Description
I received incorrect answer. How do I get the answer I paid for?
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Thank you for the opportunity to help you with your question!
Post another question...and please avoid the easy questions....studypool never pays anything meaningful for them...but students fork out the bucks!
Please let me know if you need any clarification. I'm always happy to answer your questions.Completion Status:
100%
Review
Review
Anonymous
Goes above and beyond expectations!
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
MU New Software Initiative to Compete with Providers Such as Turbo Tax in DMV MEMO
Facts:You are in the new DevOps group at a medium-sized tax preparation firm, TaxSpot, where the organization runs a tax p ...
MU New Software Initiative to Compete with Providers Such as Turbo Tax in DMV MEMO
Facts:You are in the new DevOps group at a medium-sized tax preparation firm, TaxSpot, where the organization runs a tax preparation service. They are planning to make their software online fordirect client input for the next peak tax season (January through April) and want to make sure that they have the resources to successfully support this new initiative and compete with providers such as TurboTax in the DMV (DC, Maryland, Virginia), They are looking to youradvice on delivering the service effectively to support the peak tax season and to be reduced for the off-season as part of the company’s move to DevOps.They anticipate about 2,400 concurrent users on the application each day of the peak season and 1,000 in the off-season. All client data will be preloaded before the application opens.Details of the applicationMain MenuThe application has a secure web interface with a menu allowing the user to log in and create a new filing, copy from a previous filing, update a filing, upload documents, submit to IRS, and file for an extension.Login/AuthenticationConfidentiality is a major consideration and the system will offer two-factor authentication with secure communications. The login component handles all the authentication and access controls for the systemNew Filing20% of the users create a new case when they access the system in the peak season and 10% at other times. Copy from a Previous FilingAbout 20% of the users in peak time and 30% at other times are beginning the process by merely using the application to copy data from their last year’s submission.Update FilingAbout 20% of the users in peak time and 40% at other times are simply updating previously entered or copied information. The component has 4 different services representing each of the different parts of the informationUpload DocumentsAbout 20% of the users in peak time and 14% in other times merely use the application to upload documents necessary to support their primary filings, e.g., additional schedules. The component is a stand-alone application.Submit to IRSAbout 10% of users in peak time and 5% in other time are making a submission to the IRS. The submit system has 3 services: validation, error reporting and the actual submission to IRS. Extension FilingAbout 10% of the users in peak time and 1% in other times use the application to file the required tax extension when they do not have the complete documents ready. The component is a stand-alone application.Part 1: Memo with AttachmentsDraw a component diagram of the application showing for each module the services that are necessary.Prepare a memo to the CIO (Maya Jennings) with a copy to the CFO (Peter Brown) and the CEO (Jennifer Mueller) which details the following:An overview of the application.The value of using a cloud solution when there is such a big variation in usage over the year.The value of using a cloud solution in case the anticipated user base is larger or smaller than anticipated.How DevOps will help support the application as changes in tax rules occur.Note: writing is important, the CIO does not like contractions or elaborate sentences. Your memo should be 1 page.Attach the component diagram. Refer to the attachment in your memo.Part 2: Use Case/User StoriesPrepare individual user stories for the main functions of the TaxSpot system.
Abbott Academy of Cosmetology Arts and Sciences Computer Science Discussion
The latest generation of mobile devices are portable enough to carry at all times, connected to voice and data networks, a ...
Abbott Academy of Cosmetology Arts and Sciences Computer Science Discussion
The latest generation of mobile devices are portable enough to carry at all times, connected to voice and data networks, and contextually aware by using sensors and networks to preemptively complete tasks.Many of today's mobile applications are personalized and are not useful if they can only access the data on the phone.For a user to get, for example, sports scores, retrieve stock quotes, or perform accounting work, the mobile device needs to communicate with one or more servers, starting with the Window servers.Discuss effective use of screen real estateHow does mobile user interface designs & websites reduce end-user self-efficacy?What are the challenges of integrating mobile applications with multiple databases?Your response to the initial question should be atleast 300-350 wordsThere must be at least two APA formatted reference (and APA in-text citation)Provide 2 comments generic to this topic to post 200 words each
AIU Online Final SSO Class link Project System Integration Implementation Plan
In this final week, you have one more major task. Develop a detailed project plan for all of the final implementation, acc ...
