Case Study: Appliance Warehouse Services Assignment Help

Case Study: Appliance Warehouse Services Assignment Help

 

Create a 3- to 4-page document (to submit in Blackboard) that includes the following:

  • Summary: Explain your overall approach to analyzing and addressing the needs of the new Appliance Warehouse Service Department. How did you ensure you met the implementation, integration, and maintenance needs of the new Appliance Warehouse Service Department business case?
  • Work Breakdown Structure (WBS): Design a WBS for the project of planning and implementing the new Service Department. Identify each task needed in order to implement the new Services Department. Include duration times. Refer to the Week 2 Discussion.
  • System Maintenance Plan: Include measures to implement corrective, adaptive, perfective, and preventive maintenance. Include recommendation to maintain the system either using in-house resources or to outsources it. Include pros and cons of both maintenance types.
  • Security Risks: Identify and explain potential security risks for the Service Department business case. Consider physical, network,application, file, user, and procedural types of security risks. Include the backup system method to be used.

 

Our system administrator was asking me about the security for SIM. You and I have not discussed this topic in depth. We need to do a risk assessment and look at all types of security issues: physical, network, application, file, user, and procedural.

Make a list of the security risks for all six security levels. We need to make sure that we don’t leave our new system vulnerable to attacks.

Also, what is the backup method to be used for SIM? Please explain why you’ve chosen this method.

 

As you well know, maintenance on any system is essential to fix mistakes, add enhancements, or maintain security. I was wondering what you were thinking for SIM’s ongoing maintenance plan. We are hoping that this system will last for the next 5 years. We will have to assume responsibility for maintenance if we build this system in-house. Do you think we should hire enough IT staff to maintain this system in-house or should we outsource it?

To help the company think this decision through, please make two lists for pros and cons of in-house maintenance vs. outsourced maintenance. Could you get this to me today?

 

Now that we have isolated the necessary features for an in-house built system, we need figure out if it will be economically feasible to build this software. Mae Roth has asked for the bottom-line numbers for this project. Not only do we need to tell her how much the system will cost to build, but she wants to know what the total cost of ownership would be if we use this system for the next 5 years. You will need give her the numbers in net present value. Since our IT team is unionized, their contract states that they will get a $3/hour raise each year for the next 5 years.

Assume that we will need 2 servers initially for this project. Also assume that we will have to replace these servers every two years.

In the spreadsheet that you create, show the initial build cost and the cost for years 2-5 of maintenance. Finally, give the NPV for the entire project.

After the cost feasibility is complete, Mae will finally decide between the pre-packaged software and an in-house build. Thanks for all your incredible work on this project!

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Linux Implementation Proposal: Client Response Memo Assignment Help

Faster Computing was impressed with your presentation. The company is interested in moving forward with the project, but the senior management team has responded to the presentation with the following questions and concerns:

(12.3.2: Describe the implementation of controls.)

  • How will security be implemented in the Linux systems—both workstations and servers?

(10.1.2: Gather project requirements to meet stakeholder needs.)

  • End users have expressed some concern about completing their day-to-day tasks on Linux. How would activities such as web browsing work? How would they work with their previous Microsoft Office files?

(12.4.1: Document how IT controls are monitored.)

  • The current Windows administrators are unsure about administering Linux systems. How are common tasks, such as process monitoring and management, handled in Linux? How does logging work? Do we have event logs like we do in Windows?

(2.3.2: Incorporate relevant evidence to support the position.)

  • Some folks in IT raised questions about the Linux flavor that was recommended. They would like to see comparisons between your recommendation and a couple of other popular options. What makes your recommendation the best option?

(10.1.3: Define the specifications of the required technologies.)

  • How does software installation work on Linux? Can we use existing Windows software?
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Network 206 Test homework help

Network 206 Test homework help

Question 1.1. (TCO 1) What additional information is contained in the 12-bit extended system ID of a BPDU? (Points : 6)

VLAN ID Host address MAC address Port ID

Question 2.2. (TCO 1) EIGRP is a _____. (Points : 6)

link-state routing protocol proprietary routing protocol protocol that works well in smaller networks statistical routing protocol

Question 3.3. (TCO 1) _____ is enabled by default. (Points : 6)

STP EtherChannel PortFast VLAN 100

Question 4.4. (TCO 2) How would you describe an EtherChannel implementation? (Points : 6)

EtherChannel supports between two to 10 separate links. It increases the chance of a spanning-tree loop. A trunked port can be part of an EtherChannel bundle. EtherChannel operates only at layer 2.

Question 5.5. (TCO 2) You have configured EtherChannel . Which command will display the group used? (Points : 6)

show interface port-channel3 show etherchannel summary show etherchannel port-channel show interface g0/1 etherchannel

Question 6.6. (TCO 2) The configuration of which other protocol can affect or cause problems with the EtherChannel configuration? (Points : 6)

LACP DTP STP DTP and STP

Question 7.7. (TCO 3) _____ is a global organization that certifies the interoperability of 802.11 products from different vendors. (Points : 6)

FCC IEEE ITU-R Wi-Fi Alliance

Question 8.8. (TCO 3) A(n) _____ is used in enterprise deployments to manage groups of lightweight access points (Points : 6)

access point RADIUS authentication server WLAN controller Wireless switch

Question 9.9. (TCO 3) Which technology is used to increase the available bandwidth for the wireless network? (Points : 6)

MIMO Mixed mode OFDM WPS

Question 10.10. (TCO 4) Which OSPF state is reached when the network has converged? (Points : 6)

Converge Exchange Full Two-Way

Question 11.11. (TCO 4) _____ is a link-state routing protocol. (Points : 6)

EIGRP OSPF RIPv2 RSTP

Question 12.12. (TCO 4) Why would OSPF routing protocol authentication be enabled on a network? (Points : 6)

To activate IPsec for IPv6 To share routing information with neighbors in a secure manner To block unauthorized access to the router To activate LACP

Question 1.1. (TCO 4) How might one describe OSPF type 5 LSAs? (Points : 6)

They are used to update routes between OSPF areas. They are called autonomous system external LSA entries. They are called router link entries. They are used where there is an elected DR in multi-access networks.

