Software Requirements Specification

Software Requirements Specification Please complete the Software Requirements Specification (SRS). The document should be based on the template that will be attached (Volere template).

Software Requirements Specification
Software Requirements Specification

You can decide which diagrams and system models should be included to add clarity to your document.
Please makes sure that all requirements conform to the standards :
Uniquely identified
One requirement per sentence
Has a “shall”
Unambiguous
Testable
Conflict-free
Complete
Feasible
Non-functional requirements: these should include usability, and at least another other 4 types that you think are applicable. you can make up any that
weren’t clarified (use some type of formatting to identify which ones came from the client, and which you made up). Make sure that they are stated
quantitatively.
There is also one example that I will attach so you can be clear about general the idea.
Basically, the client company is talking calls for multiple clients where they take messages from customers and send it to the clients. I have RFP file and please let me know if you need it!
Required Texts: Robertson, Susanne & James, Mastering the Requirements Process – Getting Requirements Right (Third Edition)

Agile Software Development Methods

Agile Software Development Methods -extend knowledge on agile software methods, the methods’ challenges, and solutions particularly for small projects

Agile Software Development Methods
Agile Software Development Methods

-analyze existing findings and documentation made towards understanding agile methodologies and identifying gaps
– target small projects. Agile software development methodologies are a group of development techniques or methods that enable software development using various types of iterative development techniques. These methodologies work on the basis of the continued evolution of requirements and solutions that occur by establishing collaboration between self-organizing cross-functional teams.
A way of encouraging the well-managed and organized project management process, these methodologies allow for recurrent inspection and revision of the tasks.

Role of Object Oriented Programming

Role of Object Oriented Programming Write a page paper discussing the Object Oriented programming in modern programming solutions.

Role of Object Oriented Programming
Role of Object Oriented Programming

How does OOP compare to Procedural Programming? Is Procedural Programming dead? Discuss the history of OOP. What was the first OOP language and what was the motivation to create it. How did OOP languages evolve? What do you predict to be the next evolution of Computer Programming? The four principles of object-oriented programming are encapsulation, abstraction, inheritance, and polymorphism. These words may sound scary for a junior developer. And the complex, excessively long explanations in Wikipedia sometimes double the confusion.

Internet Privacy Filtering in Public Places

Internet Privacy Filtering in Public Places This paper is my final paper .. so i need from you to concentrate and reed the instructions carefully .. the paper is related to paper 5 that you did it.

Internet Privacy Filtering in Public Places
Internet Privacy Filtering in Public Places

but you should develop these paper (edit it) and you should add 2 sources one of them is( personal interview with any professor that you can, guess-work that and write about it, the total will be 8 sources with the previous sources .. I give you an example of paper 5 and 6 and how he developed it from paper 5 to 6.. .Use same the example (paper 6) and write about it .. Also ( I give you my paper 5 that you did and i would like to use same works cited annotated bibliography) and add 2 sources one of them (personal interview) .. you can find everything in my account..
– use your own sources which is about Internet privacy…
-use same style and technique (Format and design) from the example that i gave to you ( example paper 6).. but use your own source and words to write the all paper… remember the example just to clarify… and write about my topic which is Internet privacy, Internet filtering in public places.

Characteristics of Network Topology for Lab Environment

Characteristics of Network Topology for Lab Environment List the characteristics of your network topology. Also identify why other topologies would be inappropriate for the lab environment. List the characteristics of your network topology. Also, identify why other topologies would be inappropriate for the lab environment.

Characteristics of Network Topology for Lab Environment
Characteristics of Network Topology for Lab Environment

• Describe how two nodes communicate through the network using the example of the OSI Model.
• Identify the TCP/IP protocols are used describing the elements of TCP/IP, subnets, classful and classless (CIDR) addressing and the services they provide.
Is there another form of communications which would be more appropriate for this network if this lab room was isolated from the rest of the campus?
• What devices would be most appropriate to connect D138 lab to the other campus subnets? Describe the functionality of the device used to connect subnets,
its advantages and disadvantages, describing why other forms of devices would be inappropriate for this environment.

