MITS5501 Software Quality, Change Management And Testing

MITS5501 Software Quality, Change Management And Testing

In this assignment students will work in small groups to develop components of the Quality Assurance documents discussed in lectures.

Student groups should be formed by Session four. Each group needs to complete the group participation form attached to the end of this document.

Carefully read the associated CASE STUDY for this assignment contained in the document MITS5501-CaseStudy.doc

From this Case Study you are to prepare the following documents:

1. Quality Assurance Plan
2. Test Plan
3. Test Cases (9 per group)
4. Project Scope Statement
5. Perform a Test Effort Estimation (include Tables and calculations used)
6. Test Strategy Document
7. Project Completion Checklist
The above list of documents is not necessarily in any order. The chronological order we cover these topics in lectures is not meant to dictate the order in which you collate these into one coherent document for your assignment.

Your Assignment document containing the above documents is to be compiled into one word document

Your report should use 1.5 spacing with a 12 point Times New Roman font. Include references where appropriate. Citation of sources is mandatory and must be in the Harvard style.
Your report must include a Title Page with the title of the Assignment and the name and ID numbers of all group members. A contents page showing page numbers and titles of all major sections of the report. All Figures included must have captions and Figure numbers and be referenced within the document. Captions for figures placed below the figure, captions for tables placed above the table. Include a footer with the page number.
MITS5501 Software Quality, Change Management And Testing

Posted in ICT

Servlets – Advanced Java Test – Questions…???

Servlets – Advanced Java Test – Questions…???

Servlets – Advanced Java Test – Questions…???

1) In which advantage of servlet, Servlets are managed by JVM so no need to worry about memory leak, garbage collection etc.?

2) In the following statements identify the disadvantages of CGI?

3) Servlet technology is used to create web application?

4) In HTTP Request Which Asks for the loopback of the request message, for testing or troubleshooting?

5) In HTTP Request method Get request is secured because data is exposed in URL bar?

6) In the HTTP Request method which is non-idempotent?

7) Give the examples of Application Server from the following?

8) Abbreviate the term MIME?

9) Which packages represent interfaces and classes for servlet API?

10) The web container maintains the life cycle of a servlet instance,give the lifecycle of a servlet?

11) The sendRedirect() method of HttpServletResponse interface can be used to redirect response to another resource, it may be servlet, jsp or html file?

12) In RequestDispacher which method is used to sends the same request and response objects to another servlet?

13) An object of Which is created by the web container at time of deploying the project?

14) An attribute in servlet is an object that can be set, get or removed from one of the following scopes?

15) How many techniques are used in Session Tracking?

16) Which cookie it is valid for single session only; it is removed each time when user closes the browser?

17) Which object of HttpSession can be used to view and manipulate information about a session, such as the?

18) Which methods are used to bind the objects on HttpSession instance and get the objects?

19) Which class provides stream to read binary data such as image etc. from the request object?

20) These methods doGet(),doPost(),doHead,doDelete(),deTrace() are used in?

21) Sessions is a part of the SessionTracking and it is for maintaining the client state at server side?

22) In Session tracking which method is used in a bit of information that is sent by a web server to a browser and which can later be read back from that browser?

23) Using mail API we cannot send mail from a servlet?

24) Servlets handle multiple simultaneous requests by using threads?

25) Which type of ServletEngine is a server that includes built-in support for servlets?

26) Connection Pooling Class manages no of user requests for connections to improve the performance?

27) Which of these ways used to communicate from an applet to servlet?

28) Web server is used for loading the init() method of servlet?

29) Which class can handle any type of request so it is protocol-independent?

30) In Servlet Terminology what provides runtime environment for JavaEE (j2ee) applications…

>>> — Full Questions in Attached file — <<<


Posted in ICT

Linux Implementation Proposal Linx, LLC. has a new research and development group – LSDG.

Linux Implementation Proposal Linx, LLC. has a new research and development group – LSDG.

