[SOLVED] graph security Assignment 2 for INFS700 students

$25

File Name: graph_security_Assignment_2_for_INFS700_students.zip
File Size: 452.16 KB

5/5 - (1 vote)

Assignment 2 for INFS700 students
Complete a comprehensive JAD and COTS project analysis and Reflective Report. The report will include:
A critical review of the JAD methodology: Compare it withtwoother specific requirements gathering methodologies that you have found and researched, including advantages and disadvantages of both, and your views on whether the other methodology may have worked better for this project.
A critical look at the COTS model approach and the acquisition project plan used, with comparisons and contrasts against an alternative Cloud Computing solution. List what extra evaluation steps would be needed in your Acquisition Plan.
Explainwhat Capability Maturity Model is, and commentonwhat CMM level you believe your group achieved, and why: what your group did to move up to a higher level, and/or why what prevented youmoving to a higher level.
NO EXAM

INFS700 Assignment 2
Reflective report & COTS project analysis.Individual assignment
Complete a comprehensive Reflective Report and an analysis or your JAD and COTS acquisition project.
The report will have four sections as follows:
A critical review of the JAD methodology: Compare it withtwootherrequirements gathering methodologiesthat you have found and researched, including advantages and disadvantages of both JAD and the other alternative approaches, and your views on whether either or both of the other methodologies may have worked better for this project.
DoNOTcompare JAD to SDLC or other development methodology. JAD is arequirements gatheringmethodology.
You should cite 3 5 references.
Similarly you will take a look at the COTS acquisition model approachandthe acquisition project plan used, and remove and/or add any steps that are relevant to the acquisition of an existingCloud-basedsolution. You should state the advantages/disadvantages for your client of aCloud-based COTSsolution.
For example Issues such as system availability and security should be examined.
Also, describe any difference for requirements gathering for a cloud solution. Is there is a formal model for that you can find? If not can you think if any of the steps in the JAD approach or any of the other approaches that you described in 2) above that could be modified for a cloud solution. How? And if not, why?
You should cite 3-5 references.
Further you should refer to the Capability Maturity Model in the handouts book and comment on what CMM level that you believe your group achieved, and why. As part of this, explain what your group did to move up to higher levels, and/or why what prevented you moving to an even higher level. If you believe your group could have achieved a higher-level then reflect on what actions could have been taken to achieve this higher level.
You should cite 1-2 references.
UI/UX
UIis defined in Wikipedia as Theuser interfacein the design field of humancomputer interaction, is the space where interactions between humans and machines occur. IU has atechnology-basedfocus. Whereas,UXis defined as the process of designing [a digital] product that is useful, easy to use, and delightful to interact with. It is about enhancing the experience that people have while interacting, and making sure they find value in what youre providing. It is about theUser Experience being easy and pleasurable.
Then there is Service Design, but thats another course.
Describe a possible design, forUI and UXfor your companys system interface.
You should cite 3-5 references.
Number of words: 3500 (+/- 10%). Accurate use of the APA 6 (or any other standard, relevant) referencing system is required. Reports are expected to be professionally presented according to Business report guidelines.
The report should be submitted via Turnitin (unless otherwise instructed).Please put your name as part of the document file name.
A minimum of 35% is required to pass this assessment. The weighting towards the overall course mark is 35%.
Marking Schedule:
The JAD methodology has been critiqued, and compared and contrasted with two other requirements gathering methodology according to the stated criteria.
10
The JAD approach and the COTS model/Acquisition Plan has been modified for a Cloud Computing solution according to the stated criteria.
10
Comments are made on what CMM level the group achieved, and why, and, if relevant, what actions could have been taken to achieve a higher level.
10
A UI interface AND the UX specification have been described for your client companys technology system.
10
APA6 (or accepted substitute) referencing is used correctly with the required number of references. The report is well formatted and presented.Include evidence that your assignment has been researched by including a separate bibliography of material you have looked at this is apart from any material or references used cited.
10
TOTAL
50

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Shopping Cart
[SOLVED] graph security Assignment 2 for INFS700 students
$25