Overview: This case study analysis is
the first of two formative tasks that will support your understanding of the
key course concepts of human behaviors that could potentially cause a security
threat. These case study analyses will inform your approach for the milestone
tasks and the final project.
Prompt: Identify three current security breaches. Using
presentation software, create a slide for each of the breaches. In addition to
indicating when each breach occurred, address the following critical elements
on each slide:
Guidelines for Submission: Include a title slide. Include at least
one slide for each of the three breaches. Include all of the critical elements
for each breach. On each slide, use the commenting feature to describe each
breach in two to three paragraphs.
Instructor Feedback: This activity uses an integrated rubric in
Blackboard. Students can view instructor feedback in the Grade Center. For more
information, review these instructions.
Critical
Elements
Proficient (100%)
Needs Improvement (75%)
Not Evident
(0%)
Value
Compromised Data
Accurately describes the
data that was compromised
Does not sufficiently
describe the data that was compromised
Does not describe the data
that was compromised
15
Individuals and Organizations
Accurately and sufficiently describes the
individuals and organizations that were impacted
Does not sufficiently describe the
individuals and organizations that were impacted
Does not describe the individuals and
organizations that were impacted
20
Human Factors and Suspects
Accurately and sufficiently assesses the
human factors that impacted the breach and indicates whether the suspects
were identified
Does not sufficiently
assess the humanfactors that impacted the breach or indicate whether the
suspects wereidentified
Does not assess the human
factors that impacted the breach or indicate whether thesuspects were
identified
20
Mitigation
Efforts
Sufficiently provides concrete examples of
the efforts being undertaken to mitigate future occurrences
Does not sufficiently provide concrete
examples of the efforts being undertaken to mitigate future occurrences
Does not provide examples of the efforts being
undertaken to mitigate future occurrences
20
Damage
Control Measures
Accurately and sufficiently describes the
damage control measures
Does not sufficiently describe the damage
control measures
Does not describe the damage control
measures
15
Articulation
of Response
Submission has no major errors related to
citations, grammar, spelling, syntax, or organization
Submission has major errors related to
citations, grammar, spelling, syntax, or organization that negatively impact
readability and articulation of main ideas
Submission has critical errors related to
citations, grammar, spelling, syntax, or organization that prevent
understanding of ideas
10
Earned Total
100%
[
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 21:50:482019-06-30 21:50:48case study analysis
How do I view the step by step solution to VIEW THE STEP-BY-STEP SOLUTION TO:Overview: Basic knowledge of computers is practically essential for productively engaging in twenty-first-century life.
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 21:49:592019-06-30 21:49:59twenty-first-century life
IT 145 Module Two Assignment Guidelines and Rubric
Overview: This assignment will allow you to use pseudocode to implement the program to see the value in planning first, coding later. While coding is the
glamorous part of the job, software development is a process with many steps. The program itself will focus on operators to complete an equation.
Prompt: Before completing this assignment, be sure to review the Module Two resources. Use the Guide to Pseudocode document to write out the pseudocode
for the given problem:
Imagine that you are a merchant and need to keep better tabs on your merchandise to know when to reorder supplies. First, write out pseudocode, and then
create a program to help you by accomplishing the following tasks:
Use a dialog box to ask the user to input the following. (You will need to convert this from a string to an integer.)
○ How many apples are on hand
○ How many apples should be in stock
○ How many oranges are on hand
○ How many oranges should be in stock
Perform an operation to determine how many of each item should be ordered to maintain the stock.
Use a dialog box to output the number of apples and oranges that need to be ordered.
Once you have the program laid out, build it by creating a functional program. Use your pseudocode as a guide. Be sure to remember the following important
items:
Follow the style guidelines found in ZyBooks as you develop.
Use commenting to describe the code.
Practice debugging if you encounter errors.
Ensure your program performs its intended function.
Specifically, the following critical elements must be addressed:
I. Documentation: Pseudocode: Break down the problem statement into programming terms through creation of pseudocode following the guidelines
provided in the course.
II. Functioning Code: Produce fully functioning code (a code that produces no errors) that aligns with the accompanying annotations.
III. Code Results: Results are properly generated.
A. Code results generate accurate output.
B. Code results produce results that are streamlined, efficient, and error free.
IV. Comments: All code should be well-commented. This is a practiced art that requires striking a balance between commenting everything, which adds a
great deal of unneeded noise to the code, and commenting nothing.
A. Explain the purpose of lines or sections of your code, detailing the approach and method the programmer took to achieve a specific task in the
code.
V. Style and Structure: Part of the lesson to be learned in this course is how to write code that is clearly readable and formatted in an organized manner.
A. Develop logically organized code that can be modified and maintained.
B. Utilize proper syntax, style, and language conventions and best practices.
Guidelines for Submission: Submit your pseudocode as a DOC or DOCX file. Submit the program as a JAVA file.
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information,
review these instructions.
Rubric
Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
Documentation:
Pseudocode
Meets “Proficient” criteria and
demonstrates thorough
understanding of the creation
of pseudocode
Breaks down the problem
statement into programming
terms through the creation of
pseudocode
Breaks down the problem
statement into programming
terms through the creation of
pseudocode, but pseudocode
contains inaccuracies or
explanation is illogical or
incomplete
Does not break down the
problem statement into
programming terms through
the creation of pseudocode
10
Functioning Code Produces fully functioning code
(a code that produces no
errors) that aligns with the
accompanying annotations
Produces partially functioning
code (a code that produces
almost no errors) that partially
aligns with the accompanying
annotations
Does not produce functioning
code
20
Code Results:
Accurate Output
Meets “Proficient” criteria and
the code is capable of
producing accurate results
beyond the specifications of
the given problem
Generates code results with
accurate output
Generates code with incorrect
results for the given problem
Does not produce results for
the given problem
15
Code Results:
Efficiency
Meets “Proficient” criteria and
includes sophisticated
techniques such as error
handling or reference to usercreated functions
Produces code results that are
streamlined, efficient, and
error free
Produces results that are
minimally inefficient (e.g.,
multiple minor occurrences of
convoluted code; alternative
code element would achieve
results in a simpler manner)
Does not produce code results
that are streamlined, efficient,
and error free
20
Comments:
Explanation of
Purpose
Meets “Proficient” criteria and
clarity of annotations facilitates
code navigation for a varied
audience; code is written in a
concise manner
Explains the purpose of lines or
sections of the code, detailing
the approach and method the
programmer took to achieve a
specific task in the code
Explains the purpose of lines or
sections of the code, detailing
the approach and method the
programmer took to achieve a
specific task in the code, but
explanation has inaccurate
and/or missing details
Does not explain the purpose
of lines or sections of the code
20
Style and Structure:
Logically Organized
Code
Meets “Proficient” criteria and
demonstrates deliberate
attention to spacing,
whitespace, and variable
naming
Develops logically organized
code that can be modified and
maintained
Develops logically organized
code that can be modified and
maintained but with portions
that are not logically organized
Does not develop logically
organized code that can be
modified and maintained
5
Style and Structure:
Syntax
Meets “Proficient” criteria and
demonstrates an
understanding of why certain
techniques are considered best
practices
Utilizes proper syntax, style,
and language conventions and
best practices
Utilizes proper syntax, style,
and language conventions and
best practices, but with some
errors
Does not utilize proper syntax,
style, and language
conventions and best practices
10
Total 100%
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 21:49:002019-06-30 21:49:00IT 145 Module Two Assignment Guidelines and Rubric
IT 145 Guide to Pseudocode
Pseudocode is an intermediary step between reading a problem statement and writing the code to solve
the problem. It serves as a blueprint for your program to guide you through, just like contractors start
with a blueprint before building a house. Use your pseudocode as a tool to begin thinking about your
program, but keep in mind it might not be the final solution to the problem. Pseudocode is written in a
natural language using some programming keywords.
Consider the first example below:
INCREMENT the number of apples in the basket by one
Notice in the example that it fully describes, in natural language, what needs to be done in the program.
When writing pseudocode, start at the beginning of what you need the program to do. Then work
through, step by step, until reaching the end of what’s required by the program in the problem
statement. This is putting the problem in sequence. For example, making a peanut butter sandwich:
OBTAIN a plate
OBTAIN two slices of bread
OBTAIN a jar of peanut butter
OBTAIN a knife
Place the slices of bread on the plate
Open the jar of peanut butter
Spread peanut butter on one bread slice with the knife
Place the empty slice of bread on top of the slice with peanut butter
Serve
There are several common keywords that get capitalized as they refer to actions taken in the program.
