Engineering Homework Help

CS 459 CTU Football league Management Web Application Project Report

 

As a senior coder and experienced test engineer, you have been given a new software testing future key project where you were asked to develop and conduct test cases that would occur throughout the software development life cycle. Your project first was to choose between the following 3 possible key project software implementations:

  • COTS and contract software 
  • Data warehouse software 
  • Web-based software 

The future key project will consolidate your work from the previous four weeks to include the following:

  • Week 1: After choosing 1 of the 3 projects, provide an assessment of capabilities, staff competency, and user satisfaction, and create an environment supportive of software testing; you created a requirements traceability matrix (RTM) 
  • Week 2: Building the software testing process through developing the structure for the unit/usability/system test plan, method/procedure, and report 
  • Week 3: Providing the finished populated requirements traceability matrix (RTM) concerning at least 20 testable requirements (5 external interface requirements, 5 safety, 5 security, 5 performance) that will support unit, usability and system test; and the draft unit/usability/system test plan, test method/procedure, and test report. (Note that there should be a separate RTM for unit, usability, and system tests) 
  • Week 4: Incorporate all changes or recommendations from the instructor concerning the view of the software-testing process, the RTM, and the unit/usability/system test plan, test method/procedure and test report. Provide a draft regression test plan, method/procedure and report and 5 requirements to be Regression tested 

For Week 5 the integrated master schedule test events and milestone state a regression test plan, method/procedure, report, and requirements must be added and incorporating instructor and another student’s feedback on the previous drafts from Week 4 to ensure the software product is of acceptable quality and reliability. The regression testing should ultimately identify if the software package is compatible with existing hardware, software, and networks and incorporates sufficient coverage of the business features and functions.

Engineering Homework Help

SWE 400 Colorado Technical University Atom Software Re Engineering Project

 

Key Assignment

Significant work has been completed so far in the project. The parts of the Software Reengineering Project that have been completed include the following:

  • Software Reengineering (Week 1)
  • API Evaluation (Week 2)
  • API Efficiency, Reliability, and Maintainability (Week 3)
  • Configuration and Change Management (Week 4)

The final step in completing the Software Reengineering Project is to make the changes to the application planned in other phases of the project. The changes will be made in an effort to improve the application programming interface (API) and strengthen the overall application.

For this assignment, you will use software construction techniques and tools to modify your project application and implement the changes that were planned in Week 3 of the project. You will also submit a description of the changes that were made and the techniques and tools that were used to make the changes. Finally, you will further refine the Software Reengineering Project document to produce the final version. Updates may be based on peer and instructor feedback.

The project deliverables are as follows:

  • Update the Software Reengineering Project document title page with the new date.
  • Update the previously completed sections based on instructor feedback.
  • Software Construction Tools and Techniques
    • Use at least 1 software construction technique and associated tool to perform the changes to the APIs in the application recommended in the Week 3 part of the project.
    • Submit the modified application along with a new section of the project document describing the changes that were made and the techniques and tools that were used to make the changes.
    • This is the last step of the key assignment. It should bring together all aspects of the project in 1 cohesive paper and software solution.
    • Revise the previous sections so the entire document flows and has a strong introduction and conclusion.
    • The application files will be submitted as a single ZIP file, including all source code and executable files.
  • Software Reengineering Project
    • Review the entire document for any changes and improvements that you would like to make.
    • All aspects of the document should present a cohesive report, and each weekly topic should coincide with the other weeks.
    • Ensure that this final version of the plan is sufficiently detailed to allow the reader to confidently move forward with the same changes to the application that you have recommended.
    • Any previous instructor feedback should be addressed with appropriate changes.
    • Be sure to update your Table of Contents before submission.
    • Name the document “yourname_SWE400_IP5.doc.”
  • Zip the project document and the application files together in a file named “yourname_SWE400.ZIP,” and submit the .zip file for grading.