Characteristics of Network Topology for Lab Environment

• How does the network operating system provide basic security for your system?•
THIS IS WHAT I HAVE BUT TO MUCH PLAJERISM
Fred Caulder
Net-110
Dr. Denise Houchen-Clagett
10-26-2017
What I Have Learned In Networking Class
The network topology is a layout of computers, cables, and other equipment on the network. The three we studied most is a networking class is a Bus, Star, and Ring. The topology of a network is its direction of the data flow, if you were the packet, the data flow is the path that it will take through the network and
the devices it will come in contact with.
A star topology is a group of computers connected to one location with a hub or switch. This is the most common configuration used today. Each computer has its own cable or connection to the hub or switch. With each computer having its own connection if one computer has a problem it will not cause the other computers in the network to have problems. But if the hub or switch should have a problem all the computers on that hub or switch will have the same problem.

Characteristics of Network Topology for Lab Environment

A bus topology is connected by one cable. Because only one computer at a time can send data, the number of computers connected to the Network will affect how they run. The more computers there are the longer it will take for data to be put on the bus and slow the network down.
Small business and home networks are often Peer-to-Peer networks. Nodes act as both a client and a server. No outside server is involved at all. Peer-to-peer networks have minimal computers. Hard to use this for many big networks because if all the computers ask one particular computer to share a folder it would slow it down trying to identify all the ID’s and passwords.
Servers are the ones that allow user’s access on the network and control their access to the web. The client’s usages are controlled by the server computer.
They may be many clients running from one server.
“The three bottom layers are physical, link and network these layers use data communication protocols to control communication between two network nodes. A server may connect two LANs, each containing a workstation that communicates with each other. The workstations are the end nodes and the server is the routing node that passes along data on the bottom three protocol layers”.
“The three upper layers – Application, Presentation, and Session… Transactions between these layers occur on a peer basis there is no recognition of how
transmission between the two physically independent network nodes occurs.”
“The transport layer uses the services provided by the network. Take the data and redistributes it to the appropriate applications”.

Characteristics of Network Topology for Lab Environment

Classless Inter-Domain Routing (CIDR) is new addressing for the Internet. It allows for faster placements of IP addresses than the Class-A, B, and C classes and routes any valid subnet from any base IP of its Class.
Class-A’ 126.0.0.1 and below….. 127 .0.0.1 is a loopback 255.000.000.000 126 networks
Class-B’s 128.45.5.1 – 192.45.5.1 255.255.000.000 116,384 networks
Class-C’s 193.45.5.1 – 254.45.5.1 255.255.255.000 2,097,152 networks
Advantages of why our classroom is set up as a Star Topology and why I agree on Ease of service, this Network has a number of connection points these provide easy access for service layout of our network. One device per connection, connection points are going to fail at some time or another. Failure of a single connection involves disconnecting one node from a working network without affecting the whole network. The fact that the central node is connected directly to every other node in the network means that problems are easily found and isolated. It is a quick fix to unplug problem nodes from the system, access is very simple. If the central node in a star network fails, the entire network fails.

Critical Discourse Via Computer Graphics

Critical Discourse Via Computer Graphics Watch and read the following media art piece:
Healer by Angela Washko:

Critical Discourse Via Computer Graphics
Critical Discourse Via Computer Graphics


(additional info) Angela Washko website: http://angelawashko.com/home.html
After watching and analyzing the art/media piece, write the research paper. What media technologies does the artist incorporate into the work? Identify at least 2 media technologies and expand on the subjects. Discuss the relationship between form (media) and content (message) in the work; do the formal choices serve to heighten or mask the work’s intent or statement? How do their visual strategies relate to the “message” or content of the work? In what way does the medium/ media technology chosen by the artist operate to strengthen the work’s intent? As a starting point, think critically about these two statements:
“The medium is the message.”
By Marshall McLuhan from Understanding Media: The Extensions of Man (1964)
“Media determine our situation.” By Friedrich Kittler from Gramophone, Film, Typewriter (1986)
Include a historical analysis of your two chosen media and discuss their development and influence on how we communicate. The introduction chapter from Critical Terms for Media Studies (2016) by W. J. T. Mitchell and Mark B. N. Hansen should be helpful in formulating your argument and is available here:
Your paper should include a bibliography page, using examples and citations from the readings to clarify your arguments.

The Systems Input and Output Design Paper

The Systems Input and Output Design Paper Read and follow instructions carefully read and follow the scoring guide at the bottom of the page all diagrams and GUI needed to be done correctly.

The Systems Input and Output Design Paper
The Systems Input and Output Design Paper

Input and Output Design
For this component, you will complete the following:
• Identify the input design.
• Determine and explain the system inputs and review logical requirements.
• Select an appropriate graphical user interface (GUI) controls.
• Design, validate, and test inputs.
• If needed, design a source document.
• Identify output design.
• Determine and explain the system outputs and review logical requirements.
• Determine the physical input and output requirements for your subsystem.
• Determine the types of reports needed.
• Design the reports.
Your completed assignment should include the following:
• Identify and document the set of required system inputs and outputs needed to satisfy the logical requirements of your subsystem.
• Demonstrate the ability to thoroughly validate and test the identified system inputs and system outputs.
• Successfully apply appropriate programming constructs to a predesigned prototype.
• Construct a working application based on a previously developed design.
• Write a detailed and accurate analysis of the input and output design for your chosen subsystem providing appropriate rationale for its design and implementation.

Strategic Role of MySQL System Program

Strategic Role of MySQL System Program -A discussion of the strategic role the system will play in the company

Strategic Role of MySQL System Program
Strategic Role of MySQL System Program

-A discussion of the business requirements driving the need for the system
-A discussion of the information used in the system
-An executive summary of the project, succinctly summarizing the rest of the material in the paper. This course is for professionals and researchers from Latin America and the Caribbean, who work in the public or private sphere in the design, implementation or evaluation of public policies. Participants are expected to have intermediate knowledge in program evaluation, statistics, and econometrics.

Ethics in and through Technology Research Paper

Ethics in and through Technology
     Ethics in and through Technology

Ethics in and through Technology

Order Instructions:

Identify a current application for digital technology that you feel has social, moral, and ethical implications for teachers and/or students. Technology is broadly defined to include anything from a piece of hardware (laptop, gaming console, tablet) to software, apps, social media platforms, etc.

*Write a one paper framed to argue its point toward a particular audience. You must first decide who you are considering to be the audience of the paper.

After you write the one page paper, write an additional short policy brief that could be given to the school board, administration, or the legislature with practical recommendations.

SAMPLE ANSWER

Critical Assessment – Ethics in and through Technology

Technology plays a very vital role in the lives of students and the society who have multiple technological devices and use them frequently. Though technology could have negative effects on the students but overall it helps the students to make their schooling much easier. This can be greatly supported by several studies conducted.

A research that emphases on information technology adoption and use within the education sector has been conducted. They analyzed the impact on learning efficacy of technology-mediated learning environments such as characterized by the adoption of tablet based technologies as a radical complement to old-fashioned teaching/learning methods. The study also analyzes the effect or outcome of “Support Activities” on students’ grades. The “Support Activities” are well-defined as the set of concepts similar to “Classmates’ Encouragement”, “Technical Support Availability” and “Teachers’ Encouragement”. It is known that grades are used as a measure of learning efficacy. In this study, a sample of 370 students partook, being attendants of experimental classes by using tablets as a regular working device to obtain to digital resources. The conventional theory reference was established on the theoretical fundamentals of Technology Acceptance Model, by matching the perceived effect of those concepts between grade ranges. The experimental sample was correlated to classes where the same instructors practice traditional learning resources. This is to give a practical understanding of support factors that influence tablet-mediated learning effectiveness. So, the findings showed the dissimilarities between humanistic and scientific subjects. The study confirms that technology alone could not reform and revolutionalize learning and teaching; nevertheless, it contributes to a better-quality experience if there are a deployed support initiatives (Caporarello, Magni, & Pennarola, 2016).

