Defining System Requirements In this unit

Defining System Requirements

In this unit, Charlie and Suzanne need to define system requirements for the

PPI website project. Charlie is familiar with the use case technique for gathering system requirements. He is ready to create a full set of use cases for the project. Suzanne would prefer to focus on the structured approach and identify the important entities in the system; she wants to create ERDs.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Write a program that plays a word game with the user

2.19: Word Game

Write a program that plays a word game with the user. The programshould

ask the user to enter the following:

  • His or her name
  • His or her age
  • The name of a city
  • The name of a college
  • A profession
  • type of animal
  • A pet’s name

After the user has entered these items, the program should display the following story, inserting the user’s input into the appropriate locations:

There once was a person named NAME who lived in CITY. At the age ofAGENAME went to college at COLLEGENAME graduated and went to work as a PROFESSION. Then, NAME adopted a(n) ANIMAL  namedPETNAME They both lived happily ever after!

Prompts And Output Labels: There are no labels here but the prompts should simply be (respectively) “Enter your name: “, “Enter your age: “, “Enter the name of a city: “, “Enter the name of a college: “, “Enter profession: “, “Enter a type of animal: “, “Enter a pet name: “. Note that each prompt ends with a “:” followed by one space and is displayed so that the response will appear on the same line as the prompt itself.

Input: Keep in mind that the input responses to the prompts may consist of multiple words. For example, name might be “John Jinkleheimer Schmidt”.

CLASS NAMES. Your program class should be called WordGame

2.4: Star Pattern

Write a program that displays the following pattern:

*

***

*****

*******

*****

***

*

Output. Seven lines of output as follows: The first consists of 3 spaces followed by a star. The second line consists of 2 spaces followed by a 3 stars. The third consists of one space followed by 5 stars, and the fourth consists just of 7 stars. The fifth line is identical to third, th sixth to the second and the seventh to the first.

CLASS NAMES. Your program class should be called StarPattern

Step-by-step answer

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

I have seven questions to answer for a group discussion about System Design

I have seven questions to answer for a group discussion about System Design

Looking for some

help.

What kind of models or tools might be useful?

Is it good practice to create design models?

How formal should design models be?

Should design models be saved and archived?

What are design models good for – during design, during construction, during system maintenance?

Can we just skip design and building models

What are the dangers with the approach in #6?

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Post a brief description of the new malware attack

Post a brief description of the new malware attack. Explain why the attack is

dangerous. Explain the privacy and security implications of this attack. Describe countermeasures and explain how they will mitigate or reduce the damage caused by this attack. Justify your selections.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Need java code for below two question:

Need java code for below two question:

Need

 program that will predict the size of a population of organisms. The program should ask the user for the starting number of organisms, their average daily population increase (as a percentage, expressed as a fraction in decimal form: for example 0.052 would mean a 5.2% increaseeach day), and the number of days they will multiply. A loop should display the size of the population for each day.

Prompts, Output Labels and Messages.The three input data should be prompted for with the following prompts: “Enter the starting number organisms: “, “Enter the daily increase: “, and “Enter the number of days the organisms will multiply: ” respectively. After the input has been read in successfully, a table is produced, for example:

—————————–

2            300.0

4            675.0

Under the heading is a line of 29 dashes followed by one line for each day, showing the day number and the population at the beginning of that day.

Input Validation.Do not accept a number less than 2 for the starting size of the population. If the user fails to satisfy this print a line with this message “Invalid. Must be at least 2. Re-enter: ” and try to read the value. Similarly, do not accept a negative number for average daily population increase, using the message “Invalid. Enter a non-negative number: ” and retrying. Finally, do not accept a number less than 1 for the number of days they will multiply and use the message “Invalid. Enter 1 or more: “.

———————————————————————————————————————————————————————————————————————

Need program class named SquareDisplay that asks the user for a positive integer no greater than 15. The program should then display a square on the screen using the character ‘X’. The number entered by the user will be the length of each side of the square. For example, if the user enters 5, the program should display the following:

XXXXX

XXXXX

XXXXX

XXXXX

XXXXX

INPUT and PROMPTS. The program prompts for an integer as follows: “Enter an integer in the range of 1-15: “.

OUTPUT. The output should be a square of X characters as described above.

CLASS NAMES. Your program class should be called SquareDisplay

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Need java code for below two question: Need  program that will predict the size of a population of organisms.

Need java code for below two question:

Need

 program that will predict the size of a population of organisms. The program should ask the user for the starting number of organisms, their average daily population increase (as a percentage, expressed as a fraction in decimal form: for example 0.052 would mean a 5.2% increaseeach day), and the number of days they will multiply. A loop should display the size of the population for each day.

Prompts, Output Labels and Messages.The three input data should be prompted for with the following prompts: “Enter the starting number organisms: “, “Enter the daily increase: “, and “Enter the number of days the organisms will multiply: ” respectively. After the input has been read in successfully, a table is produced, for example:

—————————–

2            300.0

4            675.0

Under the heading is a line of 29 dashes followed by one line for each day, showing the day number and the population at the beginning of that day.

Input Validation.Do not accept a number less than 2 for the starting size of the population. If the user fails to satisfy this print a line with this message “Invalid. Must be at least 2. Re-enter: ” and try to read the value. Similarly, do not accept a negative number for average daily population increase, using the message “Invalid. Enter a non-negative number: ” and retrying. Finally, do not accept a number less than 1 for the number of days they will multiply and use the message “Invalid. Enter 1 or more: “.

———————————————————————————————————————————————————————————————————————

Need program class named SquareDisplay that asks the user for a positive integer no greater than 15. The program should then display a square on the screen using the character ‘X’. The number entered by the user will be the length of each side of the square. For example, if the user enters 5, the program should display the following:

XXXXX

XXXXX

XXXXX

XXXXX

XXXXX

INPUT and PROMPTS. The program prompts for an integer as follows: “Enter an integer in the range of 1-15: “.

OUTPUT. The output should be a square of X characters as described above.

CLASS NAMES. Your program class should be called SquareDisplay

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

A security professional should understand the vulnerabilities of a CIS

A security professional should understand the vulnerabilities of a CIS before selecting and implementing effective

countermeasures. The vulnerability report is an important tool for identifying, interpreting, and understanding the vulnerabilities.

Consider the following scenario: You are a new security administrator in the credit card division of a multinational bank. Your division deals with personally identifiable information of the bank’s cardholders. To comply with regulations on personally identifiable information, you need to perform monthly network vulnerability scans. The previous security administrator ran frequent vulnerability scans, but had a hard time getting anyone to address the findings. You plan to develop a process for monthly scanning and remediation, including how to handle exceptions when the report shows a false positive or when the business needs more time to address an issue. You have a copy of the latest vulnerability report. Refer to the “Nessus Full Network Scan, Detailed Findings” web resource from the Learning Resources. The report lists server names, vulnerabilities, and the severity of these vulnerabilities. Each vulnerability has an associated Common Vulnerabilities and Exposures (CVE) number. Refer to the Common Vulnerabilities and Exposures website (http://cve.mitre.org) which explains the vulnerabilities in depth.

For this Assignment, create 4- to 6-page summary that summarizes your interpretations of the Nessus report and your recommendations to address the reported vulnerabilities. Cover the following points in your paper:

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

I am needing to a domain model class diagram and a design class diagram.

I am needing to a domain model class diagram and a design class diagram.

/>

Here are the requirements:

The database Domain Class Diagram is typically created first, followed by the program Design Class Design.

Domain Model Class Diagram. This diagram includes all of the database classes, attributes and relationships shown as one-to-one, one-to-many or many-to-many

Create both a Domain Model Class Diagram (database model) and a Design Class Diagram (for programmers).

One of the most confusing acronyms used in system design is DCD. In the world of database design it stands for Domain Class Diagram aka Domain Model Class Diagram. In the world of object-oriented program design it stands for Design Class Design. In this assignment, you will develop both types of DCDs. The database Domain Class Diagram is typically created first, followed by the program Design Class Design.

Our textbook author refers to the Domain Class Diagram as a Domain Model Class Diagram. This diagram includes all of the database classes, attributes and relationships. Relationships are shown as one-to-one, one-to-many or many-to-many. They may also be optional or mandatory.

The Design Class Diagram includes navigation visibility, methods, and data types. All of which are needed by programmers.

In this assignment, you will create both a Domain Model Class Diagram (database model) and a Design Class Diagram (for programmers).

Here is the scenario:

Following is a description of a dental clinic staff responsibilities.

The receptionists of the dental clinic are responsible for entering information about patients, including head of household information, insurance information, and number of office visits. The dental clinic business manager also maintains patient information, as well as dental staff information. The business manager responsibilities include printing invoices and sending them to the heads of households on a monthly basis, printing insurance invoices on a weekly basis, entering payment information, and compiling reports of overdue invoices. Dental staff are responsible for recording dental procedures per patient, and for running reports about dental procedures performed in a week or a month.Use Case for Print patient Invoices.jpg

Use Case for Print patient Invoices.jpg

Fuwmlwodmcm mamm- tonne Pam mun um 05: cue Pm anlmms
M um. um 01 m- mm. mums-s m pnnlsd Emu—alum: m mm mm nun-My and: m a. m .n Lama-nun: m. h—n mum-mm cm .m— m. my».- mum mean}; In nuk- m. nlondul— m. hurl urn-m by mm m
m. Imm- .m um um; mammal nu n-Iym-nl; hm- bm. mm, mm Mil-pm
In imam 1-9:»!an mm m an! w «m mm Pmem Emma mun anal. Procedures mm mm
anm mm m upfl-Im wan mm mm am
Amy x cum wnnan nun-mm pm“:
comm-Ind ms mom 2, m mm mm ID way that mm“
mm hm .u m m. a, W Ian M u-ym-mx mm um um IMI
“mm: um mm mm. :, Em. momma mm! mm mm. 5 vmymvm: :7: cum- s cm. mm mm was: 2.1 may pllml Mann-1mm mm",
pm“:- mm. 3.1 mmyummmmmm. muum
mourn mm m nu pay-m
Imam n Rw‘wcw-Iy warn mm m unpm
moudum m on awn n W a
m emu-um bvuk am by
my m mam-m ply.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Much organizational information is confidential and its leakage to undesired entities

Much organizational information is confidential and its leakage to undesired entities can damage an organization.

Therefore, the computer network of an organization should be secure enough to prevent or minimize data leakage. Your ability to identify security gaps in a network and to select measures to close those gaps will be critical to your organization’s success as well as to your professional success as a security professional.

Consider this scenario: You are the IT security manager for a business that has undergone rapid growth. The company network is suddenly much larger because of several key acquisitions. The Securities and Exchange Commission (SEC) has contacted your CEO regarding the possibility that private financial information regarding some of these new acquisitions has been leaked. There could be many ways the information leaked, and you have been asked to investigate gaps in network security that may allow data leakage such as eavesdropping or theft of credentials.

Based on your readings, as well as on additional information gleaned through research, submit 3- to 5-page summary for your Director of IT, analyzing the current security issue. You may assume that the network security is very basic. Identify possible gaps in securing the network and recommend solutions. Address the following points in your paper:

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Excel and word document 

Excel and word document

Part 1

The President of EEC recently called a meeting to announce that one

of the firm’s largest suppliers of component parts has approached EEC about a possible purchase of the supplier. The President has requested that you and your staff analyze the feasibility of acquiring this supplier. Discuss the following:

• What information will you and your staff need to analyze this investment opportunity?

• What will be your decision-making process? Discuss and evaluate the different techniques that could be used in capital budgeting decisions.

• Specifically, discuss how the time value of money affects capital budgeting. Capital budgeting differs from regular budgeting in that capital budgeting is for large investment decisions like plant expansion. The regular budgeting is for your day-to-day operations decisions.

• Which do you think EEC should use? Why?

Part 2

Based on the following information, calculate net present value (NPV), internal rate of return (IRR), and payback for the investment opportunity:

• EEC expects to save $500,000 per year for the next 10 years by purchasing the supplier.

• EEC’s cost of capital is 14%.

• EEC believes it can purchase the supplier for $2 million.

Answer the following:

• Based on your calculations, should EEC acquire the supplier? Why or why not?

• Which of the techniques (NPV, IRR, or payback period) is the most useful tool to use? Why?

• Which of the techniques (NPV, IRR, or payback period) is the least useful tool to use? Why?

• Would your answer be the same if EEC’s cost of capital were 25%? Why or why not?

• Would your answer be the same if EEC did not save $500,000 per year as anticipated?

• What would be the least amount of savings that would make this investment attractive to EEC?

• Given this scenario, what is the most EEC would be willing to pay for the supplier?

Prepare a memo to the President of EEC that details your findings and shows the effects if any of the following situations are true:

• EEC’s cost of capital increases.

• The expected savings are less than $500,000 per year.

• EEC must pay more than $2 million for the supplier.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"