case study analysis

Overview: This case study analysis is the first of two formative tasks that will support your understanding of the key course concepts of human behaviors that could potentially cause a security threat. These case study analyses will inform your approach for the milestone tasks and the final project.

Prompt: Identify three current security breaches. Using presentation software, create a slide for each of the breaches. In addition to indicating when each breach occurred, address the following critical elements on each slide:

  • The data that wascompromised
  • Theindividualsandorganizationsthatwereimpacted
  • Thehumanfactorsthatimpactedthebreachandwhetherthesuspectswereidentified
  • What is being done to mitigate futureoccurrences
  • Whatdamagecontrolmeasurestheimpactedorganizationisprovidingregardingthebreach

Guidelines for Submission: Include a title slide. Include at least one slide for each of the three breaches. Include all of the critical elements for each breach. On each slide, use the commenting feature to describe each breach in two to three paragraphs.

Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions.

Critical Elements Proficient (100%) Needs Improvement (75%) Not Evident (0%) Value
Compromised Data Accurately describes the data that was compromised Does not sufficiently describe the data that was compromised Does not describe the data that was compromised 15
Individuals and Organizations Accurately and sufficiently describes the individuals and organizations that were impacted Does not sufficiently describe the individuals and organizations that were impacted Does not describe the individuals and organizations that were impacted 20
Human Factors and Suspects Accurately and sufficiently assesses the human factors that impacted the breach and indicates whether the suspects were identified Does not sufficiently assess the humanfactors that impacted the breach or indicate whether the suspects wereidentified Does not assess the human factors that impacted the breach or indicate whether thesuspects were identified 20
Mitigation Efforts Sufficiently provides concrete examples of the efforts being undertaken to mitigate future occurrences Does not sufficiently provide concrete examples of the efforts being undertaken to mitigate future occurrences Does not provide examples of the efforts being undertaken to mitigate future occurrences 20
Damage Control Measures Accurately and sufficiently describes the damage control measures Does not sufficiently describe the damage control measures Does not describe the damage control measures 15
Articulation of Response Submission has no major errors related to citations, grammar, spelling, syntax, or organization Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas 10
Earned Total 100%

[

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

twenty-first-century life

How do I view the step by step solution to VIEW THE STEP-BY-STEP SOLUTION TO:Overview: Basic knowledge of computers is practically essential for productively engaging in twenty-first-century life.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