Question 2.2. (TCO 4) How might one describe OSPF type 3 LSAs? (Points : 6)

They are used to update routes between OSPF areas. They are called autonomous system external LSA entries. They are called router link entries. They are used where there is an elected DR in multi-access networks.

Question 3.3. (TCO 5) EIGRP _____ packets have a need for specific information. (Points : 6)

Hello Query Update Reply

Question 4.4. (TCO 5) The EIGRP hello packets are sent using the _____ protocol? (Points : 6)

TCP reliable RTP UDP unreliable RTP

Question 5.5. (TCO 5) What is a benefit of EIGRP? (Points : 6)

It is an open standard. Automatic route summarization of all routes Quickly adapts to alternate routes for rapid convergence It does not use loopback addresses.

Question 6.6. (TCO 5) A network engineer issues the maximum-paths command to configure load balancing in EIGRP. Which CLI mode is he in? (Points : 6)

Privileged mode Global configuration mode Router configuration mode Interface configuration mode

Question 7.7. (TCO 5) The quad zero static default route _____. (Points : 6)

is not used with EIGRP should be configured on the router facing the ISP is distributed for IPv6 with the redistribute IPv6 static command is represented as 0.0.0.0 255.255.0.0

Question 8.8. (TCO 5) _____ is also called the bit bucket. (Points : 6)

Loopback Link-Local Null0 interface EIGRP process link

Question 9.9. (TCO 6) On Cisco routers, where is the IOS stored? (Points : 6)

Flash memory NVRAM ROM tftp server

Question 10.10. (TCO 6) What is the tftp server used for? (Points : 6)

It allows for management of the router from a remote location. It is required for VPN connectivity for workers who must travel. It is used as a backup location for the IOS. It holds the IOS license agreement.

1. (TCO 1) Name the characteristics which would more likely be considered in purchasing an access layer switch, as compared to buying switches that operate at the other layers of the Cisco hierarchical design model. (Points : 14)

 

Question 2.2. (TCO 2) What is a benefit of using the channel-group 2 mode passive interface configuration command? (Points : 14)

 

Question 3.3. (TCO 3) Describe in detail the WiGig standard, in your own words. (Points : 14)

 

Question 4.4. (TCO 4) What is the criteria for selecting the OSPF router ID that uniquely identifies a router in an OSPF domain? Explain the process of selecting the router ID. (Points : 14)

 

1. (TCO 4) In your own words, list and describe the four steps to implementing multi-area OSPF. (Points : 14)

 

Question 2.2. (TCO 5) What are the three default EIGEP ADs with the source of route. List them in the order of preferred administrative distance with the best AD first. (Points : 14)

 

Question 3.3. (TCO 5) Write all the necessary commands to support MD5 authentication of the CHG_Secure keychain with a key string of Pep$R5. You must also include the IOS command prompts in front of the commands. Assume that you are already in global config mode. Rtr1(config) # (Points : 14)

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Agriculture Insurance Conference Assignment

Agriculture Insurance Conference Assignment

Vaccination Schedule

Think of vaccines as a coat of armor for your child. To keep it shiny and strong, you have to make sure your child’s immunizations are up to date. Timely vaccinations help to prevent disease and keep your family and the community healthy. Some immunizations are given in a single shot, while others require a series of shots over a period of time.

Vaccines for children and teenagers are listed alphabetically below with their routinely recommended ages. Missed doses will be assessed by your child’s physician and given if necessary. Keep a personal record of all immunizations and bring it with you to each office visit.

Name of Vaccine When It’s Recommended Total Doses

Inactivated poliovirus (IPV) At 2, 4, 6 months, and 4-6 years 4

Chickenpox (varicella) At 12 months and 4-6 years 2

Tetanus and diphtheria (Td) At 11-12 years 1

Diphtheria, tetanus, and pertussis (DTaP) At 2, 4, 6 and 12-15 months, and 4-6 years 5

Hepatitis A (HepA) At 12 and 18 months 3

Human papillomavirus (HPV) 3-dose series for girls at age 11-12 years 3

Pneumococcal conjugate (PCV) At 2, 4, 6, and 12 months 4

Live intranasal influenza Annually starting at age 2 years Annually

Inactivated influenza (flu shot) Annually starting at age 6 months Annually

Measles, mumps, and rubella (MMR) At 12 months and 4-6 years 2

Pneumococcal polysaccharide (PPSV) At 2, 4, 6, and 12 months 4

Haemophilus influenzae type b (Hib) At 2, 4, 6, and 12 months 4

Rotavirus (RV) At 2, 4, and 6 months 3

 

These recommendations are for generally healthy children and teenagers and are for information only. If your child has ongoing health problems, special health needs or risks, or if certain conditions run in your family, talk with your child’s physician. He or she may recommend additional vaccinations or schedules based on earlier immunizations and special health needs.

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Data Analytics Assignment

Data Analytics Assignment

3/18/2020 Solved: A local beer producer sells two types of beer, a regula… | Chegg.com

https://www.chegg.com/homework-help/business-analytics-5th-edition-chapter-4-problem-8p-solution-9781285965529?trackid=f19d957256bc&stracki… 1/4

home / study / math / statistics and probability / statistics and probability solutions manuals / business analytics / 5th edition / chapter 4 / problem 8p

Business Analytics (5th Edition) See this solution in the app

Problem

A local beer producer sells two types of beer, a regular brand and a light brand with 30% fewer calories. The company’s marketing department wants to verify that its traditional approach of appealing to local whitecollar workers with light beer commercials and appealing to local blue- collar workers with regular beer commercials is indeed a good strategy. A randomly selected group of 400 local workers are questioned about their beer-drinking preferences, and the data in the file P04_08.xlsx are obtained.

a. If a blue-collar worker is chosen at random from this group, what is the probability that he/she prefers light beer (to regular beer or no beer at all)?

b. If a white-collar worker is chosen at random from this group, what is the probability that he/she prefers light beer (to regular beer or no beer at all)?

c. If you restrict your attention to workers who like to drink beer, what is the probability that a randomly selected blue-collar worker prefers to drink light beer?

d. If you restrict your attention to workers who like to drink beer, what is the probability that a randomly selected white-collar worker prefers to drink light beer?

e. Does the company’s marketing strategy appear to be appropriate? Explain why or why not.