Those words include READ, WRITE, PRINT, DISPLAY, CALCULATE, SET, INCREMENT, and more. You can
also show choices and loops in pseudocode. Just like in coding, when an item is nested inside another
item, you indent that line of pseudocode. Below are three generic examples:
IF condition THEN
Include the first sequence
ELSE
Include the second sequence
ENDIF
WHILE condition
Include the sequence
ENDWHILE
FOR loop parameters
Include the sequence
ENDFOR
You can also use the keyword CALL to reference another algorithm written separately. Now look at the
following more complete examples of both good and bad pseudocode to get a general feel of how to
write it.
Bad Example (Vague and incomplete):
function doProgrammingHomework():
Get things for homework
Write the code correctly
Finish the homework
Bad Example (Too technical; does not follow natural language usage):
function doProgrammingHomework():
getComputer();
openBlackboard();
for (var count = 0; count < problems.length(); count++)
solve();
while (!compile)
debug();
submit()
shutDownComputer();
Good Example (Follows steps one at a time through the end of the algorithm):
function doProgrammingHomework():
GET a computer
OPEN the Blackboard module
FOR each of the problems in the module
Complete problem
WHILE the problem does not compile
Debug
ENDWHILE
Submit the assignment
ENDFOR
Shut down the computer
Remember not to make your pseudocode too technical. You are not trying to write the code itself, just a
plan as a stepping-stone after the initial problem to get your creative juices flowing.
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
The deployment of applications to the Web and the cloud has produced unique database challenges and solutions. Some of these solutions include the refinement of multi-tiered architectures, while other solutions include the adoption of database management systems that do not use the relational model.
For your initial post, research Web-based database technologies and identify a database management system (other than SQL Server, MySQL, or Oracle) that is used to deploy applications to the Web and the cloud. Discuss the database management system and its unique capabilities. How does the database management system differ from the non Web and cloud applications? What benefits does the database management system offer to organizations that are deploying applications to the Web and the cloud?
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 21:47:002019-06-30 21:47:00deployment of applications to the Web
IT 511: Final Project Guidelines and Grading Guide
Overview
Your final project for this course is the creation of a Virtual World Java application that results in a virtual world, complete with an object that will act as a human
clone. A virtual world with a human clone would not be complete without additional objects for interaction, so you will be responsible for creating a “ShoutBox”
and another object that will keep your human clone from getting lonely, and a virtual world application that will test your objects. Your final deliverables will
include your working code (which your instructor will run in order to review your virtual world) as well as an annotated version of your written code that explains
your reasoning for choices, how the code meets the given specifications for your project, how you ensured the accuracy and workability of your code, and
methods used for testing and debugging.
The project is divided into four milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Modules Two, Five, Seven, and Eight. The final submission will be submitted in Module Nine.
In this assignment you will demonstrate your mastery of the following course outcomes:
Write simple, accurate object-oriented programs using primitive data types, variables, data structures, and object-oriented principles
Implement classes that meet the given specifications of object instance variables and behaviors
Create operative algorithms using sequential logic structures, decision control structures, and loops
Create and use methods that accept parameters and return results
Test and debug object-oriented programs for accuracy in program functionality
Document object-oriented code with comments that articulate the purpose and behavior of code for various audiences
Prompt
In creating your virtual world, you will need to create a MyClone class that will represent a virtual clone, another class that will represent a ShoutBox, and
another class of your choice. The class of your choice can be anything you want to exist in your virtual world (a cat, a bird, a computer, etc.). This project is a
prototype and there will not be any graphics, so you will create an application that unit tests the functionality of your three classes (your MyClone class, your
ShoutBox class, and the class of your choice).
Specifications for MyClone
Feel free to add additional instance variables and behaviors, but your clone object must have instance variables firstName, lastName, and an introduction()
method. The firstName and lastName instance variables will hold your first and last names. You will demonstrate your understanding of encapsulation by
protecting your instance variables by making them private and by creating getters and setter methods for all instance variables. You should have at least one
constructor created that initializes all instance variables. The introduction() method will introduce you to the virtual world by displaying a greeting, your full
name, and anything else you would want to say.
Partial class diagram for the MyClone object:
Specifications for ShoutBox
The ShoutBox object will allow you to shout messages into your virtual world. Your ShoutBox will have two ways of generating messages:
1. You can select from a list of canned messages to shout, or
2. You can have the ShoutBox generate a random message for you.
You must use data structures Array, ArrayList, or a HashMap to store the message data.
Canned messages: One data structure will store the canned messages. You can load this data structure with canned messages of your choosing. The
shoutOutCannedMessage() method will loop through the data structure to first display all canned messages and allow the user to select one. The
shoutOutCannedMessage() will return the selected message String. This String will be displayed in the virtual world. For now, your virtual world will be the
output window.
Random messages: To generate random messages, you need to have a data structure that holds a list of subjects, another data structure that holds a list of
objects, another that holds a list of verbs, another that holds a list of adverbs, and another that holds a list of adjectives. The lists you create can hold as many
words as you would like. The shoutOutRandomMessage() method will use a random number generator that selects one word from each data structure to form a
random message. Random messages will be in the following form: Subject – Verb – Adjective – Object – Adverb.
The generated message String will be returned. The String will be displayed by the ShoutBox in the virtual world. For now, your virtual world will be the output
window.
MyClone
-firstName
-lastName
introduction()
Partial class diagram for the ShoutBox object:
Examples of canned messages stored in the canned messages data structure (you can store as many canned messages as you would like):
Example of subjects stored in the subjects data structure:
“I”
“You”
Example of objects stored in the objects data structure:
“course”
“homework”
Example of verbs stored in the verbs data structure:
“studying”
“eating”
“sneezing”
Example of adjectives stored in the adjectives data structure:
“funny”
“prickly”
“hard”
“awesome”
Example of adverbs stored in the adverbs data structure:
ShoutBox
String shoutOutRandomMessage()
String shoutOutCannedMessage()
“Hello World”
“I am studying”
“I am at work”
“quickly”
“everywhere”
Specifications for Your Additional Object
You will create another object of your choosing to add to your virtual world. Your object should have at a minimum two (2) instance variables and one (1)
method. You will demonstrate your understanding of encapsulation by protecting your instance variables by making them private and by creating getters and
setter methods for all instance variables. You should have at least one constructor created that initializes all instance variables.
Specifications for Virtual World Application
You will create a virtual world application that will test your MyClone, ShoutBox, and the object you decided to add to your virtual world. Because this is a simple
prototype, you will not actually create any graphics to represent the objects in the virtual world. Any displayed information will simply be displayed in the
output window.
Submit your Java application by submitting all .java files and at least four screenshots that demonstrate you tested the application.
While the listed number of instance variables and methods are the minimum number required for each class, you are free to create additional.
Specifically, the following critical elements must be addressed:
I. Program Functionality and Alignment
a. Make sure your entire program functions correctly and that there are no exceptions or compile errors
b. In writing your code, make sure that you are meeting or exceeding all of the given specifications for each class. Although you will be graded on
coverage of stated requirements, you are free to use your creative touch in developing additional classes and objects with additional instance
variables should you wish.
He reads red book
quickly!
c. Create the unit test application and use it to test the functionality of each class. Submit the screenshots showing that the code was tested.
II. Data Structure for Message Storage: Use data structures (either Arrays, ArrayLists, or a HashMaps) to store the message data in accordance with the
given specifications. You can use one type, or a mix of the listed types of data structures for message storage. Specifically, it should be one data structure
per word type (verb, subject, etc.), but you can choose to use a HashMap for canned messages and maybe ArrayLists for the other data structuresor
use Arrays for all of them.
