CS 250 Module Two Assignment Guidelines and Rubric
Overview
As the Scrum Master for the Agile team responsible for the product development, you will develop an Agile team charter to help your team be more effective. You will also reflect on a sample Daily Scrum meeting, considering its format and effective practices.
Directions
Before starting this activity, review the Required Resources for this module. You will find additional information specific to this assignment in the Supporting Materials section below.
Use the template provided in the What to Submit section to write a cohesive Agile team charter that briefly describes the SNHU Travel project and suggests some behaviors and communication practices for your team.
Note: Normally, this type of document would have input from the whole Agile team. For the purposes of this class, you will fill this out on your own while reflecting on the perspective and potential input from each role in the Scrum team.
Review this sample Daily Scrum Meeting video. (https://scrumtrainingseries.com/DailyScrumMeeting/index.html) Reflect on the format and effective practices of a Daily Scrum by addressing the following:
What are the key questions that can be used to frame a Daily Scrum meeting? How do they help the team achieve their goals?
How does the Scrum Master help facilitate the Daily Scrum throughout the video? Consider both the Scrum Master’s own updates and times when she responded to team members.
How effective were the actions taken by the Scrum Manager? How could she improve?
What to Submit
Submit your completed Agile Team Charter Template and a Microsoft Word document containing your reflection on the importance of the Daily Scrum. Your reflection document should be 1 to 2 pages in length. Your work must be your own original effort created specifically for this assignment. Support your work with a minimum of two academic or professional sources published within the last five years (peer-reviewed journals, books, technical reports, government publications, expert industry sites, and so on). All sources used should be cited according to APA style.
Supporting Materials
The following resource supports your work on this assignment:
Presentation: Initial Client Meeting Animation (https://snhu-media.snhu.edu/files/course_repository/undergraduate/cs/cs250/storyline/mod2/story_html5.html)
This presentation describes the Scrum Master’s initial interactions with the Product Owner of the software project for SNHU Travel.
Category: Computer science
-
Title: Developing an Agile Team Charter and Reflecting on the Daily Scrum Meeting for the SNHU Travel Project
-
Title: Open Source Tool for System and Memory Analysis for Incident Response The open source tool that I have chosen for system and memory analysis is called Volatility. It is a free, open-source, advanced memory forensics framework that can be
Find an opensource tool for system or memory analysis. Describe the tool and how it can be used for incident response. Include a link to the tool.
-
“Marketing Plan for a New Product Launch”
The attached picture is the assignment details and the attached file is where this assignment should be added to. Update the table of contents also.
-
Title: Task Analysis for Automating a Job Task: Interview and Observation
OVERVIEW
Based on the information you have learned about user interface design so far, interview a person
about a task he/she performs on his/her job. The person can be a parent, spouse, friend, or
colleague—anyone you choose. Your goal is to ask questions that would enable you to design a
system to automate a task he/she performs. Ask this person a minimum of twenty questions that
will help you perform a task analysis.
NOTE: Only questions pertaining to the automation of the task should be included.
This analysis will become part of a requirements document (a document that will guide a
developer in producing the system to automate). Such a document describes the requirements of
the system, which includes an algorithm (i.e., how the task is to be performed), the number of
expected users, the characteristics of the users (i.e., age, expertise, educational level, attitudes
about automation, etc.), the hardware/software needed to accomplish the task, security concerns,
location/setting of the system, connectivity, platform, etc.
Next, observe the user performing the task and identify any gaps or inconsistencies between
what you observed and the descriiption initially given to you in the interview. Were any
differences noted? If so, what do you think accounts for them?
INSTRUCTIONS
In a Word document, provide the following items:
Section 1: List the questions you asked your interviewee and include his/her answers.
Section 2: In a minimum of 150 words, describe what you observed when you witnessed
your interviewee actually performing the task. Note any differences between the
information you gathered in the interview and your direct observation. If differences were
observed, indicate why you believe they occurred.
Section 3: In a minimum of 250 words, describe the task to be automated (task analysis).
Note: At this point, you do not have to describe how your system will automate the task.
