) or inputting a key from the user to continue) that are meant to keep the terminal from going away. Do not include any code that is specific to a single

8

operating system, such as the system(“pause”) which is Microsoft Windows specific.

(File need to be in ‘.cpp’. Use any C++ compilers but the code must be working.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now