IT 145 Module Two Assignment Guidelines and Rubric

IT 145 Module Two Assignment Guidelines and Rubric Overview: This assignment will allow you to use pseudocode to implement the program to see the value in planning first, coding later. While coding is the glamorous part of the job, software development is a process with many steps. The program itself will focus on operators to complete an equation. Prompt: Before completing this assignment, be sure to review the Module Two resources. Use the Guide to Pseudocode document to write out the pseudocode for the given problem: Imagine that you are a merchant and need to keep better tabs on your merchandise to know when to reorder supplies. First, write out pseudocode, and then create a program to help you by accomplishing the following tasks:  Use a dialog box to ask the user to input the following. (You will need to convert this from a string to an integer.) ○ How many apples are on hand ○ How many apples should be in stock ○ How many oranges are on hand ○ How many oranges should be in stock  Perform an operation to determine how many of each item should be ordered to maintain the stock.  Use a dialog box to output the number of apples and oranges that need to be ordered. Once you have the program laid out, build it by creating a functional program. Use your pseudocode as a guide. Be sure to remember the following important items:  Follow the style guidelines found in ZyBooks as you develop.  Use commenting to describe the code.  Practice debugging if you encounter errors.  Ensure your program performs its intended function. Specifically, the following critical elements must be addressed: I. Documentation: Pseudocode: Break down the problem statement into programming terms through creation of pseudocode following the guidelines provided in the course. II. Functioning Code: Produce fully functioning code (a code that produces no errors) that aligns with the accompanying annotations. III. Code Results: Results are properly generated. A. Code results generate accurate output. B. Code results produce results that are streamlined, efficient, and error free. IV. Comments: All code should be well-commented. This is a practiced art that requires striking a balance between commenting everything, which adds a great deal of unneeded noise to the code, and commenting nothing. A. Explain the purpose of lines or sections of your code, detailing the approach and method the programmer took to achieve a specific task in the code. V. Style and Structure: Part of the lesson to be learned in this course is how to write code that is clearly readable and formatted in an organized manner. A. Develop logically organized code that can be modified and maintained. B. Utilize proper syntax, style, and language conventions and best practices. Guidelines for Submission: Submit your pseudocode as a DOC or DOCX file. Submit the program as a JAVA file. Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions. Rubric Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value Documentation: Pseudocode Meets “Proficient” criteria and demonstrates thorough understanding of the creation of pseudocode Breaks down the problem statement into programming terms through the creation of pseudocode Breaks down the problem statement into programming terms through the creation of pseudocode, but pseudocode contains inaccuracies or explanation is illogical or incomplete Does not break down the problem statement into programming terms through the creation of pseudocode 10 Functioning Code Produces fully functioning code (a code that produces no errors) that aligns with the accompanying annotations Produces partially functioning code (a code that produces almost no errors) that partially aligns with the accompanying annotations Does not produce functioning code 20 Code Results: Accurate Output Meets “Proficient” criteria and the code is capable of producing accurate results beyond the specifications of the given problem Generates code results with accurate output Generates code with incorrect results for the given problem Does not produce results for the given problem 15 Code Results: Efficiency Meets “Proficient” criteria and includes sophisticated techniques such as error handling or reference to usercreated functions Produces code results that are streamlined, efficient, and error free Produces results that are minimally inefficient (e.g., multiple minor occurrences of convoluted code; alternative code element would achieve results in a simpler manner) Does not produce code results that are streamlined, efficient, and error free 20 Comments: Explanation of Purpose Meets “Proficient” criteria and clarity of annotations facilitates code navigation for a varied audience; code is written in a concise manner Explains the purpose of lines or sections of the code, detailing the approach and method the programmer took to achieve a specific task in the code Explains the purpose of lines or sections of the code, detailing the approach and method the programmer took to achieve a specific task in the code, but explanation has inaccurate and/or missing details Does not explain the purpose of lines or sections of the code 20 Style and Structure: Logically Organized Code Meets “Proficient” criteria and demonstrates deliberate attention to spacing, whitespace, and variable naming Develops logically organized code that can be modified and maintained Develops logically organized code that can be modified and maintained but with portions that are not logically organized Does not develop logically organized code that can be modified and maintained 5 Style and Structure: Syntax Meets “Proficient” criteria and demonstrates an understanding of why certain techniques are considered best practices Utilizes proper syntax, style, and language conventions and best practices Utilizes proper syntax, style, and language conventions and best practices, but with some errors Does not utilize proper syntax, style, and language conventions and best practices 10 Total 100%

