Week 7 project

 Week 7 Project Paper

Hide Assignment InformationInstructions

Week 7 Project Paper: (Due by Sunday of Week 7 11:59 PM EST)

Submit a 10 page research paper with APA standard annotations on an approved topic (see pre-approved topics below).
Pre-approved research topics

  • Authentication/Digital signatures
  • Data collections tools (hardware & software)
  • E-business/e-commerce security
  • End user security issues.
  • Government vs. commercial organization security issues.
  • HIPAA
  • Identity Theft
  • ID&IH Management and Legal Issues
  • Instant Messaging security.
  • Intrusion detection.
  • Sarbannes Oxley
  • Security Threats & Vulnerabilities
  • Wireless technology security

You may use resources from the APUS Online Library, any library, government library, or any peer-reviewed reference (Wikipedia and other non-peer-reviewed sources are not acceptable). Requirements: 

  • The paper must by at least 10 pages double-spaced
  • 1″ margin all around
  • Black12 point fonts (Times New Roman, Arial, or Courier)
  • Correct APA format citations
  • Graphics are allowed but do not apply for the minimum page count.
  • A minimum of 10 references are needed.
  • The paper is automatically submitted to Turnitin to against plagiarism

(Please make sure it’s in APA format and proper in-text citations are used)

Figure 5.4 AppMaker DFD with data types.

Using Figure 5.4 as the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?

 

Using Figure 5.4 as the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?

Answer the questions with an APA-formatted paper (Title page, body and references only).  Your response should have a minimum of 500 words.  Count the words only in the body of your response, not the references.  A table of contents and abstract are not required.

A minimum of two references are required. One reference for the book is acceptable but multiple references are allowed.  There should be multiple citations within the body of the paper.  Note that an in-text citation includes author’s name, year of publication and the page number where the paraphrased material is located.

Your paper must be submitted to SafeAssign.  Resulting score should not exceed 35%. Figure 5.4 AppMaker DFD with data types.

Exp19_PowerPoint_Ch02_CapAssessment_Food

 

Exp19_PowerPoint_Ch02_CapAssessment_Food

  

PowerPoint Chapter 2 Capstone Assessment – Food

#Exp19_PowerPoint_Ch02_CapAssessment_Food  

#Exp19 PowerPoint Ch02 CapAssessment Food

Project Description:

Your school’s Culinary Club is raising money for the local food bank. You volunteer to create a slide show that will be shown at a potluck fundraiser put on by the club. In this activity, you will create a presentation that meets slide show design principles, and has shapes, animation, video, and audio.

#Start PowerPoint. Download and open the file named Exp19_PPT_Ch02_CapAssessment_Food.pptx. Grader has automatically added your last name to the beginning of the filename

#Replace Student Name in the subtitle placeholder on Slide 1 with Carl Patterson Change the title font size to 54.

#Click Slide 2. Change the title font size to 48. Change the subtitle font size to 32.

#Click Slide 3. Change the title to sentence case. Change the title font size to 54. Change the bulleted text to 32

#Click Slide 4. Change the title font size to 48. Change the bulleted text to 32.

#Click Slide 5. Change the title font size to 48. Change the subtitle font to 27.

#Click Slide 4 and insert a heart shape. Size it to a height of 2.5” and a width of 2.75” . Apply Colored Fill – Red, Accent 1, Darker 25%. Apply a shape outline in Black, Text 1. Apply Preset 2 as a shape effect. Position the shape horizontally at 10.35” from the Top Left Corner. Position the shape vertically at 4.9” from the Top Left Corner.

#Click Slide 2. Select the subtitle text and add the Zoom Entrance animation. Click After Previous in the Start box. Adjust the Duration to 01.75 and the Delay to 00.50.

#Click Slide 3. Select the first text bullet and apply the Fade Entrance effect. Set the animation to start After Previous with a Duration of 02.00 and a Delay of 01.75. Click the Animation Pane, and then click the arrow for the first bullet. Select Effect Options to access the Fade dialog box. Set the After Animation to Orange (sixth from the left) on the Effect tab.

#Select the second text bullet and apply the Fade Entrance effect. Set the animation to start After Previous with a Duration of 02.00 and a Delay of 01.75. Click the arrow for the second bullet in the Animation Pane. Select Effect Options to access the Fade dialog box. Set the After Animation to Orange (sixth from the left) on the Effect tab.

#Select the third text bullet and apply the Fade Entrance effect. Set the animation to start After Previous with a Duration of 02.00 and a Delay of 01.75. Click the arrow for the last bullet in the Animation Pane. Select Effect Options to access the Fade dialog box. Set the After Animation to Orange (sixth from the left) on the Effect tab.

#Click Slide 4 and select the heart shape. On the Animations tab, in the Animations group, click More and add the Pulse Emphasis effect. Set the animation to start After Previous with a Duration of 02.00 and a Delay of 0.25. Click the arrow for the shape in the Animation Pane. Select Timing and set Repeat to Until End of Slide and click OK.

#Click Slide 1 and add the Fade transition. Set the Duration at 01.00. Set the slides to advance automatically after 00:07.00. Set it to apply to all.

#Click Slide 5. Insert the downloaded video file Veggies.mp4

#Apply the Rounded Diagonal Corner, White moderate video style.

#Set the video to start Automatically. Change the Video Options to Hide While Not Playing and to Rewind after Playing. Compress the media in the presentation using the Standard setting. Mac users, compress all pictures in the presentation using the On-screen setting.

#Save and close Exp19_PPT_Ch02_CapAssessment_Food.pptx. Exit PowerPoint. Submit the file as directed.

