Categories
Writers Solution

Computer Dynamics is a microcomputer software development company that has a 300 + computer network

 ITM502 AssignmentWeighting: 30%

Part A: Mini Case Study (2 pages maximum)
You are to provide an essay (two pages maximum) for the following mini case question. The essay is to be a 1.5 line spacing.
Computer Dynamics
Computer Dynamics is a microcomputer software development company that has a 300 + computer network. The company is located in three adjacent five-story buildings in an office park, with about 100 computers in each building. The LANs in each building are similar, but one building has the data canter on the second floor. There are no other office locations. The current network is poorly designed for its current needs and must be completely replaced. Develop a logical design for this enterprise campus that considers the seven network architecture components. There are no other campuses, so you can omit WAN access. You will need to make some assumptions, so be sure to document your assumptions and explain why you have designed the network in this way.
(25 marks)
The essays do not require in text references or a list of references.
Part B: Business Report (8 pages for body of the report)
Management has identified that in order to provide employees with mobile access a more flexible networking environment needs to be created. Since the organisation uses a typical client server network management has decided that the next logical step would be to move the services to a cloud based solution. The move to the cloud it is argued would remove some of the access restrictions that IT has placed on services and therefore make employees more productive.
Our organisation provides the manufacture and supply of widgets that are in high demand for the production of integrated circuits. Currently we are only a few of the manufacturers that can supply the widgets in the quantity required by our customers. Internal review of our activities has identified that while out manufacturing process is well established the scheduling and processing of orders can lead to delays in processing orders. Changes were proposed to try and alleviate some of the complaints from the employees when accessing and using the organisation IT services in order to schedule the productions.
The networking is designed as a two tier client server architecture. The backend services provide the data store and retrieval of company information which needs to be guarded carefully. Most of the business processing is performed on the staff desktops. Due to the structure and management of the data, sales people when visiting a client store the orders and quantities onto specially printed note pads which will need to be re-enter into the system once they are back in the office. Recently we have moved to a digitised version of the order form to help the sales people when interacting with customers. Transfer of the data to the organisation systems still needs to be done manually as the information has to be checked against a number of systems before the order can be placed. The reentry of the data is normally done by office staff but may also be done by the sale people usually during the busy period of the year. Any changes to the original orders and times will require them to contact the client and renegotiate the job order. Employees are require to connect to multiple systems to be able to enter the new orders and place them on the system as production runs. As the processing of the data and information is very important to the organisation the current design requires that when users access a major system they need to re-enter their user credentials.
It was evident from the meeting that management understanding of the cloud services in terms of structures and benefits was not clear enough to make planning decisions. Before proceeding with the proposed plans you have been tasked with providing a report that would be used to re-examine the proposal by researching and providing a report for the following topics.
Note: When we say Mobile devices we mean devices that can be used by employees to access the data and services in an unstructured network environment as well as through other third party networks.
• The cloud solutions are not well formulated at the moment due to some misunderstanding of what the term actually means. Describe the type of cloud services available, the benefits and disadvantages of each solution.
• It is evident that from the description of the processes in the organisation the processing of information is done by requesting information from number of different sources before the order can be placed in the production queue. Which type of cloud should we be looking at to be able to benefit from remote access to the services while not necessarily modifying our business process and why is that the best solution.
• Nominate the cloud solution that would be best for the organisation in the long run with justifications for your selection. Also include any possible problems that the solution might pose in the future plans.
• Consider the overall impact that the introduction of new devices would have on the network functionality and availability. Identify possible problems and issues that the introduction of mobile computing could have on the network services.
• It is evident that the introduction or restructure can cause a major disruption to the employees with having to adjust to the new technology, new security and access restrictions and so on. Provide advice the management on the need for training and reskilling you think would be needed to maximise the adoption of new technology by the organisational employees.
(75 marks)
Please read the instructions very carefully.
Report Format for Part C (8 pages body)
The report needs to be a standard business report and you must reference correctly in Harvard style.
Your report MUST follow the structure for a report as specified in the Faculty of Business
Communications skills handbook, however, you will not be required to submit the following sections: Glossary or Appendices. You may want to consider the structure of the marking scheme when structuring the body of your report.
Your report must include references where you have used other sources (both in the body text and listed at the end of the report)
• Marks will be deducted for submitted work with missing or incorrect references.
• Work submitted with no references in the body of the report will NOT be accepted.
• Your report must be printed with 1.5 line spacing; at least 12-point font size; and the body of the report should be no more than 10 pages of single-sided A4 paper.
• Penalty will apply for exceeding the page limit.
• Assignments not following the report style will be heavily penalised

WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

Computer Dynamics is a microcomputer software development company that has a 300 + computer network

TO BE RE-WRITTEN FROM THE SCRATCH

Categories
Writers Solution

Do research on one-or-two large software systems that were implemented successfully and on

 Project Planning

Do research on one-or-two large software systems that were implemented successfully and on

one-or-two large software systems that failed in their implementation. Write at least a 3-page

Word document, double-spaced, detailing each system.

Your paper should include a number of topic sections. Using the concept of A.D.D.I.E., create a

section to discuss the A.-Analysis that went into the system, a section to discuss the D.-Design of

the system, a section to discuss the D.-Development of the system, a section to discuss the I.-

Implementation of the system (successful or failed) and a section to discuss the E.-Evaluation of

the system (successful or failed). Provide the following:

1. An Introduction paragraph describing the assignment and a short description of the

systems selected.

2. A section that describes the first Software System (with an appropriate section Heading)

and a description of that Software System to include:

a. What is its purpose?

b. What operations it performs?

c. What are its inputs (resources, interfaces, when used)?

d. What are its outputs (interfaces, data)?

e. The system’s complexity/cost/feasibility.

f. Any constraints or risks found during the research.

3. Sections with details for each component of A.D.D.I.E. (with an appropriate section

Heading) to include:

a. Success or failures identified.

b. Issues or findings identified.

c. Recommendations or lessons learned.

Your paper should then conclude with a Findings section the compares the two systems. Provide

the following:

1. What made one system successful but make the other system fail.

2. What could have been done to make the failed system more successful.

3. What could have been done to make the successful system even more successful.

You must include at least 3 scholarly references with citations

Categories
Writers Solution

Software developer at a health insurance firm

Course: Organization leader and decision making

My job title: software developer at a health insurance firm. 

 Needs to be specific to this course and your job – no generalities 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  •  Don’t forget that the grade also includes the quality of writing

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery- primewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, Software developer at a health insurance firm

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG
Categories
Writers Solution

What are arguments for or against the use of virtualization software?

Write a 6-8 page paper (deliverable length does not include the title and reference pages)
  1. What are arguments for or against the use of virtualization software?
  2. What are risks that companies face with the use of virtualization software?
  3. What are the implications of the risks to a company’s operations and what can companies do to combat the risks?
GET SOLUTION BELOW CLICK HERE TO MAKE YOUR ORDER TO BE RE-WRITTEN FROM THE SCRATCH NO PLAGIARISM
  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services
  • What are arguments for or against the use of virtualization software?
Get Professionally Written Papers From The Writing Experts 
Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

What are arguments for or against the use of virtualization software?

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  1. What are arguments for or against the use of virtualization software?
  2. What are risks that companies face with the use of virtualization software?
  3. What are the implications of the risks to a company’s operations and what can companies do to combat the risks?

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services What are arguments for or against the use of virtualization software?

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

A windows PC with Microsoft Excel installed. If you need this software

Resources needed: 

1. A windows PC with Microsoft Excel installed. If you need this software, follow these steps to install it.

2. Ess13ch02_Questionfile.xlsx

In this exercise, you will learn how to use spreadsheet software to improve management decisions about selecting suppliers. You will filter transactional data about suppliers based on several criteria to select the best suppliers for your company.

Scenario: You run a company that manufactures aircraft components. You have many competitors who are trying to offer lower prices and better service to customers, and you are trying to determine whether you can benefit from better supply chain management. The Assignments area under Week 2, you will find a spreadsheet file (Ess13ch02_Questionfile.xlsx) that contains a list of all the items your firm has ordered from its suppliers during the past three months. The fields in the spreadsheet file include vendor name, vendor identification number, purchaser’s order number, item identification number and item description (for each item ordered from the vendor), cost per item, number of units of the item ordered (quantity), total cost of each order, vendor’s accounts payable terms, order date, and actual arrival date for each order.

Prepare a recommendation of how you can use the data in this spreadsheet database to improve your decisions about selecting suppliers. Some criteria to consider for identifying preferred suppliers include: 

· the supplier’s track record for on-time deliveries 

· suppliers offering the best accounts payable terms 

· suppliers offering lower pricing when the same item can be provided by multiple suppliers. (extra credit)

Use your spreadsheet software to prepare reports to support your recommendations.

Information about the data:

· At a minimum you will need to be able to sort the database by various criteria such as item description, item cost, vendor number, or A/P terms

· A/P terms is expressed as the number of days that the customer has to pay the vendor for the purchase. In other words, 30 designates net 30 days. The vendor that allows customers the longest amount of time to pay for an order would, of course, offer the most favorable payment terms

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services A windows PC with Microsoft Excel installed. If you need this software

