short answer

“Usability Evaluation”  Please respond to the following:

  • Software design engineers use different data gathering techniques for establishing requirements. Requirements come in many different forms and levels of abstraction, but need to be very specific and unambiguous. Of the two different kinds of requirements (functional and non-functional), speculate the challenges you may see in capturing both requirements. Provide a rationale for your response. 
  • Low-fidelity prototypes are mainly used to conduct research on a product and are not integrated into the final product, while high-fidelity prototypes may evolve into a final product. Compare and contrast the final product that evolves from a high-fidelity product and a product built from the ground up after studying and learning from a low-fidelity prototype. Provide one(1) example of each type of product to support your response.
Attachments

CLOUD COM WEEK 1 DQ

 

kamau muchiri

Attachments1:07 PM (9 hours ago)to meWeek 1 Discussion Options Menu: Forum

There are three common Cloud Service Models.  Define one and identify at least three cons and three pros for that particular Cloud Service Model. 

You must do the following:

1) Create a new thread. 

2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread. 

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)

Chapter 7 – study questions 1-10, Exercise 2 ( from Information Systems for Business and Beyond textbook) Chapter 8- study questions 1-10, Exercise 2 ( from Information Systems for Business and Beyond textbook)

 

Chapter 7 – study questions 1-10, Exercise 2 ( from Information Systems for Business and Beyond textbook)

Chapter 8- study questions 1-10, Exercise 2 ( from Information Systems for Business and Beyond textbook)

The above assignments should be submitted in a single word document.

IT Security Policy Implementations

 

Information technology security policies are the foundation upon which an organization builds good security habits.  IT security policies define what business and technology risks will be controlled.  Will-implemented security policies build brand confidence and help an organization achieve its goal.  

1. What technical and/or nontechnical barriers do YOU foresee in YOUR organization when it comes to implementing IT security policies?

week 9 assignment NS

  • 9.1 Give examples of applications of IPsec.
  • 9.2 What services are provided by IPsec?
  • 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
  • 9.4 What is the difference between transport mode and tunnel mode?
  • 9.5 What is a replay attack?
  • 9.6 Why does ESP include a padding field?
  • 9.7 What are the basic approaches to bundling SAs?
  • 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?

make pdf report on software development

we should make powerpoint as a software developer or programmer. we need to make powerpoint report of parking space software.

it should include 

1. user stories

2. present the planning chart.

3. iteration

4.calculation

5. burn down chart

please provide notes on each slide. it kind of progress report.

Lists, Sets, Stacks and Queues

 

retainAll

Write a method called retainAll that takes two sets of integers as parameters and that removes any values in the first set that are not found in the second set. 

For example, given sets: 

s1: [0, 19, 8, 9, 12, 13, 14, 15]  

s2: [0, 19, 2, 4, 5, 9, 10, 11]  

If the following call is made: 

retainAll(s1, s2);  

after the call, the sets would store the following values: 

s1: [0, 19, 9]  

s2: [0, 19, 2, 4, 5, 9, 10, 11]  

You are implementing a two-argument alternative to the standard Set method called retainAll, so you are not allowed to call that method to solve this problem. 

You are also not allowed to construct any structured objects to solve the problem (no set, list, stack, queue, string, etc) although you can construct iterators. 

Your method should not change the second set passed as a parameter.

Computation

 

Start by reviewing Microsoft article  “Tips for creating and delivering an effective presentation”. Then search for best practices when creating a presentation. Select one or two recommendations and create a 3 to 4 slides presentation explaining the recommendation you selected. If possible, include an example of a slide that follows that recommendation and one that doesn’t.

Add a text narration in the notes area for each slide that explains the slide like if you were presenting in class (How to add notes). Submit your presentation.

Organization risk culture

 

An Information Technology (IT) security policy framework supports business objectives and legal obligations.  It also promotes an organizations core values and defines how it identifies, manages and disposes of risk.  A core objective of a security framework is to establish a strong control mindset, which creates an organization’s risk culture. When organizations implement security policies, there are pressures and trade-offs.  Information technology (IT) security policies are represented in many types of policy documents, depending on the organization’s network and infrastructure needs.  These differences stem from different cybersecurity risks.

Need in 500 words… no plagiarism 

InfoTech Import in Strat Plan (ITS-831-31)

Week 8 Research Paper: Server Virtualization  

 

You have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your research paper as a single document. Your paper should meet the following requirements:

• Be approximately 2-4 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.