AIU Online Final SSO Class link Project System Integration Implementation Plan
In this final week, you have one more major task. Develop a detailed project plan for all of the final implementation, acceptance confirmation, and closeout activities, and then transition it to the operations teams.Assignment GuidelinesFor this week’s assignment, you will provide detail on the final implementation and closeout plan. New Content (Week 5) System Integration Implementation PlanDevelop a detailed implementation plan that captures the following (address 4 of these):Testing activitiesFinal migration activitiesTraining activitiesProject closeout activitiesTransition to operational support teamAddress 2 of the following:Start and completion datesRequired resources to support these activitiesLessons that you have learned from doing this projectMake sure that the document is in APA format.Grading RubricRubric ItemRequirementsPointsSystem Integration Implementation Plan (4 of 5)Develop a detailed implementation plan that captures the following (4 of 5 required):Testing activitiesFinal migration activitiesTraining activitiesProject closeout activities Transition to operational support team120Additional Details (2 of 3)Start and Completion DatesRequired resources to support these activitiesA summary of the lessons you have learned from doing this capstone project.65Effective CommunicationDemonstrates outstanding or exemplary application of written, visual, or oral skills. Demonstrates outstanding expression of topic, main idea, and purpose. Audience is addressed appropriately. Language clearly and effectively communicates ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are minimal. Organization is clear. Format is consistently appropriate to assignment. Presentation and delivery are confident and persuasive (where applicable). The writing was of collegiate level with no errors in spelling or grammar.10Supporting AnalysisAnalysis exceeded minimum requirements. Appropriate sources were used to support analysis and were properly referenced.15Total Points200
Security Weaknesses in UNIX/Linux, computer science homework help
Security Weaknesses in UNIX/Linux Please respond to both of the following questions: Question A What are some of the co ...
Security Weaknesses in UNIX/Linux, computer science homework help
Security Weaknesses in UNIX/Linux Please respond to both of the following questions: Question A What are some of the common security weaknesses inherent in Unix or Linux based systems and what techniques can be used to harden these systems against an attack? Question B What distributions of Linux are known to be more secure after a default installation and should these versions be used more often in corporations?
Emerging Threats, Counters Measures & Contingency Planning Paper
Contingency PlanningContingency planning is a risk mitigation process for developing back-up plans in anticipation of even ...
Emerging Threats, Counters Measures & Contingency Planning Paper
Contingency PlanningContingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:(1) Benefits of scenario events/planning.(2) Questions to consider when implementing scenario planning.(3) The common types of scenario planning.Your paper should meet the following requirements:Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
4 pages
Discussion Comments.edited
Indeed, the three main approaches to database programming are the embedding of database commands using a programming langu ...
Discussion Comments.edited
Indeed, the three main approaches to database programming are the embedding of database commands using a programming language for general-purpose, the ...
Similar Content
Information system security, computer science homework help
Week 2 Assignment: Security AssessmentsPortfolio assignment: Chapter 7 of the text discusses various auditing and monitori...
ITS 632 University of the Cumberlands Monetary Value Question
1) Should you play at all? (5%) If you play, what is your expected (net) monetary value? (15%)
2) If you play and do...
Discussion: Determining Your Technology Needs
For this discussion, you will be employed as a contracted technology consultant at one of the following organizations of y...
Arkansas State University Mountain Home Law Ethics and Cyber Security Questions
Chapter 4 – Quiz 4
Instructions: There are three (3) topic areas listed below that are designed to measure your knowledg...
New England College of Business Cognitive Biases in Negotiation Discussion
Each student will select one of the key terms listed below and conduct a search of Campbellsville University’s online Li...