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Pseudocode Pseudocode

IT 145 Guide to Pseudocode Pseudocode is an intermediary step between reading a problem statement and writing the code to solve the problem. It serves as a blueprint for your program to guide you through, just like contractors start with a blueprint before building a house. Use your pseudocode as a tool to begin thinking about your program, but keep in mind it might not be the final solution to the problem. Pseudocode is written in a natural language using some programming keywords. Consider the first example below: INCREMENT the number of apples in the basket by one Notice in the example that it fully describes, in natural language, what needs to be done in the program. When writing pseudocode, start at the beginning of what you need the program to do. Then work through, step by step, until reaching the end of what’s required by the program in the problem statement. This is putting the problem in sequence. For example, making a peanut butter sandwich: OBTAIN a plate OBTAIN two slices of bread OBTAIN a jar of peanut butter OBTAIN a knife Place the slices of bread on the plate Open the jar of peanut butter Spread peanut butter on one bread slice with the knife Place the empty slice of bread on top of the slice with peanut butter Serve There are several common keywords that get capitalized as they refer to actions taken in the program. Those words include READ, WRITE, PRINT, DISPLAY, CALCULATE, SET, INCREMENT, and more. You can also show choices and loops in pseudocode. Just like in coding, when an item is nested inside another item, you indent that line of pseudocode. Below are three generic examples: IF condition THEN Include the first sequence ELSE Include the second sequence ENDIF WHILE condition Include the sequence ENDWHILE FOR loop parameters Include the sequence ENDFOR You can also use the keyword CALL to reference another algorithm written separately. Now look at the following more complete examples of both good and bad pseudocode to get a general feel of how to write it. Bad Example (Vague and incomplete): function doProgrammingHomework(): Get things for homework Write the code correctly Finish the homework Bad Example (Too technical; does not follow natural language usage): function doProgrammingHomework(): getComputer(); openBlackboard(); for (var count = 0; count < problems.length(); count++) solve(); while (!compile) debug(); submit() shutDownComputer(); Good Example (Follows steps one at a time through the end of the algorithm): function doProgrammingHomework(): GET a computer OPEN the Blackboard module FOR each of the problems in the module Complete problem WHILE the problem does not compile Debug ENDWHILE Submit the assignment ENDFOR Shut down the computer Remember not to make your pseudocode too technical. You are not trying to write the code itself, just a plan as a stepping-stone after the initial problem to get your creative juices flowing.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

deployment of applications to the Web

The deployment of applications to the Web and the cloud has produced unique database challenges and solutions. Some of these solutions include the refinement of multi-tiered architectures, while other solutions include the adoption of database management systems that do not use the relational model.

For your initial post, research Web-based database technologies and identify a database management system (other than SQL Server, MySQL, or Oracle) that is used to deploy applications to the Web and the cloud. Discuss the database management system and its unique capabilities. How does the database management system differ from the non Web and cloud applications? What benefits does the database management system offer to organizations that are deploying applications to the Web and the cloud?