III. Methods and Instance variables
a. Method shoutOutCannedMessage() loops through the data structure that stores the canned messages first to display all canned messages and
allows the user to select one canned message.
b. The method shoutOutCannedMessage() will return the selected message string.
c. Your shoutOutRandomMessage() method should use a random number generator that selects one word from each data structure to form a
random message. The random number generated should not exceed the bounds of your data. In other words, if you only have 5 words in a data
structure, the random number generated should not be an index that has no word stored.
d. The method shoutOutRandomMessage() should return a randomly generated message string in accordance with specifications, in the form:
Subject – Verb – Adjective – Object – Adverb (for example, “You read hard books quickly”).
e. Use the MyClone introduction() method to introduce your clone to the virtual world by displaying a greeting, your full name, and anything else
you would want to say.
f. MyClone class should include instance variables (at least firstName and lastName) that are made private and have associated getters (accessors)
and setters (mutators) for all instance variables.
g. You should build an additional class of your choice, which should have at least 2 private instance variables with associated getters (accessors) and
setters (mutators) and 1 method your choice.
IV. Test Application: You will create one application that will test all three classes.
a. Perform a unit test of the MyClone to test all getters (accessors) and setters (mutators)and method(s) of the class.
b. Perform a unit test of the ShoutBox to test all methods of the class.
c. Perform a unit test of the additional class object to test all getters (accessors) and setters (mutators) and method(s) of the class.
V. In-Code Comments
a. Make sure your object-oriented code is accurately documented to explain the purpose and behavior of the code.
b. Articulation of comments is clear and concise for the audiences that may review it, including your instructor and individuals that may need to
maintain or implement the code.
Milestones
Milestone One: MyClone Class
In Module Two, you will submit your Java class, MyClone. You will create your initial version of the MyClone class. MyClone class should have instance variables
firstName and lastName. The firstName and lastName instance variables hold a value for first and last names respectively. You will demonstrate your
understanding of encapsulation using the private specifier to restrict access to your instance variables. This milestone is graded with the Milestone One Rubric.
Feedback should be incorporated into the final project as warranted.
Milestone Two: Message Array
In Module Five, you will submit your Java code that creates an Array of String messages. Write an application that uses an Array to store 10 messages of type
String. You will store this Array with 10 messages of your choosing. For example, a message could be “I love Java the programming language!” or another
message could be “I love Java the drink!” You may initialize your Array with the messages or have the user enter the messages. The choice is yours. Your Java
code will loop through the Array to iterate through your entire list and display each message and allow the user to select one. The shoutOutCannedMessage() will
return the selected message String. This milestone is graded with the Milestone Two Rubric. Feedback should be incorporated into the final project as
warranted.
Milestone Three: Programmer-Defined Class
In Module Seven, You will create a Virtual World application as your final project. This Virtual World will have several objects including a MyClone object and
another object of your choice. It would be an excellent idea to review the Final Project Guidelines at this time. For this Third Final Project Milestone, you will
finish development of your MyClone class and create another class of your choice.
In Module Two, you started development of the MyClone class. You will continue to develop the MyClone class by adding accessor methods, mutator methods,
and an introduction() method. You will create an accessor and mutator method for each instance variable declared in the MyClone class. The introduction()
method will introduce yourself to the virtual world by displaying a greeting, your first and last name, and anything else you would want to say.
You will also create another class of your choice. Your programmer-defined class should have at a minimum two instance variables and one method. The instance
variables and method should be representative of the data and behavior that objects of this class will have. You will demonstrate your understanding of
encapsulation by declaring the instance variables as private and by creating accessors and mutators for each instance variable. You should have at least one
constructor created that initializes all instance variables. Document your code. This milestone is graded with the Milestone Three Rubric. Feedback should be
incorporated into the final project as warranted.
Milestone Four: ShoutBox Class With Methods
In Module Eight, you will create the ShoutBox class for your Virtual World. Your ShoutBox class will have two methods:
Method shoutOutCannedMessage()will return type String.
The shoutOutCannedMessage will use an Array or an ArrayList to store 10 messages of type String. For those of you who are more advanced with your Java skills,
you could use a HashMap for the data structure. You can load this data structure with 10 messages of your choosing. You can initialize your Array or ArrayList
with the messages or have the user enter the messages. The choice is yours. The shoutOutCannedMessage() will loop through the data structure to first display
all canned messages and allow the user to select one. The shoutOutCannedMessage() will return the selected message String. Document your
shoutOutCannedMessage() method to explain the code.
Method shoutOutRandomMessage() method will return type String.
