Cosc175 Homework 1-5 Points Type In Word Work With A Partner

Cosc175 Homework 1 5 Pointstype In Word Work With A Partner And Su

Cosc175 Homework #1 – 5 points Type in Word. Work with a partner and submit one copy per pair. Partner 1: Name _______________________________ Partner 2: Name _______________________________ Please note if one partner did not work on all problems: 1. Describe the SDLC: a) Include a chart using Smart Art or some other tool b) Include a description of each step in detail c) Include security! d) Indicate (highlight on the chart) what step is being used when we use IPOs Defining the Problem: For each of the following, define the problem by specifying the input and output (use good variable names as described in class) and processing steps in the following format: Input Processing Output The processing steps should be very general, i.e. Calculate tax, Print sum, etc. Remember we are doing phase 1 (analysis) only – Defining the Problem. We will solve these problems later. Use the notes as guidelines. 2. Write a program to input the price of an item, the sales tax rate and calculate the total price. 3. A program is required which will receive two numbers, calculate, and display to the screen their sum, difference, product, quotient. 4. Write a program to input three test scores and calculate the average. Print the average. 5. A program is required that will read in a tax rate (as a percentage), tip rate (as a percentage) and the price of three items (use 3 variables). The program is to calculate the total price before tax, the tax payable, bill after tax, tip and total bill. Print all values.

Paper For Above instruction

Cosc175 Homework 1 5 Pointstype In Word Work With A Partner And Su

SDLC Description with Chart and Processing Steps

The Software Development Life Cycle (SDLC) is a systematic process used by software developers and project managers to design, develop, test, and maintain software applications. It provides a structured approach that ensures the quality and correctness of software products. The main phases of SDLC typically include Planning, Analysis, Design, Implementation, Testing, Deployment, and Maintenance.

In this assignment, we are required to illustrate the SDLC using a chart generated through Smart Art or another tool with security considerations highlighted. We will also provide a detailed description of each step, emphasizing security measures and indicating the step where Input-Process-Output (IPO) logic is used.

SDLC Chart

A typical chart could display the following phases:

  • Planning (highlighted as the initial phase where requirements are gathered and feasibility is assessed)
  • Analysis (detailed examination of requirements and security considerations)
  • Design (system architecture, interface design, database design, with security features integrated)
  • Implementation (coding phase, including secure coding practices)
  • Testing (verifying functionality and security vulnerabilities)
  • Deployment (releasing the application to users)
  • Maintenance (ongoing updates, security patches, and support)

In the chart, the IPO step (Input, Processing, Output) is relevant during the Analysis phase, as inputs are gathered and processed to define the system's requirements before moving onto design and implementation.

Detailed Description of Each SDLC Step

  1. Planning: This initial stage involves defining project goals, scope, resources, and timeline. Security considerations include identifying potential security threats and compliance requirements early on.
  2. Analysis: In this phase, detailed requirements are gathered from stakeholders. Input variables are collected (e.g., user data, system requirements). Processing involves analyzing these inputs to define specifications. Security aspects such as data protection and access controls are integrated into the requirements.
  3. Design: The system architecture and database schema are designed, incorporating security features such as encryption, authentication, and authorization mechanisms.
  4. Implementation: The actual coding takes place, adhering to secure coding standards to minimize vulnerabilities. Inputs are processed through functions and algorithms to produce outputs.
  5. Testing: The system undergoes rigorous testing including security testing to find and fix vulnerabilities.
  6. Deployment: The software is released for use, with security patches applied as needed.
  7. Maintenance: Post-deployment, any issues, especially security flaws, are addressed, and updates are made to enhance security and functionality.

Security is integrated throughout all SDLC phases, predominantly in Analysis, Design, and Testing, to ensure the robustness of the final product.

Defining Problems with Input, Processing, and Output

  1. Program 1: Input the price of an item (float), the sales tax rate (percentage as float, e.g., 0.08), calculate total price including tax.
  2. Program 2: Receive two numbers (float or int), compute and display their sum, difference, product, and quotient.
  3. Program 3: Input three test scores (floats), calculate and display their average.
  4. Program 4: Input tax rate (% as float), tip rate (% as float), and prices of three items, then calculate total before tax, tax payable, bill after tax, tip, and total bill, printing all these values.

These problems are formulated during the analysis phase, with attention to defining clear variables, inputs, processing steps, and outputs for future coding.

References

  • Pressman, R. S. (2014). Software Engineering: A Practitioner's Approach. McGraw-Hill Education.
  • Sommerville, I. (2016). Software Engineering (10th ed.). Pearson.
  • Balzarian, W., & Wang, Y. (2019). Secure Software Development Lifecycle. IEEE Software, 36(2), 12-19.
  • McConnell, S. (2004). Code Complete: A Practical Handbook of Software Construction. Microsoft Press.
  • Shostack, A. (2014). Threat Modeling: Designing for Security. Wiley.
  • Fowler, M. (2003). Patterns of Enterprise Application Architecture. Addison-Wesley.
  • ISO/IEC 27001:2013. Information Security Management Systems.
  • Thompson, H. (2018). Secure Coding in Practice. O'Reilly Media.
  • O'Neill, P. (2020). Introduction to Software Engineering. Springer.
  • Krutchen, P. (1995). The Rational Unified Process: An Introduction. Addison-Wesley.