Categories
Software Engineering

Sprint 2: homepage setup, new user sign-up, account summary page, db management system for initial testing, internal testing.

Sprint 1: database scheme, system architecture, hardware, and infrastructure options for the patient portal system, and internal testing.
Sprint 2: Homepage setup, new user sign-up, account summary page, DB management system for initial testing, internal testing.
Sprint 3: Development setup, add or remove patient, doctor, payment details, appointment confirmation and cancellation, internal testing.
Sprint 4: Generate bill and receipt, confirmation message for the patient, and internal testing
Prepare a Gantt chart using the above data for a span of 2 months, refer to the screenshot attach

Categories
Software Engineering

Sprint 4: generate bill and receipt, confirmation message for patient, and internal testing.

Sprint 1: Define database scheme, system architecture, hardware, and infrastructure options for the patient portal system, and internal testing.
Sprint 2: Homepage setup, new user sign-up, account summary page, DB management system for initial testing, internal testing.
Sprint 3: Development setup, add or remove patient, doctor, payment details, appointment confirmation and cancellation, internal testing.
Sprint 4: Generate bill and receipt, confirmation message for patient, and internal testing.
For the mentioned sprints we need to create a work break down schedule for 5 people for 2 months and also prepare a gantt chart by the given data. Kindly refer the screenshots attached for your reference

Categories
Software Engineering

Sprint 3: development setup, add or remove patient, doctor, payment details, appointment confirmation and cancellation, internal testing.

Sprint 1: Define database scheme, system architecture, hardware, and infrastructure options for the patient portal system, and internal testing.
Sprint 2: Homepage setup, new user sign-up, account summary page, DB management system for initial testing, internal testing.
Sprint 3: Development setup, add or remove patient, doctor, payment details, appointment confirmation and cancellation, internal testing.
Sprint 4: Generate bill and receipt, confirmation message for patient, and internal testing.
For the mentioned sprints we need to creat a work break down schedule for 5 people for 2 months and also prepare a gantt chart by the given data.

Categories
Software Engineering

Discuss the security problem each of these

1. What is the difference between a nongenerative and a generative pattern? (5 points)
2. What are design patterns? Explore four security related design patterns, one pattern that
focuses on confidentially, one pattern that focuses on integrity, one pattern that focuses on
availability and a fourth one, that focuses on privacy. Discuss the security problem each of these
patterns solve, the context for which the pattern can be applied to and the forces (constraints,
limitations). (20 points) 3. Consider one of the following interactive applications (20 points)
a. A secure automated course registration system for a university
b. A secure library management system
c. An Internet-based polling booth for public elections
d. A secure home banking system
Develop a user model, design model, mental model, and an implementation model, for any one of
these systems.
4. Develop two additional design principles that “reduce the user’s memory load.” (5 points)

Categories
Software Engineering

How does it work?

Project Abstract
The recycling Steps is a website that aims to provide recycling services in Riyadh society and foster recycling principles in Saudi Arabia.
The reason for creating a website is to solve of overstock of trash and helps to transform the waste into something reusable.
The website offers to recycle various materials such as plastics, glasses, clothes, cardboard cartons, and paper. The method is that customers’ waste will be delivered to the delivery service, and then it will be transferred as points.
The usage of the website is creating a new account on the website and filling out the information about his/her name, phone number, and email.
How does it work?
The user logs in and makes a reservation and chooses what to want to be recycled. After that, selects the date and h location. Finally, submit the reservation. The website is able to view and cancel orders, using points as rewards.
if you use any references, they should cite in APA style.
Thank you
The requirements are:
1/ Draw sequence diagram ,Component Diagram, and Deployment Diagram for Recycle website project depicting of the system based on the class diagram and entity relationship Diagram (upload files).
2/ each diagram must be followed up with an explained document (how did you do it?)
The diagrams should be an editable file so can edit them if necessary. I encourage you to use a website called: app. diagrams.net. I will upload the files to use in the project.
*Note*
I will upload to you the class diagram, and entity relationship, because it is related to the project and help you fully understand the project. all these diagrams represent the project I am working on
You should answer all the questions.
The work must be free of matches from other sites or students and has no plagiarism.
Thank you

Categories
Software Engineering

Write the reason for using agile in this project

Fill this requirement and all the information is below:
1. write the introduction to Agile
“write a paragraph about Agile in general and its methodology ”
2. write the reason for using Agile in this project
” write down the importance, Characteristics, and benefits of using agile with the project’”
3. Write and specify each phase of this project. I don’t want you to write the phases only.
This is the Agile Software Development Life Cycle which is:
1. Plan requirements
2. Develop product
3. Test Software
4. Deliver iteration
5. Incorporate feedback
Project Abstract
The recycling Steps is a website that aims to provide recycling services in Riyadh society and foster recycling principles in Saudi Arabia.
The reason for creating a website is to solve of overstock of trash and helps to transform the waste into something reusable.
The website offers to recycle various materials such as plastics, glasses, clothes, cardboard cartons, and paper. The method is that customers’ waste will be delivered to the delivery service, and then it will be transferred as points.
The usage of the website is creating a new account on the website and filling out the information about his/her name, phone number, and email.
How does it work?
The user logs in and makes a reservation and chooses what to want to be recycled. After that, selects the date and h location. Finally, submit the reservation. The website is able to view and cancel orders, using points as rewards.
*Note:* I want a unique work, no plagiarism, please
if you use any references, they should it cite as APA style.
Thank you

Categories
Software Engineering

How each of these terms differs from its counterparts.