Software development, computer science homework help
Research each of the following topics:Continuous DeliveryContinuous IntegrationCreate a PowerPoint presentation ...
Attachment 1 2021 08 10t100316.841
This is a report of a series of activities involving using a black box style red teaming engagement. These activities nece...
Bookgeek
(Source: https://docs.oracle.com/cd/E11882_01/server.112/e40540/tablecls.htm#CNCPT88804) (QUERY 1) Build a query consistin...
Order 143.edited
The first step is to identify the challenges that the company is facing. ClubIT is grappling with a host of challenges, in...
Related Tags
Book Guides
The Awakening
by Kate Chopin
Freakonomics
by Stephen J. Dubner and Steven D. Levitt
One Flew Over the Cuckoos Nest
by Ken Kesey
Animal Farm
by George Orwell
Big Magic
by Elizabeth Gilbert
Silas Marner
by George Eliot
A Passage to India
by E. M. Forster
Calypso
by David Sedaris
The Life-Changing Magic of Tidying Up
by Marie Kondo
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
MU New Software Initiative to Compete with Providers Such as Turbo Tax in DMV MEMO
Facts:You are in the new DevOps group at a medium-sized tax preparation firm, TaxSpot, where the organization runs a tax p ...
MU New Software Initiative to Compete with Providers Such as Turbo Tax in DMV MEMO
Facts:You are in the new DevOps group at a medium-sized tax preparation firm, TaxSpot, where the organization runs a tax preparation service. They are planning to make their software online fordirect client input for the next peak tax season (January through April) and want to make sure that they have the resources to successfully support this new initiative and compete with providers such as TurboTax in the DMV (DC, Maryland, Virginia), They are looking to youradvice on delivering the service effectively to support the peak tax season and to be reduced for the off-season as part of the company’s move to DevOps.They anticipate about 2,400 concurrent users on the application each day of the peak season and 1,000 in the off-season. All client data will be preloaded before the application opens.Details of the applicationMain MenuThe application has a secure web interface with a menu allowing the user to log in and create a new filing, copy from a previous filing, update a filing, upload documents, submit to IRS, and file for an extension.Login/AuthenticationConfidentiality is a major consideration and the system will offer two-factor authentication with secure communications. The login component handles all the authentication and access controls for the systemNew Filing20% of the users create a new case when they access the system in the peak season and 10% at other times. Copy from a Previous FilingAbout 20% of the users in peak time and 30% at other times are beginning the process by merely using the application to copy data from their last year’s submission.Update FilingAbout 20% of the users in peak time and 40% at other times are simply updating previously entered or copied information. The component has 4 different services representing each of the different parts of the informationUpload DocumentsAbout 20% of the users in peak time and 14% in other times merely use the application to upload documents necessary to support their primary filings, e.g., additional schedules. The component is a stand-alone application.Submit to IRSAbout 10% of users in peak time and 5% in other time are making a submission to the IRS. The submit system has 3 services: validation, error reporting and the actual submission to IRS. Extension FilingAbout 10% of the users in peak time and 1% in other times use the application to file the required tax extension when they do not have the complete documents ready. The component is a stand-alone application.Part 1: Memo with AttachmentsDraw a component diagram of the application showing for each module the services that are necessary.Prepare a memo to the CIO (Maya Jennings) with a copy to the CFO (Peter Brown) and the CEO (Jennifer Mueller) which details the following:An overview of the application.The value of using a cloud solution when there is such a big variation in usage over the year.The value of using a cloud solution in case the anticipated user base is larger or smaller than anticipated.How DevOps will help support the application as changes in tax rules occur.Note: writing is important, the CIO does not like contractions or elaborate sentences. Your memo should be 1 page.Attach the component diagram. Refer to the attachment in your memo.Part 2: Use Case/User StoriesPrepare individual user stories for the main functions of the TaxSpot system.