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

ase Study Scenario for ‘Holmes Software Engineering

HS2021 Database Design and Use
Assignment 2 Individual Assessment
Assessment Weight: 15%
Due: Weeks 8
Objective(s)
This assessment item relates to the unit learning outcomes as in the unit descriptor. This assessment is designed to reinforce the lecture material and give students practice at applying Database design techniques, as well as providing a relational schema using DDL statements and relational DML statements to demonstrate access of the Database to be built.
Instructions
Consider the following Case Study Scenario for ‘Holmes Software Engineering’
A relational database is to be designed for a medium sized Company dealing with industrial applications of computers. The Company delivers various products to its customers ranging from a single application program through to complete installation of hardware with customized software. The Company employs various experts, consultants and supporting staff. All personnel are employed on longterm basis, i.e. there is no short- term or temporary staff. Although the Company is somehow structured for administrative purposes (that is, it is divided into departments headed by department managers) all projects are carried out in an inter- disciplinary way. For each project a project team is selected, grouping employees from different departments, and a Project Manager (also an employee of the Company) is appointed who is entirely and exclusively responsible for the control of the project, quite independently of the Company’s hierarchy. The following is a brief statement of some facts and policies adopted by the Company.
• Each employee works in some department.
• An employee may possess a number of skills
• Every manager (including the MD) is an employee
• A department may participate in none/one/many projects.
• At least one department participates in a project.
• An employee may be engaged in none/one/many projects
• Project teams consist of at least one member.
Deliverable Descriptions
For the above mini-case study, you are to analyze the data requirements and develop a set of relational tables to suit the above case study.
• Draw and ER diagram depicting the relational database.
• Make sure the tables are normalized.
• Build the Database in PostgreSQL (storing your DDL statements in a script)
• Add test data to the PostgreSQL database (again store these DML statements in a script), one of the employees you add must have an employee ID the same as your own Student ID. This employee must also be part of a team working on some project
• Develop a set SQL queries to query this database (there should be at least 4 queries)
? at least 2 queries should joint multiple tables (1 should join at least 3 tables)
? at least one query should show the employee with the ID the same as your student ID
For each query, you should show the output from executing the Query in PostgreSQL by cutting and pasting the PostgreSQL output into your assignment just under the Query.
This should be demonstrated to your tutor in class during a tutorial after the due date to be advised by your tutor.
Submission Guidelines
The day and time of the due week that the assessment must be submitted will be announced by your subject coordinator.
Your documents should be a single MS Word or OpenOffice document containing your report. Do not use PDF as a submission format,
All submissions will be submitted through the safeAssign facility in Blackboard. Submission boxes linked to SafeAssign will be set up in the Units Blackboard Shell. Assignments not submitted through these submission links will not be considered.
Submissions must be made by the due date and time (which will be in the session detailed above) and determined by your Unit coordinator. Submissions made after the due date and time will be penalized per day late (including weekend days) according to Holmes Institute policies.
The SafeAssign similarity score will be used in determining the level, if any, of plagiarism. SafeAssign will check conference web-sites, Journal articles, the Web and your own class members submissions for plagiarism. You can see your SafeAssign similarity score (or match) when you submit your assignment to the appropriate drop-box. If this is a concern you will have a chance to change your assignment and resubmit. However, re-submission is only allowed prior to the submission due date and time. After the due date and time have elapsed your assignment will be graded as late. Submitted assignments that indicate a high level of plagiarism will be penalized according to the Holmes Academic Misconduct policy, there will be no exceptions. Thus, plan early and submit early to take advantage of the re-submission feature. You can make multiple submissions, but please remember we grade only the last submission, and the date and time you submitted will be taken from that submission.
Academic Integrity
Holmes Institute is committed to ensuring and upholding Academic Integrity, as Academic Integrity is integral to maintaining academic quality and the reputation of Holmes’ graduates. Accordingly, all assessment tasks need to comply with academic integrity guidelines. Table 1 identifies the six categories of Academic Integrity breaches. If you have any questions about Academic Integrity issues related to your assessment tasks, please consult your lecturer or tutor for relevant referencing guidelines and support resources. Many of these resources can also be found through the Study Sills link on Blackboard.
Academic Integrity breaches are a serious offence punishable by penalties that may range from deduction of marks, failure of the assessment task or unit involved, suspension of course enrolment, or cancellation of course enrolment.
Table 1: Six categories of Academic Integrity breaches
Plagiarism Reproducing the work of someone else without attribution. When a student submits their own work on multiple occasions this is known as self-plagiarism.
Collusion Working with one or more other individuals to complete an assignment, in a way that is not authorised.
Copying Reproducing and submitting the work of another student, with or without their knowledge. If a student fails to take reasonable precautions to prevent their own original work from being copied, this may also be considered an offence.
Impersonation Falsely presenting oneself, or engaging someone else to present as oneself, in an in-person examination.
Contract cheating Contracting a third party to complete an assessment task, generally in exchange for money or other manner of payment.
Data fabrication and falsification Manipulating or inventing data with the intent of supporting false conclusions, including manipulating images.
Source: INQAAHE, 2020

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services ase Study Scenario for ‘Holmes Software Engineering

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Research the IRS and its experience with software upgrades. Study the various attempts made to upgrade and modernize the software the IRS uses.

Research the IRS and its experience with software upgrades. Study the various attempts made to upgrade and modernize the software the IRS uses. What difficulties has the IRS faced?

If you were given charge of this project, what would you recommend to the IRS?

Make it 3 pages max

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Research the IRS and its experience with software upgrades. Study the various attempts made to upgrade and modernize the software the IRS uses.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG  
Categories
Writers Solution

Software development companies have engineering employees with different levels of expertise