On the other hand, another study was done which seeks to discover the degree to which technology interrupts and occupies the time of a university student and to determine the extent to which these disturbances contribute to superficial stress. The study is a 71-item survey to evaluate perceived stress, disruptions, technology use and social support was overseen to 299 undergraduate learners. The results indicated that 25% of participants have issues and problems with distractions from technology, and more disturbances from technology are associated with advanced levels of perceived stress. Experiencing disruptions from technology is a notable problem among college students and needs to be tackled by student affairs professionals (Gemmill, & Peterson, 2006).

Policy brief

Students of today are now very fond of using modern devices that somehow aid in their studies and the environment they live in.

The people live in a very fast-changing ‘runaway world’ where the economic, social, cultural and political fundamentals of society are being redefined on an incessant basis (Giddens 2000).

The utilization of technologies to improve educational outcomes and support social inclusion in education has two main forms.

The number one is the usage of technologies to endorse social inclusion in terms of educational outcomes and prospects. The Information and Communication Technology (ICT) have long been supported as a predominantly opposite means of permitting citizens to play active parts in improving educational prospects and crucially proposing ways in which the underprivileged individuals could participate in education (Schofield Clark, 2003). The decentralized, intrinsically equitable, and democratic systems of education could be expected by many critics, with individuals – particularly young people – technologically re-placed at its core instead of the periphery. And the number two could be the usage of education to guarantee social insertion in terms of technological outcomes and opportunities. So, in this sense, educational organizations such as colleges, schools, museums, and libraries are used to deliver access to ICTs which training in technology skills and proficiency are seen to offer the students with the info literacy mandated to make the most of the ICTs.

Perhaps the most dominant have been guidelines and policies pursuing to use education to make sure social inclusion in terms of technological outcomes and opportunities. This kind of policy campaign have been typically built around the augmented resourcing of municipal institutions and public like libraries, community centers, schools, subsidizing of IT equipment acquisitions by those students who belong to the low incomes families and the development of formal computer education and support programs.

Recommendations

Here are some recommendations which the school board may consider for the betterment of their students:

  • Use technology to enhance the knowledge and skills of all students including those who cannot afford to buy their own device or gadgets
  • Since technology could help close achievement gaps and improve learning, the students should be encouraged to use technology but in moderation in order not to disrupt their focus on their studies
  • Technology should be efficiently and effectively used in school and the social aspects of the students.
  • Efficiently use the advantage of technology especially to those students who are at risk of dropping out and failing courses. Use technology to search and build rather than to “drill and kill,” and the correct blend of technology and teachers.

References

Caporarello L., Magni M., Pennarola F. (2016). When Teachers Support Students in Technology Mediated Learning. In: Rossignoli C., Gatti M., Agrifoglio R. (eds) Organizational Innovation and Change. Lecture Notes in Information Systems and Organisation, vol 13. Springer, Cham

Gemmill, E., & Peterson, M. (2006). Technology Use Among College Students: Implications for Student Affairs Professionals. NASPA Journal43(2). http://dx.doi.org/10.2202/0027-6014.1640

Giddens, A.(2000). Runaway world: how globalisation is shaping our lives. London: Routledge, 2000.

Schofield Clark, L. (2003). Challenges of social good in the world of Grand Theft Auto and Barbie. New Media & Society, v. 5, n. 1.

We can write this or a similar paper for you! Simply fill the order form!

Business Computing Case Study Report

Business Computing Case Study Report Order Instructions: please read Business Report Assignment Specification – Sem 2 2016 doc
all the instruction is inside.