Linux Implementation Proposal Linx, LLC. has a new research and development group – LSDG. All systems in LSDG will run the Linux operating system and will access resources, as well as share resources, with Linx, LLC.’s Microsoft Active Directory domain. The domain consists of several Windows Server 2012 R2 servers running various services (Microsoft Active Directory, DNS, DHCP, web services, printing and file services). Linx, LLC. also has around 500 client operating system desktops/laptops that run Windows 7 and Windows XP. There is a mix of desktop and laptop systems. Current Desktop/Laptop Configuration for Windows 7: Processor: Intel Core i3 Second Generation Memory: 4GB RAM Hard Drive: 350GB Network Card: 10/100/1000 Mbps USB Ports: 4 USB 2.0 Monitor: 20inch LCD Current Desktop/Laptop Configuration for Windows XP: Processor: Intel Core 2 Memory: 2GB RAM Hard Drive: 80GB Network Card: 10/100 Mbps USB Ports: 4 USB 2.0 Monitor: 15inch LCD Your boss wants you to come up with a proposal to replace all Windows XP systems with Linux. You will implement the Linux variant specified by your instructor.


The final submission should contain at least 5 to 7 pages’ worth of text written by the student (not counting title page, images, diagrams, tables, or quotations that may be used), but may be longer, not to exceed approximately 7 pages’ worth of student-supplied text. It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required. You must turn this assignment to both the assignment area within our LEO classroom as well as to the TurnItIn website. Failure to do so may result in point deductions. Follow the TurnItIn instructions provided within the class. You must address the following in your proposal and may make any assumptions which are not specified:

Research and justify whether LSDG will use existing computer hardware that is being used with the Windows XP systems, or if new hardware will be required.

• Plan for migration from Windows XP to Linux.

• Determine the hardware to be used and the installation options. • How will users log onto the systems? Explain.

How will systems receive IP addresses? Explain.

• How will DNS be accessed by the LSDG systems? Explain. • Explain how files on the network may be accessed by LSDG.

• Explain how LSDG can securely share files within their group and other selected groups/users in the company.

• How will printing be handled? Explain.

• What, if any, data will be encrypted? Explain.


Posted in ICT

University Financial Aide Fee Management Application

University Financial Aide Fee Management Application

Part 1 – The Proposal Document ()

University Financial Aide Fee Management Application

Tracks payments paid by students for school to include any technology or lab fees they pay on top of tuition (library, computer labs, admission fees, books, etc.).

The system should track all payments, any late fees, and categorize it so the students can see what portion of their money goes to tuition, books, fees, etc. The system will be controlled and maintained by a financial aid supervisor in order to provide security and allow access for students needing that information.

Requirements Specification:

•Enter student information with different categories based on payment reasons/amounts

•Handling payment information bybank card/check as well as Cash

•Proper handling of new Departments/Classes

•Creation of new users and authority management.

•Security Handling

•Database Backup/Database Recovery

•List of students

•Cash Handling Reports (Fines,Admission Fees,Other Fees)

•Password management

•Proper Graphical User Interface

•Proper Links with MsWord/Ms Excel

•Internet Usage

•Client/Server Architecture

S/W Requirements:

1.VB 6

2.Oracle 9i

Part 2

•Using Visual Studio, create a project for your proposed application.

Create a sample splash screen for your application (a splash screen is a screen that runs at program startup). This screen should have the application name, your name, the date, and a descriptive note about the purpose of the application. Include a graphic that fits the project; you may use any public domain graphic (i.e.: no licensed or copyrighted material!) or create your own graphic.

Part 3

Update Part 1

It is known that many things can change between the design and implementation. Update your Application Proposal (shown as Part 1) and complete the following tasks.

•What items you will be able to create and how you will create them?

•Create a storyboard (graphic) and list of menu and screen items to delineate your proposed user screen(s) and menus. Include a starting list of the classes you believe will be useful to your application.

•List and describe any user data inputs and outputs your application will require and produce.

•If you will be using data validation as one of your techniques, list and describe the criteria needed for each proposed field.

•Using Visual Studio, create sample class implementations. These will be code stubs that provide the basis for the classes you will be using.