1. Consider the software required to implement a full navigation capability (using GPS) in a mobile, handheld communication device. Describe three crosscutting concerns that would be present. Discuss how you would represent one of these concerns as an aspect. (15 points, 5 points for each crosscutting concern)
2. How are the concepts of coupling and software portability related? Provide examples to support your discussion. (5 points)
3. Present two examples of applications for each of the architectural styles noted and describe the why the application uses that architectural style. Complete this exercise for Data driven, Layered, Call and return and Object-oriented architecture (20 points, 5 points for each architecture)
4. The terms architectural style, architectural pattern, and framework (not discussed in this book) are often encountered in discussions of software architecture. Do some research and describe how each of these terms differs from its counterparts. (10 points)

Categories
Software Engineering

Research methodology, findings, and conclusion.

PSLO 1 Signature Assignment In this assignment, you are required to write a summary about the article below: Miyazaki, A. D., & Fernandez, A. (2001). Consumer perceptions of privacy and security risks for online shopping. Journal of Consumer affairs, 35(1), 27-44. Each summary should be between 300-400 words and I will take points off if you don’t adhere to the word limit. I expect each summary to offer a complete investigation of the context of the article, research methodology, findings, and conclusion. You should also criticize the paper and show the weaknesses. Your paper must use well-format, and it should be free of grammatical and spelling errors.

Categories
Software Engineering

List them in tables with a brief description of each tool.

The Task is: DevOps is now the project development practice that guarantees good quality, fast product delivery and efficient system integration.
Find a research paper about DevOps practices and use the paper’s suggested method to create your IT project DevOps plan and strategy. To make your strategy works also find suitable DevOps automated tools. List them in tables with a brief description of each tool.
Adapt your selected DevOps strategies, methods, and tools suitable for your project process. ATTENTION: please read the required task above carefully !
– I upload the case study to ues it in DevOps.
– I upload a paper in the attachment, so I want to use this paper in this task and apply the strategy and practices, and tools.

Categories
Software Engineering

Downtime has been a factor so the government organization wants to have at least 2 different vms or servers.

Introduction
You are in the DevOps group at a government agency where the organization runs a case management application. They are having performance problems running the application in-house (a web server in their own data center), and there is too much downtime. They are looking to your advice about whether they need to procure one or more new web servers (Dell) or they should move to a cloud service. There are about 1200 concurrent users on the application each day, most of them at remote locations.
Details of the application The application has a major web interface with a menu allowing the user to create a new case, update a case, find a specific case, or search for a case by a variety of terms.
Main Menu
The current front-end application requires 0.5 GB of memory to run each instance and each instance can handle a maximum of 300 concurrent users.
New Cases
20% of the users create a new case when they access the system. The “new case” component calls 4 different services to collect different parts of the required information. Each service is called sequentially so only 1 service is in memory at any one time. The new case component stays in memory and takes 1.2 GB of memory. The maximum load it can take is 150 users. The maximum size of each of the services called is 0.5 GB and it can handle 50 users at the same time.
Update Cases
About 30% of the users are simply updating one or more of the pages created as above. Again,the component has 4 different services representing each of the different parts of the information. As above, each service is called sequentially so only 1 service is in memory at only one time.
The “update case” component stays in memory and takes 0.75 GB of memory. The maximum load it can take is 300 users. The maximum size of each of the services called is 0.4GB and it can handle 300 users at one time.
Find Specific Case About 30% of the users merely use the application to retrieve data on a specific case. The component is a stand-alone application. The maximum load is 80 users and the size of the component is 0.5 GB of memory.
Search Cases The remaining 20% of users are performing searches to identify one or more relevant cases. The search system has a service to handle each of the five different search terms (e.g. topic, name, location, date, and prosecution status).
Searches can involve 2 of these topics at the same time so 2 service instance can be in memory at the same time. The search case outer module stays in memory (1.5GB) and so does 2 of the 5 services (0.4 MB) each. The module and services have maximum local factor of 100 users.
Non-Functional Considerations
Downtime has been a factor so the government organization wants to have at least 2 different VMs or servers. Each VM/server must have enough memory to carry the entire load in the case of failure of one of the machines (e.g., a hard disk failure).
Memo Draw a component diagram of the application making for each module the number of instance that are necessary to adequately support the estimated workload.
Prepare a spreadsheet identifying the various component memory requirements and calculate the total memory requirements, allowing for the multiple instances necessary to support the anticipated concurrent users.
Prepare a memo to the CIO (Elizabeth Jones) with a copy to the CFO (Nathan Andrews) which summarizes the features of the 2 options, including the time it might take to provision them.
Include information on the urgency of the requests as the inspector general will be doing an audit in 3 months’ time.
In the last paragraph detail your recommendation, attached a spreadsheet showing your calculations, and the component diagram.
Notes:
In addition, the application requires a Registry/Load Balancer and this is a 1.2 GB application and should be in memory at all times.
The application will require about 3 TB of data and has a service to retrieve data for each part of the system which requires 2GB of memory. It has capacity of handling 600 users.
You may recommend the cloud service of your choice but your memo should justify why you selected the cloud provider, there should be at least 3 justifications.