Need to Complete the assignment in the format mentioned in the attachement

 

Topic: Based on this weeks lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.

Instructions: Please download the Assignment 3 Door and Window Lock Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit to the appropriate assignment folder. Also review any additional files attached for more information.

Software System Design feb 3

In the folder, CS 620 Software Systems Design – Power Points, you will see a document called “NCCA Write Up”…for this assignment, you are to read the document carefully and create a CONTEXT DFD…make sure you review what a Context DFD diagram is…

Take your time…do this a piece at a time…remember, this is an ITERATIVE process…so making changes is to be expected…

REMEMBER: YOU MUST USE THE NOTATION WE USED IN CLASS…I WILL NOT ACCEPT ANY OTHER NOTATION!…

Easy Own Words

Chapter 9 – Read the Running Case.
Each team member will complete tasks 1, 2 and 3 and submit individually here.

Chapter 9 – Read the Running Case:

Several people working on the Global Treps Project are confused about their responsibilities for

providing content for the new website. Recall that the team members include you, the project

manager, Bobby, the IT guy, and three people who will run shark-tank-like events in Vietnam,

India, and Ethiopia (Kim, Ashok, and Alfreda). Recall that the activities in the WBS for the

in-house development include the following:

1.3.2.1 Guidelines and templates for events

1.3.2.2 Acceptance of ideas for needed new products or services

1.3.2.3 Custom site for 20 events

You and your team also need to provide information for the videos that you are outsourcing.

Recall that the purpose of these short videos is to show people how to use the site and provide

suggestions for holding the events. That activity is 1.3.1.3 Video creation for website in the

WBS. You have selected the company that will do the outsourced video creation, and their main

contact person is Angela.

Task-1. Prepare a RACI chart for the four WBS activities listed. You decide that one person should

be accountable for each of these four activities, spreading the work between you, Kim,

Ashok, and Alfreda. Bobby will be informed on each activity, and you will be consulted on

the ones you are not accountable for. Document key assumptions you make in preparing

the chart.

Task-2. You realize that all of your team members have different personality types, and you believe

you could work better as a team if you understood each other better. You asked everyone

to take an MBTI-based assessment (a free one you found at www.humanmetrics.com).

You are an ENTJ, Bobby is an INTJ, Kim is an ISFP, Ashok is an ESTJ, and Alfreda is an

ISFJ. Find information about each of these MBTI types and summarize their traits as well as

suggestions for improving teamwork.

Task-3. Angela, the person in charge of the company preparing the short videos for you website,

has suggested that you work together to prepare a detailed list of resources available to

help prepare scripts and edit the videos they will create. You decide to use animations

instead of real people in the videos, and Angela’s company has a lot of experience in that

area. Together, you decide that you will need someone to take on the roles of script writers, 

script editors, animators, sound experts, content editors, and technical editors. Angela and

her team will do all of the animating, sound, and technical work and will provide guidance

for you and your team to do the other work. To keep costs down and stay on schedule, you

decide to plan for all of the video work to be done in 20 days, using no more than 240 total

hours of effort, with about half of the effort from Angela’s company. Prepare a resource

histogram to estimate the number of hours by role for each of the 20 days. Document key

assumptions you make in preparing the histogram.

Chapter 10 – Read the Running Case.
Each team member will complete tasks 1 and 2 only for this case project and submit individually here. 

Chapter 10 – Read the Running Case:

Several issues have arisen on the Global Treps Project. Ashok, your team member in India,

broke his wrist playing tennis yesterday and cannot work on the project at all for three weeks.

His work, which involves helping to edit the videos, starts in one week, so you need to

reassign it to others.

Bobby suggests you use kanban boards to list all of the tasks for editing the videos and to

track where they are in the work flow. Bobby, a techie and not known for being a good communicator,

is the only person who’s ever used kanban boards. You have not yet broken down the tasks

into much detail and need more information from Angela, the contractor in charge of creating the

videos.

Alfreda is having difficulties communicating with her main contact in Ethiopia, Dr. B.

He is very busy all the time and does not use texting, Alfreda’s preferred communications

medium. He has also not communicated key information with students who could be

candidates for their event, which is only a month away. Alfreda is not sure if he booked a

room for the event yet.

