Discussion

 “A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. For this week’s discussion question, please view the Periodic Table of Visualization at the following link (http://www.visual-literacy.org/periodic_table/periodic_table.html). Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. Provide your classmates with a brief description of your choices and explain why you made your choices. Also, describe what advantages do your choices have over the others. 

Strict APA format

2 pages

At least 2 scholarly references.

Vulnerability Process and Assessment Memorandum

 

Your boss wants you to draft a two- to three-page vulnerability process and assessment memorandum addressing the main points of a VM process for Mercury USA. You will cover the main elements of a vulnerability management process, tailored to Mercury USA’s business in the transportation sector, evaluate the OpenVAS scanning tool, and provide recommendations for mitigating the vulnerabilities found within the OpenVAS report.

The third-party pen tester used the free tool Open Vulnerability Assessment Scanner (OpenVAS) to scan Mercury USA’s network. Review the report from the OpenVAS Scan.

As you review the scan, consider some important points from Remediation:

  • Priority
  • Difficulty of implementation
  • Communication/change control
  • Inhibitors to remediation
    • MOUs
    • SLAs
    • Business process interruption
    • Degrading functionality

Cloud computing

A three-tier web application architecture has been generically defined as the presentation, business logic, and data storage tiers. However, Amazon Web Services defines the three-tier web application architecture as the web, application, and storage/database tiers.

Write a paper comparing the generic three-tier web application architecture to that applied by Amazon Web Services.

Apply APA Edition 6 formatting.

Use at least three properly documented references (do NOT use wikis).

Correctly cite your references using APA Edition 6 formatting.Your paper should be at least 500 words in length using good grammar.

Journal Analysis

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format and only use journal articles

ITSD324:Project Testing and Software Quality Assurance

 

Assignment Description

Automation testing is an important task that will help you reduce the time it takes to execute a test case. In this assignment, you will install a trial version of an automation testing tool and then create automation test cases.
The automation testing process includes the following stages:

  • Select the appropriate tool.
  • Determine the test cases that should be automated.
  • Implement the automated test cases.
  • Record the test script.
  • Save the test script.
  • Execute and analyze the test results.

Please follow the step-by-step instructions and screenshots below to install the tool (Micro Focus, 2018):

  • Step 1: Use the search engine, and search for Unified Functional Testing Trial Version.
  • Step 2: The browser will take you to the Microfocus site.
  • Step 3: Enter all details and click “Free Trial.”
  • Step 4: Go to “All Products,” and click the UFT Download button.

 

  • Step 5: Click on the UFT Version_SetUp.exe file.
  • Step 6: It will take at least 10 minutes to download the .exe file.
  • Step 7: Click on the .exe file.

  • Step 8: Verify the path, and click “Next.”

  • Step 9: Click “Next.”

  • Step 10: Verify all of the prerequisites, and continue with installation.

  • Step 11: Click the Next button.

  • Step 12: Select “I accept the terms” in the License Agreement, and click “Next.”
  • Step 13: Select all of the add-ins, and click “Next.”

 

  • Step 14: Click “Next.”
  • Step 15: Click “Install.”

You can also use this PDF file for installation help.

  • Step 16: Once the installation is complete, open the tool and create the sample test.
  • Step 17: Follow this URL, and learn how to create an automated test for the Sample MyFlight application.
  • Step 18: You can use either the Calculator application from Unit 2 or the sample MyFlight application to create additional automated test cases.

You need to create at least 4–5 automation test cases using either Sample MyFlight or the Calculator application.

Submit the following in a .zip file:

  • Output screenshot of UFT installation
  • Entire solution folder that contains 4–5 automation test cases

Assignment

Using a Microsoft Word document, please discuss the case involving the United States of America versus Ross Ulbrecht. Please include what took place at the United States Supreme Court.

2. The minimum word count shall be not less than 500 words in APA format.

ITISP W 2 A

 Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Software Reference Architecture document.

 

Write a Software Reference Architecture document for a fictitious University information technology department. This Software Reference Architecture should include at least one software framework (e.g. Spring, struct, Hibernate). You can assume the data storage is part of software because it normally uses a database.

Attached is the full description and requirement and rubric for this project.

cloud computing 4

 

Part 1: Hypervisors

Review case 8-3 and 8-4. Select one of the two cases from chapter 8 and complete the written exercise.

Case 8-3 Hyper-V 

Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.

 OR

Case 8-4 VmWare 

Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.

Part 2: Cloud Security

Chapter 9 lists several common security threats to cloud-based environments. Analyze 3 types of cloud security threats and describe methods to mitigate the risks. Compare and contrast the difference between these security threats in a data center/on site versus from the cloud. Provide a minimum of 3 references to support your findings.

Requirements:

Total page count should be a minimum of 3 pages.

Make sure to cite any content provided from your sources.

Minimum number of references for the assignment is 5.