Part 4

Create the Final Application proposed in Part 1.

•Compile and test the application before you submit it.

•If your final project does not match the proposed design exactly, document the differences.

List the differences between the design document specification and the final implementation.

•Write a detailed explanation of why the design was not implemented. For example, if your design was too ambitious and you did not have time to implement it completely, what did you do instead, and why was the original too time consuming?

•Your code project must be in Visual Studio.

•Your documentation must be in a Word-readable format (.docx, .doc, .rtf, .txt).

•Your final submission will consist of

othe application plus all project files (code files and other project files);

odocumentation of differences between proposed design and final product.


Posted in ICT

CIS333 Technical Project Paper: Information Systems Security

CIS333 Technical Project Paper: Information Systems Security

Technical Project Paper: Information Systems Security

Due Week 10 and worth 150 points

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the premises, as well as the personally identifiable information and protected health information of your customers that resides on your system. Your supervisor has tasked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.

1) Firewall (1)4) Desktop computers (4)2) Windows 2012 Active Directory Domain Controllers (DC) (1)5) Dedicated T1 Connection (1)3) File Server (1)

Write an eight to ten (8-10) page paper in which you:

Identify at least five (5) potential physical threats that require attention.

Determine the impact of at least five (5) potential logical threats that require attention.

Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.

Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.

For each of the five (5) selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

For each of the five (5) selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.


Posted in ICT

This assignment will assess the competency 4.

This assignment will assess the competency 4.

This assignment will assess the competency 4. Explore current business trends in the use of telecommunications technology and computer networks.

Directions: The Internet is actually a collection of interconnected networks, all freely exchanging information. Prepare a short PowerPoint presentation of 10 slides to explain the terminology associated with the basic functioning of the Internet and methods of accessing the Internet. Discuss the difference between the Internet and the World Wide Web. How do businesses typically use the Internet?

This assignment needs to have the following:

• A cover slide (includes students name, date, class title, assignment title)

• 10 content slides (not including cover slide or reference slide)

• A reference slide (If you are referencing information from a textbook or other source, then an APA formatted citation and reference slide are necessary)


Posted in ICT

This assignment will assess the competency 3.

This assignment will assess the competency 3.

This assignment will assess the competency 3. Investigate the fundamental aspects of data and information management.

Directions: Prepare a written assignment of 2-3 pages that investigates the following topic: Define and discuss data warehouses, data marts, and data mining. Also, define and discuss business intelligence, online analytical processing (OLAP), and object-relational database management systems.

This assignment needs to have the following:

• A cover page (includes student’s name, date, class title, and assignment title)

• Paper needs to be 2-3 pages (minimum 2 full pages), 12 point font, double spaced, and writing is grammatically correct

• A reference page (If you are referencing information from a textbook or other source, then an APA formatted citation and reference page is necessary)


Posted in ICT

This assignment will assess the competency 2.

This assignment will assess the competency 2.

This assignment will assess the competency 2. Identify the components that comprise today’s hardware and software systems.

Directions: Create a mind map (a.k.a. brainstorming diagram) to identify and summarize the primary features of commonly used applications software. Your diagram should address personal application software, workgroup application software, and enterprise application software. Your mindmap should be visually coherent; the content should be easy to understand and follow.

• Option 1: Go to Wisemapping and click on the Tutorial Video on the top right hand side of the screen. You can use the Wisemapping website to create your mind map and then save the document to your computer as a PDF. You will need to click on “Register” in the upper right hand corner and create a free account before you use Wisemapping, but it is very quick and easy.

• Option 2: You may also draw your mind map by hand and scan your drawing into your computer and save as a PDF.

• Option 3: You can choose to create a simple flowchart in Microsoft Word. (If you aren’t familiar with using symbols and shapes in Word, the NAU Online Library’s Learning Express video tutorials can help, or you can view “Creating a Simple Flowchart in Microsoft Word,” a YouTube video hosted by Floyd Jay Winters, for a very quick introduction.)


Posted in ICT