Questions
Software Engineering Process Models Question 4 (a) Give a description of the waterfall process model. In...

Software Engineering Process Models
Question 4
(a) Give a description of the waterfall process model. In your answer you should describe the main tasks that are conducted, and the order in which they are carried out. You may want to include a diagram to clarify your answer.
[7 marks]
(b) Describe one advantage and one disadvantage of adopting the waterfall process model in comparison to other process models.
[4 marks]
(c) Describe the key principles which underlie Agile software development.
[8 marks]
(d) Risk management is an important part of software project planning. Describe what is meant by a risk and give two examples of risks which could seriously affect a project.
[4 marks]

In: Computer Science

Explain in your own words what is meant by the .NET term of "master pages"? Include...

Explain in your own words what is meant by the .NET term of "master pages"? Include an example.

In: Computer Science

Visit the web site of one of the following government agencies: •            Federal Trade Commission •            FFIEC • &nbs

Visit the web site of one of the following government agencies:

•            Federal Trade Commission

•            FFIEC

•            Federal Drug Administration

Search the site for information about the agency’s standards related to information security. Study the information you find and draw some conclusions about it. How are the regulations presented? How easily can businesses access and follow these regulations? Summarize your findings in a brief report (06 - 08 pages)

In: Computer Science

Write a java program that presents the user with the following menu Linear Search Binary Search...

Write a java program that presents the user with the following menu

Linear Search
Binary Search
The user can choose any of these operations using numbers 1 or 2. Once selected, the operation asks the user for an input file to be searched (the file is provided to you and is named input.txt).

If option 1 or 2 is selected, it asks the user for the search string. This is the string that the user wants the program to search in the input file. Implement two methods stubs:

1) linearSearch - takes a file and a search string as inputs, and returns a boolean signifying found or not found.

2) binarySearch - takes a file and a search string as inputs, and returns a boolean signifying found or not found.

You will develop these stubs into actual functionality in the next assignment.

Sample Output 1:

Please select from below:

1. Linear Search

2. Binary Search

Your selection: 1

Please enter the input file to searched: input.txt

Please enter the string to be searched in input.txt: RaDar

Search functionality is under maintenance. Thank you for using my search program.

---------------------------------------------------------------------------------------

Sample output 2

Please select from below:

1. Linear Search

2. Binary Search

Your selection: 90

Please select between option 1 or 2

Your selection: 2

Please enter the input file to searched: words.txt

Please enter the string to be searched in words.txt: Recoil

Search functionality is under maintenance. Thank you for using my search program.

In: Computer Science

Give an example of a non-regular Context-Free Language that can be recognize by a Deterministic Pushdown...

Give an example of a non-regular Context-Free Language that can be recognize by a Deterministic Pushdown automata and one that cannot.

In: Computer Science

Using C# create a new grade book program for a teacher. We have a class with...

Using C# create a new grade book program for a teacher.

We have a class with 10 students who have each taken 5 tests. Create an array to hold:

  1. Each student’s name
  2. Each test grade
  3. The average for each student's tests

Use a random number generator to generate the test scores for each student. The student names may be hard-coded into the array.

Create and call a method that calculates and stores each student’s average in the array.

Create and call a method that displays the grades and average for each student.

In: Computer Science

C++ Modify FunctionTable.cpp so each that each function returns a string(instead of printing out a message)...

C++

Modify FunctionTable.cpp so each that each function returns a string(instead of printing out a message) and so that this value is printed inside of main().

//: C03:FunctionTable.cpp
// Using an array of pointers to functions
#include <iostream>
using namespace std;
// A macro to define dummy functions:
#define DF(N) void N() { \
cout << "function " #N " called..." << endl; }
DF(a); DF(b); DF(c); DF(d); DF(e); DF(f); DF(g);
void (*func_table[])() = { a, b, c, d, e, f, g };
int main() {
while(1) {
cout << "press a key from 'a' to 'g' "
"or q to quit" << endl;
char c, cr;
cin.get(c); cin.get(cr); // second one for CR
if ( c == 'q' )
break; // ... out of while(1)
if ( c < 'a' || c > 'g' )
continue;
(*func_table[c - 'a'])();
}
}

In: Computer Science

Write a fragment of MIPS code to convert temperature in Kelvin to Fahrenheit

Write a fragment of MIPS code to convert temperature in Kelvin to Fahrenheit

In: Computer Science

Static methods can be called directly from the name of the class that contains the method....

Static methods can be called directly from the name of the class that contains the method. Static methods are usually created to do utility operations. For example: public class Test{ public static int timesTwo(int value){ return value * value; } } public class TestDriver{ public static void main(String[] args){ int var = Test.timesTwo(5); System.out.println(var); } } Create a class called ManyLinkedLists. It will contain a static method called createLinkedList(). That method takes an argument that is a constant defined in the ManyLinkedLists class. The identifier of the constants should describe a type of linked list. When the createLinkedList method is called, it should return a linked list object of the type identified by the constant. For example: DoubleEndedList del = ManyLinkedLists.createLinkedList(ManyLinkedLists.DOUBLEENDEDLIST); Give the createLinkedList method the ability to return the linked lists described below: A double-ended linked list. A doubly linked list.

In: Computer Science

2. Combine multiple files Use Python programming to combine two text files: customer-status.txt and sales.txt Data...

2. Combine multiple files

Use Python programming to combine two text files: customer-status.txt and sales.txt

Data columns in customer-status.txt (separated by comma):

Account Number, Name, Status 527099,Sanford and Sons,bronze

Data columns in sales.txt (separated by comma):

Account Number, Name, SKU, Quantity, Unit Price, Ext Price, Date

163416,Purdy-Kunde,S1-30248,19,65.03,1235.57,2014-03-01 16:07:40 527099,Sanford and Sons,S2-82423,3,76.21,228.63,2014-03-01 17:18:01

After you combine, you will see the following:

527099,Sanford and Sons,S2-82423,3,76.21,228.63,2014-03-01 17:18:01,bronze

In: Computer Science

Using C++ Create a polymorphic banking program using the Bank-Account hierarchy created in Exercise 2 of...

Using C++

Create a polymorphic banking program using the Bank-Account hierarchy created in Exercise 2 of Written Assignment 4. For each account in the vector, allow the user to specify an amount of money to withdraw from the Bank-Account using member function debit and an amount of money to deposit into the Bank-Account using member function credit. As you process each Bank-Account, determine its type. If a Bank-Account is a Savings, calculate the amount of interest owed to the Bank-Account using member function calculateInterest, then add the interest to the account balance using member function credit. After processing an account, print the updated account balance obtained by invoking base-class member function getBalance. [MO 5.1, MO 5.2]

In: Computer Science

I need the full code. No hardcoding. Code a function to convert any 8-bit number from...

I need the full code. No hardcoding.
Code a function to convert any 8-bit number from binary to hexadecimal. You are not allowed to use libraries that automate this process.
a) Test your function with the following binary numbers. 11110000 and 00100010
The binary number will be provided by the user and you must read it using fgets.

b) Draw a flowchart of your code. You can draw it by hand but it must be readable, and respect the flowchart conventions.

Must be Written in C

In: Computer Science

Write your answer in ESSAY format (approximately 300 words) Which of the following CPUs are compatible...

Write your answer in ESSAY format (approximately 300 words)

Which of the following CPUs are compatible with the Z390 AORUS MASTER Motherboard ?

AMD RYZEN 9 3900x

Intel Core i7-7700

Intel Core i7-9700k

Intel Core i9 9820x

Explain the criteria you checked to make your choice. Make sure to explain why the other CPUs were NOT compatible.

Hint: check socket type, chipset, generation, manufacturer, motherboard specifications

Describe the features of the compatible CPU including speed, cache, supported chipset and any other important features.

The explanation should be written in a way that even a layman can understand the importance of these features.

In: Computer Science

List the steps in maintaining chain of custody for digital evidence. Why is it important to...

  1. List the steps in maintaining chain of custody for digital evidence.
  2. Why is it important to follow the chain of custody when gathering evidence?
  3. For the computer forensics case, identify what evidence the forensics experts were able to gather.
  4. Name two of the things the United States attorney was able to prove in the computer forensics case.
  5. What important questions should the security incident response form answer.
  6. Why is it important to include a time/date stamp in the security incident response form?

In: Computer Science

Provide a 250-400 word description of the issues DirectAccess addresses related to the use of VPNs...

Provide a 250-400 word description of the issues DirectAccess addresses related to the use of VPNs within an organization.

In: Computer Science