Create the computer system needed to store information

Assignment Help Basic Computer Science
Reference no: EM13810776

Whodunit offers unique computer forensics services to a nationwide client base of businesses and private individuals seeking evidence of specific kinds of computer use. Whodunit staff members are experts in their specialized area of computer investigations, but they lack the knowledge and skills to create the computer system needed to store and organize the information they collect. Whodunit would like your company to design a system to help them categorize, sort, store, and otherwise manipulate the thousands of artifacts they collect using your well-known expertise in object-oriented analysis and design. Additional information about Whodunit's needs shall be provided for each phase of the design process.

Prepare an activity design and description in that addresses the following requirements:

  • Define a process used by the Whodunit staff to retrieve a specific kind of forensic computer evidence, transfer it to Whodunit storage, classify it, and document it.
  • Prepare a rough flow diagram of the process using an appropriate drawing tool.
  • Paste this flow diagram into an activity design and description document along with a description of the process.
  • Prepare a UML activity diagram for the same process using Microsoft Visio or another drawing tool capable of preparing properly formatted UML activity diagrams. Your diagram should serve to document the business process defined in the first step.
  • Paste your diagram into the activity design and description document and add a thorough description of your diagram and the business process it documents.
  • Compare and contrast the first flow diagram with the second, more formal UML activity diagram. What benefits were gained from the more formal approach?
  • Include an appropriate title page for the assignment.
  • Make assumptions as necessary, but be sure to state your assumptions.

Reference no: EM13810776

Questions Cloud

Differentiate between virtual memory and physical memory : Differentiate between virtual memory and physical memory. Evaluate the benefits gained by running applications when the operating system uses a virtual memory manager
Determining the idea of visual scheduling : One of the hardest things for schedulers to accept is the idea of visual scheduling, which is commonly referred to as Kanban scheduling. All of the schedulers earned degrees or have extensive experience in operations management and are used to termin..
Stakeholder influences for human services : Stakeholder Influences for Human Services
Demonstrate the traits of a high-performing team : You realize that for some, this may be uncomfortable, which is why the managers must be the first team to practice and demonstrate the traits of a high-performing team.
Create the computer system needed to store information : create the computer system needed to store and organize the information they collect. Whodunit would like your company to design a system to help them categorize, sort, store, and otherwise manipulate the thousands of artifacts they collect using ..
Improve negotiation and conflict resolution skills : Identification of the successful characteristic of establishing self-directed, high-performing teams. Recommendations for success. A designed plan that might help guide the struggling managers and improve negotiation and conflict resolution skills
Evaluate how separation of powers and checks : Briefly explain why the constitutional framers based the new government on these ideas. Evaluate how separation of powers and checks and balances are working out in practice, today, justifying your assessment with persuasive reasoning and examples..
Construct scatter diagrams for pairs of variables : Perform more in-depth analysis for a better grade than a C -  Construct scatter diagrams for pairs of variables. Numerical descriptive measures and construct scatter diagrams for pairs of variables. Do any of these appear to have some association?
Ethical issues related to reproduction : Ethical Issues Related to Reproduction

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compute the total asset value

For this project assume that an organization has five total servers. One server has a TCO of $25,000, two servers have a TCO of $37,000 and the remaining two servers have a TCO of $42,000. The servers are not used by internal employees but are ..

  Asynchronous transaction processing mode

When operating in an asynchronous transaction processing mode, what information must be present in both the pending request and the received response messages for the response to be exclusively matched to its associated pending request?

  What will be the eventual proportion of the bandwidth

Assume that the queue size is infinite without buffer overflow (no packet loss), and the maximum window of the TCP sender is 20 packets, with each packet having 1500 bytes.

  Why random access file instead of a sequential access file

Write a 200- to 300-word response to the following question: In which situations would you choose to use a direct access or random access file instead of a sequential access file? Give a specific example and explain your reasoning.

  Write a procedure homming

Submit your programs by email. The program should have as many comments as necessary. The top comments should explain how to run and test the program. If any two assignments have the same code, zero marks will be assigned to the assignments.

  Discuss the difference between relative network utilization

Discuss the difference between relative network utilization and absolute network utilization when considering protocol behavior?

  What is the danger of not having a strategic intent

What is the danger of not having a strategic intent? In your answer, assume you are a hospital in a city with a population of 30,000 people, located about 50 miles away from a large city.

  Write a mips program to complete the following functions

Write a MIPS program to complete the following functions. You must write comments and follow the register convention.

  This code uses separate chaining

This code uses separate chaining ...implement it using double hashing. Implement a separate-chaining table in which each integer x is hashed twice using two different hash functions h1(x) and h2(x). This will perhaps produce two different location..

  Compute the cost of sorting the relation in seconds

Suppose a flash storage device is used instead of disk, and it has a seek time of 1 microsecond and a transfer rate of 40 MB per second. Recompute the cost of sorting the relation in seconds with.

  How many tails and heads you get

Simulate tossing a coin 10,000 times and record how many tails and heads you get. Make two runs as with the dice. Again accumulate the number of heads and tails in an array. Your for loops would go from 0 to 1.

  What is the target audience of the app

What is the target audience of the APP. What stands out about the design of the APP. What stands out about the content of the APP

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd