Discussion 1
"Functional and Nonfunctional Requirements" Please respond to the following:
Discuss some examples of functional versus nonfunctional requirements. What would exemplify these requirements in a software development project for an online college student registration system?
Describe a requirement-specification technique that would be appropriate for an online college student registration system with an enrollment of 10,000 students.
Provide a justification as to why you would use your chosen technique over other requirement-specification techniques that are available.
Discussion 2
"Testing Nonfunctional Requirements" Please respond to the following:
Among the many nonfunctional requirements that can be included in a specification are those related to safety and reliability.
In yo
The development of a database requires thorough methodology that ensures quality within the solution. Imagine you have been contracted to develop a finance database that will help an organization track monthly expenditures by departments. Using the DBLC, discuss the various activities that you would have to achieve each phase. Assess possible challenges that may exist within each phase. Suggest actions that one can perform in order to overcome these possible challenges.
In order to mitigate risks associated with a database, it is essential to consider common sources of database failures. Describe at least two possible database failures that may occur once a database is placed into operation. Suggest actions that may be performed in order to avoid or mitigate these possible failures.
Please respond to the following:
Explore the various data communication technologies youve learned about this week.
What are some things that stood out for you?
What factors would you advise a company to consider when deciding on the way it connects to the Internet?
How would you advice the CIO of a small, medium, or large company?
Choose one and discuss the pros and cons of a couple of your selections.
1. You have been hired to lead a complex, two-year project (the project of your choice). As the Project Manager, you know it is important get the project off to a good start. Using the tools provided in the required readings (See attached), provide a quick summary of your project, including the scope and at least three goals and objectives of your project.
Big Data is data whose scale, distribution, diversity, and timeliness require the use of new technical architectures and analytics to enable insights that unlock new sources of business value.
Initial Post:
(1) Create a new thread and Name a few companies that dominate their sector through data science and data analytics. Mention on what basis are these companies effective in terms of data analytics.
(2) Chapter 1 discussed driving data deluge. Explain by giving example the concept of data deluge using four sources such as mobile sensors, social media, video surveillance, video rendering, smart grids, geophysical exploration, medical imaging, and gene sequencing?
(3) Chapter 2 described the data analytics lifecycle which is an approach to managing and executing an analytical project. What are the benefits of doing a pilot program before a full-scale rollout of a new analytical methodology? Discuss this in the context of the mini-case study of your selected or
For some additional reading, take a look at the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure:
https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/
After reading chapter 1 and looking at the link above, you're ready to participate in the first discussion.
Lets look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited and satellite communications are down (limiting the Department of Defenses [
Provide (3) 150 words response with a minimum of 2 APA references at the discussions below. Response provided should further discuss the subject or provide more insight.
Question 1:
If you were talking to a group of seniors about mobile security, what would you tell them?
Discussion 1:
Discuss what type of evidence can be collected from and mobile device and the processes used to collect that evidence.
-There is a lot of information that can be gathered from a mobile device. This information includes call history, emails, text and other messages such as Facebook messenger and Skype, photos, videos, phone information, global positioning system, and network information. Things such as photos and videos generally have hidden information such as where the media was captured and what software or hardware was used to capture it. When seizing a device, there are certain considerations to take into account. Befo
Assignment Essay
Choose your sources carefully. Cite your sources, use APA style as required, check your spelling.
Do not just answer the questions. You should be able to explain the logic behind your answer You are expected to spend at least 3 hours studying the questions, finding and studying good sources, and understanding the nature of the answers and at least an additional 3 hours answering these questions and polishing your writing, so the answers are compelling. Invest your time wisely, giving more time to the complex answers in order to ensure that you demonstrate that you truly understand the answer. Typical assignment submissions should be roughly 3,000 word in length. Shorter compelling answers are fine. Answers with needless filler will be marked down.
Essay Questions
1. Discuss in scholarly d
Good day,
I need a one to three page memo completed by 5pm on January 20, 2020 for course CIS 500 Information Systems for Decision Making . Plagiarism free. I have attached the instructions that provides the information needed to be included in the memo.