The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.
LIT101 week 3a
Discussion 3A: Identifying literary devices
No unread replies.No replies.
For this first discussion board assignment, you will practice identifying literary devices in a work of literature. We will focus on several elements, starting with Theme. A theme is the overall message or idea an author is trying to convey in a work. Then, you will identify the known as symbol, motif in the work. Finally, you will identify other literary devices such as metaphors, personification, etc. in a work. Please review the following document for an excellent overview of all these terms, including examples.
· Literary Devices and Terms: Theme https://www.litcharts.com/literary-devices-and-terms/theme (Links to an external site.)
Once you are reviewed this document, choose a work of your own. You can choose a work from Module 2, or any other work of prose (no poetry yet.. we will get to that). Please note, I know many of these works are LONG, so I don’t expect you to do an entire book. You can choose an appropriate excerpt to make it more manageable.
As another example, I chose the most famous Romeo and Juliet scene: The balcony scene. SCENE II.docx Download SCENE II.docxI identified some lines and phrases in which Shakespeare supported one of the themes of the play: Love triumphs over evil. In addition, I identified some areas where there were common motifs (i.e. light, color) and literary devices. This you can use as an example of how to do this in a work. Once you have done this to an excerpt of your own, answer the following questions:
- What is the general plot of the story or scene?
- What is a major theme of this story? (there can be more than one, but you can just use one). Give examples from the work.
- What examples of symbol, motif, and leitwortstil are in this work of literature?
- What other literary devices are used within this work of literature? Give examples from the work.
When completing your discussion, explain the answer to the question and use at least one example from each from your work. You should have a total of about 8-10 examples (not each, total).
Respond to others
Respond to at least two other persons; what did you learn from their post?
Paper Last- Planning Project
- Question 1
Your team has been asked to test and document enhancements to a web application that allows buyers to purchase custom-printed canvas shoes. The tasks and dependencies are as follows:- Create a testing plan
- Once the testing plan is ready, your team can:
- Test the user interfaces
- Test the database
- Test the network
- Write the documentation first draft
- When the user interface tests are complete, you can:
- Perform user testing—enlist some users to test the user interface
- When the database and network testing are complete, you can:
- Perform integration testing—network with the database
- When the user testing of the user interface and the database testing are complete, you can:
- Perform integration testing—database, network, and user interface
- When all integration testing and user testing are complete, you can:
- Perform system testing
- Then you can:
- Review and revise documentation
- After all other tasks are complete, you can:
- Obtain management approval
- Duration estimates for the tasks:
a. 3 days b. 10 days c. 6 days d. 7 days e. 20 days f. 5 days g. 3 days h. 2 days i. 8 days j. 4 daysk. 5 days
- Create a network diagram and a Gantt chart for the project tasks. Ask your instructor if you are permitted to use software such as Microsoft Project to help you prepare your diagrams.
- What is the planned duration for the testing project?
- What is the critical path for the testing project?
- For each task NOT on the critical path, calculate the amount of slack available.
- If the user testing of the user interface takes 15 days, what will the impact be on the project duration?
Text
Title: Project Management
Subtitle: https://opentextbc.ca/projectmanagement/
ISBN: 978-1-77420-013-1
Authors: Adrienne Watt
Publisher: BCcampus
Publication Date: August 14, 2014
Edition: 2nd Edition
Paper1
Write a white paper that describes how to create a modern software development environment that incorporates and integrates all SDLC processes. Your paper should be approximately 4-6 pages, not including the title page and Works Cited.
Follow the Paper Direction Your task is to make recommendations for creating a state-of-the-art software development environment. Your audience is mid-level managers such IT managers.
Computer Networking Assignement
For this assignment, explore the peer-reviewed literature and complete a 1 – page paper on the following topic:
- Network controller for 3G/4G/5G mobile and wireless networks
Your submissions will be checked for plagiarism
Practice Programming Challenge
Practice Programming Challenge #1
A prime number is a whole number greater than 1 whose only factors are 1 and itself. A factor is a whole number that can be evenly divided into another number. The first few prime numbers are 2, 3, 5, 7, 11, 13, 17, 19, 23, and 29. The number 1 is not prime.
Create a java application that allows the user to repeatedly enter a number to find out it is a prime number.
The program should:
· Prompt the user for a number greater than 1
· Print out if the number is a prime number or not
· Then ask the user if they would like to enter another number or quit
See sample below:
In addition, your program should also contain and demonstrate a method isPrime. This method should:
· Take in one int as an argument
· Return a boolean – true if the argument is prime, false if argument int is not prime
The main method of the program should call the isPrime method to determine if the number entered by the user is prime.
Information technology class
Review the videos in this section. After viewing, create a 2page Word document in APA format. Your topics include:
- A brief description of 2 careers, 1 in your major and the second in the technology field.
- Describe each career in detail including salary (based in MD, VA, and DC geographical area), education level or certification needed, and duties.
- What emerging technology (within the past 5 years) is used in the industry (your chosen career) to improve production or work flow.
- What are the ethical issues.
- Include 4 references.
In this assignment you will research information about your careers of interest salary, education level, duties, ethical issues,and emerging technologies. You want to find out what a person in each career does but you also need to investigate criteria for each career that we will use for evaluation.
- Read about evaluating website on the PGCC Library web site. Go to http://pgcc.libguides.com/c.php?g=60038&p=385689
- Review APA style reference at https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html
- Look up the criteria for each of your careers on the Bureau of Labor and Statistics Occupational Outlook Handbook https://www.bls.gov/ooh
- Look up the criteria for each of your careers on O*Net https://www.onetonline.org/
- Look up the criteria for each of your careers on a site of your choice
- Find at least one site that identifies an ethical issue(s) for your careers
- Find at least one site that identifies an emerging technology(ies) for your careers
- Keep all (4 or more) URL’s in a Word document using the Word reference feature.
- Submit as a Word (25 points) and a PDF document (10 points) below.
MVP research
minimum viable product (MVP), Lean Startup, and Story Maps.
cyber security
Why is Biometrics the latest trend in cybersecurity for both personal devices and entire networks? Because biometrics are the most personal of personally identifiable information, how and why should state laws regulate it (Links to an external site.)?
refer link
https://www.privacypolicies.com/blog/privacy-policy-biometrics-laws/