Personal Reflection: Problem Solving in the Workplace

Personal Reflection: Problem Solving in the Workplace

It is important for students to understand how their curriculum is applied to real world workplace environments. How what you are studying can or will benefit you in your current, or future, career. For this assignment, you will need to review your program’s curriculum and goals and compare that to your current job/internship (if unemployed, reflect on a job/career that you desire to obtain in the future). To complete the assignment, please follow the below instructions:

  1. Review your program’s goals and curriculum on the UC Webpage and the UC Graduate Course Catalog:
  1. Reflect on (research, if needed) your current (or future) job duties and responsibilities.

Assignment Details:Part 1 – Identify a Problem

  • Problem solving starts by being able to identify existing problems, gaps in service, inefficient systems/processes, flawed policies, or any other areas of our job/career where improvement is needed. Identify a problem or gap at your workplace and explain why/how this problem exists.

Part 2 – Solve the Problem

  • Use your knowledge that you’ve learned in the program (or hope to learn in a future course) to implement a plan to solve the problem.

Grading Expectations:

  •  Fully answer both parts of the assignment.
  • Word requirement: 400-500 words

*Please include your Program details (MSIT, MSISS, MBA, MSPM, PHDIT, etc.) in the reflection and also include your job details (job title and employer, if available).

Software Contruction -1

 

1. In your own words, what is the difference between a flow chart, a pseudocode, and a program? Why does a programmer need to know all three of them?

Interactive Computer Graphics -5

 

Run all the HTML programs in Canvas folder – Week 5 – Chapter 4

Look at the image from different “views”

Write your observation for 

– translation

– rotation

– Model view

– Camera view

Exp19_Excel_Ch10_HOEAssessment_Pledge_Drive

  Exp19_Excel_Ch10_HOEAssessment_Pledge_Drive

  

Project Description:

You are a volunteer for Health Right, a nonprofit company that provides free physical fitness classes to schools that do not have a physical education facility. As part of your duties, you generate weekly reports that detail donation pledge calls placed, as well as pledge dollars received. You also maintain pledge drive agent personal information and manage the thank-you gifts agents receive for volunteering their time. This week you have decided to overhaul your report by updating agent contact information, importing data previously stored outside your old report, implementing a PivotTable using Power Pivot, and utilize Power-Add-Ins to edit and visualize the week’s data.

     

Start   Excel. Download and open the file named Exp19_Excel_Ch10_HOEAssessment –   PledgeDrive.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

Use Get & Transform (Power   Query) to load the file e10c2VolunteerInfo.csv   in the Power Query Editor. Use the Power Query Editor to split column D into   three separate columns for City, State, and Zip using comma as the delimiter.   Edit the city.state.zip1 column heading to City, city.state.zip2 to State, and city.state.zip3 to Zip then load the data to the   existing worksheet.

 

Rename the worksheet Volunteer   Information.

 

Set the External Data Range   Properties to Refresh data when opening the file.

 

Use Get & Transfrom (Power   Query) to load the Pledge table from xml file e10c2Rewards.xml into a new worksheet. Be sure to add the   information to the data model.

 

Rename the worksheet Rewards.

 

Apply Accounting Number Format   to the dollar amounts imported into column A.

 

Use Get & Transform (Power   Query) to load the Contacts table from the file e10c2Contacts.accdb in the Power Query Editor. Use the Power   Query Editor to remove the Income and Dependents fields then load the data in   a new worksheet. 

 

Rename the worksheet Pledge Leads.

 

Use Power Pivot to import the   Transactions table from the Access database e10c1PledgeDollars.accdb into a PivotTable. Place the PivotTable   on a new worksheet named Pledge Dollars. Add the Date field to the Filters area, add   Operator_ID to the Rows area, and add Pledge_Amount to the Values area. Save   the workbook.

 

Create a relationship between   the Operator_ID in the Transactions table and the Operator_ID in the   Volunteer Information worksheet.

 

Insert a 3D Map (Power Map)   using the Volunteer Information zip code (Zip) as the location dimension,   Pledge_Amount as the height dimension, and Operator_ID as the category   dimension. Zoom the plot area as needed to display results.

 

Save and close the file. Submit Exp19_Excel_Ch10_HOEAssessment – PledgeDrive.xlsx   as directed.

strategies of innovation

 

Research a firm that has gone public through an initial public offering in the last five years.

  • Identify the name of the firm, the year the firm went public, and the value of the stock at the time of the IPO.
  • Identify the growth profile of the firm before the IPO as follows:
    • (a) In what way was the firm leading the market with its products, services, or innovation?
    • (b) What was the firm’s growth strategy before the IPO?
  • Identify the growth profile of the firm after the IPO as follows:
    • (a) In what way was the firm leading the market with its products, services, or innovation?
    • (b) What was the firm’s growth strategy after the IPO?

Your one-page paper should cite all research using APA citation format.

Threat Modeling

 A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Homework

 

Discuss in 500 words or more  federated architecture in cloud systems. Remember that this is a cloud class not a database class. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.