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

final project

IT 511: Final Project Guidelines and Grading Guide Overview Your final project for this course is the creation of a Virtual World Java application that results in a virtual world, complete with an object that will act as a human clone. A virtual world with a human clone would not be complete without additional objects for interaction, so you will be responsible for creating a “ShoutBox” and another object that will keep your human clone from getting lonely, and a virtual world application that will test your objects. Your final deliverables will include your working code (which your instructor will run in order to review your virtual world) as well as an annotated version of your written code that explains your reasoning for choices, how the code meets the given specifications for your project, how you ensured the accuracy and workability of your code, and methods used for testing and debugging. The project is divided into four milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Two, Five, Seven, and Eight. The final submission will be submitted in Module Nine. In this assignment you will demonstrate your mastery of the following course outcomes:  Write simple, accurate object-oriented programs using primitive data types, variables, data structures, and object-oriented principles  Implement classes that meet the given specifications of object instance variables and behaviors  Create operative algorithms using sequential logic structures, decision control structures, and loops  Create and use methods that accept parameters and return results  Test and debug object-oriented programs for accuracy in program functionality  Document object-oriented code with comments that articulate the purpose and behavior of code for various audiences Prompt In creating your virtual world, you will need to create a MyClone class that will represent a virtual clone, another class that will represent a ShoutBox, and another class of your choice. The class of your choice can be anything you want to exist in your virtual world (a cat, a bird, a computer, etc.). This project is a prototype and there will not be any graphics, so you will create an application that unit tests the functionality of your three classes (your MyClone class, your ShoutBox class, and the class of your choice). Specifications for MyClone Feel free to add additional instance variables and behaviors, but your clone object must have instance variables firstName, lastName, and an introduction() method. The firstName and lastName instance variables will hold your first and last names. You will demonstrate your understanding of encapsulation by protecting your instance variables by making them private and by creating getters and setter methods for all instance variables. You should have at least one constructor created that initializes all instance variables. The introduction() method will introduce you to the virtual world by displaying a greeting, your full name, and anything else you would want to say. Partial class diagram for the MyClone object: Specifications for ShoutBox The ShoutBox object will allow you to shout messages into your virtual world. Your ShoutBox will have two ways of generating messages: 1. You can select from a list of canned messages to shout, or 2. You can have the ShoutBox generate a random message for you. You must use data structures Array, ArrayList, or a HashMap to store the message data. Canned messages: One data structure will store the canned messages. You can load this data structure with canned messages of your choosing. The shoutOutCannedMessage() method will loop through the data structure to first display all canned messages and allow the user to select one. The shoutOutCannedMessage() will return the selected message String. This String will be displayed in the virtual world. For now, your virtual world will be the output window. Random messages: To generate random messages, you need to have a data structure that holds a list of subjects, another data structure that holds a list of objects, another that holds a list of verbs, another that holds a list of adverbs, and another that holds a list of adjectives. The lists you create can hold as many words as you would like. The shoutOutRandomMessage() method will use a random number generator that selects one word from each data structure to form a random message. Random messages will be in the following form: Subject – Verb – Adjective – Object – Adverb. The generated message String will be returned. The String will be displayed by the ShoutBox in the virtual world. For now, your virtual world will be the output window. MyClone -firstName -lastName introduction() Partial class diagram for the ShoutBox object: Examples of canned messages stored in the canned messages data structure (you can store as many canned messages as you would like): Example of subjects stored in the subjects data structure: “I” “You” Example of objects stored in the objects data structure: “course” “homework” Example of verbs stored in the verbs data structure: “studying” “eating” “sneezing” Example of adjectives stored in the adjectives data structure: “funny” “prickly” “hard” “awesome” Example of adverbs stored in the adverbs data structure: ShoutBox String shoutOutRandomMessage() String shoutOutCannedMessage() “Hello World” “I am studying” “I am at work” “quickly” “everywhere” Specifications for Your Additional Object You will create another object of your choosing to add to your virtual world. Your object should have at a minimum two (2) instance variables and one (1) method. You will demonstrate your understanding of encapsulation by protecting your instance variables by making them private and by creating getters and setter methods for all instance variables. You should have at least one constructor created that initializes all instance variables. Specifications for Virtual World