Enterprise risk management Discussion one page

 The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program. 

LIT101 week 3a

Discussion 3A: Identifying literary devices

No unread replies.No replies.

 For this first discussion board assignment, you will practice identifying literary devices in a work of literature. We will focus on several elements, starting with Theme. A theme is the overall message or idea an author is trying to convey in a work. Then, you will identify the known as symbol, motif in the work. Finally, you will identify other literary devices such as metaphors, personification, etc. in a work. Please review the following document for an excellent overview of all these terms, including examples.

·  Literary Devices and Terms: Theme https://www.litcharts.com/literary-devices-and-terms/theme (Links to an external site.)

Once you are reviewed this document, choose a work of your own. You can choose a work from Module 2, or any other work of prose (no poetry yet.. we will get to that). Please note, I know many of these works are LONG, so I don’t expect you to do an entire book. You can choose an appropriate excerpt to make it more manageable.

As another example, I chose the most famous Romeo and Juliet scene: The balcony scene. SCENE II.docx Download SCENE II.docxI identified some lines and phrases in which Shakespeare supported one of the themes of the play: Love triumphs over evil. In addition, I identified some areas where there were common motifs (i.e. light, color) and literary devices. This you can use as an example of how to do this in a work. Once you have done this to an excerpt of your own, answer the following questions:

  • What is the general plot of the story or scene?
  • What is a major theme of this story? (there can be more than one, but you can just use one). Give examples from the work.
  • What examples of symbol, motif, and leitwortstil are in this work of literature?
  • What other literary devices are used within this work of literature? Give examples from the work.

When completing your discussion, explain the answer to the question and use at least one example from each from your work. You should have a total of about 8-10 examples (not each, total).

Respond to others

Respond to at least two other persons; what did you learn from their post?

Paper Last- Planning Project

  1. Question 1
    Your team has been asked to test and document enhancements to a web application that allows buyers to purchase custom-printed canvas shoes. The tasks and dependencies are as follows:

    • Create a testing plan
    • Once the testing plan is ready, your team can:
    • Test the user interfaces
    • Test the database
    • Test the network
    • Write the documentation first draft
    • When the user interface tests are complete, you can:
    • Perform user testing—enlist some users to test the user interface
    • When the database and network testing are complete, you can:
    • Perform integration testing—network with the database
    • When the user testing of the user interface and the database testing are complete, you can:
    • Perform integration testing—database, network, and user interface
    • When all integration testing and user testing are complete, you can:
    • Perform system testing
    • Then you can:
    • Review and revise documentation
    • After all other tasks are complete, you can:
    • Obtain management approval
    • Duration estimates for the tasks:
       a. 3 days b. 10 days c. 6 days d. 7 days e. 20 days f. 5 days g. 3 days h. 2 days i. 8 days j. 4 daysk. 5 days
    1. Create a network diagram and a Gantt chart for the project tasks. Ask your instructor if you are permitted to use software such as Microsoft Project to help you prepare your diagrams. 
      1. What is the planned duration for the testing project?
      2. What is the critical path for the testing project?
      3. For each task NOT on the critical path, calculate the amount of slack available.
      4. If the user testing of the user interface takes 15 days, what will the impact be on the project duration?

Text

Title: Project Management 

Subtitle: https://opentextbc.ca/projectmanagement/ 

ISBN: 978-1-77420-013-1 

Authors: Adrienne Watt 

Publisher: BCcampus 

Publication Date: August 14, 2014 

Edition: 2nd Edition

Paper1

 Write a white paper that describes how to create a modern software development environment that incorporates and integrates all SDLC processes. Your paper should be approximately 4-6 pages, not including the title page and Works Cited. 

 Follow the Paper Direction  Your task is to make recommendations for creating a state-of-the-art software development environment. Your audience is mid-level managers such IT managers. 

Computer Networking Assignement

 

For this assignment, explore the peer-reviewed literature and complete a 1 – page paper on the following topic: 

  • Network controller  for 3G/4G/5G mobile and wireless networks

Your submissions will be checked for plagiarism

Practice Programming Challenge

  

Practice Programming Challenge #1

A prime number is a whole number greater than 1 whose only factors are 1 and itself.  A factor is a whole number that can be evenly divided into another number.  The first few prime numbers are 2, 3, 5, 7, 11, 13, 17, 19, 23, and 29.  The number 1 is not prime.

Create a java application that allows the user to repeatedly enter a number to find out it is a prime number.

The program should:

· Prompt the user for a number greater than 1

· Print out if the number is a prime number or not

· Then ask the user if they would like to enter another number or quit

See sample below:isPrime.jpg

In addition, your program should also contain and demonstrate a method isPrime.  This method should:

· Take in one int as an argument

· Return a boolean – true if the argument is prime, false if argument int is not prime

The main method of the program should call the isPrime method to determine if the number entered by the user is prime.

Information technology class

 

Review the videos in this section.  After viewing, create a 2page Word document in APA format.  Your topics include:

  1. A brief description of 2 careers, 1 in your major and the second in the technology field.
  2. Describe each career in detail including salary (based in MD, VA, and DC geographical area), education level or certification needed, and duties. 
  3. What emerging technology (within the past 5 years) is used in the industry (your chosen career) to improve production or work flow. 
  4. What are the ethical issues.
  5. Include 4 references. 

In this assignment you will research information about your careers of interest salary, education level, duties, ethical issues,and emerging technologies. You want to find out what a person in each career does but you also need to investigate criteria for each career that we will use for evaluation.

  1. Submit as a Word (25 points) and a PDF document (10 points) below.

cyber security

Why is Biometrics the latest trend in cybersecurity for both personal devices and entire networks? Because biometrics are the most personal of personally identifiable information, how and why should state laws regulate it (Links to an external site.)?

refer link

https://www.privacypolicies.com/blog/privacy-policy-biometrics-laws/