Categories
Computer Science

please note that we are not working in groups for this project Milestone 4 (tem

please note that we are not working in groups for this project
Milestone 4 (template and 2-4 paragraphs). Be sure to add quotation marks and reference your work
in every section of the template (copy-and-paste assignment.

Categories
Computer Science

Consider an example of an input screen – either at work or at school. Analyze th

Consider an example of an input screen – either at work or at school. Analyze the design and appearance of each screen and try to identify at least 2-3 possible improvements.
This is a video assignment. Use screencastomatic.com or another screencast software to record a walkthrough of this input screen and improvements. Also, discuss the data collected on the backend of this input screen and how that data should be stored or reported for ease of analysis as well.
No more than 4-5 minutes recorded; informal.
voice-over description or notes to describe steps in a separate doc

Categories
Computer Science

Competency Develop software design models. Scenario You are the lead developer f

Competency
Develop software design models.
Scenario
You are the lead developer for the software development team at Great Code Inc. Your company has been contracted by the Acme Company, a small manufacturing company, to develop a set of software system solutions to bring their existing manual, paper ordering process into an automated, digital online ordering system. The Acme Company has very limited experience with the process of developing software.
Instructions
The Program Manger has asked you to develop design models for the Acme Company online ordering system. The design models that have been requested are:
A design model diagram detailing the overview of the online order system.
A process flowchart model for the order submission to fulfillment process within the online order system.
A UML activity diagram for the order submission to fulfillment process within the online order system.
A UML class diagram that must include at least three classes with specific details regarding relationships (names, multiplicity, direction).

Categories
Computer Science

From the Technical Communication textbook, under “Projects” (p. 14) at the end o

From the Technical Communication textbook, under “Projects” (p. 14) at the end of Chapter 1, Item #1 under the ‘General’ category: “Write a memo to your boss, justifying reimbursement for this course. Explain how the course will help you become more effective on the job. (See Chapter 15 for memo elements and format.)”
In addition, request reimbursement for all the courses in the BS-CSIA Program, up to whatever dollar limit might be set by your employer (if there is such a limit). Be sure to provide a brief summary of each of the courses and how completion of the overall program will make you a better asset for the company.
If you are not currently employed (or in the military), or you do not want to use your real employer as the target audience, just write the assignment using a fictitious, medium-sized company where they have you and a few other cybersecurity staff and you are addressing the memo to the InfoSec supervisor/manager.
Strictly for identification purposes of this assignment, use the following information in the heading of the memo:
From – Your Name
To – Professor _________ (don’t write the memo ‘to’ the professor, your audience is your boss)
Date – Use the date of the assignment
Subject – Enter something appropriate for the topic
REF: – “CYB320 Week One Writing Assignment”
Other criteria:
Margins all 1 inch
Use 12pt font size only
Use a standard font style (e.g., Times Roman, Arial, Calibri)
Use 1.5 line spacing
Written memo should be 1.5 to 2 pages (no more than 2 pages)
CYB320 Week 1 Writing Assignment – Grading Rubric – PDF Document (138 KB)

Categories
Computer Science

From the Technical Communication textbook, under “Projects” (p. 14) at the end o

From the Technical Communication textbook, under “Projects” (p. 14) at the end of Chapter 1, Item #1 under the ‘General’ category: “Write a memo to your boss, justifying reimbursement for this course. Explain how the course will help you become more effective on the job. (See Chapter 15 for memo elements and format.)”
In addition, request reimbursement for all the courses in the BS-CSIA Program, up to whatever dollar limit might be set by your employer (if there is such a limit). Be sure to provide a brief summary of each of the courses and how completion of the overall program will make you a better asset for the company.
If you are not currently employed (or in the military), or you do not want to use your real employer as the target audience, just write the assignment using a fictitious, medium-sized company where they have you and a few other cybersecurity staff and you are addressing the memo to the InfoSec supervisor/manager.
Strictly for identification purposes of this assignment, use the following information in the heading of the memo:
From – Your Name
To – Professor _________ (don’t write the memo ‘to’ the professor, your audience is your boss)
Date – Use the date of the assignment
Subject – Enter something appropriate for the topic
REF: – “CYB320 Week One Writing Assignment”
Other criteria:
Margins all 1 inch
Use 12pt font size only
Use a standard font style (e.g., Times Roman, Arial, Calibri)
Use 1.5 line spacing
Written memo should be 1.5 to 2 pages (no more than 2 pages)
CYB320 Week 1 Writing Assignment – Grading Rubric – PDF Document (138 KB)

Categories
Computer Science

Competency Develop software design models. Scenario You are the lead developer f

Competency
Develop software design models.
Scenario
You are the lead developer for the software development team at Great Code Inc. Your company has been contracted by the Acme Company, a small manufacturing company, to develop a set of software system solutions to bring their existing manual, paper ordering process into an automated, digital online ordering system. The Acme Company has very limited experience with the process of developing software.
Instructions
The Program Manger has asked you to develop design models for the Acme Company online ordering system. The design models that have been requested are:
A design model diagram detailing the overview of the online order system.
A process flowchart model for the order submission to fulfillment process within the online order system.
A UML activity diagram for the order submission to fulfillment process within the online order system.
A UML class diagram that must include at least three classes with specific details regarding relationships (names, multiplicity, direction).

Categories
Computer Science

Consider an example of an input screen – either at work or at school. Analyze th

Consider an example of an input screen – either at work or at school. Analyze the design and appearance of each screen and try to identify at least 2-3 possible improvements.
This is a video assignment. Use screencastomatic.com or another screencast software to record a walkthrough of this input screen and improvements. Also, discuss the data collected on the backend of this input screen and how that data should be stored or reported for ease of analysis as well.
No more than 4-5 minutes recorded; informal.
voice-over description or notes to describe steps in a separate doc

Categories
Computer Science

Describe one or more accomplishments you are particularly proud of that suggest that you will succeed in your chosen area of research.

Please explain why you are a good candidate for graduate school. You should describe why you
wish to attend graduate school, what you would like to study, and any research experience you
have. Describe one or more accomplishments you are particularly proud of that suggest that you
will succeed in your chosen area of research.

Categories
Computer Science

Managing user identity is equally important as implementing it.

Objective
In Project 2 deliverable, you implemented a strategy for user identity. Managing user identity is equally important as implementing it. Proper management of identity ensures that users have access to resources they need to perform their job functions and accounts are properly secured. In this deliverable, you will demonstrate the creation of user groups, manage Role-Based Access Control (RBAC) roles, view user login activity, the configuration of Azure AD self-service password reset policy, and create a customed banned password.

Categories
Computer Science

How does computer forensics tie into your topic

more instructions in power point below
A Project report with detailed information about your project topic and should have the following sections: (At least 5 Pages)
Description
Major suppliers/vendors/service providers
Feature matrix
Pricing of Product/Service (If available)
How does Computer Forensics tie into your topic
Comparison with other similar Product/Service
Summary/Conclusion
Format
12 point Arial 1.5 line spacing. Default margins
Page count does not include Title Page, Reference Page, or Appendices.
Please credit graphics you download
At least 3 independent, credible references are required. Use MLA or APA format