Step-by-step solution

The data for survey of local workers with regard to beer-drinking preferences is given below.

Comment

Here ‘W’ denotes white-collar workers and ‘B’ denotes blue-collar worker in ‘Type’ column. In ‘Preference’ column, ‘L’ denotes those workers who prefer to drink light beer, ‘R’ denotes those workers who prefer to drink regular beer and ‘N’ denotes those workers who prefer not to drink beer.

Comment

Step 1 of 8

Step 2 of 8

My Textbook Solutions

Business Analytics 5th Edition

Business Analytics 5th Edition

Business Analytics:… 5th Edition

View all solutions

Post a question Answers from our experts for your tough homework questions

Enter question

Continue to post 20 questions remaining

Statistics Chegg tutors who can help right now

Ashish Indian Institute of F… 185

Varun Université de Genève 59

Fabio Scuola Normale Su… 38

Find me a tutor

1 Bookmark Show all steps:Chapter 4, Problem 8P ON

  Textbook Solutions Expert Q&A Study Pack Practice NEW!

Search 

 

 

3/18/2020 Solved: A local beer producer sells two types of beer, a regula… | Chegg.com

https://www.chegg.com/homework-help/business-analytics-5th-edition-chapter-4-problem-8p-solution-9781285965529?trackid=f19d957256bc&stracki… 2/4

A pivot table has been created to show the counts of worker type for different drinking preferences of workers where the total number of workers surveyed is 400. The screenshot of the pivot table is given below.

Comment

a. From the pivot table given above the number of blue collar workers that prefer light beer is 111 and the total number of blue collar workers is 250. So the probability E of a randomly chosen blue collar worker that prefers light beer is given by,

Comment

b. From the pivot table given above the number of white collar workers that prefer light beer is 79 and the total number of white collar workers is 150. So the probability F of a randomly chosen white collar worker that prefers light beer is given by,

Comment

c. From the pivot table given above the number of blue collar workers that prefer light beer is 111 and the number of worker that drink beer is 371. So the probability G of a randomly chosen beer drinking worker being a blue collar worker that prefers light beer is given by,

Step 3 of 8

Step 4 of 8

Step 5 of 8

Step 6 of 8

1 Bookmark Show all steps:Chapter 4, Problem 8P ON

  Textbook Solutions Expert Q&A Study Pack Practice NEW!

Search 

 

 

3/18/2020 Solved: A local beer producer sells two types of beer, a regula… | Chegg.com

https://www.chegg.com/homework-help/business-analytics-5th-edition-chapter-4-problem-8p-solution-9781285965529?trackid=f19d957256bc&stracki… 3/4

Recommended solutions for you in Chapter 4

Was this solution helpful?

Comments (3)

d. From the pivot table given above the number of white collar workers that prefer light beer is 79 and the number of worker that drink beer is 371. So the probability H of a randomly chosen beer drinking worker being a white collar worker that prefers light beer is given by,

Comments (2)

e. The company’s marketing strategy to target blue collar workers who drink regular beer and white collar worker who drink light beer is most appropriate, since these two type of workers comprise the largest segment in their two respective subgroups.

Comment

Step 7 of 8

Step 8 of 8

10 0

Chapter 4, Problem 28P

Consider the probability distribution of the weekly demand for copier paper (in hundreds of reams) used in a corporation’s duplicating center, as shown in the file P04_27.xlsx. a. Use simulation to generate 500 values of this random…

See solution

Chapter 4, Problem 3P

The publisher of a popular financial periodical has decided to undertake a campaign in an effort to attract new subscribers. Market research analysts in this company believe that there is a 1 in 4 chance that the increase in the number of new…

See solution

ABOUT CHEGG

LEGAL & POLICIES

CHEGG PRODUCTS AND SERVICES

CHEGG NETWORK

CUSTOMER SERVICE

1 Bookmark Show all steps:Chapter 4, Problem 8P ON

  Textbook Solutions Expert Q&A Study Pack Practice NEW!

Search 

 

 

3/18/2020 Solved: A local beer producer sells two types of beer, a regula… | Chegg.com

https://www.chegg.com/homework-help/business-analytics-5th-edition-chapter-4-problem-8p-solution-9781285965529?trackid=f19d957256bc&stracki… 4/4

 

© 2003-2020 Chegg Inc. All rights reserved. 1 Bookmark Show all steps:Chapter 4, Problem 8P ON

  Textbook Solutions Expert Q&A Study Pack Practice NEW!

Search 

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Exp19_Word_Ch03_HOEAssessment_Radio Assignment

Exp19_Word_Ch03_HOEAssessment_Radio Assignment

Exp19_Word_Ch03_HOEAssessment_Radio

 

Project Description:

You work with the Radio Advertisers Federation to promote the use of radio advertising. In this document, you provide a summary of research related to the weekly reach of various media sources, including tables describing the reach as well as the weekly hours most households spend with those sources. The summary will be distributed to various local advertisers as part of a mail merge process.

 

Start   Word. Download and open the file named Exp19_Word_Ch03_HOEAssessment_Radio.docx. Grader has automatically added   your last name to the beginning of the filename.

 

Ensure that Ruler is shown and   that nonprinting characters are displayed. Move to the last page of the   document and type the following, beginning in the first cell of the blank row   at the bottom of the table:
24 RA Tablet 78.1

 

Move to the second blank   paragraph following the table. Draw a table approximately 6 inches wide and 3   1/2 inches tall. Draw one vertical grid line at approximately 3 inches from   the left to create two columns. Draw 5 horizontal grid lines to divide the   table into 6 approximately evenly spaced rows of about 1/2 inch each. Rows do   not have to be precisely spaced as you will distribute them later.