You are only gathering information about the task itself at this stage.
Section 4: In a minimum of 100 words, describe your user base (i.e., number of expected
users, age, gender, experience/knowledge about performing the task, etc.).
Note: Your assignment will be checked for originality via the Turnitin plagiarism tool. -
Title: Building a Data Enterprise: Prioritizing Projects as the Chief Data Officer As the Chief Data Officer (CDO) of a fictional firm, my primary responsibility is to ensure that the organization’s data is effectively managed and utilized to support
Your post must be at least 200 words.
NOTE- 1) APA format
2) NO plagiarism
3)NO AI generated text
4)write reference
5)What ever written in questions i need like same answers No extra NO missing
Your post must be at least 200 words.
Please include:
For the duration of this course, you will be the Chief Data Officer (CDO) of a fictional firm of your choice.
You have a data enterprise that contains structured and unstructured data
As the CDO, you built your company’s first data warehouse or a data lake
How will your data enterprise support the business?
List the projects that you chose to undertake
Prioritize them
Write a short bullet describing why this project is on your list -
“Virtual Currency Overview: Assessing Encryption Methods and Policy Issues” Virtual Currency Overview: Assessing Encryption Methods and Policy Issues Introduction Virtual currencies, also known as cryptocurrencies, have gained significant attention in recent years as a potential alternative to traditional fiat currencies
Thank you for assisting me. Attached to this order is a example of a previous student project (Virtual Currency Applicability Report and Recommendations) and lecture notes to assist you. Please create the spreadsheet and the two page essay using APA 7.
Instructions:
Develop a spreadsheet that will be used to gather your research. In the first column, list Bitcoin and other virtual currency options available, if any. In column 2, list the corresponding encryption method for that specific virtual currency. In column 3, assess what characteristics or cybersecurity technologies used by that virtual currency that makes it unique. Make a fourth column in the spreadsheet for policy constraints and document the findings.
Lastly, In the previous step, you identified the technological elements of virtualization and cloud computing, and now it’s time to fully assess the inherent policy issues and challenges of these cybersecurity technologies. Discuss core concepts and developments in cryptography and cryptanalysis for the benefit of your financial audience from a cyber perspective and the financial implications of virtual currency. Also, consider information assurance needs for the business.
Provide a two- to three-page summary of the findings thus far and an overall assessment of virtual currencies, the encryption technology, and the subsequent policy issues that might arise.
Submit the Virtual Currency Overview, along with the spreadsheet of the recorded findings, as an addendum. -
“Comparing End User Experience: A Comparison of Online Retailers”
Overview
In this activity, you will compare the end user experience based on
the system functionality of two retailers. An example of system
functionality is in-stock notifications. When you are shopping on
Target’s site, you select your item, along with size and color. You
immediately see if the item is in stock. If it is not, the shopping cart
page provides an option to email you when the item is back in stock. On
another site (for example, Walmart), the shopping cart page tells you
if the item is not in stock; however, it does not give you the
opportunity to receive notifications when it is back in stock. In both
scenarios, as an IT professional, you need to evaluate the system
functionality through the lens of the end user.
Prompt
You are concerned with the end user experience. When you visit a
website or use the app for a an e-retailer, what are you requirements
for that website or app? Are you interested in how fast the pages load?
Can you compare items? Are these features important to you, and will you
continue to use a website that does not meet these requirements? That
experience will trigger a return visit to the site based on the most
expeditious purchasing experience, variety of items available, quantity
of items available, and quickest delivery method. In this activity, you
will locate two online retailers and compare them for ease of use as a
consumer. YOU ARE NOT REQUIRED TO MAKE A PURCHASE. You will be searching
inventory, examining purchasing and shipping options, and reviewing
return policies. You will provide a description of your experience and
compare the retailers’ purchasing processes.
In your comparison, you will include a table that addresses the
following processes, along with a detailed narrative explanation of
which retailer has the best system ease of use:
Inventory process (Are you able to locate the item you wanted? Are you able to compare it to similar items?)
Purchasing process (Can you add the item to your cart? Are there multiple payment options available?)
Shipping process (How quickly will items be ready to ship?)
Return policies (How convenient is it to return an item?)
What to Submit
Upload a Word document including your comparison table and your brief
(1 page) narrative explanation of which retailer has the best system
ease of use.
Rubric
Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
System Narrative Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Supports position on which retailer has best system ease of use Shows progress toward
proficiency, but with errors or omissions; areas for improvement may
include more details of system comparison Does not attempt criterion 45
Comparison Table Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Compares all required system processes Shows progress toward
proficiency, but with errors or omissions; areas for improvement may
include comparing all of the system processes outlined in the prompt Does not attempt criterion 45
Articulation of Response Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Clearly conveys meaning with correct
grammar, sentence structure, and spelling, demonstrating an
understanding of audience and purpose Shows progress toward
proficiency, but with errors in grammar, sentence structure, and
spelling, negatively impacting readability Submission has critical errors in grammar, sentence structure, and spelling, preventing understanding of ideas 10
Total: 100% -
“Mitigating Malicious Code: Analyzing Control Families and Identifying Key Vulnerabilities” Title Slide: “Mitigating Malicious Code: Analyzing Control Families and Identifying Key Vulnerabilities” Agenda Slide: – Introduction to Malicious
A) Your presentation should include the following:
Title Slide
Agenda Slide
Introduction Slide: This should motivate to want to see your remaining slides.
Content slides (This could be several Slides)Part 1 NIST SP800-53 Control Families
Part 2 You make the call with the scenario we will discuss in class
Conclusions
References
PART 1 NIST SP 800-53 defines 18 Control families. All controls are important but depending on your environment or situation, some are more important than others. From your experience, what are the three most important control families? Discuss. Here is a link to the special publication: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdfLinks to an external site.
Hint: go to page 35 to find a clickable hyperlinked table.
PART 2 You Make the Call
If you were responsible for this room in your organization, which controls would you implement. After selecting the controls, write an implementation statement on how to implement or use these controls to mitigate a particular risk identified. (Choose 2. Two different families)
EditEdit
2) Discussion Forum 7: Malicious Code
1) In Discussion Forum 7, post your response to the following discussion topic. Reply to at least two classmates’ responses and shares informative URLs by the date indicated in the Course Calendar. Your discussion question response should be at least 200 Words, with another 50 words per reply. Malicious Code, or Malware, attacks all three information security properties: Confidentiality, Integrity, and Availability. It is a threat to any Internet-connected device. What are the types of Malware being used today (Name two), and explain in your own words what they do. 2) Respond to at least two other students (at least 50 words each )!
Respond to two (2) students/Peers (two classmates). The responses should be at least 50 words each and must focus on the discussion topic above. Examine related issues, ask questions, provide hypothesis and/or situation(s). A peer response should not be to a peer already responded to more than twice. -
Title: Leveraging Collaboration Information Systems to Enhance Efficiency and Customer Service in Banking Operations
Identify a skill or knowledge that you learned in this course, and explain how you can apply it to increase success in your career in a real-world scenario.
Career is a Bank Manager
Topics covered are Listed Below
Hardware, Software, and Mobile Systems
Database Processing
The Cloud
Processes, Organizations, and Information Systems
Business Intelligence Systems
Social Media Information Systems
Information Systems Security
Information Systems Development
Strategy and Information Systems
Collaboration Information Systems -
Troubleshooting Computer Problems and Knowing When to Seek Professional Help Title: Troubleshooting Computer Problems: When to Seek Professional Assistance and Consider Buying a New Computer When encountering computer problems, it is important to first try to troubleshoot and resolve the
Despite how well you might take care of your computer, problems can always arise. When troubleshooting problems you encounter, at what point should you engage a professional for assistance/ Why? At what point might you consider purchasing a new computer? Refer to Module 6: Security and Safety CC 3-18-3-25.
Your initial post should comprise a minimum of 50 words supported by at least one (1) reference by Thursday mid-night, followed by a minimum of two (2) responses to classmates’ posts comprising at least 30 words supporting, challenging, clarifying, or adding to the existing information by Sunday mid-night.