Abbott Academy of Cosmetology Arts and Sciences Computer Science Discussion
The latest generation of mobile devices are portable enough to carry at all times, connected to voice and data networks, a ...
Abbott Academy of Cosmetology Arts and Sciences Computer Science Discussion
The latest generation of mobile devices are portable enough to carry at all times, connected to voice and data networks, and contextually aware by using sensors and networks to preemptively complete tasks.Many of today's mobile applications are personalized and are not useful if they can only access the data on the phone.For a user to get, for example, sports scores, retrieve stock quotes, or perform accounting work, the mobile device needs to communicate with one or more servers, starting with the Window servers.Discuss effective use of screen real estateHow does mobile user interface designs & websites reduce end-user self-efficacy?What are the challenges of integrating mobile applications with multiple databases?Your response to the initial question should be atleast 300-350 wordsThere must be at least two APA formatted reference (and APA in-text citation)Provide 2 comments generic to this topic to post 200 words each
AIU Online Final SSO Class link Project System Integration Implementation Plan
In this final week, you have one more major task. Develop a detailed project plan for all of the final implementation, acc ...
AIU Online Final SSO Class link Project System Integration Implementation Plan
In this final week, you have one more major task. Develop a detailed project plan for all of the final implementation, acceptance confirmation, and closeout activities, and then transition it to the operations teams.Assignment GuidelinesFor this week’s assignment, you will provide detail on the final implementation and closeout plan. New Content (Week 5) System Integration Implementation PlanDevelop a detailed implementation plan that captures the following (address 4 of these):Testing activitiesFinal migration activitiesTraining activitiesProject closeout activitiesTransition to operational support teamAddress 2 of the following:Start and completion datesRequired resources to support these activitiesLessons that you have learned from doing this projectMake sure that the document is in APA format.Grading RubricRubric ItemRequirementsPointsSystem Integration Implementation Plan (4 of 5)Develop a detailed implementation plan that captures the following (4 of 5 required):Testing activitiesFinal migration activitiesTraining activitiesProject closeout activities Transition to operational support team120Additional Details (2 of 3)Start and Completion DatesRequired resources to support these activitiesA summary of the lessons you have learned from doing this capstone project.65Effective CommunicationDemonstrates outstanding or exemplary application of written, visual, or oral skills. Demonstrates outstanding expression of topic, main idea, and purpose. Audience is addressed appropriately. Language clearly and effectively communicates ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are minimal. Organization is clear. Format is consistently appropriate to assignment. Presentation and delivery are confident and persuasive (where applicable). The writing was of collegiate level with no errors in spelling or grammar.10Supporting AnalysisAnalysis exceeded minimum requirements. Appropriate sources were used to support analysis and were properly referenced.15Total Points200
Security Weaknesses in UNIX/Linux, computer science homework help
Security Weaknesses in UNIX/Linux Please respond to both of the following questions: Question A What are some of the co ...
Security Weaknesses in UNIX/Linux, computer science homework help
Security Weaknesses in UNIX/Linux Please respond to both of the following questions: Question A What are some of the common security weaknesses inherent in Unix or Linux based systems and what techniques can be used to harden these systems against an attack? Question B What distributions of Linux are known to be more secure after a default installation and should these versions be used more often in corporations?
Emerging Threats, Counters Measures & Contingency Planning Paper
Contingency PlanningContingency planning is a risk mitigation process for developing back-up plans in anticipation of even ...
Emerging Threats, Counters Measures & Contingency Planning Paper
Contingency PlanningContingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:(1) Benefits of scenario events/planning.(2) Questions to consider when implementing scenario planning.(3) The common types of scenario planning.Your paper should meet the following requirements:Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
4 pages
Discussion Comments.edited
Indeed, the three main approaches to database programming are the embedding of database commands using a programming langu ...
Discussion Comments.edited
Indeed, the three main approaches to database programming are the embedding of database commands using a programming language for general-purpose, the ...
Earn money selling
your Study Documents