Application You will create a virtual world application that will test your MyClone, ShoutBox, and the object you decided to add to your virtual world. Because this is a simple prototype, you will not actually create any graphics to represent the objects in the virtual world. Any displayed information will simply be displayed in the output window. Submit your Java application by submitting all .java files and at least four screenshots that demonstrate you tested the application. While the listed number of instance variables and methods are the minimum number required for each class, you are free to create additional. Specifically, the following critical elements must be addressed: I. Program Functionality and Alignment a. Make sure your entire program functions correctly and that there are no exceptions or compile errors b. In writing your code, make sure that you are meeting or exceeding all of the given specifications for each class. Although you will be graded on coverage of stated requirements, you are free to use your creative touch in developing additional classes and objects with additional instance variables should you wish. He reads red book quickly! c. Create the unit test application and use it to test the functionality of each class. Submit the screenshots showing that the code was tested. II. Data Structure for Message Storage: Use data structures (either Arrays, ArrayLists, or a HashMaps) to store the message data in accordance with the given specifications. You can use one type, or a mix of the listed types of data structures for message storage. Specifically, it should be one data structure per word type (verb, subject, etc.), but you can choose to use a HashMap for canned messages and maybe ArrayLists for the other data structuresor use Arrays for all of them. III. Methods and Instance variables a. Method shoutOutCannedMessage() loops through the data structure that stores the canned messages first to display all canned messages and allows the user to select one canned message. b. The method shoutOutCannedMessage() will return the selected message string. c. Your shoutOutRandomMessage() method should use a random number generator that selects one word from each data structure to form a random message. The random number generated should not exceed the bounds of your data. In other words, if you only have 5 words in a data structure, the random number generated should not be an index that has no word stored. d. The method shoutOutRandomMessage() should return a randomly generated message string in accordance with specifications, in the form: Subject – Verb – Adjective – Object – Adverb (for example, “You read hard books quickly”). e. Use the MyClone introduction() method to introduce your clone to the virtual world by displaying a greeting, your full name, and anything else you would want to say. f. MyClone class should include instance variables (at least firstName and lastName) that are made private and have associated getters (accessors) and setters (mutators) for all instance variables. g. You should build an additional class of your choice, which should have at least 2 private instance variables with associated getters (accessors) and setters (mutators) and 1 method your choice. IV. Test Application: You will create one application that will test all three classes. a. Perform a unit test of the MyClone to test all getters (accessors) and setters (mutators)and method(s) of the class. b. Perform a unit test of the ShoutBox to test all methods of the class. c. Perform a unit test of the additional class object to test all getters (accessors) and setters (mutators) and method(s) of the class. V. In-Code Comments a. Make sure your object-oriented code is accurately documented to explain the purpose and behavior of the code. b. Articulation of comments is clear and concise for the audiences that may review it, including your instructor and individuals that may need to maintain or implement the code. Milestones Milestone One: MyClone Class In Module Two, you will submit your Java class, MyClone. You will create your initial version of the MyClone class. MyClone class should have instance variables firstName and lastName. The firstName and lastName instance variables hold a value for first and last names respectively. You will demonstrate your understanding of encapsulation using the private specifier to restrict access to your instance variables. This milestone is graded with the Milestone One Rubric. Feedback should be incorporated into the final project as warranted. Milestone Two: Message Array In Module Five, you will submit your Java code that creates an Array of String messages. Write an application that uses an Array to store 10 messages of type String. You will store this Array with 10 messages of your choosing. For example, a message could be “I love Java the programming language!” or another message could be “I love Java the drink!” You may initialize your Array with the messages or have the user enter the messages. The choice is yours. Your Java code will loop through the Array to iterate through your entire list and display each message and allow the user to select one. The shoutOutCannedMessage() will return the selected message String. This milestone is graded with the Milestone Two Rubric. Feedback should be incorporated into the final project as warranted. Milestone Three: Programmer-Defined Class In Module Seven, You will create a Virtual World application as your final project. This Virtual World will have several objects including a MyClone object and another object of your choice. It would be an excellent idea to review the Final Project Guidelines at this time. For this Third Final Project Milestone, you will finish development of your MyClone class and create another class of your choice. In Module Two, you started development of the MyClone class. You will continue to develop the MyClone class by adding accessor methods, mutator