Discussion 1- Planning Project

Assigned Readings:Chapter 1: Project Management: Past and PresentChapter 2: Project Management OverviewChapter 3: The Project Life Cycle (Phases)Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. How does the application of a phased approach to project management vary in different industries? Do you think that the phases work the same in construction as they do in event management or software development?
  2. In what ways can the following activities be seen as projects? In what ways do they resemble ongoing, routine business activities? Feel free to add assumptions and details to describe how the activity might be a project in one context and routine in another. 
    1. Reading the chapter before attending a university lecture.
    2. Taking the bus to work each day.
    3. Piloting an aircraft between Vancouver and Fiji.
    4. Teaching a course for the first time; teaching the same course every semester.
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text-

Title: Project Management 

Subtitle: https://opentextbc.ca/projectmanagement/ 

ISBN: 978-1-77420-013-1 

Authors: Adrienne Watt 

Publisher: BCcampus 

Publication Date: August 14, 2014 

Edition: 2nd Edition

Research Paper (4.5 Pages)

After reading the required articles this week, please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

H2LoginPage JAVA Required

This assignment requires students to follow the slides of H2LoginPage.pdf and complete the tasks below:Follow the steps as illustrated in H2LoginPage.pdf to create a Login Page, with the solution name “LoginPage” being prefixed by the initials of your given and family names. For example, the solution name needs to be jsLoginPage if the student’s name is ***** *****.

Modify the function okButton_Click() and write C# ***** to allow the modified function to check if a password ***** ***** A valid password ***** have at least six characters with both letters and numbers. In addition, the password ***** start with a letter, and cannot contain characters other than letters and numbers.

While the “Cancel” button still terminates the application, the “OK” button produces the following different messages according to user input:

“Please fill in all slots.” if one or both of the slots are empty;

“Thank you for providing the input.” if the password ***** the requirements;

“A valid password ***** to have at least six characters with both letters and numbers.” in all other cases.

Package the folder containing all files of your solution and submit it online before due.

Hints: please check ASCII table for the code range of letters and numbers, and refer to http://msdn.microsoft.com/en-u… C# ***** codes using string.chars properties.

BaseToDecimal coding in Java

 

Write a program given a number in any base (base 2 to base 16) and rounds that number to a

specified place. Rounding up occurs when the digit to the right of the rounding place divided by the

number’s base is 0.5 or more. For example, 0.12468 rounded to 3 places is 0.125 because 6 divided by

8 is greater than 0.5; when rounded to 2 places, it’s 0.13 because 4 divided by 8 is 0.5; and it’s 0.1

when rounded to 1 place because 2 divided by 8 is less than 0.5. Input from the keyboard three (3)

values: a number, the base of that number, and the number of places to be rounded. Assume the

numbers entered will have at least one digit to the right of the place to be rounded and at least one digit

to the left of the decimal point. Also, assume the rounding place will never be 0 (round a whole

number). For each input, output to the screen the number rounded to the given number of places. Do

not output any digits beyond the rounded place. Finally, ask the user if he/she wishes to run the

program again (check case). Refer to the sample output below.

Sample Run:

Enter the value: 0.11101

Enter the base of the number: 2

Number of decimal places to round: 4

The resulting value: 0.1111

Run again (Y/N): y

Enter the value: 35.4321

Enter the base of the number: 7

Number of decimal places to round: 3

The resulting value: 35.432

Run again (Y/N): N

Assignment

  

Week 1: Assignment #1

Instructions

1. Please read these two articles: 

· Using forensics against a fitbit device to solve a murder:  https://www.cbsnews.com/news/the-fitbit-alibi-21st-century-technology-used-to-help-solve-wisconsin-moms-murder/

· How Amazon Echo could be forensically analyzed! https://www.theverge.com/2017/1/6/14189384/amazon-echo-murder-evidence-surveillance-data

2. Then go around in your residence / dwelling (home, apartment, condo, etc) and be creative.

3.  Identify at least five appliances or devices that you THINK could be forensically analyzed and then identify how this might be useful in an investigation. Note – do not count your computer or mobile device. Those are obvious!

4. I expect at least one paragraph answer for each device. 

Why did I assign this? 

The goal is to have you start THINKING about how any device, that is capable of holding electronic data (and transmitting to the Internet) could be useful in a particular investigation! 

 Due Date

This is due by Sunday, May 10th at 11:59PM

Activity to do

 

Locate at least 2 websites (NOT WIKIPEDIA because it is not considered reliable; anyone could post false or inaccurate data) that contains one or more articles that present a side-by-side comparison of two iPhone 12 products (4 have just come out or are about to be released). 

Evaluate the effectiveness of the product comparison by considering the questions listed below and then write a summary of your findings in 4 paragraphs (at least 5 sentences each).

1. Which CRITERIA are used to compare the products?

2. What additional criteria could have been used?

3. Did the method(s) produce an objective or subjective result?

4. Do you agree with the results? Why or Why not?

INCLUDE (at bottom of paper) the websites and articles you referenced (list citations/where you could information from a valid website).

whale of problem

Q1:

If you were working for or with sea world’s strategic communication team, How would you respond to the allegations cited in the documentary? be specific in describing your recommended communication strategy and tactics.

Q2:

why would you believe sea world decided to shift its business and communication strategy and tactics month after the airing of blackfish of CNN? what do you think of sea worlds announcement that it will end its traditional orca shows at the sea world san Diego park? should it  end the shows at its other two parks as well ?

Q3:

Do you believe that sea worlds reputation campaign will have desired effect of strengthening the company reputations and improving  its relationship with stakeholders, particularly customers and business partners ? why or why not ? what do you think of tactics being used in this campaign ?

CIS109-Discussion 5

  

  • Our readings this week focused on computer networking. We learned about networking protocols and standards and how they are used to move data across the Internet. What are some types of technology might you encounter in your chosen field that will use these networking protocols and standards? As a business professional, why do you think it is important to understand networking protocols and standards?