Course name: InfoTech Import in a Strat Plan

Course Reflection:

During this session, we looked at several topics on Strategic IT planning and strategy

We examined researchers, models, and issues in the area, and as you get closer to starting your own dissertation, you will need to choose a topic in your first dissertation class DSRT-736, so it is essential to start preparing. 

This week, let us take a look at some topics to consider, and by the end of the week, we could have several ideas for dissertation topics.

Since you have already examined several research articles, another way would be to examine previous dissertations in these areas.

Visit the University of Cumberland’s library, go to the Dissertation Database, and locate an interesting topic on IT atrategy, or examine a model presented this term.

Here are some pointers that will help critically evaluate some viable topics.
• Is the topic attainable for a first-time dissertation student?
• Is the problem rooted in the literature?
• Is the research empirical, i.e., is there a survey, is there an interview guide, has the data been analyzed via some statistical tool?
• Is there a theoretical model or framework discussed?
Discuss the topic, the problem the model has been used in the research, and any present findings.

Do not read the entire dissertation, as the abstract and chapter one introduction should give a clear understanding of the research.

Part II: Trees

  

Task Background: Graphs and Trees are useful in visualizing data and the relations within and between data sets. Conversely, it is also important to be able to represent graphs as databases or arrays, so that programs for processing the data can be written. 

Part I: Adjacency Matrix and Shortest Path 

Construct a graph based on the adjacency matrix that appears below. Label all nodes with indices consistent with the placement of numbers within the matrix. 

⌈ 0 6 0 5 0⌉ 

| 6 0 1 0 3 | 

| 0 1 0 4 8 | 

| 5 0 4 0 0 | 

⌊ 0 3 8 0 0⌋ 

Describe the graph and why it is consistent with the matrix. 

How many simple paths are there from vertex 1 to vertex 5? Explain. 

Which is the shortest of those paths? 

Part II: Trees 

Construct and describe a tree that indicates the following: 

A college president has 2 employees who answer directly to him or her, namely a vice president and provost. The vice president and provost each have an administrative assistant. Three deans answer to the provost, and the heads of finance and alumni relations answer to the vice president. Each dean oversees three department chairpersons, and each department chair oversees several faculty in each of their respective departments. 

Suppose that the professional correspondences are the same as above, with the addition that there is also a direct working relationship between the college president and the head of alumni relations (it is not necessary to draw this). Would the graph still be a tree? Why or why not?

database and computer expert needed

I need experienced and professional computer science writers who have worked on database work before. Please chat with me in case you are good enough to handle it. I need to deal with the writer and not middlemen. The work needed within 24 hours time frame

Operational excellence

 Practical connection assignment (3 pages): 

This week select an organization that has a Global platform (they operate in more than one country), that has demonstrated operational excellence.  In this paper, perform the following activities:

  • Name the organization and briefly describe what good or service they sell and where they operate. Consider using an organization that is in an industry where you work or want to work. (Exclude the use of Apple, Amazon, Facebook/Meta, Microsoft and Google).
  • Note how they are a differentiator in the market.
  • Note the resources used to ensure success in their industry (remember resources are comprised of more than just people).
  • Explain what actions the company took to achieve operational excellence.

Discussion: (250-300 words)

 This week we focus on some additional terms for IT users.  This week lets discuss what a community of practice is.   Why are they important and how can they impact the culture within an organization? 

Assignment: (1 page)

 Information Systems for Business and Beyond Questions:

  • Chapter 13- study questions 1-10, Exercise 1 (2, 4)

Information Technology and Organizational Learning Assignment:

  • Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter).  Reflect on the various challenges are present in the digital era.  Will things get better or more complicated as times goes on?  Explain.  What are some methods to assimilate new generations into the workforce to think about competitive advantage?

Short answer Assignment

 Discuss the importance of Information Protection. What are the consequences for not protecting the organizational or personal data and information?  

In your opinion, has the importance or emphasis on information security increased or remained the same in the organization you work for? 

Why do you think this has happened? 

Computer and Information Networking

 

please write in separate pages 250 to 300 words, two references

sometimes a big picture can help to give an idea of what is going on in a particular subject area.  Examine Figure 1-1 (Page 10 PowerPoint slides chapter 1)

 1).  Explain your basic understanding of WAN to WAN connections, LAN to LAN connections, and WAN to LAN connections. Explain how networks intercommunicate.   Also explain the terms server, bridge, router, hub, node, communications network, and communications line. 

……end…… topic 1

please write in separate pages 250 to 300 words, two references 

 2)  Explain analog and digital signals.  Which one is better and why? Justify your answer. Discuss technologies that have gone from analog to digital. 

Computer and Information Networking

Assigment : 2 pages

(1) Suggest how a development team might avoid feature creep when “it is” to be in agreement with “a team” faced with many different suggestions for new features to be added to a product.

(2) Explain why domain knowledge is important when identifying and designing product features.

(3) What do you think are the weaknesses of user stories when used to identify system features and how they work?

Project 2: Troubleshooting and Tool Report

 

The SITREP (Situation Report) Sample Report is provided so that you can understand what Cyber Command is expecting in your report. Your report will vary depending on the problem and tool selected.

Select one of the seven network problems and develop a troubleshooting and tool report that details the solution.

  1. On Day 2 of full operational capability (FOC), our connection to the internet was becoming intermittent. We could establish connections to our globally hosted servers some of the time. The connection would drop at seemingly random periods and we don’t know why. We have experienced this day and night, and it has been consistent for the past three days.
  2. When our connection to the internet is working, we seemingly cannot reach out to our globally dispersed servers from our hosts. We use the globally dispersed servers for command and control and must be able to connect to them. We need a method to determine where the packets are going and why they are not reaching their destination. Because these servers are globally distributed, we can’t just pick up and deploy to them.
  3. Our internal network servers are also spotty. Sometimes they are up, and sometimes they are down. For example, the DHCP server appears to provide IP addresses to hosts that are turned on sometimes, but other times when the host is turned on, it receives an Automatic Private IP Address (APIPA). These hosts can communicate with our networked hosts locally, but they can’t reach out to our global servers. These hosts enable our persistent engagement capability, so they must be functional, and we need to determine the problem ASAP!
  4. We have a team that can troubleshoot from afar, but the members are located 25 miles west of this location. We have one of the tech support personnel deployed on site, but there are just too many issues for one person. The support team that is 25 miles west is centrally located to support multiple operational outfits. That team has a virtual private network (VPN) and secure access to our internal servers. At times, support team members need to determine which of our hosts are functioning. We use both Microsoft Windows and Linux operating systems, but we don’t know what tool will help determine host functionality from afar.
  5. This next part is classified, but I need your help, and I need it fast. Bottom line, we believe there may be an insider threat. At times, we have reason to believe a nonapproved device is connecting to the network and reaching out to the internet. We need a method to determine what devices exist on the same subnet of our network. What can help us do that?
  6. When we begin operations in 72 hours, it will be of utmost importance for us to know what device name is associated with what IP address. This will allow us to know what exists internally and what we need to defend should the adversary begin operations against us. We need to understand what options exist to achieve this task.
  7. When we first arrived and established our connection to the internet, we noticed inbound connection requests. What tool can we use to determine if any adversary is reaching into our systems through a particular port or protocol?

Your report should be about a page in length and address the following:

  • Choose and restate one of the problems identified as you understand it and explain why it is a problem.
  • Describe how you would apply the steps in the Network+ troubleshooting model to this problem.
  • Name and provide a brief overview of the tool that could solve this problem (refer to Lesson 17 in uCertify).
  • Describe how the tool can be used to solve similar problems in the future.
  • Provide a detailed overview of the tool’s functionality and options.
  • Include a screenshot of your selected tool from the appropriate uCertify lab.

How Will My Work Be Evaluated?

Troubleshooting refers to the process of identifying problems with a network through a rigorous and repeatable process and then solving those problems using testable methods. An important part of your duties in the networking field will be to troubleshoot and solve problems. In fact, most of your time will be spent with this focus to include optimizing performance. Networks are dynamic in implementation and are built to be resilient, but problems arise due to many unforeseen reasons. Developing the knowledge, skills, and experience to successfully troubleshoot and recommend solutions will show you are value-added to the organization.

For this assignment, you are asked to review a scenario, understand the problems, apply your knowledge and skills gained in this class, and propose a solution. Use the template provided and complete the assignment. An example solution is provided for you.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.
  • 1.3.5: Adhere to required attribution and citation standards.
  • 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 10.1.1: Identify the problem to be solved.
  • 13.1.1: Create documentation appropriate to the stakeholder.

When you are finished, delete the instructional text from the template before you submit. Click “add a file” to upload your work, then click the Submit button.