Activity 8- Project Process

Part 1: 

Choose two Project Management Life Cycle (PMLC) models that you have experience using or that interest you and provide two similarities and two differences.  In addition,  give an example of a project that could be managed using each life cycle and why? 

Text-

Title: Effective Project Management ISBN: 9781119562801 Authors: Robert K. Wysocki Publisher: Wiley Publication Date: 2019-05-07 Edition: 8th Edition 

Research Paper

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.

Policy Legal Ethics

 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. what do each of these terms refer to: copyright, patent, trademark, trade secret?

2. Why is intellectual property entitled to legal protection? 

3. Why did copyright laws become stricter and more punishing in the late 20th century?

4. What is the Fair Use doctrine?

5. Make an argument for legalizing the copying of music or software. 

6. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I don’t own them, what is my legal right to them?

7. What was the 1984 Sony Supreme Court case about?

8. Was Napster responsible for the actions of its users?

9. Why did the court find in favor of Diamond in the Rio case? 

10. What is Digital Rights Management?

Building a Virtual Machine

For this project, you will create a virtual Linux machine that will be hosted on your computer.

  • To virtualize the system, you may use free solutions you find online, such as VMWare Player or VirtualBox, and you will use Ubuntu 18.04 (a deliberately older version) as your operating system. You might choose to download a pre-built image of Linux rather than installing your own. (Hint: see https://www.osboxes.org/ubuntu/ (Links to an external site.) for some ready-made images.)
  • In your submission, you will need to prove that you have completed the project by discussing your process and sharing screenshots
  • This virtual machine will be used again in next week’s assignment

 The additional instructions below are to assist you with Ubuntu installation.

  

Create a new Virtual Machine named Ubuntu Desktop. Verify that the version is Ubuntu 64-bit. Specify four gigabytes of memory. Create a virtual drive, provision. Specify the size as 128 gigabytes. Start the virtual machine and specify the Ubuntu Desktop ISO. Click start. Configure scaling to make the screen easier to read. Confirm your language and click install Ubuntu. Confirm your keyboard layout, click continue, specify normal or minimal installation. In this case, we’re selecting minimal because it’s faster and click continue. Confirm that you would like to erase the disc and click install now. Confirm that you would like to write those changes to the drive. Confirm your time zone. Click continue. Specify your name, your computer’s name, and pick a username. Specify a password, confirming it, and click continue. After reboot, log in as your demo user, specify the password and clicking sign in .

For Additional Assistance

  1. Visit VirtualBox  (Links to an external site.)(freely available for Microsoft Windows, Apple Mac, and Linux).
  2. Under platform packages, click the version of the operating system you plan upon running VirtualBox.
  3. Save the installation file.
  4. Open the installation file and follow the onscreen prompts to install the software.

Students will now need to download a trial copy of Windows 10 from Microsoft.com.

  1. Visit Microsoft Evaluation Center. (Links to an external site.)
  2. Click Continue.
  3. Enter your contact information as required.
  4. Select 64-bit and select your language—English.
  5. Click Download.
  6. Save the ISO to the Downloads folder on your computer.

Students will now need to download a copy of Ubuntu from Ubuntu.com.

  1. Visit Unbuntu. (Links to an external site.)
  2. Click Download.
  3. Click the LTS version.
  4. Save the ISO to the Downloads folder on your computer.

Parameters

  • The assignment should be double-spaced, 12-point Times New Roman font, with one-inch margins
  • Use APA for citing references and quotations
  • See the assignment rubric below for more details 

one page of answers

 

  1. Problem statement: what kind of problem is presented by the authors and why this problem is important?
  2. Approach & Design: briefly describe the approach designed by the authors
  3. Strengths and Weaknesses: list the strengths and weaknesses, in your opinion
  4. Evaluation: how did the authors evaluate the performance of the proposed scheme? What kind of workload was designed and used?
  5. Conclusion: by your own judgement.

Discussion 250 -300 words

Question 1: An argument that has been ongoing for some time now involves the question as to whether ATM or Gigabit Ethernet is the best choice for a high-speed networking solution. Do some Internet research that compares these two technologies and formulate an initial post outlining one potential scenario for each technology where it might constitute the optimal solution for a business.

Question 2: Do some Internet research on switching techniques used in cellular telephone networks. Are cell phone networks examples of circuit-switched networks? Why or why not? 

practical connection assignment

 

Assignment:

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of the “Cryptography” course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

Risk Assessment/Penetration Testing Plan

Write a minimum 1,000-word risk assessment/ethical hacking plan for an organization. Include things that you consider important. For example, you can include the phases used in hacking, the steps you would take, and how often you would perform the different activities. These are just suggestions. Include what you think is important as long as it conforms to the rubric.

You can include a list or two, but for the most part, try to avoid lists and keep it in narrative format. Make sure your work is original. You can use the Internet for ideas, but be sure to use your own words. Do not copy and paste materials others have written or that you find in references. Be sure to cite your resources using APA formatting.

Portfolio Section 2 (Connection with other fields)

Section 2 asks you to demonstrate that you can integrate other fields of work into your core engineering.

What is “another field”?  

We’re talking about other disciplines. Not another programming language, not databases….these are work that would cross all fields. “Another field” is 

1. Another engineering field

2. A science field (biology, chemistry etc) 

3. Math or Statistics

4. etc

(My major is computer science.)

(Page 8-9 of the file is an example.)

6/5 Paper

  1. In this final assignment, you will be adding your recommendations for improving the information system’s infrastructure that you researched and completed in the Workshop Two summary of your organization’s mission, goals, and strategies and the Workshop Four organizational SWOT analysis.
  2. This last phase of the final project will be your recommendations based upon the SWOT analysis you conducted in Workshop Four.
  3. You should identify at least four improvements and provide a thorough explanation for each of your recommendations.
  4. Your final paper should include the following sections:
    1. Introduction
    2. Summary of the organization’s mission, goals, and strategies from the Workshop Two paper
    3. SWOT analysis from the Workshop Four paper
    4. Recommendations as noted for this section above
    5. Conclusion
    6. References
  5. The total length of the paper should be 10–15 pages. You may use graphics or other features within your paper; however, these do not count toward the 10–15 page total.
  6. Make sure your paper is double-spaced and uses APA format. The paper should have a minimum of five references.