The shoutOutRandomMessage() will use several Arrays or an ArrayList to store words. You will have one data structure that holds a list of words that are subjects,
another data structure that holds a list of words that are objects, another that holds a list of verbs, another that holds a list of adverbs, and another that holds a
list of adjectives. You can initialize your data structures with words or have the user enter the words. The choice is yours.
The shoutOutRandomMessage() method will use a random number generator that selects one word from each data structure to form a random message. The
shoutOutRandomMessage() method will return the random message as a String data type. Random messages will be of the following form: Subject – Verb –
Adjective – Object – Adverb.
Document your shoutOutRandomMessage() method to explain the code.
This milestone is graded with the Milestone Four Rubric. Feedback should be incorporated into the final project as warranted.
Final Submission: Virtual World Java Application
In Module Nine, you will submit all classes for the Virtual World Java application. It should be a complete artifact, free of compiler and run-time errors, and
contain all of the critical elements of the final product. You will submit the following completed classes in addition to a class that tests them: MyClone, ShoutBox,
the class you designed, and a test class. In your test class you will have a main() method. This test class will represent your virtual world application that will test
the MyClone, the ShoutBox, and the class you decided to create in Module Seven. Document your code with comments. It should reflect the incorporation of
feedback gained throughout the course. This submission will be graded using the Final Project Rubric.
Deliverable Milestones
Milestone Deliverables Module Due Grading
1 MyClone Class Two Graded separately; Milestone One Rubric
2 Message Array Five Graded separately; Milestone Two Rubric
3 Programmer-defined Class Seven Graded separately; Milestone Three Rubric
4 ShoutBox Class With Methods Eight Graded separately; Milestone Four Rubric
Final Project: Virtual World Java
Application
Nine Graded separately; Final Project Rubric
Final Project Rubric
Requirements of Submission: Written components of projects must follow these formatting guidelines when applicable: double spacing, 12-point Times New
Roman font, one-inch margins, and discipline-appropriate citations.
This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions.
Instructor Feedback: Students can find their feedback in the Grade Center.
Critical Elements Exemplary (100%) Proficient (90%) Needs Improvement (70%) Not Evident (0%) Value
Program
Functionality
All functional and design
requirements are met and the
user interface is friendly,
handles invalid user
interactions, displays output in
a clear format, and is intuitive
Complete program functions
correctly, with no compile
errors and no exceptions
Complete program does not
function correctly
Program is not complete 10
Program Alignment Meets “Proficient” criteria and
code includes additional
instance variables or objects
that behave according to given
specifications
Complete code meets the
specifications and minimum
requirements for each class
Code is complete, but does not
meet all of the given
specifications and minimum
requirements for each class
Code is not complete 7
Unit Test Application Meets “Proficient” criteria and
unit test application behaves
like a true virtual world
Unit test application accurately
tests the functionality of each
class
Unit test application tests the
functionality of each class, but
not accurately
Unit test application does not
test the functionality of each
class
7
Data Structure for
Message Storage
Meets “Proficient” criteria and
generics are used to define the
type of any ArrayList or
HashMap; initialization of data
structures are flexible (user
enters the data instead of hard
coded initialized data)
Uses an Array, ArrayList, or a
HashMap to effectively store
massage data in accordance
with the given specifications
Uses an Array, ArrayList, or a
HashMap to effectively store
massage data, but not in
accordance with the given
specifications
Does not use an Array,
ArrayList, or a HashMap to
effectively store massage data
6
shoutOutCannedMes
sage() Method
Meets “Proficient” criteria
substantiated with formatted
printing used to display all
canned messages from the
shoutOutCannedMessage()
method; the user interface
provided that allows user to
select a message is robust,
handles invalid entries, and
prevents the user from entering
an index that is beyond the
range of the indices for the
Array; loop uses length of Array
to control loop
Method loops through the data
structure that stores the canned
messages, displays all canned
messages, and allows user to
select one; method returns the
correct selected message string
Method insufficiently loops
through the data structure that
stores the canned messages,
does not display all canned
messages, or method
insufficiently allows user to
select one message
Method does not loop through
the data structure that stores
the canned messages
6
shoutOutRandomMe
ssage() Method
Meets “Proficient” criteria and
uses a different random
number for the index for each
data structure
Method correctly uses a
random number generator that
selects one word from each
data structure to form a
random message
Method incorrectly uses a
random number generator so
that it does not select one word
from each data structure to
form a random message
Method does not use a random
number generator
6
shoutOutRandomMe
ssage() Return
