Dissertation – Journal Reflection on Topic Ideas

Note : Please read and write homework 1 and 2

Home work:1

 Share your topic idea(s) here. Here are some things to consider:

  1. Identify a topic in your specialization. (For IT students, Information Technology is not a topic, however, Millennial’s perceptions of smart phone technology could be a topic. These are examples).  
  2. What is the cited problem? The problem you want to address has to come from the literature, and be cited, who are saying there are problems.
  3. What is the population you would like to address?
  4. What methodology are you planning on using? (If you are unsure, do you plan on a quantitative or qualitative study?  You will determine your methodology in 839).
  5. Locate at least one article related to your topic. What was the research question in the study? Who were the participants in the study? What findings were reported?

Share your topic idea(s) by going to the “Week 1 Assignment – Journal Reflection on Topic Ideas” link above. 

Homework 2:Please fill attached timeline and I will fill up dates 

Completion of the dissertation primarily rests upon you, the doctoral student. However, research indicates that self-regulated learning strategies predict the elapsed time along the dissertation journey (Dunn & Rakes, 2015; Kelley & Salisbury-Glennon, 2016). One such strategy is the creation of a timeline. This cyclical process has the learner plan out a task, monitor their performance along major milestones, reflect on their progress, and then use the reflection to adjust the timeline. However, to be effective, this strategy needs to be personalized for each learner’s purpose (Zimmerman, 2002).

Using the attached template as a guide, you are to create such a timeline – a roadmap, if you will, along your dissertation journey. Incorporated within the timeline are major milestones. Build into the timeline goals for each milestone with specific dates. You may also want to include specific contact information as well as possible obstacles that may arise. This will be a tool you will bring to each consultation with your professor/chair. Most importantly, it is to be a useable point of reference along your dissertation journey.

References

Dunn, K., & Rakes, G. (2015). Exploring online graduate students’ responses to online self-regulation training. Journal of Interactive Online Learning, 13(4), 1–21.

Kelley, M., & Salisbury-Glennon, J. (2016). The Role of Self-regulation in Doctoral Students’ Status of All But Dissertation (ABD). Innovative Higher Education41(1), 87–100.

Zimmerman, B. J. (2002). Becoming a self-regulated learner: An overview. Theory into Practice, 41(2), 64-70.

Cryptography

In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.

No plagiarism please.

Need it next 5 hours

Analysis Phase

 

In the analysis phase the teams need to:

  1. Requirements Determination: All the requirements for the new system needs to be defined in this document
  2. Data Flow Diagrams
  3. Use Case Diagrams
  4. Activity Diagram
  5. Class Diagrams

More Info on the company you will be working on is below:

  

Project objective –

Develop a business intelligence dashboard to be used by the Analytics and Marketing departments to conveniently analyze data and present key insights in an easy-to-use and intuitive manner.

Justification for the project –

This project attempts to solve operational problems encountered by data analytics professionals at Swift Trade Corp. The business intelligence dashboard will facilitate the process of presenting data and other important business metrics important to the company’s performance.

week 4

1. How is the implementation of network security similar and different between on-perm and cloud environments? Give some examples. 

2. How is the management of network security similar and different between on-perm and cloud environments? Give some examples. 

need asap

 have to find a problem to solve that deals with data and data sources. 

 

  1. The problem to solve.
  2. The data sources to pull from.
  3. The tool that will be used (R)
    1. Note high level graphics that will be used to solve the problem and how they will be used

Assignment

 Titanium lets you develop cross-platform native mobile applications and build great mobile experiences using JavaScript.  Write a one page minimum (250 words) paper on Titanium. Must be APA formatted with Title page and References page. You may discuss why Titanium was/is used, who uses it, or other interesting facts that you find in your research.