Business Computing Case Study Report
Business Computing Case Study Report

I have also uploaded the lecture powerpoint in case you need it

Business Computing Case Study Report Sample Answer

BUSINESS COMPUTING CASE STUDY REPORT

  • …………………………………………………………………………………………………………….2
  • Data Analysis Results……………………………………………………………………………………………….3
  • Discussion of the Data Analysis Results……………………………………………………………………..6

1.3.1.         Discussion of Factors Affecting the Results…………………………………………………7

  • Concluding Remarks………………………………………………………………………………………………..7
  • ……………………………………………………………………………………………………7
  • Reference List…………………………………………………………………………………………………………..8
  • Introduction

Data visualization is without any doubt one of the most powerful business analytics tools that play a fundamental role in enabling the process of effective decision making in business (Cleveland, 2014). Thus, according to Tufte (2013) and Stephen (2015), data visualization in business allows abstract information to be graphically displayed for two purposes: data analysis or sense-making and communication of meaningful insights obtained to enable informed decision making (Liff & Posey, 2013; Robbins, 2015). Effective visualization makes complex data more understandable, accessible and usable; while helping users to carry out analysis and reasoning about data and the evidence it provides mostly through comparative representation of the data using tables and charts to show patterns, trends or relationships between variables of the data (Carr & Pickle, 2012; Post, Nielson & Bonneau, 2012; Friendly, 2014).

The purpose of this business report is to use varied data visualization techniques to represent the sales data of the number of cans of drinks sold over a trial period of 4 months. In particular, the report is directed to Colin who is interested in expanding to non-alcoholic beverages and analysis of the trial period results done and, advice provided to him based this analysis concerning the marketing potential for each flavor, the different retailers and the different regions.  The report also provides the sales trends over the trial period, as well as other factors worthy consideration when the results are interpreted, and finally providing advice on other factors that may need to be considered prior to making final decisions concerning the ongoing trial period sales of the ‘mixer’ drinks.

  • Data Analysis Results

Analysis of the sales data contained in the spreadsheet is carried out in tables and charts to visually represent the data in a more understandable and meaningful manner. The sales data is analyzed with regards to three broader aspects of the drinks concerning the marketing potential for each flavor, the different retailers and the different regions.

Table 1: A Table Showing the Number of Drinks Sold per Flavour (number of 300 ml cans)

Flavor TOTALS
ALMOND PASSION 1975834
CRANBERRY WIZZ 525519
LIME SODA 428008
MANGO DELIGHT 1027283.333
RASPBERRY SODA 247802
TRIPLE SHOT EXPRESSO 1244085
OVERALL TOTAL 5448531

Figure 1: A Bar Chart Showing the Number of Drinks Sold per Flavour (number of 300 ml cans)

Table 2: A Table Showing the Number of Drinks Sold in Different Regions (number of 300 ml cans)

REGION TOTALS
NSW 1395684
QLD & NT 1758854
VIC &TAS 934091
WA & SA 1359902
OVERALL TOTALS 5448531

Figure 2: A Pie Chart Showing the Number of Drinks Sold in Different Regions (number of 300 ml cans)

Table 3: A Table Showing the Number of Drinks Sold by Different Retailers (number of 300 ml cans)

RETAILER TOTALS
THIRSTY CAMEL 1702809
CELLARBRATIONS 1150649
DAN MURPHY’S 2418035
DUNCAN’S 177038
OVERALL TOTALS 5448531

Figure 3: A Column Chart Showing the Number of Drinks Sold by Different Retailers (number of 300 ml cans)

Table 4: A Table Showing Sales Trends over the Trial Period (number of 300 ml cans)

Number of Drinks sold (number of 300 ml cans)
September October November December Totals
Mixer Flavour
ALMOND PASSION 439615 553068 455825 527326 1975834
CRANBERRY WIZZ 168453 150640 206371 55 525519
LIME SODA 300772 76109 37696 13431 428008
MANGO DELIGHT 224747 250997 261243 290296 1027283
RASPBERRY SODA 66372 71074 55374 54982 247802
TRIPLE SHOT EXPRESSO 213894 310386 317038 402767 1244085
Region
NSW 366040 387425 336472 305747 1395684
QLD & NT 429141 467946 428128 433639 1758854
VIC &TAS 221655 230457 241504 240475 934091
WA & SA 397017 326446 327443 308996 1359902
Retailer
THIRSTY CAMEL 462963 455320 374882 409644 1702809
CELLARBRATIONS 252914 261046 271751 364938 1150649
DAN MURPHY’S 640078 655990 645582 476385 2418035
DUNCAN’S 57898 39918 41332 37890 177038
  • Discussion of the Data Analysis Results