Meets “Proficient” criteria
substantiated with the correct
format used to return the
message string
Method returns a randomly
generated message in
accordance with the given
specifications and in the proper
string format
Method returns a randomly
generated message, but not in
accordance with specifications
or not in the proper string
format
Method does not return a
randomly generated message
6
MyClone Method
introduction()
Meets “Proficient” criteria
substantiated with formatted
printing used to display the
introduction; message displayed
is aesthetically pleasing;
introduction() method uses
getters or accessor methods to
get the current value of the first
name and last name instance
variables
Method correctly displays a
greeting, the full name of the
clone, and an introduction
statement for the virtual world
Method displays a greeting, the
full name of the clone, and an
introduction statement for the
virtual world, but not correctly
Method does not display a
greeting, the full name of the
clone, and an introduction
statement for the virtual world
6
MyClone Class
Instance variables
Meets “Proficient” criteria and
the class includes additional,
creative or real-world private
instance variables that follow
specifications
MyClone class includes required
instance variables that are
made private and have
associated getters and setters
MyClone class includes required
instance variables that are
made private but do not have
associated getters and setters
MyClone class does not include
the required instance variables
and the instance variables are
not made private
7
Additional Class Meets “Proficient” criteria and
the class objects are creative or
unique with private instance
variables that fit the object
The choice class has 2 private
instance variables with
associated getters and setters
and 1 successful method
The choice class has 2 private
instance variables with
associated getters and setters
and 1 method, but the method
is not successful or the instance
variables do not follow
specifications
The choice class does not have
2 private instance variables and
1 method
7
Unit Test: MyClone Meets “Proficient” criteria
substantiated with a user
interface that lets the user
interact with the application;
unit test application creates
more than one MyClone object
and tests all possible code paths
Unit test successfully tests all
getters and setters and
method(s) of the class
Unit test tests all getters and
setters and method(s) of the
class, but not successfully
Unit test does not test all
getters and setters and
method(s) of the class
6
Unit Test: ShoutBox Meets “Proficient” criteria
substantiated with a user
interface that allows the user to
interact with the application;
unit test application tests all
possible code paths
Unit test successfully tests all
methods of the class
Unit test tests all methods of
the class, but not successfully
Unit test does not test all
methods of the class
6
Unit Test: Additional
Class
Meets “Proficient” criteria
substantiated with user
interface that allows the user to
interact with the application;
unit test application creates
more than one of these objects
and tests all methods more
than once; unit test application
tests all possible code paths
Unit test successfully tests all
getters and setters and
method(s) of the class
Unit test tests all getters and
setters and method(s) of the
class, but not successfully
Unit test does not test all
getters and setters and
method(s) of the class
6
Code Documentation Meets “Proficient” criteria and
all methods have a header that
explains the purpose of the
method, the pre-conditions,
and the post-conditions
Code is accurately documented
to explain the purpose and
behavior of the code
Code is documented to explain
the purpose and behavior of
the code, but not always
accurately
Code is not documented to
explain the purpose and
behavior of the code
6
Articulation of
Comments
Meets “Proficient” criteria and
submission is properly cited,
free of errors related to
citations, grammar, spelling,
syntax, and organization and is
presented in a professional and
easy to read format
Articulation of comments is
clear and concise, using
appropriate jargon for all users
and viewers, with no major
errors related to citations,
grammar, spelling, syntax, or
organization
Articulation of comments is
clear and concise , but does not
use appropriate jargon for all
users and viewers or has major
errors related to citations,
grammar, spelling, syntax, or
organization that negatively
impact readability and
articulation of main ideas
Articulation of comments is not
clear and concise
8
Earned Total 100%
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
I asked what files that I need to incorporate in the final project and from what my professor told me all that is needed is MyClone.java, ShoutBox.java, one more class file of your choice and the tester class. I have had a heck of a time having them all connect and work properly, here is what I have so far attached to this question, I was wondering if you could guide me on how to incorporate all the files that I am going to provide into one source package or if you could rewrite it if the functionality does not work. I am all ears and up to suggestions. Here attached is the final project guidelines and the files I had a hard time putting in a tester so if you could write one for me that would be good or if you could show me how to create a tester class. Thank you so much
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
I need to identify the business needs of an advertising company MilleniAds in TestOut 2-3 the hardware needs of the company.
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 21:43:222019-06-30 21:43:22business needs of an advertising company MilleniAds
IT 380 Milestone Two Guidelines and Rubric
Overview: For the final project in this course you will assume the role of a training manager at a cybersecurity firm needing to create a training manual for new
information security analyst hires. For milestone two, complete the cybersecurity policy section of the manual. Remember, use the same manual you used to
complete milestone one.
Prompt: You will submit the cybersecurity policy section of the training manual. The training manual will include a discussion of the purpose and value of
cybersecurity, illuminate core tenets of cybersecurity, and illustrate best practices for addressing common threat scenarios. Use the information on each of
these topics to develop a customized training manual for newly hired cybersecurity professionals at CyberLeet.
Specifically, the following critical elements must be addressed:
I. How to Develop Cybersecurity Policies: In this part of the training manual, you will develop the cybersecurity policies in four distinct areas for new hires
at CyberLeet. Based on information you have learned on cybersecurity use and governance, you will develop policies for end-user passwords, acceptable
use, basic users, and user training. For each of these areas, follow the guiding questions to develop effective use policies that new hires will be trained
on. Review the directions in each section of the manual template to guide your response. Be sure you delete all of the directions in each section prior to
finalizing the information.
A. What principles should the information security analyst apply in order to develop appropriate password policies for their clients? Make sure you
address confidentiality, integrity, and availability of information.
B. What principles should the information security analyst apply in order to develop appropriate acceptable use policies for the client? Make sure
you address confidentiality, integrity, and availability of information.
C. What principles should the information security analyst apply in order to develop appropriate user training policies for the client? Make sure
you address confidentiality, integrity, and availability of information.
D. What principles should the information security analyst apply in order to develop appropriate basic user policies for the client? Make sure you
address confidentiality, integrity, and availability of information.
Rubric
Guidelines for Submission: Use the template provided to complete this assignment. Review each section and follow the prompts accordingly. All prompts should
be deleted. Remember, you are responsible for every section of a completed training manual.
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information,
review these instructions.
Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
How To:
Password
Policies
Meets “Proficient” criteria and
demonstrates keen insight into
best practices for defending the
confidentiality, integrity, and
availability of information
Identifies specific principles for
developing appropriate password
policies that address
confidentiality, integrity, and
availability of information
Identifies principles for developing
password policies but fails to fully
address all relevant aspects or
there are gaps in logic or accuracy
Does not identify principles for
developing password policies
25
How To:
Acceptable Use
Policies
Meets “Proficient” criteria and
demonstrates keen insight into
best practices for defending the
confidentiality, integrity, and
availability of information
Identifies specific principles for
developing appropriate
acceptable use policies that
address confidentiality, integrity,
and availability of information
Identifies principles for developing
acceptable use policies but fails to
fully address all relevant aspects
or there are gaps in logic or
accuracy
Does not identify principles for
developing acceptable use policies
25
How To: User
Training Policies
Meets “Proficient” criteria and
demonstrates keen insight into
best practices for defending the
confidentiality, integrity, and
availability of information
Identifies specific principles for
developing appropriate user
training policies that address
confidentiality, integrity, and
availability of information
Identifies principles for developing
user training policies but fails to
fully address all relevant aspects
or there are gaps in logic or
accuracy
Does not identify principles for
developing user training policies
25
How To: Basic
User Policies
Meets “Proficient” criteria and
demonstrates keen insight into
best practices for defending the
confidentiality, integrity, and
availability of information
Identifies specific principles for
developing appropriate basic user
policies that address
confidentiality, integrity, and
availability of information
Identifies principles for developing
basic user policies but fails to fully
address all relevant aspects or
there are gaps in logic or accuracy
Does not identify principles for
developing basic user policies
25
Total 100%
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 21:42:462019-06-30 21:42:46IT 380 Milestone Two Guidelines and Rubric