methods, and an introduction() method. You will create an accessor and mutator method for each instance variable declared in the MyClone class. The introduction() method will introduce yourself to the virtual world by displaying a greeting, your first and last name, and anything else you would want to say. You will also create another class of your choice. Your programmer-defined class should have at a minimum two instance variables and one method. The instance variables and method should be representative of the data and behavior that objects of this class will have. You will demonstrate your understanding of encapsulation by declaring the instance variables as private and by creating accessors and mutators for each instance variable. You should have at least one constructor created that initializes all instance variables. Document your code. This milestone is graded with the Milestone Three Rubric. Feedback should be incorporated into the final project as warranted. Milestone Four: ShoutBox Class With Methods In Module Eight, you will create the ShoutBox class for your Virtual World. Your ShoutBox class will have two methods: Method shoutOutCannedMessage()will return type String. The shoutOutCannedMessage will use an Array or an ArrayList to store 10 messages of type String. For those of you who are more advanced with your Java skills, you could use a HashMap for the data structure. You can load this data structure with 10 messages of your choosing. You can initialize your Array or ArrayList with the messages or have the user enter the messages. The choice is yours. The shoutOutCannedMessage() will loop through the data structure to first display all canned messages and allow the user to select one. The shoutOutCannedMessage() will return the selected message String. Document your shoutOutCannedMessage() method to explain the code. Method shoutOutRandomMessage() method will return type String. The shoutOutRandomMessage() will use several Arrays or an ArrayList to store words. You will have one data structure that holds a list of words that are subjects, another data structure that holds a list of words that are objects, another that holds a list of verbs, another that holds a list of adverbs, and another that holds a list of adjectives. You can initialize your data structures with words or have the user enter the words. The choice is yours. The shoutOutRandomMessage() method will use a random number generator that selects one word from each data structure to form a random message. The shoutOutRandomMessage() method will return the random message as a String data type. Random messages will be of the following form: Subject – Verb – Adjective – Object – Adverb. Document your shoutOutRandomMessage() method to explain the code. This milestone is graded with the Milestone Four Rubric. Feedback should be incorporated into the final project as warranted. Final Submission: Virtual World Java Application In Module Nine, you will submit all classes for the Virtual World Java application. It should be a complete artifact, free of compiler and run-time errors, and contain all of the critical elements of the final product. You will submit the following completed classes in addition to a class that tests them: MyClone, ShoutBox, the class you designed, and a test class. In your test class you will have a main() method. This test class will represent your virtual world application that will test the MyClone, the ShoutBox, and the class you decided to create in Module Seven. Document your code with comments. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded using the Final Project Rubric. Deliverable Milestones Milestone Deliverables Module Due Grading 1 MyClone Class Two Graded separately; Milestone One Rubric 2 Message Array Five Graded separately; Milestone Two Rubric 3 Programmer-defined Class Seven Graded separately; Milestone Three Rubric 4 ShoutBox Class With Methods Eight Graded separately; Milestone Four Rubric Final Project: Virtual World Java Application Nine Graded separately; Final Project Rubric Final Project Rubric Requirements of Submission: Written components of projects must follow these formatting guidelines when applicable: double spacing, 12-point Times New Roman font, one-inch margins, and discipline-appropriate citations. This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions. Instructor Feedback: Students can find their feedback in the Grade Center. Critical Elements Exemplary (100%) Proficient (90%) Needs Improvement (70%) Not Evident (0%) Value Program Functionality All functional and design requirements are met and the user interface is friendly, handles invalid user interactions, displays output in a clear format, and is intuitive Complete program functions correctly, with no compile errors and no exceptions Complete program does not function correctly Program is not complete 10 Program Alignment Meets “Proficient” criteria and code includes additional instance variables or objects that behave according to given specifications Complete code meets the specifications and minimum requirements for each class Code is complete, but does not meet all of the given specifications and minimum requirements for each class Code is not complete 7 Unit Test Application Meets “Proficient” criteria and unit test application behaves like a true virtual world Unit test application accurately tests the functionality of each class Unit test application tests the functionality of each class, but not accurately Unit test application does not test the functionality of each class 7 Data Structure for Message Storage Meets “Proficient” criteria and generics are used to define the type of any ArrayList or HashMap; initialization of data structures are flexible (user enters the data instead of hard coded initialized data) Uses an Array, ArrayList, or a HashMap to effectively store massage data in accordance with the given specifications Uses an Array, ArrayList, or a HashMap to effectively store massage data, but not in accordance with the given specifications Does not use an Array, ArrayList, or a HashMap to effectively store massage data 6 shoutOutCannedMes sage() Method Meets “Proficient” criteria substantiated with formatted printing used to display all canned messages from the shoutOutCannedMessage() method; the user interface provided that allows user to select a message is robust, handles invalid entries, and prevents the user from entering an index that is beyond the range of the indices for the Array; loop uses length of Array to control loop Method loops through the data structure that stores the canned messages, displays all canned messages, and allows user to select one; method returns the correct selected message string Method insufficiently loops through the data structure that stores the canned messages, does not display all canned messages, or method insufficiently allows user to select one message Method does not loop through the data structure that stores the canned messages 6 shoutOutRandomMe ssage() Method Meets “Proficient” criteria and uses a different random number for the index for each data structure Method correctly uses a random number generator that selects one word from each data structure to form a random message Method incorrectly uses a random number generator so that it does not select one word from each data structure to form a random message Method does not use a random number generator 6 shoutOutRandomMe ssage() Return Meets “Proficient” criteria substantiated with the correct format used to return the message string Method returns a randomly generated message in accordance with the given specifications and in the proper string format Method returns a randomly generated message, but not in accordance with specifications or not in the proper string format Method does not return a randomly generated message 6 MyClone Method introduction() Meets “Proficient” criteria substantiated with formatted printing used to display the introduction; message displayed is aesthetically pleasing; introduction() method uses getters or accessor methods to get the current value of the first name and last name instance variables Method correctly displays a greeting, the full name of the clone, and an introduction statement for the virtual world Method displays a greeting, the full name of the clone, and an introduction statement for the virtual world, but not correctly Method does not display a greeting, the full name of the clone, and an introduction statement for the virtual world 6 MyClone Class Instance variables Meets “Proficient” criteria and the class includes additional, creative or real-world private instance variables that follow specifications MyClone class includes required instance variables that are made private and have associated getters and setters MyClone class includes required instance variables that are made private but do not have associated getters and setters MyClone class does not include the required instance variables and the instance variables are not made private 7 Additional Class Meets “Proficient” criteria and the class objects are creative or unique with private instance variables that fit the object The choice class has 2 private instance variables with associated getters and setters and 1 successful method The choice class has 2 private instance variables with associated getters and setters and 1 method, but the method is not successful or the instance variables do not follow specifications The choice class does not have 2 private instance variables and 1 method 7 Unit Test: MyClone Meets “Proficient” criteria substantiated with a user interface that lets the user interact with the application; unit test application creates more than one MyClone object and tests all possible code paths Unit test successfully tests all getters and setters and method(s) of the class Unit test tests all getters and setters and method(s) of the class, but not successfully Unit test does not test all getters and setters and method(s) of the class 6 Unit Test: ShoutBox Meets “Proficient” criteria substantiated with a user interface that allows the user to interact with the application; unit test application tests all possible code paths Unit test successfully tests all methods of the class Unit test tests all methods of the class, but not successfully Unit test does not test all methods of the class 6 Unit Test: Additional Class Meets “Proficient” criteria substantiated with user interface that allows the user to interact with the application; unit test application creates more than one of these objects and tests all methods more than once; unit test application tests all possible code paths Unit test successfully tests all getters and setters and method(s) of the class Unit test tests all getters and setters and method(s) of the class, but not successfully Unit test does not test all getters and setters and method(s) of the class 6 Code Documentation Meets “Proficient” criteria and all methods have a header that explains the purpose of the method, the pre-conditions, and the post-conditions Code is accurately documented to explain the purpose and behavior of the code Code is documented to explain the purpose and behavior of the code, but not always accurately Code is not documented to explain the purpose and behavior of the code 6 Articulation of Comments Meets “Proficient” criteria and submission is properly cited, free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy to read format Articulation of comments is clear and concise, using appropriate jargon for all users and viewers, with no major errors related to citations, grammar, spelling, syntax, or organization Articulation of comments is clear and concise , but does not use appropriate jargon for all users and viewers or has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Articulation of comments is not clear and concise 8 Earned Total 100%

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

final project

To Whom this may concern, 

I asked what files that I need to incorporate in the final project and from what my professor told me all that is needed is  MyClone.java, ShoutBox.java, one more class file of your choice and the tester class. I have had a heck of a time having them all connect and work properly, here is what I have so far attached to this question, I was wondering if you could guide me on how to incorporate all the files that I am going to provide into one source package or if you could rewrite it if the functionality does not work. I am all ears and up to suggestions. Here attached is the final project guidelines and the files I had a hard time putting in a tester so if you could write one for me that would be good or if you could show me how to create a tester class. Thank you so much

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

DFD

I have to create a DFD for training process. I am totally lost I don’t know where to begin

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

business needs of an advertising company MilleniAds

I need to identify the business needs of an advertising company MilleniAds in TestOut 2-3  the hardware needs of the company.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

IT 380 Milestone Two Guidelines and Rubric

IT 380 Milestone Two Guidelines and Rubric Overview: For the final project in this course you will assume the role of a training manager at a cybersecurity firm needing to create a training manual for new information security analyst hires. For milestone two, complete the cybersecurity policy section of the manual. Remember, use the same manual you used to complete milestone one. Prompt: You will submit the cybersecurity policy section of the training manual. The training manual will include a discussion of the purpose and value of cybersecurity, illuminate core tenets of cybersecurity, and illustrate best practices for addressing common threat scenarios. Use the information on each of these topics to develop a customized training manual for newly hired cybersecurity professionals at CyberLeet. Specifically, the following critical elements must be addressed: I. How to Develop Cybersecurity Policies: In this part of the training manual, you will develop the cybersecurity policies in four distinct areas for new hires at CyberLeet. Based on information you have learned on cybersecurity use and governance, you will develop policies for end-user passwords, acceptable use, basic users, and user training. For each of these areas, follow the guiding questions to develop effective use policies that new hires will be trained on. Review the directions in each section of the manual template to guide your response. Be sure you delete all of the directions in each section prior to finalizing the information. A. What principles should the information security analyst apply in order to develop appropriate password policies for their clients? Make sure you address confidentiality, integrity, and availability of information. B. What principles should the information security analyst apply in order to develop appropriate acceptable use policies for the client? Make sure you address confidentiality, integrity, and availability of information. C. What principles should the information security analyst apply in order to develop appropriate user training policies for the client? Make sure you address confidentiality, integrity, and availability of information. D. What principles should the information security analyst apply in order to develop appropriate basic user policies for the client? Make sure you address confidentiality, integrity, and availability of information. Rubric Guidelines for Submission: Use the template provided to complete this assignment. Review each section and follow the prompts accordingly. All prompts should be deleted. Remember, you are responsible for every section of a completed training manual. Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions. Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value How To: Password Policies Meets “Proficient” criteria and demonstrates keen insight into best practices for defending the confidentiality, integrity, and availability of information Identifies specific principles for developing appropriate password policies that address confidentiality, integrity, and availability of information Identifies principles for developing password policies but fails to fully address all relevant aspects or there are gaps in logic or accuracy Does not identify principles for developing password policies 25 How To: Acceptable Use Policies Meets “Proficient” criteria and demonstrates keen insight into best practices for defending the confidentiality, integrity, and availability of information Identifies specific principles for developing appropriate acceptable use policies that address confidentiality, integrity, and availability of information Identifies principles for developing acceptable use policies but fails to fully address all relevant aspects or there are gaps in logic or accuracy Does not identify principles for developing acceptable use policies 25 How To: User Training Policies Meets “Proficient” criteria and demonstrates keen insight into best practices for defending the confidentiality, integrity, and availability of information Identifies specific principles for developing appropriate user training policies that address confidentiality, integrity, and availability of information Identifies principles for developing user training policies but fails to fully address all relevant aspects or there are gaps in logic or accuracy Does not identify principles for developing user training policies 25 How To: Basic User Policies Meets “Proficient” criteria and demonstrates keen insight into best practices for defending the confidentiality, integrity, and availability of information Identifies specific principles for developing appropriate basic user policies that address confidentiality, integrity, and availability of information Identifies principles for developing basic user policies but fails to fully address all relevant aspects or there are gaps in logic or accuracy Does not identify principles for developing basic user policies 25 Total 100%

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"