GO19_AC_CH01_GRADER_1F_HW – Recruiting Events 1.1

GO19_AC_CH01_GRADER_1F_HW – Recruiting Events 1.1

  

Project Description:

In this project, you will use a database template and create database objects to track recruiting events for a college. You will enter records into the Events table using a multiple-items form and a single-items form. You will append data from Excel to the Events table. You will create a second table in the database that tracks contact information for recruiters.

     

Start   Access. Open the downloaded file named Student_Access_1F_Recruitment_Events.accdb,   and enable the content.

 

In   the Event List multiple-items form that opened automatically, in the new   record row, enter the following record (the Start Time and End Time data will   reformat automatically):
 

  Title: Health Professions
  Start Time: 6/1/23 8a
  End Time: 6/1/23 12p
  Description: Science Students
  Location: Hill Country High   School

 

In   the Event List form, click New Event, and in the Event Details single-record   form, enter the following record (the Start Time and End Time data will   reformat automatically):
 

  Title: New Students
  Location: Brazos Convention   Center
  Start Time: 6/1/23 10a
  End Time: 6/1/23 3p
  Description: College Fair

 

Close   the Event Details single-record form, and then enter the following two   records in the Event List multiple-items form (the Start Time and End Time   data will reformat automatically):
 

  Record 3:
  Title: Information Technology Start Time: 6/2/23 9a End Time: 6/2/23 12p
  Description: Technical Students Location:   Round Rock Technical Center
 

  Record 4:
  Title: International Students Start Time: 6/2/23 2p End Time: 6/2/23 5p
  Description: Open House   Location: Southeast Campus

 

Close   the Event List form. Append the records from the downloaded Excel file a01F_Recruiting_Events.xlsx to the   Events table.

 

In   the Navigation Pane, organize the objects by Tables and Related Views. Open   the Events table (the table has 13 records). Apply Best Fit to all of the   fields in the table, save the table, and then close the table.

 

In   Datasheet view, create a new table. Beginning in the second column of the   table and using the data type of Short Text, create the Location, Last Name,   First Name, Email Address,   and Business Phone fields (in that order).

 

For   the ID field, change the data type to Short Text and rename the field to Recruiter ID.

 

Starting   in the Recruiter ID field, add the following two records to the new table:
 

R-01|Hill Country High School|Rostamo|Robyn|[email protected]|(512) 555-3410
R-02|Brazos Convention   Center|Hart|Roberto|[email protected]|(512) 555-1938

 

Starting   in the Recruiter ID field, add the following two records to the new table:
 

R-03|Round Rock   Technical Center|Sedlacek|Belinda|[email protected]|(512) 555-0471
R-04|Southeast Campus|Nguyen|Thao|[email protected]|(512) 555-2387

 

Apply   Best Fit to all of the fields in the table, and then save the table as 1F Recruiters.

 

Close   all database objects, and then close Access. Submit the Access_1F_Recruitment_Events.accdb database as directed.

Need help with Project Portfolio

Please use the attached sample and Project reports. 

How to Prepare the Portfolio

The portfolio report must be typewritten and should be a minimum of 3 complete pages in length. A project report that is two and a half pages (2.5 pages) is not acceptable. Large margins that have been increased to meet the length requirement are also not acceptable. If your report is not submitted according to the stated specifications, you will be asked to re-write it.

Do not submit the original project; the report is meant to capture the project highlights and significant points of the original project.

You will write a report on the project that includes:

  1. Introduction
  2. Explanation of the solution
  3. Description of the results 
  4. ​Description of your contributions to the project
  5. ​Explanation of what new skills, techniques, or knowledge you acquired from the project and if it was a group project, you should also include a list of team members who worked on the project.
  6. A reference section with at least 4 references and citations to those references inside the text. Use the IEEE Referencing Style Sheet for citation guidelines.

List the Following Briefly in Six sentences each

Errors Failures and Risks 

  1. Give an example from the book where insufficient testing was a factor in a program error or system failure.
  2. What was one cause in the delay in the completing of the Denver Airport.
  3. Why didn’t the healthcare.gov website work at first?
  4. What is one characteristic of high reliability organizations?
  5. Describe the potential risks of alert fatigue in EHR systems.
  6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.
  7. What does design for failure mean?

Activity 2- Project Risk & quality Mngt

#1 What is Agile?

How is risk handled within an Agile project approach such as Scrum?

In what ways can the following activities be seen as projects?

In what ways do they resemble ongoing, routine business activities?

Feel free to add assumptions and details to describe how the activity might be a project in one context and routine in another.

  1. Reading a chapter before attending a university lecture.
  2. Taking a bus to work each day.
  3. Piloting an aircraft between Vancouver and Fiji.
  4. Teaching a course for the first time; teaching the same course every semester.

Text

Title: Managing Project Risks 

ISBN: 9781119489733 

Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards 

Publisher: John Wiley & Sons 

Publication Date: 2019-08-13

Cybersecurity

There are several security frameworks and architectures available to use as templates for creating a secure environment. These include ISO, NIST, COBIT, ETSI, RFC, and ISA/IEC. Select three security frameworks/architectures and use the Internet to research each of them. How are they predominately used? What are their strengths? What are their weaknesses? Are they general or specific? What is a setting (small business, school, home office, etc.) that you would recommend for each of these?

Lastly, use the Internet to identify three network firewalls, and create a chart that compares their features. Note if they are rule-based or application-aware, perform stateless or stateful packet filtering, what additional features they include (IDS, content filtering, etc.), their costs, etc. Which would you recommend? Why? Write a one-page paper on your comparison and analysis.