Task-1. Describe how you would communicate to Ashok and the rest of the team about Ashok’s

injury. What actions would you take? What communications medium would you use with

different stakeholders?

Task-2. Prepare a partial communications management plan to address some of the challenges

mentioned in Part 7 of the case.

***I attached text book for reference. Question is from Chapter-9 & Chapter-10*****

Questions

 

  • 3.1 List three approaches to message authentication.
  • 3.2 What is a message authentication code?
  • 3.4 What properties must a hash function have to be useful for message authentication?
  • 3.5 In the context of a hash function, what is a compression function?
  • 3.6 What are the principal ingredients of a public-key cryptosystem?
  • 3.7 List and briefly define three uses of a public-key cryptosystem.
  • 3.8 What is the difference between a private key and a secret key?
  • 3.9 What is a digital signature?

Complete your answers on a WORD Document, 

Algorithm discussion response – 2

 Respond to the discussion about algorithms and their roles below using 150 words or more. 

 

At  the most basic level, an algorithm is simply a set of step-by-step  instructions that we utilize to accomplish a specific task. We use  algorithms every single day in our day-to-day activities: Brushing our  teeth, getting dressed, driving to work, making dinner. These daily  tasks which we complete are all composed of a set of instructions that  starts with a certain action and ends with a certain action.

In  the realm of computer programming, algorithms are utilized to enhance  the efficiency, effectiveness, and functionality of the programs we  create. Two such types of algorithms are searching algorithms and  sorting algorithms.

Sorting  algorithms are designed to sort an array of objects into a specific  order. Searching algorithms are designed to compare the elements of an  array to find a particular value within an array of objects. Just a few  examples are search engines, the sorting of a business’ online item  inventory, and sorting/searching a database of students who attend a  university.

There  are multiple approaches which people have taken to solve the issue of  sorting and searching an array of items. Two frequently used searching  algorithms are linear search and binary search. Three frequently used  sorting algorithms are insertion sort, selection sort, and bubble sort.

Each  of these types of algorithms have both pros and cons associated with  them. The main properties that we want to keep an eye on when choosing  an algorithm are memory usage, maintainability, and time complexity. It  is always best to assess the situation and to use discretion when  choosing which algorithm that we want to implement into our program.

IT207 week 8

Please discuss/answer the following questions:

  1. How does the use of repetition and decision-making structures enhance your scripts?
  2. What is the difference between a peer-to-peer network and a client/server network?

For APA format, include a title page. Include an abstract statement on page two. Add the body on pages 3 & 4. Put your references on page 5. Use more than one reference for your information. Use Times New Roman 12 point font, double-spaced through the entire document. Indent paragraphs in the body. The abstract is not indented. 

You can use the APA template and References tab in MS Word for easier formatting.

Business Intelligence

The following are the items to discuss in the paper:

  • What are the five (5) steps (describing each one) for implementing intelligent systems (please review the lecture and PowerPoint for this week for details and assistance)?
  • Provide at least three (3) examples of an intelligent system and what it is used for.

Paper requirements:

  • Minimum 900 words (excluding title page, table of contents, abstract, and references pages)
  • Minimum of three (3) references
  • Format your paper consistent with APA guidelines – review the provided PowerPoint, APA Manual, and video for details and assistance.
  • When submitting the assignment, please ensure you are submitting it as an attached MS Word document.
  • please follow APA 7 guidelines

python programming

 

  1. Create a Parent folder with the following name: lastname_Chapter2Exercises
  2. Create a Program folder for each program (5, 8 ,12)
  3. Complete the Programming Exercises doing both the flowchart and the code in python.
  4. When complete, zip the parent folder and submit in the drop box 

Create a class named Person that holds the following fields: two String objects for the person’s first

  

Create a class named Person that holds the following fields: two String objects for the person’s first and last name and a LocalDate object for the person’s birthdate. Create a class named Couple that contains two Person objects. Create a class named Wedding for a wedding planner that includes the date of the wedding, the names of the Couple being married, and a String for the location. Provide constructors for each class that accept parameters for each field, and provide get methods for each field. Then write a program that creates two Wedding objects and in turn passes each to a method that displays all the details. Save the files as 

Person.java, Couple.java, Wedding.java, and TestWedding.java.