Subject Code and Name CMP1041 – Foundation Programming
Assessment Number 2
Assessment Title Pseudo Coding and Flowcharting
Assessment Type Report
Length or Duration Four (4) Tasks / 1 File
Subject Learning Outcomes SLO 2, SLO 3, SLO 4
Submission Date / Time Week 8
Weighting 30%
Assessment Purpose
Software development companies have engineering employees with different levels of expertise, i.e. from junior engineers to senior engineers. Junior engineers may be given projects that are outside their ability to achieve, and thus receive help from more experienced engineers.
In this assessment you work as a senior engineer for a security software company that has a new client. A junior engineer was assigned to this client however has been struggling with the more complex parts of the software. Part of your role as a senior engineer at the security software company is to help the junior engineer in providing non-buggy software for the client.
Assessment Task / Item
For this assessment, you must submit a pdf file that contains your final solutions to the following four tasks.
Assessment Instructions
Read each of the following four (4) tasks and write your responses in the form of a report. The report will be submitted as one (1) pdf file.
Hi senior engineer! As a junior engineer I am struggling to finish the following four tasks. I’ve attempted each of them at least a little bit before getting stuck! I would greatly appreciate your help with these tasks!
Task 1
The client wants to add security tag readers to doors that allow employees to scan their security tag and if they have the security level appropriate to access the door, they can progress through the door. If they do not have the appropriate security level, security will be alerted with the employee’s name and the door will be locked down – not allowing anyone to enter until the door has been reset by security.
Doors are given a security level from 1 to 3, where 3 is the highest security level, and 1 is the lowest. Employees are also given a security level from 1 to 3. An employee with a security level of 1 can access all doors that also have a security level of 1. An employee with a security level of 2 can access all doors that have a security level of 1 or 2. An employee with a security level of 3 can access all doors that have a security level of 1 or 2 or 3.
I’ve finished a flowchart, but as a junior I am unsure if it has bugs! Can you please identify any syntax, logic, and runtime errors in the flowchart and do the following:
i) Identify the flowchart node that has the error. ii) Provide a flowchart node that fixes the error. iii) Provide information about what the error was.
Task 2
The client wants to be able to upgrade an employee’s security level, so as the employee receives a promotion they can access new areas.
An employee may upgrade another employee’s security level only if the upgrader (the employee upgrading another employee) has a security level at least one security level above the upgradee (the employee being upgraded). That way an employee with a security level of 2 can upgrade an employee with a security level of 1 to a security level of 2, but is not able to upgrade an employee of security level 2 to a security level of 3. In the case where the employee does not have the correct security level to upgrade another employee, security should be alerted with the names of both of the employees.
As a junior engineer I was unsure how to achieve this, but I have started a flowchart. Could you please finish the flowchart, using appropriate tools that will create presentable flowcharts, so that I can implement this within a programming language.
Task 3
The client wants to be able to downgrade all employee’s security levels, if the employee has a specific role. Only an employee with a role of Security should be able to downgrade all employee’s security levels based on their role.
For example the client decides that all employees with a role of Scientist should no longer have access to security level 2 rooms and wants to be able to downgrade their security level from 2 to 1. An employee with the role of Security will then execute this program to downgrade all employees security level’s with the role of Scientist. An employee’s security level should never be below 1. If an employee tries to execute this program with a role that is not Security then security should be alerted with the employee’s name.
Again, I was unsure how to achieve this, but I have started a flowchart. Could you please finish the flowchart so that I can implement this within a programming language.
Task 4
As a junior engineer, I intend on implementing the above programs in an Object Oriented Language, such as C++. Can you please help me get started by providing the properties and methods for the Employee class, to be used in my class diagram, that has all the properties and methods required for the programs above, specifically methods that allow upgrading or downgrading an employee’s security level easily would be great!
Submission
Export a document with the 4 tasks in a pdf format with the following naming convention:
[Student_ID][Surname][First Name][SubjectCode][Assessment_#].pdf E.g.: 1234_Singh_Visha_PRG1002_Assessment_02.pdf
You should take a screenshot or otherwise convert your flowchart to an image that should be contained within the pdf document.
Google Docs, Microsoft Word, and various other word processing applications can export/publish to the pdf format.
All work must be submitted via the LMS, in the assignments section appropriate to this brief. Please ensure the above mentioned submission date and/or time are adhered to, or penalties may apply.
For more information on late submission, please see the Assessment Policy.
Academic Integrity
The integrity of the assessment process is fundamental for ensuring appropriate evaluation at AIT. All work submitted should be your own, and where additional resources are used, they must be referenced according to the Harvard style. Additionally, TurnItIn is available in the LMS to test plagiarism in your writing.
For more information on academic integrity, please see the Academic Integrity and Academic Integrity Penalties Policies.
Appeals
Fair application of the assessment rubric, rules and guidelines should be administered for each assessment. If you feel an evaluation requires further consideration, you may be entitled to an appeal.
For more information on your right to an appeal, please see the Assessment Appeals Procedure and Policy.
Policies
For access to the policies mentioned above and related to education at AIT, please see the footer of the AIT website, and follow the link named Education Policies and Procedures.
Website: https://www.ait.edu.au
Assessment Rubric
Task Descriptor (F)
Fail (P) Pass (C) Credit (D)
Distinction (HD)
High
Distinction
Apply debugging processes to
meet project expectations
20% Fewer than two (2) of the following criteria are met. Other criteria are not included or poorly applied.

