Need to write answers for questions based on my Resume.

 

Engineering experience

  • Describe your level of experience in Python, and how you have attained it.
  • Describe your experience with SQL and relational data modeling, and summarize your learning with large-scale database backed applications.
  • Describe a case where it was very difficult to test code you were writing, but you found a reliable way to do it.
  • What kinds of software projects have you worked on before? Which operating systems, development environments, languages, databases?
  • Would you describe yourself as a high quality coder? Why?
  • Would you describe yourself as an architect of resilient software? If so, why, and in which sorts of applications?
  • Outline your thoughts on open source software development. What is important to get right in open source projects? What open source projects have you worked on? Have you been an open source maintainer, on which projects, and what was your role?
  • Describe your experience building large systems with many services – web front ends, REST APIs, data stores, event processing and other kinds of integration between components. What are the key things to think about in regard to architecture, maintainability, and reliability in these large systems?
  • How comprehensive would you say your knowledge of a Linux distribution is, from the kernel up? How familiar are you with low-level system architecture, runtimes and Linux distro packaging? How have you gained this knowledge?
  • Describe your experience with large-scale IT operations, SAAS, or other running services, in a devops or IS or system administration capacity
  • Describe your experience with public cloud based operations – how well do you understand large-scale public cloud estate management and developer experience?
  • Outline your thoughts on quality in software development. What practices are most effective to drive improvements in quality?
  • Outline your thoughts on documentation in large software projects. What practices should teams follow? What are great examples of open source docs?
  • Outline your thoughts on user experience, usability and design in software. How do you deliver outstanding user experience?
  • Outline your thoughts on performance in software engineering. How do you ensure that your product is fast?
  • Outline your thoughts on security in software engineering. How do you influence your colleagues to improve their security posture and awareness?
  • Outline your thoughts on devops and devsecops. Which practices are effective, and which are overrated?

Education

  • In high school, how did you rank competitively in maths and hard sciences? Which was your strongest?
  • In high school, how did you rank competitively in languages and the arts? Which was your strongest?
  • What sort of high school student were you? Outside of class, what were your interests and hobbies?  What would your high school peers remember you for, if we asked them?
  • Which university and degree did you choose? What others did you consider, and why did you select that one?
  • At university, did you do particularly well at any area of your degree?
  • Overall, what was your degree result and how did that reflect on your ability?
  • In high school and university, what did you achieve that was exceptional?
  • What leadership roles did you take on during your education?

Context

  • Outline your thoughts on the mission of Canonical. What is it about the company’s purpose and goals which is most appealing to you? What do you see as risky or unappealing?
  • Who are Canonical’s key competitors, and how should Canonical set about winning?
  • Why do you most want to work for Canonical?
  • What would you most want to change about Canonical?
  • What gets you most excited about this role?
  • How does your background and experience make you suitable for this role in the Store team?

Write a program in pseudocode that

Write a program in pseudocode that inputs from the user the number of hours worked and hourly pay rate for employees and outputs their total pay. the program should process an arbitrary number of employees : the user will terminate input by entering 0 for hours worked and pay rate. use a class called Worker with attrributes: hours rate and total. methods computetotal() and access methods sethours, gethours, setrate, getrate, settotal,, and gettotal for each of the attributes

requirements of project management

  

1. Clearly define the main problem and list all sub problems

2. Make a direct connection between major sub problems and the main problem. Use a Fish Bone diagram.

3. Identify all stakeholders by title and association (i.e. department, outpatient etc.) and connect them to the main problem or a sub problem. Use the stakeholder template and the Problem template.

4. Which Elicitation tools would you use to gather additional information and gain a better understanding of the problem (List two 2). Give specific examples. (for instance if you are using ethnography which stakeholders  will you observe (at least two), and what you are looking for. If you are using an Interview provide the stakeholders (at least two) you will interview and sample questions)

5. Include a Glossary of all specialty terms

6. You do not need to solve the problem or propose solutions 

Homework

 

Discuss in 500 words or more best practices for incident response in the cloud. Refer to at least one incidence response framework.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Research Paper: Develop a Computer/Internet Security Policy

Research Paper: Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select.  Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.Your paper should meet the following requirements:

• Be approximately four pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. 

Assignment

 

Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC.

Use at least three sources.   Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand alone quotes will not count toward the 3 required quotes.

Problem 7- Planning

Problem:

1. Describe the general processes that should be followed in managing risks throughout a project. Be sure to include the general sequence in which these processes are carried out.
2. Prepare a sample risk register for a project to put humans on Mars (four or five risks).
3. What is the difference between qualitative and quantitative risk analysis? Which one is always done? Why is the other one not always done for every project?

Text

Title: Project Management 

Subtitle: https://opentextbc.ca/projectmanagement/ 

Authors: Adrienne Watt 

Publisher: BCcampus Open Education 

Publication Date: 2019 

Edition: 2nd Edition

Assignment

The paper is an old but important publication in the history of operating systems. The paper is A. Bensoussan and R. Daley, “The Multics Virtual Memory: Concepts and Design”, Proceedings of the Symposium on Operating Systems Principles, 1969.” As usual, I would like a summary, followed by a separate section containing your reaction. As I continue to read your submissions, in many cases the summaries are better than the reaction sections, in the sense that they were given more attention, or they are so commingled that I can’t tell the summary and reaction apart. Please physically separate the two sections (using ‘Summary’ and ‘Reaction’ headings would be a good way to do that) and give some serious, critical thought to what you have read.