Engineering Homework Help

George Mason University Routing Network of Cisco Packet Tracer Lab Report

 

IT 341

undefined

Skills Exam II

undefined

Instructions:

undefined

You have been provided with the required addressing table and network topology in a pkt file. Follow the instructions and

undefined

Deliverables:

undefined

Zipped folder containing:

undefined

Device

Interface

IP Address

Subnet Mask

Default Gateway

R1

Gi0/0

11.11.11.1

255.255.255.0

NA

S0/0/0

14.14.14.1

255.255.255.252

NA

S0/0/1

12.12.12.1

255.255.255.252

NA

R2

S0/0/0

23.23.23.1

255.255.255.252

NA

S0/0/1

12.12.12.2

255.255.255.252

NA

R3

Gi0/0

33.33.33.1

255.255.255.0

NA

S0/0/0

23.23.23.2

255.255.255.252

NA

S0/0/1

34.34.34.1

255.255.255.252

NA

R4

Gi0/0

44.44.44.1

255.255.255.0

NA

S0/0/0

14.14.14.2

255.255.255.252

NA

S0/0/1

34.34.34.2

255.255.255.252

NA

PC1

NA

11.11.11.2

255.255.255.0

11.11.11.1

PC3

NA

33.33.33.2

255.255.255.0

33.33.33.1

PC4

NA

44.44.44.2

255.255.255.0

44.44.44.1

undefined

Task 1: Configure Basic Device Settings (10 Points)

undefined

Step 1: Setup host name for the routers as given in the topology.

undefined

Step 2: Setup enable password: class

undefined

Step 3: Setup line console password: cisco

undefined

Task 2: Configure and verify OSPF Routing (40 Points)

undefined

Step 1: Configure OSPF as the routing protocol on all four routers and advertise the appropriate networks using the network statement. (hint: determine the connected networks for each router and advertise them through OSPF.) You need to use PROCESS ID: 100 and Area: 0 in your OSPF configurations. (15 points)

undefined

Step 2: Prevent routing updates on the interfaces of R1 on which routing advertisements are not required. (hint: you should use passive-interface command for the LAN interface.) (10 points)

undefined

Step 3: Verify that OSPF is running on the routers. Which command would you use to confirm that OSPF is running? (10 points)

undefined

Step 4: Examine the routing tables on all routers. What command should you use to examine the routing table content? (5 points)

undefined

Task 3: Configure Static Routing (30 Points)

undefined

Step 1: From R4 OSPF configuration, remove the LAN network 44.44.44.0/24.(5 points)

undefined

Step 2: Configure static routes on R1 and R2 to reach to network 44.44.44.0/24 with S0/0/0 as the next hop. (10 points)

undefined

Step 3: Configure static route on R3 to reach to network 44.44.44.0/24 with S0/0/1 as the next hop. (5 points)

undefined

Step 4: Verify the routing configuration by viewing the routing tables of R1, R2 and R3. How can you confirm from the routing tables that all static routes have been added correctly? (10 points)

undefined

Task 4: Saving your Configurations and Restart the Devices (5 Points)

undefined

  • Save your configuration by using the proper save command on the routers. Now, click on ‘Power Cycle Devices’ to restart the network. Please make sure to save your configuration before restarting your devices.

undefined

Task 5: Verify Connectivity (15 points)

undefined

  • To verify connectivity, you should be able to ping between all the devices.

undefined

From

To

Fail/Pass

PC1

PC3

PC1

PC4

PC3

PC4

Engineering Homework Help

San Diego Mesa College System and Building Cods Construction Discussion

 

Appendix C – Family Residences ( entire,p.p 1039-1074) the answer must be from the book, the PDF that attached.

The Reading Journal comprises your responses to these questions:

  1. What are the most important ideas, requirements, techniques you learned from the reading?
  2. What are the fundamental intentions implicit in these ideas, requirements, techniques?
  3. How might the ideas, requirements, techniques, and underlying intentions relate to your work as a designer and/or contribute to your professionalism?

Requirements:

  • Submissions may be in outline or narrative form.
  • A minimum of one typed page in 12-point font; no maximum length.
  • Include assignment title, week number, and your name.

Engineering Homework Help

ECE 505 UoN Signal Resampling & Nonlinear Interpolation Worksheet

 

In this laboratory project we are going to change the effective sampling rate of a discrete signal in order to directly observe the effects of the process both in the frequency domain and after continuous signal reconstruction. We will then design proper decimation and interpolation filters to ensure that the resampling process is completed successfully. We will also apply several nonlinear interpolators to the sampled signal to explore the effects on the reconstructed signal using these alternative methods.

Engineering Homework Help

Abraham Lincoln University Information Technology Threats Discussion

 

I’m working on a information technology discussion question and need guidance to help me learn.

Question: In your opinion what is/are the most security threats that organizations will have to be prepared for 2020-2021 ?

Engineering Homework Help

Southern New Hampshire University Security Design Principles Case Study

 

Case Study Scenario: You are a cybersecurity analyst working at a prominent regional hospital. On Monday morning, the organization’s technology help desk received a call from Dr. John Beard, a long-time resident physician. Dr. Beard called them to report that his company laptop was stolen from his car after he stopped to work out at a local gym on his way home from the office. A representative from the help desk informed you of the theft and also mentioned that Dr. Beard stated that his laptop case contained a USB thumb drive that he purchased to “back up” important patient files he saved onto his laptop. Dr. Beard also revealed that his daily planner “might have” been in the bag, and that the planner had his hospital computer user name and password written on the back cover. Prior to ending the call, Dr. Beard told the representative that he would call her back if his daily planner turned up. As your conversation with the help desk representative wound down, she commented that Dr. Beard had many different computer “issues” that keep her team busy. She recalled talking to Dr. Beard about the hospital’s policy against accessing patient files remotely, and his annoyance with her inability to help him “get work done” while away from the hospital. And just a week ago, a junior member of her team completed a service ticket to reconfigure Dr. Beard’s laptop to grant him administrative rights. The service request stuck out because it did not have a “reason” indicated (a company policy requirement), but was still approved by James Davis, the hospital’s senior system administrator and close personal friend of Dr. Beard. 

Prompt:  After reading the scenario above, complete the Fundamental Security Design Principles mapping table in the Case Study Template and answer the short response questions. 

Specifically, you must address the critical elements listed below: I. Fundamental Security Design Principles Mapping: Fill in the table in the Module Two Case Study Template by completing the following steps for each control recommendation: A. Specify which Fundamental Security Design Principle best applies by marking all appropriate cells with an X. B. Indicate which security objective (confidentiality, availability, or integrity) best reflects your selected control recommendation. C. Explain your choices in one to two sentences, providing a selection-specific justification to support your decision. II. Short Response Questions: A. How might you work with someone like Dr. Beard to cultivate a security mind-set that is more in line with the organization’s ethical norms? Hint: Consider his attitude, his past behaviors, and his opinion about organizational policies. B. How would you help the hospital better secure its patient files? Make sure to incorporate at least one data state (data-at-rest, data-in-use, or data-in-motion) and one of the control recommendations from your completed table in your response. 

Engineering Homework Help

Military Technological College Systems Engineering Lab Report

 

Explain clearly system engineering and pathways within MTC. Avoid copy from net and avoid explaining wrong things like writing about information system and architecture engineering, project management.

2) Your project is rescue bridge robot and we are using Lego robot EV3, if you write or mention different project such as Tour robot , Missile robot , fish robot , autonomous car , etc , you will fail the project part and you will get zero. Any other Irrelevant project will be zero as well

3) It was noticed that you are using a previous year 2019-2020 project and evaluation points, evaluation of rescue bridge robot was explained, you don’t need to mention evaluation points for other project or irrelevant to rescue bridge robot cause will be wrong and you will get zero again.

4) Your design bridge is from wood (bamboo and PINE) , any explanation for other design ( civil bridge , iron bridge , river bridge , isolated island bridge , any irrelevant bridge for our MTC4027 will be wrong ) and you will get zero mark.

5) You need to explain features of bridge drawing, just copy paste feature from net is not acceptable, and also you must show weight calculations and explain the good and bad about wood bridge design.

6) You are writing scientific report, references are expected to be within report ( minimum 6 ) and cited correctly within text.

7) Design cycle figure must be included and each step explained.

8) Don’t forget that you are using Solidwork, free cad, those are simulations software, mention importance of modeling and simulation in engineering design.

9) Follow the template you were given and answer all questions correctly- don’t delete any part of any question or heading, writing irrelevant information within text will lead you get zero. Also, ensure you write report by yourself because you are the one who attended the lab and know the project.