logo

Using SDLC to Automate Business Processes at Drewmobile Incorporated

   

Added on  2023-01-23

7 Pages2787 Words84 Views
University of Maryland University College
ITEC 610 Section 1111-1809
Spring 2019
Final Essay Exam
Tuesday, April 16, 2019
The Final Exam is due by 11:59 p.m. EST Monday, April 22, 2019.
This is an open-book individual exam comprised of 5 questions. Please
answer all 5 questions in the form of an essay exam response.
Guidelines:
Put your name in the exam.
You should submit your exam to your assignment folder in LEO in a MS-Word
(preferred),
MS-RTF, PDF or ASCII file. Please scan your file against viruses before
submitting.
Please keep the full text of the question as part of your answering sheet.
Be as clear and objective as you can in all questions and be sure you are
answering what is asked (you will lose points for rambling).
Justify all your numerical answers and answer all the questions using your
own words. Show all your work, including how you found your answer (this
is very important and essential to have your answer graded appropriately!).
Make sure that you read, acknowledge, and follow the following
rules
Rules:
The exam is to be taken in accordance with the UMUC Honor Code – e.g., do
not collaborate or seek help from anyone else.
This is an open-book exam but you are only allowed to use your textbook and
information posted in our classroom. Please do not use any other sources that
are not listed in our classroom. For example, you can refer to our class lecture
notes and all links posted in the lecture notes but you should not search the Web
for information to solve exam questions.
You should not discuss exam questions with other students or anyone else. If
you have any questions about the exam, please send me an email.
Acknowledge:
I, ______________Please Fill_____________ acknowledge the above
rules.
(Your name)

1. How would you use the stages of the Systems Development Life Cycle
(SDLC) to help Drewmobile Incorporated automate its currently manual
business process known as “Submit Official Travel Requests & Vouchers ”?
(see Chapter 13). Drewmobile Incorporated wants to move from a manual
process, which involves using hard copy forms, to a more online web-based
experience. Please craft a well-written and fluid essay exam response to
address this question. Moreover, please use examples to support your
answer. Do not use a bulleted list.
Introduction
System Development Life Cycle is one of the most evolving technology that
provides higher efficiency to the functional process of the business organizations that
implements SDLC. The processes that will be required for implementing SDLC will be
stated in this essay.
Steps to implement Automation
The initial step that must be taken by Drewmobile for incorporating automation
includes testing. It can be stated that a DevOps team can never be 100% successful until
they are relying on testing phase that will be performed manually. For Example: if a
client of Drewmobile complains regarding presence of a certain bug, they can test and
identify the bug and resolve the issue. Software testing will also be one of the major
aspects of the testing process. in the next stage coding is the main concern. Drewmobile
must execute the coding in the different phases (Gupta, Ahlawat & Sagar 2017). These
phases include fixing of the errors with the help of the bureaucratic association of the
large-scale software process. the most important section of the automation
implementation is developing the code and deploying the same. Performing API
management and application workflow process is also included in this stage. After this
stage the main aspect that is taken inti consideration is Development environment.
Infrastructure management is one of the main aspects that helps DevOps group for
eliminating the error prone methods (Karim, Saba and Albuolayan 2017). For example:
Using of Agile technology by the users will help in implementing the iteration process in
a better manner. Proper scalability, Dashboards, Data and database will be used in the
development environment stage. After this stage security checking will be performed. In
this stage, security testing will be performed. After this security testing, vulnerability
scanning will be performed. Security and compliance will be performed along with
proper implementation of patches and security reporting. After this stage deployment
phase will be performed by the Drewmobile. Usage of feedback loop will be seen (Tsui,
Davis & Sahlin 2018).
Conclusion
From the above discussion, it can be stated that after following the steps that are
stated in this essay, Drewmobile will be able to implement automation in their business
process.
2. When Tony Stark, CEO of Stark Industries, travels to other countries, he
follows a routine that seems straight from a secret agent movie. He leaves his
smart-phone and laptop at home. Instead he brings loaner devices, which he
erases before he leaves the U.S. and wipes clean the minute he returns. While

traveling, he disables Bluetooth and Wi- Fi and never lets his phone out of his
sight. While in meetings, he not only turns off his phone, but also removes the
battery for fear his microphone could be turned on remotely. Mr. Tony Stark
connects to the Internet only through an encrypted, password-protected
channel. He never types in a pass-word directly, but copies and pastes his
password from a USB thumb drive. By not typing his password, he
eliminates the risk of having it stolen if key-logging software got installed on
his device.
Many travelers might consider Tony Stark’s method too inconvenient.
Clearly, his electronically clean methods are time consuming and expensive.
By way of a well written and fluid essay exam response, please address the
below questions:
a) Is there a tradeoff between cybersecurity and convenience? Explain.
b) PLEASE create a list and explain the best cybersecurity practices for
travelers based on Tony Stark’s methods
Introduction
Cyber security has been one of the major concerns in todays society. This is one
of the main reasons that business management of Tony Stark is performed with such high
conservative manner. This essay will discuss about the link in between the cyber security
and its convenience and provide proper cyber security measures.
Discussion
There is a tradeoff in between cybersecurity and convenience of communication
process. in case the convenience process is considered the main aspect that is considered
is that with increase in convenience in functioning robustness of the entire infrastructure
gets affected. With lack of robustness it gets easy for the imposters to gain access to the
data that are present in the database. After this unauthorized access to the data that are
stored in the data base, alteration of the data can be performed and this will affect the
regular lifestyle of the victim.
The best security practices that must be implemented as per the cybersecurity
concern. This includes the fact that proper understanding of the entre terminology will get
functional in a better manner. The list is as follow: -
Usage of loaner device: Usage of loaner device helps in increasing privacy of the
data that will be transacted during the tour.
Disabling Wi Fi and Bluetooth: With the help of disabling of the Wi Fi or
Bluetooth, gaining access to the network of the mobile devices can be blocked.
Usage of encrypted passwords: With usage of proper encryption of the password,
the main benefit that will be received includes the password can be gained access
to unless decoding is performed.
Copy and pasting passwords: With this process the main aspect that is taken into
consideration includes higher security from the keyboard tracking software.
Conclusion
From the above discussion it can be stated that convenience and security does not go
hand in hand and steps are needed to be taken for increasing the efficiency.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
INHS 200 Final Exam Question Answer 2022
|14
|3811
|23

100 Alexander College Exam Rules
|9
|3714
|42

MATH 107 Quiz 1
|7
|931
|172

Bayesian Data Analytics (pdf)
|14
|4150
|209

Bayesian Data Analytics (pdf)
|14
|4155
|383

Collecting Data for PAWS Fundraising Activity
|7
|2230
|176