 

Erase the vertical gridline in the first row, so that the row includes only   one column. Ensure the insertion point is located in the first row and type Table 2 –   Weekly Hours (Average Watch or Listen Time). (Ensure that a space precedes   and follows the hyphen and do not type the period.) Press TAB and complete   the table as follows (do not press TAB at the end of the last entry):
Radio 25.7
TV 21.5
Smartphone 18.3
PC 10.7
Tablet 7.7

 

Select Table 2 and change the   font size of all text to 12 pt. Apply bold formatting to the first row in   Table 2. Delete the Category column in the first table. Insert a row above   the first row in Table 1 and type Table 1 – Weekly Reach of Media. (Ensure that a space precedes   and follows the hyphen and do not type the period.)

 

In Table 1, insert a row between   Hub and Insight. Type the following in the new row, ensuring that the new   entry is in Times New Roman, 12 pt.
Nielsen Smartphone  142.3

 

In Table 2, insert a blank row   above row 2. Type Source in the first cell of the new row and type Hours in the second cell. Apply bold   formatting to both cells. Select Table 2, ensure that the Table Tools Layout   tab is selected, and click Distribute Rows.

 

Select cells in the first column   of Table 1, from row 2 through the end of the table. Ensure that you do not   include text from row 1. Split the cells, making sure to deselect Merge cells before split. Type Source in cell 2 of row 2 in Table 1.   Complete the remaining cells in the second column as follows. (Type only   those shown in column 2 of the list below.)
PPM  30
Hub 87
Neilsen 82
Insight 26
RA 12

 

Insert a row below the last row   in Table 1. In the third column of the new row, type Total. Apply bold formatting to the   word Total and apply Align Center   Right alignment. In the next cell on the same row, enter a formula to sum all   cells in the column above. You do not need to select a number format.

 

Sort the rows containing media   sources in Table 1 (rows 3-7) by Column 3 in ascending order so that the   media sources are shown in alphabetical order. Do not include the heading   rows or the total row in the sort.

 

Insert a column to the right of   the last column in Table 1 and type Percentage of Total in the second row of the new   column. In the third row of the last column, type a formula that divides the   Households Reached value in the cell to the left by the Total in the last row   and then multiplies by 100 to convert the result to a percentage. The formula   is =d3/d8*100. Select a number format of   0.00%.

 

Include a formula in each cell   in the Percentage of Total column except for the last cell (on the Total   row), adjusting cell references in each formula to reflect the current row.   Apply Align Center alignment to all numeric entries in the last two columns.

 

Merge all cells in the first row   of Table 1 and ensure that the text is centered. Change the number of   households reached by TV to 197.5. Update the field in the last row of that column (the total) and   also update all fields in the last column to reflect that change.

 

At the first blank paragraph at   the beginning of the second page, insert text from Radio_Statistics.docx. In Table 1, apply a style of Grid Table 4   – Accent 3 (row 4, column 4 under Grid Tables). Deselect First Column in the   Table Style Options group to remove bold formatting from the first column.   Bold all cells in row 2 and apply Align Center alignment.

 

Center both tables horizontally   on the page. Select Table 2. Select a border style of Double solid lines, ½   pt, Accent 3 (row 3, column 4). Apply the border style to all borders.

 

Select row 1 of Table 2 and   apply a custom shading color of Red – 137, Green – 121, and Blue – 139.   Change the font color of all text in row 1 to White, Background 1 and ensure   that it is bold. Shade all remaining rows, including those on page 3, in Light   Gray, Background 2. Change the Pen Color to Black, Text 1, and drag the   border dividing row 1 from row 2 in Table 2.

 

Select the first two rows of   Table 2 and repeat the header rows so that they display at the top of the   table section that is currently shown on page 3. Include a caption below   Table 1 with the text Table 1: Household   Reach of Media Sources. (Do not type the period and ensure that a space follows the   colon.) Include a caption below Table 2 with the text Table 2: Average Weekly Hours. (Do not type the period and   ensure that a space follows the colon.) Modify the Caption style to include   center alignment with bold, italicized text.

 

Move to the end of the document   and press ENTER. Insert text from Ratings_Sources.docx.   Select all text from Ratings Source   to http://www.rainc.com. Whether   you select the paragraph mark following the URL is irrelevant; however, do   not select the blank paragraph on the following line. Convert the selected   text to a table, accepting all default settings. Apply a table style of Grid,   Table 4 (row 4, column 1 under Grid Tables) and add a caption below the new   table as Table 3: Major   Ratings Sources.   (Do not type a period.)

 

Begin a mail merge procedure,   selecting the Access database Source   Ratings.accdb as a recipient list. Note Mac users, select the text file Source Ratings.txt as a recipient   list.
Edit the recipient list to add the following record and respond affirmatively   when asked to update the recipient list:
Source ID  Company Guild Member
B9111 Insight False

 

Filter the recipient list to   select only those with a value of False in the Guild Member column. Replace [Company Name] in the last body paragraph on page 2 with the   merge field of Company. Be sure to   include the brackets in the text to be replaced.

 

Preview results and then finish   the merge, editing individual documents and merging all. Press CTRL+A to   select all of the merged document and copy the selection. Display Exp19_Word_Ch03_HOEAssessment_Radio,   move the insertion point to the end of the document (after the last caption)   and insert a page break. Paste all copied text, resulting in a 7-page   document

 

Save and close Exp19_Word_Ch03_HOEAssessment_Radio.docx. Close all other open documents without   saving. Submit   Exp19_Word_Ch03_HOEAssessment_Radio.docx as directed.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Create A Step-By-Step IT Security Policy For Handling User Accounts/Rights For A Student Who Is Leaving Prematurely

Computer Science homework help

Computer Security Fundamentals

by Chuck Easttom

 

Chapter 10 Security Policies

*

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Chapter 10 Objectives

  • Recognize the importance of security policies
  • Understand the various policies and the rationale for them
  • Know what elements go into good policies
  • Create policies for network administration
  • Evaluate and improve existing policies

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Explain what cyber terrorism is and how it has been used in some actual cases.

Understand the basics of information warfare.

Have a working knowledge of some plausible cyber terrorism scenarios.

Have an appreciation for the dangers posed by cyber terrorism.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Introduction

  • Technology by itself cannot solve all network security problems.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Cyber terrorism, according to the definition of the FBI:

Premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents.

Typically, loss of life in a cyber attack would be less than in a bombing attack.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Introduction (cont.)

  • Virus software won’t prevent a user from manually opening an attachment and releasing a virus.
  • A technologically secured network is still vulnerable if former employees (perhaps some unhappy with the company) still have working passwords. Or if passwords are simply put on Post-it notes on computer monitors.
  • A server is not secure if it is in a room that nearly everyone in the company has access to.
  • Your network is not secure if end users are vulnerable to social engineering.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

What Is a Policy?

  • A security policy is a document that defines how an organization deals with some aspect of security. There can be policies regarding end-user behavior, IT response to incidents, or policies for specific issues and incidents.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Defining User Policies

  • Passwords
  • Internet use
  • E-mail attachments
  • Installing/uninstalling software
  • Instant messaging
  • Desktop configuration

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

System Admin Policies

  • New Employees
  • Departing Employees
  • Change Control
  • Access Control

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Other Issues

  • Bring Your Own Device
  • A major concern in the modern network
  • New Employees
  • Departing Employees

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Bring your own device (BYOD) has become a significant issue for most organizations. Most, if not all, of your employees will have their own smart phones, tablets, smart watches, and Fitbits that they will carry with them into the workplace. When they connect to your wireless network, this introduces a host of new security concerns. You have no idea what networks that device previously connected to, what software was installed on them, or what data might be exfiltrated by these personal devices.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Change Management

  • RFC
  • CAB
  • Follow-up

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Software Development Policies

  • Security standards
  • Testing

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Incident Response Policies

  • Handling viruses
  • Dealing with breaches

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Data Classification

  • Public
  • Secure

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

BCP and DRP

  • DRP
  • BCP
  • BIA

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Fault Tolerance

  • Backups
  • Full: All changes
  • Differential: All changes since last full backup
  • Incremental: All changes since last backup of any type
  • RAID

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Relevant Laws & Regulations

  • HIPAA
  • Sarbanes-Oxley
  • PCI

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Summary

  • In this chapter, you learned the technology is not enough to ensure a secure network. You must have clear and specific policies detailing procedures on your network. Those policies must cover employee computer resource use, new employees, outgoing employees, access rights, how to respond to an emergency, and even how secure code in applications and websites is.
  • User policies must cover all aspects of how the user is expected to use company technology. In some cases, such as instant messaging and web use, policies may be difficult to enforce, but that does not change that they must still be in place. If your user policies fail to cover a particular area of technology use, then you will have difficulty taking any action against any employee who performs that particular misuse.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

 

*

 

*

Explain what cyber terrorism is and how it has been used in some actual cases.

Understand the basics of information warfare.

Have a working knowledge of some plausible cyber terrorism scenarios.

Have an appreciation for the dangers posed by cyber terrorism.

*

Cyber terrorism, according to the definition of the FBI:

Premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents.

Typically, loss of life in a cyber attack would be less than in a bombing attack.

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

*

Bring your own device (BYOD) has become a significant issue for most organizations. Most, if not all, of your employees will have their own smart phones, tablets, smart watches, and Fitbits that they will carry with them into the workplace. When they connect to your wireless network, this introduces a host of new security concerns. You have no idea what networks that device previously connected to, what software was installed on them, or what data might be exfiltrated by these personal devices.

*

 

*

 

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

*

 

*

 

*

 

*

 

*

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Non-Deterministic Finite Automata

1. Construct an nfa that accepts all integer numbers in C. Explain why your construct is an nfa.

2. Prove in detail the claim made in the previous section that if in a transition graph there is a walk

labeled w, there must be some walk labeled w of length no more than Λ + (1 + Λ) |w|.

3. Find a dfa that accepts the language defined by the nfa in Figure 2.8.

4. Convert the nfa in Exercise 13, Section 2.2, into an equivalent dfa.

 

 

5. Convert the nfa defined by

δ(q0,a)δ(q1,b)δ(q2,a)==={q0,q1}{q1,q2}{q2}δ(q0,a)={q0,q1}δ(q1,b)={q1,q2}δ(q2,a)={q2}

with initial state q0 and final state q2 into an equivalent dfa.

6. Is it true that for every nfa M = (Q, Σ, δ, q0, F), the complement of L (M) is equal to the set {w ∈ Σ* : δ*

(q0, w) ∩ (Q − F) ≠ ∅}? If so, prove it; if not, give a counterexample.

7. Prove that for every nfa with an arbitrary number of final states there is an equivalent nfa with only one final state. Can we make a similar claim for dfa’s?

8. Consider the dfa with initial state q0, final state q2 and δ(q0,a)=q2δ(q1,a)=q2δ(q2,a)=q3δ(q3,a)=q3δ(q0,b)=q2δ(q1,b)=q2δ(q2,b)=q3δ(q3,b)=q1δ(q0,a)=q2δ(q0,b)=q2δ (q1,a)=q2δ(q1,b)=q2δ(q2,a)=q3δ(q2,b)=q3δ(q3,a)=q3δ(q3,b)=q1 Find a minimal equivalent dfa.

9. Minimize the number of states in the dfa in Figure 2.16.

 

THEOREM 2.2 Let L be the language accepted by a nondeterministic finite accepter MN = (QN, Σ, δN, q0, FN). Then there exists a deterministic finite accepter MD = (QD, Σ, δD, {q0}, FD) such that L = L (MD).

10. Use the construction of Theorem 2.2 to convert the nfa in Figure 2.10 to a dfa. Can you see a simpler answer more directly?

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

CGS 1000 – Intro To Computers Tech.- Project Assignments Help

For this project, you will use all four of the Microsoft Office applications to create a unified project on a single topic.

 

Project Topic

You may select any topic that is of interest to you. The course instructor must approve your topic before you begin working on it–be sure to obtain his/her permission sooner rather than later. Remember that your project will cover ONE topic. You will use ALL of the Office applications to create content related to your chosen topic.

Some examples of past project topics include:

• develop a business
• highlight attending HCC
• your favorite sports team
• your favorite sport
• dream car
• moving out on your own
• researching your planned career
• planning a vacation
• planning a wedding
• highlight your native country or culture
• your passion in life, etc.

Project Minimum Requirements

The minimum requirements for each of the four applications are detailed in the checklists below.

1. Each application component is valued at 65pts.
2.There are 40 points (10 pts each application) allocated for professionalism, effort, and creativity.

  • Professionalism is assessed in evaluation of proper use of the required skills (e.g. competent in tables), grammar, spelling, and overall appearance.
  • Effort is assessed in whether or not the presentation exceeded the minimum requirements
    • Students who meet only the minimum requirements for each software application may not receive the 40 points for professionalism, effort, and creativity.
  • Creativity is demonstrated by applying the software skills acquired during the term.
  • Creativity is measured in various ways, including:
    • applying additional skills covered in the course but not listed as a minimum requirement,
    • adding additional graphics or pictures,
    • applying varying color schemes,
    • creative formatting of the Excel chart,
    • using various design backgrounds with presentation slides,
    • creating your own slide background instead of using a design template,
    • adding a border to the Microsoft Word document component,
    • graphically editing pictures and other graphics,
    • adding external sounds or movie clip in the PowerPoint component, etc.

3. This project must be an original creation, not a copy ‘n paste from this semester’s assignments. All rules concerning Academic Dishonesty and Plagiarism will be strictly enforced.

4. The project must be based on your original work.

For the Face pictures, Insert a black picture in that section, and i’ll change it once done. And for lastname titles,  just type “lastname” so that i know and change it aswell when done.

Please open the file i attached, and follow the steps numbers for each Microsoft (Access, Excel, Powerpoint, Word)

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Java Project Assignment Help

Java Project Assignment Help

IT 511 Final Project Guidelines and Rubric

Overview The final project for this course is the creation of a collection manager program. The project is divided into two milestones, which will be submitted at various

points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Five and Seven. The final

product will be submitted in Module Nine.

Substantial software projects are often developed and implemented by utilizing accepted software engineering principles like modularity, encapsulation, and reusability. Throughout this course, you have learned the concepts and processes involved in the development of object-oriented programs. Following established object-oriented principles when writing a program results in modular solutions composed of well-formed classes that can be extended and reused, culminating in an enduring program that solves a problem. In this final project, you will create a basic program that will help you manage a collection of items that needs to be organized and managed. Your program must meet the requirements of the provided scenario. The creation of this program demonstrates your competency in the use of fundamental data types and more complex data structures and the creation of methods that utilize typical algorithmic control structures, object instantiation, and class definition. In order to make your program enduring, you will be adding inline comments directed toward software engineers about design decisions to facilitate the program’s ongoing maintenance, along with generating application programming interface (API) documentation for your programmatic solution that will be directed toward other software developers. This assessment addresses the following course outcomes:

 Employ suitable data types in object-oriented programs for addressing specific program requirements

 Apply algorithms using appropriate control structures for solving computational problems

 Implement methods that accept parameters and return expected results for addressing given program requirements

 Construct classes with relevant object attributes and behaviors for developing modular, object-oriented solutions

 Utilize appropriate documentation techniques for articulating the purpose and behavior of object-oriented code to specific audiences

Scenario You will create a program that will help you manage a collection of recipes. You will implement three classes: one for the main recipe items, one for the ingredients that are part of the recipe, and one for the entire collection of recipes. The collection should use a list data structure to store the individual items. Your collection class should include methods like addItem(), printItem(), and deleteItem() that allow you to add, print, or delete items from your collection of items.

 

 

Your Ingredient class will model the items that will be stored in each recipe in your collection. You will give it some basic attributes (of numeric or string types) and some basic methods (accessors/mutators, printItemDetails(), etc.). Your Recipe class will start off similar to your Ingredient class, but you will increase its functionality by modifying it to accept the Ingredient objects, containing all the details stored in an Ingredient class object. You will also expand the Recipe class by adding recipe-specific methods to your Recipe class.

The basic, foundational elements are shown in the following Unified Modeling Language (UML) diagram for the required classes:

UML Overview

Ingredient

 

Recipe

 

RecipeBox

– String nameOfIngredient – recipeName: String – listOfRecipes: ArrayList

– float numberCups; – servings: int + getListOfRecipes(): ArrayList – int numberCaloriesPerCup – recipeIngredients: ArrayList + setListOfRecipes(ArrayList): void – double totalCalories – totalRecipeCalories: double + RecipeBox(): void

+ getNameOfIngredient(): String + getRecipeName(): String + RecipeBox(ArrayList): void + setNameOfIngredient(String) : void + setRecipeName(String): void + printAllRecipeDetails(String): void + getNumberCups(): float + getServings(): int + printAllRecipeNames(): void + setNumberCups(float): void + setServings(int): void + addNewRecipe(): void

+ getNumberCaloriesPerCup(): int + getRecipeIngredients(): ArrayList + setNumberCaloriesPerCup(int): void + setRecipeIngredients(ArrayList): void + getTotalCalories(): double + getTotalRecipeCalories(): double + setTotalCalories(double): void + setTotalRecipeCalories(double): void + addIngredient(String): Ingredient + printRecipe(): void

+ addNewRecipe(): Recipe

Finally, you will also write an application driver class that should allow the user to create a new recipe and add it to the collection. In addition, it should allow the user to see a list of items in the collection and then give the user an option to either see more information about a particular item (by retrieving it from the collection) or edit an item that is already in the collection. Finally, your program should allow the user to delete an item from the collection. Moreover, you will add documentation to the application that will contain inline comments explaining your design decisions as well as documentation comments that will be used to generate API documentation for your programmatic solution for other software developers. To prepare for the final project, you will complete a series of six stepping stone assignments and two final project milestones that will help you learn the coding skills required for the project. Separate documentation for these assignments is included in the course resources.

 

contains contains

 

 

 

Prompt You have been tasked with developing a complete, modular, object-oriented program that will allow for the management of a collection. The scenario provided to you outlines all of the program’s requirements. Refer to the provided scenario to make the determinations for all data types, algorithms and control structures, methods, and classes used in your program. Your final submission should be a self-contained, fully functional program that includes all necessary supporting classes. Furthermore, you must provide inline comments in your program design that software engineers would be able to utilize for the ongoing maintenance of your program. Your programmatic solution should also be communicated through application programming interface (API) documentation to other programmers. Specifically, the following critical elements must be addressed:

I. Data Types: Your final program should properly employ each of the following data types that meet the scenario’s requirements where necessary:

A. Utilize numerical data types that represent quantitative values for variables and attributes in your program.

B. Utilize strings that represent a sequence of characters needed as a value in your program.

C. Populate a list or array that allows the management of a set of values as a single unit in your program.

D. Utilize inline comments directed toward software engineers for the ongoing maintenance of your program that explain your choices of data

types you selected for your program.

II. Algorithms and Control Structure: Your final program should properly employ each of the following control structures as required or defined by the

scenario where necessary:

A. Utilize expressions or statements that carry out appropriate actions or that make appropriate changes to your program’s state as represented in

your program’s variables.

B. Employ the appropriate conditional control structures that enable choosing between options in your program.

C. Utilize iterative control structures that repeat actions as needed to achieve the program’s goal.

D. Utilize inline comments directed toward software engineers for the ongoing maintenance of your program that explain how your use of

algorithms and control structures appropriately addresses the scenario’s information management problem.

 

III. Methods: Your final program should properly employ each of the following aspects of method definition as determined by the scenario’s requirements

where necessary:

A. Use formal parameters that provide local variables in a function’s definition.

B. Use actual parameters that send data as arguments in function calls.

C. Create both value-returning and void functions to be parts of expressions or stand-alone statements in your program.

D. Create unit tests that ensure validity of the methods.

E. Invoke methods that access the services provided by an object.

F. Employ user-defined methods that provide custom services for an object.

 

 

G. Utilize inline comments directed toward software engineers for the ongoing maintenance of your program that explain the purpose of the

methods you implemented in your program.

IV. Classes: Construct classes for your program that include the following as required by the scenario where necessary:

A. Include attributes that allow for encapsulation and information hiding in your program.

B. Include appropriate methods that provide an object’s behaviors.

C. Create a driver class that instantiates objects for testing the constructed classes.

D. Utilize inline comments directed toward software engineers for the ongoing maintenance of your program that explain the decisions you made

in the construction of the classes in your program.

 

V. Produce reference documentation that communicates your application programming interface (API) to other programmers, using a documentation

generator (Javadoc, Doxygen, etc.).

 

Milestones Milestone One: Ingredient Class

In Module Five, you will create a complete class based on Stepping Stone Labs Two and Three and provide it the basic attributes with the appropriate data types. Additionally, you will add code to validate the data type of the user input. This class will be modified for the submission of your final project application; however, it should be functional code that accepts user input for each variable. This milestone will be graded with the Milestone One Rubric.

Milestone Two: Recipe Class

In Module Seven, you will focus your skills finalizing your final project code by submitting a class complete with accessor/mutator, constructor, and “custom”

programmer-defined methods. This milestone will be graded with the Milestone Two Rubric.

 

Final Submission: Collection Manager Program

In Module Nine, you will submit your final project. It should be a complete, polished artifact containing all of the critical elements of the final product. It should

reflect the incorporation of feedback gained throughout the course. This submission will be graded with the Final Project Rubric.

 

Final Project Rubric Guidelines for Submission: Your complete program should be submitted as a zip file of the exported project and the reference documentation from your documentation generator.

 

 

 

Critical Elements Exemplary Proficient Needs Improvement Not Evident Value

Data Types: Numerical

Utilizes numerical data types that represent quantitative values for variables and attributes in the program, meeting the scenario’s requirements (100%)

Utilizes numerical data types that represent quantitative values for variables and attributes in the program, but use of data types is incomplete or illogical, contains inaccuracies, or lacks accordance with the scenario’s requirements (70%)

Does not utilize numerical data types that represent quantitative values for variables and attributes in the program (0%)

6.34

Data Types: Strings

Utilizes strings that represent a sequence of characters needed as a value in the program, meeting the scenario’s requirements (100%)

Utilizes strings that represent a sequence of characters needed as a value in the program, but use of strings is incomplete or illogical, contains inaccuracies, or lacks accordance with the scenario’s requirements (70%)

Does not utilize strings that represent a sequence of characters needed as a value in the program (0%)

6.34

Data Types: List or Array

Populates a list or array that allows the management of a set of values as a single unit in the program, meeting the scenario’s requirements (100%)

Populates a list or array that allows the management of a set of values as a single unit in the program, but population is incomplete or illogical, contains inaccuracies, or lacks accordance with the scenario’s requirements (70%)

Does not populate a list or array that allows the management of a set of values as a single unit in the program (0%)

6.34

Data Types: Inline Comments

Meets “Proficient” criteria and inline comments demonstrate an insightful awareness of adapting documentation techniques to specific audiences (100%)

Utilizes inline comments directed toward software engineers for the ongoing maintenance of the program that explain the choices of data types selected for the program (90%)

Utilizes inline comments that explain the choices of data types selected for the program, but inline comments are incomplete or illogical, contain inaccuracies, or lack applicability toward software engineers for the ongoing maintenance of the program (70%)

Does not utilize inline comments that explain the choices of data types selected for the program (0%)

3.8

 

 

Algorithms and

Control Structures:

Expressions or Statements

Utilizes expressions or statements that carry out appropriate actions or that make appropriate changes to the program’s state as represented in the program’s variables and meet the scenario’s requirements (100%)

Utilizes expressions or statements that carry out actions or that make changes to the program’s state as represented in the program’s variables, but use of expressions or statements incomplete or illogical, contains inaccuracies, or lacks accordance with the scenario’s requirements (70%)

Does not utilize expressions or statements that carry out actions or that make changes to the program’s state as represented in the program’s variables (0%)

6.34

Algorithms and Control

Structures: Conditional

Control Structures

Employs the appropriate conditional control structures, as the scenario defines, that enable choosing between options in the program (100%)

Employs the conditional control structures that enable choosing between options in the program, but use of conditional control structures is incomplete or illogical, contains inaccuracies, or lacks accordance with the scenario’s definition (70%)

Does not employ the conditional control structures that enable choosing between options in the program (0%)

6.34

Algorithms and Control

Structures: Iterative Control

Structures

Utilizes iterative control structures that repeat actions as needed to achieve the program’s goal as required by the scenario (100%)

