Software Technology – Testing Software Testing

 

IT213-4: Apply the debugging process and testing process to programs containing fundamental concepts such as decision statements, iteration, functions and arrays.

GEL-7.02: Apply ethical reasoning to ethical issues within the field of Information Technology.

Purpose

In this assignment, you will be addressing what is entailed in each of the testing levels that will occur in a professional software development environment. You will also consider an ethical dilemma as it relates to software testing and share from your personal experience, perspective, readings and research.

Assignment Instructions

Write a 4–6 page paper addressing the following:

  • Define the following four levels of testing for software development: 1) unit testing, 2) integration testing, 3) systems testing, and acceptance testing.
  • Explain the purpose of each testing level, and provide your reasoning for why it is important that each level of testing is performed for any software development project.
  • Describe how the four testing levels are related to one another.
  • Additionally, conclude your paper by addressing the following ethical dilemma providing your perspective on how to approach this decision:

There is a “first to market at all costs” culture that exists at some well-known corporations today. They would rather send out a “buggy” product if it meant being first. There have been many inferior products to rise to the top simply because they took the biggest chunk of the market share before anyone else. If you worked for a major software corporation as a software developer and were assigned a role on a project, what would you do if your manager pushed to rush a product to market without sufficient debugging and testing. What are the ethical implications of delivering a quality product versus meeting a deadline? How would you approach this decision?

Be sure to cite your sources in this paper and use correct APA format.

Question

Discussion Question #1: How do you describe the importance of data in analytics? Can we think about analytics without data? Explain.

Discussion Question #2: Considering the new and broad definition of business analytics, what are the main inputs and outputs to analytics continuum?

Discussion Question #3: Where do the data for business analytics come from? What are the sources and nature of those incoming data?

Discussion Question #4: What are the most common metrics that make for analytics-ready data?

Exercise #12:

Go to data.gov – a US government-sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to education, climate to public safety. Pick a topic that you are most passionate about. Go through the topic-specific information and explanation provided on the site. Explore the possibilities of downloading the data and use your favorite data visualization tool to create your own meaningful information and visualization. Show your visualization on your assignment submission

Music 120. Due today.

Instructions

Check the video and answer the questions.

#1 John Cage Sonatas and “Interludes for Prepared Piano, Sonata II” (1946-48)
This piece is written for piano, but certainly doesn’t sound like the traditional tone color of the piano.  Describe the tone colors that are generated by this “prepared piano.”  What is a prepared piano? How are some of the particular tone colors that you hear produced by this acoustic instrument?  What influenced Cage to invent “the prepared piano”?https://www.youtube.com/watch?v=oL_UdQf704A You can watch a short video on how to prepare a piano here: https://www.youtube.com/watch?v=myXAUEuECqQ

#2  Edgard Varese “Poème électronique” (Electronic Poem: 1958)
The first stage of music produced electronically in the twentieth-century was called “musique concrete.”  Composers recorded sounds onto audio tape, and then manipulated them in the studio to produce a fixed performance of the piece.  Varese’s Poem electronique is perhaps one of the most famous of these works.  read about it in your textbook before you listen.  Try to put yourself back in 1958 and think about the technology that was available at that time.  Listen carefully to try to discern some of the raw sound material.  How do you think this piece was received in 1958? https://www.youtube.com/watch?v=qTMSllIv2lw

#3  John Adams “Short Ride on a Fast Machine” (1986)
John Adams is most often referred to a “postminimalist” composer.  Listen to his “Short Ride in a Fast Machine” and discuss why this piece could be described as “minimalist.”  Does this piece aptly portray its title?  What specific types of musical techniques does he use in this piece to create the perpetual motion? https://www.youtube.com/watch?v=5LoUm_r7It8

#4  Kaija Saariaho “L’amour de loin” (Love from Afar: 2000)
Saariaho’s career has produced music that has used techniques of live electronics, mixed media (music, text, tape, electronics, dance, video). What is the impact of the mix of traditional instruments and electronic sounds?   How does this opera compare with the others we have studied in class, i.e. Mozart, Verdi, Wagner? https://www.youtube.com/watch?v=DKBm9mKWJVU

#5 Tania Leon “Inura” (2009)
Using the vocabulary you have learned so far in the course, describe the basic characteristics of this piece.  Explain how Leòn utilizes call and response during this movement. Discuss the role of the percussion during this movement. Be specific. https://www.youtube.com/watch?v=5WCsr4qeij4

Strategic Management

Read the attached case study answer the questions at the end of the text in a 2 and a half page paper (excluding title and reference pages) include at least three peer-reviewed sources found.

Note: My assignments will need actual references from EBSCO host, google scholar, and semantic scholar With a website link at the end.  Only use APA 7th edition. 

Threat Model

 Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (” Do not copy and paste images from the Internet, I need 100% original work, no plagiarism is encouraged or tolerated” ). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately 2 to 3 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

dis_dmwk2

 What’s simple random sampling? Is it possible to sample data instances using a distribution different from the uniform distribution? If so, give an example of a probability distribution of the data instances that is different from uniform (i.e., equal probability). 

Disaster recovery-4

Topic: Submit a report that discusses the techniques used by malware developers to disguise their code and prevent it from being analyzed.  Give suggestions on how these techniques should be classified and ranked in the disaster recovery documentation.[500 words]

Assignment should follow all APA rules and include a min. of (1) citation/reference.

Term Paper on 'Rockwell Automation – Factory Talk (SCADA)'

  It is a term paper.The topic is  ‘Rockwell Automation – Factory Talk (SCADA)’ The paper shall be at least five (5) and no more than ten (10) pages in length excluding figures, tables, and references. The paper shall be formatted using an 11-point font of either Arial, Helvetica, or Times Roman type using 1″ margins on the sides and double-spacing between lines with 0.5″ indentation on first line of paragraphs. The paper shall be written using the APA style guide seventh edition published in October 2019. Online guidance can be viewed at https://apastyle.apa.org.All tables and figures shall be captioned and specifically referenced in the body of the document. All references shall be stated and included as endnotes in this paper. Citations must meet the following requirements:

  • No more than two (2) citations shall be from Wikipedia
  • At least two (2) references shall be from United States government sites (e.g. CISA, NIST)
  • At least two (2) references from vendor web (html) or printed (pdf) material
  • At least two (2) references shall be from independent sources including but not limited to
    • News Media Outlets (e.g. Reuters, Washington Post, Wired, CSOOnline)
    • Industry Publications (e.g. Automation, ISSSource, Control)
    • Trade Sources (e.g. Oil and Gas Journal, ChemWeek, PharmaTimes)
    • Security Solution Providers (e.g. McAfee, Trend Micro, Dragos, Claroty) to name several.

    The section titles (paper) and slide titles (presentation) in the templates are for reference only.Your paper and presentation shall address and develop each of the following items:

  1. System overview (textual) and architecture (graphical) covering devices and network topology explaining the function of each of the key assets
  2. Communication protocols used by the system
  3. Industry sectors that use the system
  4. Vulnerabilities publicly disclosed for the system and the publication of any exploitation packages
  5. Potential or actual impact of the vulnerabilities discovered to the industry sectors served
  6. Cyber security measures taken by the vendor to secure the system
  7. Additional cyber security measures that could be taken by the end-user user if the vendor recommendations are not feasible (e.g. an upgrade could not be performed in a timely manner)

Must have the following categories

INTRODUCTION

System Overview and Architecture

Market Analysis and Typical Use Case(s)

Major Vulnerability Disclosures

Impact Analysis

Risk Reduction Recommendations

Conclusion

Outline assignment

Using the Documenting Research Guide and the Assignment 2 Instructions, develop your outline. Submit the outline in an MS Word document file type. Utilize the standards of APA 7 for all documentation, including citations or references in the outline. Ensure that the document includes your name. Do not include your student identification number. You may use the cover page from the student paper template, but it is not required. The Documenting Research Guide is in the Useful Documents folder, in the content area; the Assignment 2 Instructions.

Submit your outline on or before the due date.

By submitting this paper, you agree:

(1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy;
(2) that your institution may use your paper in accordance with UC's policies; and
(3) that the use of SafeAssign will be without recourse against Blackboard Inc.