  1. In the provided flowchart, half the errors are identified.
  2. All identified errors are described with respect to the error type.
  3. All errors have provided fixes. Two (2) of the following criteria are met. Other criteria are not included or poorly applied.
  4. In the provided flowchart, half the errors are identified.
  5. All identified errors are described with respect to the error type.
  6. All errors have attempted fixes. All three (3) of the following criteria are met. Other criteria are not included or poorly applied.
  7. In the provided flowchart, most errors are identified.
  8. All identified errors are described with respect to the error type.
  9. Most errors are fixed in an appropriate way. All three (3) of the following criteria are met.
  10. In the provided flowchart, all errors are identified.
  11. All identified errors are described with respect to the error type and how it impacts the program.
  12. All errors are fixed in an appropriate way. All three (3) of the following criteria are met.
  13. In the provided flowchart, all errors are identified.
  14. All identified errors are accurately described with respect to the error type and how it impacts the program.
  15. All errors are fixed in an optimal way.
    Apply the process for the
    implementation of algorithms
    40% Fewer than three
    (3) of the following criteria are met. Other criteria are not included or poorly applied.
    All flowcharts:
  16. Have correct inputs, and outputs, except in two (2) cases.
  17. Uses variables with types.
  18. Has less than three (3) significant logic errors.
  19. Has less than eight (8) syntax errors. Three (3) of the following criteria are met. Other criteria are not included or poorly applied.
    All flowcharts:
  20. Have correct inputs, and outputs, except in two (2) cases.
  21. Uses variables with types.
  22. Has less than three (3) significant logic errors.
  23. Has less than eight (8) syntax errors. All four (4) of the following criteria are met.
    All flowcharts:
  24. Have correct inputs, and outputs, except in one (1) case.
  25. Have less than three (3) cases of redundant or inefficiently typed variables.
  26. Have less than two (2) significant logic errors that cause runtime bugs.
  27. Have less than five (5) significant syntax errors by using incorrect or inconsistent variable naming. All four (4) of the following criteria
    are met
    All flowcharts:
  28. Have the correct inputs, and outputs.
  29. Have less than three (3) cases of redundant or inefficiently typed variables.
  30. Have no (0) significant logic errors that cause runtime bugs.
  31. Have no (0) significant syntax errors by using incorrect or inconsistent variable naming.
    All four (4) of the following criteria
    are met
    All flowcharts:
  32. Have the correct inputs, and outputs.
  33. Have no (0) redundant or inefficiently typed variables.
  34. Have no (0) logic errors that cause runtime bugs.
  35. Have no (0) syntax errors by using incorrect or inconsistent variable naming.
    Complete a project according to design specifications
    30% Fewer than three
    (3) of the following criteria are met. Other criteria are not included or poorly applied.
    All flowcharts:
  36. Alert security is present in more than two (2) cases.
  37. Some variables are present used in alerting security in more than two (2) cases.
  38. Security level requirements are enforced in more than two (2) cases.
  39. Range of security level is maintained in more than one (1) case.
    Three (3) of the following criteria are met. Other criteria are not included or poorly applied.
    All flowcharts:
  40. Alert security is present in more than two (2) cases.
  41. Some variables are present used in alerting security in more than two (2) cases.
  42. Security level requirements are enforced in more than two (2) cases.
  43. Range of security level is maintained in more than one (1) case.
    Three (3) of the following criteria are met. Other criteria are not included or poorly applied.
    All flowcharts:
  44. Alert security at the appropriate places based on all possible security violations in all but two (2) cases.