Utilizes iterative control structures that repeat actions to achieve the program’s goal, but use of iterative control structures is incomplete or illogical, contains inaccuracies, or lacks accordance with the scenario’s requirements (70%)

Does not utilize iterative control structures that repeat actions to achieve the program’s goal (0%)

6.34

Algorithms and Control

Structures: Inline Comments

Meets “Proficient” criteria and inline comments demonstrate an insightful awareness of adapting documentation techniques for specific audiences (100%)

Utilizes inline comments directed toward software engineers for the ongoing maintenance of the program that explain how the use of algorithms and control structures appropriately addresses the scenario’s information management problem (90%)

Utilizes inline comments that explain how the use of algorithms and control structures addresses the scenario’s information management problem, but inline comments are incomplete or illogical, contain inaccuracies, or lack applicability toward software engineers for the ongoing maintenance of the program (70%)

Does not utilize inline comments that explain how the use of algorithms and control structures addresses the scenario’s information management problem (0%)

3.8

 

 

Methods: Formal

Parameters Uses formal parameters that

provide local variables in a function’s definition as determined by the scenario’s requirements (100%)

Uses formal parameters that provide local variables in a function’s definition, but use of formal parameters is incomplete or illogical, contains inaccuracies, or lacks accordance with the scenario’s requirements (70%)

Does not use formal parameters that provide local variables in a function’s definition (0%)

3.17

Methods: Actual Parameters

Uses actual parameters that send data as arguments in function calls as determined by the scenario’s requirements (100%)

Uses actual parameters that send data as arguments in function calls, but use of actual parameters is incomplete or illogical, contains inaccuracies, or lacks accordance with the scenario’s requirements (70%)

Does not use actual parameters that send data as arguments in function calls (0%)

3.17

Methods: Value- Returning and Void Functions

Creates both value-returning and void functions to be parts of expressions or stand-alone statements in the program as determined by the scenario’s requirements (100%)

Creates both value-returning and void functions to be parts of expressions or stand-alone statements in the program, but functions are incomplete or illogical, contain inaccuracies, or lack accordance with the scenario’s requirements (70%)

Does not create both value- returning and void functions to be parts of expressions or stand- alone statements in the program (0%)

3.17

Methods: Unit Tests

Creates unit tests that ensure validity of the methods as required by the scenario (100%)

Creates unit tests that ensure validity of the methods, but unit tests are incomplete or illogical, contain inaccuracies, or lack accordance with the scenario’s requirements (70%)

Does not create unit tests that ensure validity of the methods (0%)

3.17

Methods: Access Services Provided

Invokes methods that access the services provided by an object as required by the scenario (100%)

Invokes methods that access the services provided by an object, but called methods are incomplete or illogical, contain inaccuracies, or lack accordance with the scenario’s requirements (70%)

Does not invoke methods that access the services provided by an object (0%)

3.17

 

 

Methods: User-

Defined Methods Employs user-defined methods

that provide custom services for an object as specified in the program requirements (100%)

Employs user-defined methods that provide custom services for an object, but use of user-defined methods is incomplete or illogical, contains inaccuracies, or lacks accordance with the specifications in the program requirements (70%)

Does not employ user-defined methods that provide custom services for an object (0%)

3.17

Methods: Inline Comments

Meets “Proficient” criteria and inline comments demonstrate an insightful awareness of adapting documentation techniques to specific audiences (100%)

Utilizes inline comments directed toward software engineers for the ongoing maintenance of the program that explain the purpose of the methods implemented in the program (90%)

Utilizes inline comments that explain the purpose of the methods implemented in the program, but inline comments are incomplete or illogical, contain inaccuracies, or lack applicability toward software engineers for the ongoing maintenance of the program (70%)

Does not utilize inline comments that explain the purpose of the methods implemented in the program (0%)

3.8

Classes: Attributes

Includes attributes, as required by the scenario, that allow for encapsulation and information hiding in the program (100%)

Includes attributes that allow for encapsulation and information hiding in the program, but inclusion is incomplete or illogical, contains inaccuracies, or lacks accordance with the scenario’s requirements (70%)

Does not include attributes that allow for encapsulation and information hiding in the program (0%)

6.34

Classes: Behaviors

Includes appropriate methods that provide an object’s behaviors, as required by the scenario (100%)

Includes methods that provide an object’s behaviors, but inclusion of methods is incomplete or illogical, contains inaccuracies, or lacks accordance with the scenario’s requirements (70%)

Does not include methods that provide an object’s behaviors (0%)

6.34

Classes: Driver Class

Creates a driver class that instantiates objects for testing the constructed classes as specified in the scenario (100%)

Creates a driver class that instantiates objects for testing the constructed classes, but driver class is incomplete or illogical, contains inaccuracies, or lacks accordance with specifications in the scenario (70%)

Does not create a driver class that instantiates objects for testing the constructed classes (0%)

6.34

 

 

Classes: Inline

Comments Meets “Proficient” criteria and inline comments demonstrate an insightful awareness of adapting documentation techniques to specific audiences (100%)

Utilizes inline comments directed toward software engineers for the ongoing maintenance of the program that explain the decisions made in the construction of the classes in the program (90%)

Utilizes inline comments that explain the decisions made in the construction of the classes in the program, but inline comments are incomplete or illogical, contain inaccuracies, or lack applicability toward software engineers for the ongoing maintenance of the program (70%)

Does not utilize inline comments that explain the decisions made in the construction of the classes in the program (0%)

3.8

Reference Documentation

Produces reference documentation that communicates the API to other programmers, utilizing a documentation generator (100%)

Produces reference documentation that communicates the API to other programmers, but documentation is incomplete or contains inaccuracies (70%)

Does not produce reference documentation that communicates the API to other programmers (0%)

3.8

Readability Meets “Proficient” criteria with an organized structure that separates components with different responsibilities and/or groups related code into blocks (100%)

Code follows proper syntax and demonstrates deliberate attention to indentation, white space, and variable naming (90%)

Code follows proper syntax, but there are variations in indentation, white space, or variable naming (70%)

Code does not follow proper syntax (0%)

4.92

Total 100%

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!