SOFTWARE ENGINEERING 2

  

Your assignment most have introduction, recommendation and conclusion 

1. (a) What is Software Development Life Cycle (SDLC)? (7mk) 

(b) With a suitable diagram, explain the different phases involved in waterfall life cycle (8mks) 

(c) What is Software Engineering? (5mks) 

(d) Enumerate five of the challenges of the software crisis era (5mks) 

2. (a) What is feasibility study? What are the contents we should contain in the feasibility report? (8mks) 

(b) What are the purposes of Data Flow diagrams, Give an example. (7mks) 

3. (a) What is the difference between SRS document and design document? What are the contents we should contain in the SRS document and design document. (9mks) 

(b) List and explain different types of testing done during the testing phase. (6mks) 

4. (a) What is user acceptance testing? Explain different testing in user acceptance testing. Why is it necessary? (9mks) 

(b) What are functional and non-functional requirements? (6mks) 

5. (a) Explain the steps involved in the prototyping. (6mks) 

(b) What is a class and object? Give the diagrams and representation of class and object (7mks) 

(c) Enumerate the reasons for the Failure of Waterfall Model. (2mks) 

6. (a) Define Software Reliability (3mks) 

(b) What are the factors of Software Quality? (6mks) 

(c) What is Modularity? (6mks) 

Computer Program Design

I want you to create something based on what you’ve learned so far in this course

Visit https://corallanguage.org/simulator/ and write a program using:

variables

branches

loops

arrays

functions

Come up with your own program that contains your own user-defined functions and variables. Be creative. No need to be too complicated but be a useful program with a function and array.

Computer Science

 

For your project, complete the following using screenshots, images or diagram of sample products, processes, etc. to illustrate and descriptive texts to address the items below (you may also consult YouTube.com as a source). This is not a research paper; however, provide your source(s):

1. Identify at least three types of computers, how they process information, and the purpose and function of each computer.
2. Identify how software and hardware work together to perform computing tasks and how software is developed and upgraded.
3. Identify at least three different types of application software and provide a general description each application software.

4. Using an operating system, identify what is an operating system, how it works, and how it solves common problems related to the operating systems.
5. Illustrate the process of using an operating system to manipulate a computer’s desktop, files and disks.
6. Use screenshots, images or diagram of sample products, processes, etc. to illustrate and descriptive texts to explain each items provided.

enterprise computing

 

1.For this assignment you will be submitting your progress on your final project.  Specifically you will submit a document addressing the following topics.

M07 – Milestone 3

  • Group Policy Plans
  • Backup Plans
  • Remote Access solution plan

While there is not a formal format for this submission and you are not expected to have everything for these items implemented in your proof of concept,  if you work through the project logically for each milestone you will have completed a large quantity of the work by the end of the course.

2.  compose a research paper with the content body between 900 & 1400 words evaluating the main ideas of the readings. The paper should be correctly cited using APA style citation form. There should be a title page and works cited page (not included in the word count). There should be at least 3 outside sources for your critique. Document your research using the other sources and explain how the white papers might be correct, incorrect, lacking or showing forsight, practical or impractical, etc.  

Case Study 5

The purpose of this assignment is to develop skills in problem solving, decision making in complex situations, and learn/use the APA 6.0 style guidelines.

Discussion

 

There are TWO tasks that you would need to do( they are separate): 

Task 1 (Minimum 250 words): 

 Business Ethics: Discuss the risks of avoiding confrontation of a problem employee. 

– Minimum two references. 

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index

IT217 week 8

JustBasic Software allows you to use file from your computer to load into your program.  Use some specific examples to explain the advantages of importing files from your computer into your program.

Research paper review in detail

I need the following after reviewing the paper

Problem Statement – Issued discussed by the author

Approach & design – How the authors approach to the issue & what proposed ideas they mentioned

Strengths and Weakness – Readers perspective strengths & weakness from the papaer

Evaluation(Performance) – How the authors evaluated the proposed system, what parameters they used to test the performance

Conclusion(In readers perspective)

Along with these, I need to have a detailed explanation of the paper section-wise:

sections are:

Abstract

Introduction

Background

Delay Compensation(This need to be in more detail along with the algorithm explanation)

Performance evaluation

Discussion & conclusion

Instructions:

The figures in the paper should also be addressed. 

Need PPT slides for section 3 less slides and more explanation(bullet points in slides, explanation in a different document file) Algorithm flow and all should be addressed.

Nothing should be taken directly from the paper.

Should not use any only AI tools for developing the content

PHP web development services in Delhi

 

IndiaInternets provides full cycle php web development services in Delhi. It is more profitable to work with a single vendor who has strong expertise in all facets of software development compared with several companies narrowly focused either on front-end or back-end sides. Additionally, it’s harder to manage several providers.

Visit https://www.indiainternets.com/web-development/php-web-development.html

Section 404

  

As an Internal Auditor you have been given the task of creating a specific checklist to ensure compliance with Section 404.

Review the requirements of Section 404 and create a list identifying compliance requirements. The checklist should include information about reporting requirements, audits, IT security, and any other topics relevant to Section 404 compliance. The checklist should include information on internal controls over financial reporting (ICFR) controls as well as any known difficulties in complying with Section 404.

Evaluation Criteria and Rubric

  1. List the compliance      requirements of Section 404
  2. Include information about ICFR      controls
  3. Include information about      reporting requirements, audits, and IT security
  4. Include information about known      Section 404 compliance difficulties.

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial 10-point      size, Double-space
  • Citation Style: Follow      your school’s preferred style guide
  • Length: Minimum 500 words