The marketing potential of these drinks for each flavor the different retailers and the different regions is varied. For instance, the sales of each flavour are as follows: ALMOND PASSION (1975834 Cans); TRIPLE SHOT EXPRESSO (1244085 Cans); MANGO DELIGHT (1027283 Cans); CRANBERRY WIZZ (525519 Cans); LIME SODA (428008 Cans); and RASPBERRY SODA (247802 Cans) respectively. The first three flavours seem to have a significant potential due to their high sales compared to the rest. In addition, the four different regions considered also show varied results as follows: QLD & NT (1758854 Cans or 32%); NSW (1395684 Cans or 26%); WA & SA (1359902 Cans or 25%); and VIC & TAS (934091 Cans or 17%) respectively. Furthermore, the four different retailers considered also show varied results as follows: DAN MURPHY’S (2418035 Cans); THIRSTY CAMEL (1702809 Cans); CELLARBRATIONS (1150649 Cans); and DUNCAN’S (177038 Cans).

  • Discussion of Factors Affecting the Results

It is evidently clear that, the results obtained concerning the drinks over the 4 month trial period with regards to the marketing potential for each flavour, the different retailers and the different regions may have been affected by a number of factors. First, the packaging of the ‘mixer’ drinks only in 300 ml aluminium cans seems monotonous and may hinder purchasing convenience among some buyers subsequently affecting the sales. Second, considering that these drinks are advertised as ‘adult’ mixers and their sales is accompanied with cocktail recipes directly printed onto the can may affect the sales results, since the sales of these drinks are envisaged to correspond to the sales of alcoholic beverages irrespective of being non-alcoholic beverages.

  • Concluding Remarks

In conclusion, it is important to emphasize that the marketing potential of the drinks is affected by various factors including the flavour, chosen retailers, distribution regions and cost as well as the packaging and advertising strategy. The sales trends also vary, and this means if all these factors are appropriately balanced sales of these drinks can improve significantly.

1.5 Recommendations 

From the analysis carried out in the report, there are three recommendations that are appropriate for Colin to adopt:

  1. Increase the production of Almond Passion, Mango Delight and Triple Shot Expresso flavours because sales seem to be higher compared to the rest.
  2. Increase the advertising budget of the three drinks with low sales including Cranberry Wizz, Lime Soda and Raspberry Soda to ensure that their sales improve.
  3. Expand distribution in the Victoria and Tasmania regions where low sales are recorded and distribution cost is lower and compared to other regions due to their proximity to the central distribution warehouse.
Business Computing Case Study Report Reference List

Carr, DB & Pickle, LW 2012, Visualizing Data Patterns with Micromaps, Chapman and Hall/CRC, Melbourne, VT.

Cleveland, WS 2014, The Elements of Graphing Data, Hobart Press, Melbourne.

Friendly, M 2014, A Brief History of Data Visualization, Springer-Verlag, Melbourne.

Liff, S & Posey, PA 2013, Seeing is Believing: How the New Art of Visual Management Can Boost Performance Throughout Your Organization, AMACOM, Sydney. ISBN 978-0-8144-0035-7

Post, FH, Nielson, GM & Bonneau, G-P 2012, Data Visualization: The State of the Art, Springer-Verlag, Melbourne.

Robbins, NB 2015, Creating More Effective Graphs, Prentice-Hall, Sydney.

Stephen, F 2015, Fundamental Differences in Analytical Tools: Exploratory, Custom, or Customizable, Prentice-Hall, Sydney.

Tufte, E 2013, The Visual Display of Quantitative Information, Graphics Press, Sydney. ISBN 0-9613921-4-2