  45. Appropriate variables are present that are used in alerting security, such as employee names.
  46. Security level requirements are enforced correctly in all but two (2) cases.
  47. Range of security level is maintained, i.e. never below 1 and above 3 in all but one (1) case. All four (4) of the following criteria are met.
    All flowcharts:
  48. Alert security at the appropriate places based on all possible security violations in all but one case.
  49. Appropriate variables are present that are used in alerting security, such as employee names.
  50. Security level requirements are enforced correctly in all but two (2) cases.
  51. Range of security level is maintained, i.e. never below 1 and above 3 in all but one (1) case.
    All four (4) of the following criteria are met.
    All flowcharts:
  52. Alert security at the appropriate places based on all possible security violations.
  53. Appropriate variables are present that are used in alerting security, such as employee names.
  54. Security level requirements are enforced correctly.
  55. Range of security level is maintained, i.e. never below 1 and above 3.
    Apply appropriate tools and processes for generating
    flowcharts and class diagrams
    10% Fewer than two (2) of the following criteria are met. Other criteria are not included or poorly applied.
    All flowcharts:
  56. Use the correct flowchart nodes for the appropriate usage, except in six (6) cases.
  57. Have less than five (5) missing arrows.
    All Diagrams:
  58. Use correctly spelled and Two (2) of the following criteria are met. Other criteria are not included or poorly applied.
    All flowcharts:
  59. Use the correct flowchart nodes for the appropriate usage, except in six (6) cases.
  60. Have less than five (5) missing arrows.
    All Diagrams:
  61. Use correctly spelled and Three (3) of the following criteria are met.
    All flowcharts:
  62. Use the correct flowchart nodes for the appropriate usage, except in four (4) cases.
  63. Have less than four (4) missing arrows.
    All Diagrams:
  64. Use correctly spelled and consistent variable, property, and method All four (4) of the following criteria are met.
    All flowcharts:
  65. Use the correct flowchart nodes for the appropriate usage, except in two (2) cases.
  66. Have less than three (3) missing arrows.
    All Diagrams:
  67. Use correctly spelled and consistent variable, property, and method All four (4) of the following criteria are met.
    All flowcharts:
  68. Use the correct flowchart nodes for the appropriate usage.
  69. Have no (0) missing arrows.
    All Diagrams:
  70. Use correctly spelled and consistent variable, property, and method names.
    consistent variable, property, and method names, except in five (5) cases.
  71. Flows from top to bottom, and all text is readable. consistent variable, property, and method names, except in five (5) cases.
  72. Flows from top to bottom, and all text is readable. names, except in three (3) cases.
  73. Are mostly well formatted and easily readable. names, except in three (3) cases.
  74. Are mostly well formatted and easily readable. 2. Are well formatted and easily readable

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Software development companies have engineering employees with different levels of expertise

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Develop a Software Test Plan for Hangman that contains the test scope

The Hangman game is a classic word game where the word to guess is represented by a row of dashes. The player guesses a letter and if the letter exists in the word, the letter replaces the dash in the correct position within the word. If the letter does not exist in the word, the player loses one of the ten turns that the player starts the game with.

Develop a Software Test Plan for Hangman that contains the test scope and a minimum of five functional test cases and 5 non-functional test cases

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Challenge Founded in 2011, Skycaps Cloud Services is sharply focused on public-sector The FBI’s Terrorist Screening Center

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays