Prepare a presentation on software engineering

Assignment Help Management Information Sys
Reference no: EM132294422 , Length: 1500 Words

Objective(s)

This assessment item relates to the unit learning outcomes as in the unit descriptor. This assessment is designed to improve student presentation skills and to give students experience in researching a topic and writing a report relevant to the Unit of Study subject matter.

INSTRUCTIONS

These instructions apply to both Assignment 1 - Presentation and Assignment 2 Research Report.

Assignment - Presentation and Participation

For this component you will be required to do a 5-10 minute presentation on a recent academic paper on a topic related to Software Engineering or Software Engineering Methodologies. Some possible topic areas include but are not limited to:

• Software Engineering for Data Warehouse systems

• Risk Analysis in Software Engineering

• Project Management methodologies

• Advances in Prototyping for software engineering

• Cleanroom methodology

• Test Driven methodologies

• Advanced human Interfaces

• Artificial Neural Networks

• Cloud Computing

• Agent Oriented Software Engineering

The paper you select must be directly relevant to one of the above topics or another topic and be related to Software Engineering. The paper must be approved by your lecturer and be related to what we are studying this semester in Software Engineering.

The paper can be from any academic conference or other relevant Journal or online sources such as Google Scholar, Academic department repositories, or a significant commercial company involved in research such as IBM etc.

All students must select a different paper. Thus, the paper must be approved by your lecturer before proceeding. In case two students are wanting to present on the same paper, the first who emails the lecturer with their choice will be allocated that paper. Please note that popular magazine or web-site articles are not academic papers.

If you do not participate in at least 70% of other student's presentations you will forfeit a significant proportion of the marks for this component.

The presentations will occur in sessions 5-12 on the academic calendar for the semester and the order of presentations will be by arrangement, but these will be evenly spread over those sessions.

Assignment 2 - Research Report

For this component you will write a report or critique on the paper you chose from Assignment 1, the Presentation and Participation component above.

Your report should be limited to approx. 1500 words (not including references). Use 1.5 spacing with a 12 point Times New Roman font. Though your paper will largely be based on the chosen article, you should use other sources to support your discussion or the chosen papers premises.

Citation of sources is mandatory and must be in the IEEE style.

Your report or critique must include:

Title Page: The title of the assessment, the name of the paper you are reporting on and its authors, and your name and student ID.

Introduction: Identification of the paper you are critiquing/ reviewing, a statement of the purpose for your report and a brief outline of how you will discuss the selected article (one or two paragraphs).

Body of Report: Describe the intention and content of the article. If it is a research report, discuss the research method (survey, case study, observation, experiment, or other method) and findings. Comment on problems or issues highlighted by the authors. Report on results
discussed and discuss the conclusions of the article and how they are relevant to the topics of this Unit of Study.

Conclusion: A summary of the points you have made in the body of the paper. The conclusion should not introduce any ‘new' material that was not discussed in the body of the paper. (One or two paragraphs)

References: A list of sources used in your text. They should be listed alphabetically by (first) author's family name. Follow the IEEE style.

The footer must include your name, student ID, and page number.

Reference no: EM132294422

Questions Cloud

Why is a pm the ceos best friend : Your final project is to submit to the CEO. So why is a PM the CEO's best friend? In summary: project dedication and personal integrit
Describe an instance where you did not have an intuitive : GUIs play an important role on how an end-user interacts with an operating system. Describe an instance where you did not have an intuitive experience.
Description of internal control weakness : Case Study - Bell Studio - Appreciate the opportunities for computer fraud and the security measures in electronic commerce that need to be taken to overcome
Discuss a situation in which data storage using a flat file : Discuss a situation in which data storage using a flat file would be preferable over using a database table.
Prepare a presentation on software engineering : MITS5002 Software Engineering Methodology: Presentation on a recent academic paper on a topic related to Software Engineering or Software Engineering.
Different approaches to system analysis and design : Compare and contrast different approaches to system analysis and design, such as object-oriented, agile, and service oriented techniques
Describe the scope and analyze how to control the scope : Describe the scope and analyze how to control the scope. Speculate and give justifications for how to control scope.
Perform penetration testing on the ecommerce platform : MN623 Cybersecurity and Analytics Assignment - Penetration Testing Project for eCommerce Website, Melbourne Institute of Technology, Australia
Describe in detail the reason for the hardware choice : ISYS201 : Describe in detail the reason for the hardware choice and describe how the various sections of the plan serve the business needs.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Develop an introduction to the security policy outline

Develop an introduction to the security policy outline which you will present in your deliverable. Develop an overview of the client company (mission, functions, information / information systems which need to be protected, laws and regulations, et..

  Explain the most common forms of digital crime

Determine the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Provide a rationale to support your response. Summarize the roles and responses that the U.S. government, court systems, an..

  Write paper on advantage and disadvantage of online banking

Assignment- Write a double spaced one page report using Word on the ADVANTAGES and DISADVANTAGES of ONLINE BANKING.

  Powerpoint presentation of technologyin this assignment

powerpoint presentation of technologyin this assignment take a few minutes to contemplate the world of business as you

  Integration of e-commerce and erp system

ASSIGNMENT - Integration of E-commerce and ERP system with other ICT (information and communication technologies) to create value for customer and shareholders

  Discuss about an attack analysis about it security

An attacker discovered the access by use of a port scan and used a dictionary attack to gain access to one of the training computers

  What are the advantages of an e-commerce business

MGT 401- If you are unable to secure funding, what are the alternatives to starting your own business? What are the advantages and disadvantages of an e-commerce business? Should traditional businesses also offer online sales?

  What are the primary functional requirements for the system

COIT20248 Information Systems Analysis and Design Assignment - About Systems Development. What are the primary functional requirements for the system

  Evaluate the effects that implementing the health option

Should all cultures be given equal consideration in health care policies? What aspects of culture should be given consideration in the health care industry

  Contribute to the high failure rate under certain situations

What are some characteristics of software development that contribute to the high failure rate under certain situations?

  Provide a link to the article or attach a copy of article

Locate a current article about Technology that has been published within the last 6 months. Good online sources can be found by looking at the Internet references at the end of each selection in Annual Editions.Provide a Link to the article or atta..

  Establish the key benefits of the imdb to the company ceo

According to the textbook, in-memory databases (IMDB) are making significant inroads into database management. Imagine that you are a consultant to a large transaction-oriented Web-based company. Establish the key benefits of the IMDB to the compa..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd