Software Engineering Portfolio
Source Code Management
Each member of the team created github repositories to hold source code they had work on. I created a repository called IScanDir, available at https://github.com/AhmedAhmet/IScanDir, to hold work done on the application plugins. Towards the end of the project. A new repository called ScanDirectory was created to hold the latest version of scan directory plugin, available at https://github.com/AhmedAhmet/ScanDirectory. This was an example of good software engineering practice, because the project manager was able to more effectively practice source control management, and monitor the contributions of individual members.
Coding Standards and Code Reviews
Creating variables with
…show more content…
Absent members were able to catch up on what they had missed or where the project was heading. It also gave individuals an easy way to remember what had been discussed in the meeting, in the event they had forgotten the details of the meeting.
Test Driven Development
I made the decision to unit test each part of the scan directory plugin. The scanning directory code was tested in a windows console application called scanDirectoryTest2. Figure 3 shows the ScanDir class used to test the scanning code.
Figure 3
The extracting metadata code was tested in a windows WPF application called audiometadata. Figure 4 shows the MainWindow class. This class is designed to test code from a third party library called TagLib.
Figure 4
Unified Modelling Language (UML)
Three UML diagrams were created to help gain a better understanding of the scan directory plugin. Figure 5
Figure 5 shows a use-case diagram created to show a high level view of the plugin architecture. This was a good choice for a diagram to start on, as it provided the simplest view of how the scan directory would function. Figure 6
Figure 6 shows a sequence diagram for the scan directory plugin. Sequence diagrams show in detail the way objects interact, helping to outline messages defined as an event or an operation belong to a class (Bennett, McRobb, and Farmer, 2007). Sequence diagrams are a lower level analysis in contrast to the use case
1.4 Identify when and how to combine and merge information from other software and documents.
Now directory connects to data base directly and search for the name entered by user.
As the information system is designed, implementation decisions describing how the system will work are made. Data flow diagrams offer those implementation details, including data stores that refer to files and database tables, programs and human actions that perform processes. The automated parts of the system are differentiated from the manual parts by the human-machine boundary (Dennis, Wixom,
It allows groups to use the situation in the learning environment to develop their social interaction skills e.g. meeting new people, and share ideas. This enhances the group’s experiences, promotes collaboration, can develop their social relationships skills and allows opportunity for peer
When asked if you explored, as per CW policy and procedure, whether impending danger safety threats existed, you responded it was a “fair conversation to have that (the children) could have been unsafe.”
The Rectangular shapes in Black represent the internal job of the Program at a particular section or point
A ____________________ typically includes a data flow diagram to describe the flow of information for a
It has been a great help for my working development as an Administrative Assistant at CAR. However, this manual is limited on information. It missed most of the step to follow for processing request and it doesn’t include all the different function that Adm. Assist. At CAR entails.
The “Phase 2: Scanning” portion of the lab instructions were very confusing as they give commands to research and test but this portion of the lab has no interconnectivity to the internet. After much wasted time and talking to the lab assistances, it was noted that the students weren’t supposed to test in this environment but it was just information only and bringing up the help file. To offset and further understand this, the student set up a separate lab environment using Virtual Box with a Kali iso. All the main commands were tested with some different variation of options on a number of sites; advancedmissiongroup.com (the students own personal IP address but with no website), largobooks.com, and umuc.edu. Figure 10 demonstrates the
One of the first sections of the manual discusses its purpose. It discusses who will manage access and who will deal with the most common aspects of security. In the purpose section it is made clear that the policies will be amended through an ongoing process. The Purpose section outlines the boundaries for acceptable behavior and guidelines for best practices in certain work situations. It offers clear instructions to employees as to how they are expected to act. They outline the importance of including policies that address legal and ethical safety. In the purpose section they also outline who will manage the IT resources to protect from threats.
installed in the host to be scanned, and has direct access to lowlevel data, such as specific services and configuration details of the host's operating system. It can therefore provide insight into risky user activities such as using easily guessed passwords or even no password. It can also detect signs that an attacker has already compromised a system, including looking for suspicious file names, unexpected new system files or device files, and unexpected privileged programs.
Moving on to question three, I ask “what filing systems are used: alphabetical, subject, geographic?” Wendy answered, “Well, we mainly use alphabetical. As I said before, we use subject and location to label folders, but inside those folders are arranged in alphabetical order. The Social Assistant Management System (SAMs) account and SchedulePlus system can be set to quarry by first or last name, phone numbers, location, birthday and even poverty levels. Our hard copies that need to be scanned don’t have an order, we just put them in a folder and scan them when we can.”
PathScan is capable of running in two modes; online and forensic. Online mode is as it sounds; PathScan is operational on a network and is analyzing millions of communications that occur every minute. In fact, PathScan is currently active of Los Alamos National Labs unclassified network doing just this. In foresic mode, PathScan is able to find and determine details of a previous attack that has occurred that could have been missed in the original investigation. “It has proven effective in fleshing out attacks initially identified by security incident responders, discovering additionally compromised machines that were undetected by the original investigators” (Maughan & Pozmantier,
It is important as gives an opportunity to celebrate achievements and success. For example, it is a good practice for organizations to share good news and the individuals that are progressing well within the team. This can be done during team meetings
Software engineering (SE) is the profession concerned with specifying, designing, developing and maintaining software applications by applying technologies and practices from computer science, project management, and other fields.