Security assessment vs Security audit, explain briefly the differences and similarity if any ?
Discuss what performance management is and how it influences effective teams
After completing the reading this week, we reflect on a few key concepts this week:
- Discuss what performance management is and how it influences effective teams.
- Review table 11.1, define leadership behaviors (in your own words) and note which behaviors are beneficial at specific organizational activities (example: project planning, leading coworkers, etc…). Please note at least five organizational activities and be specific when responding.
- Note at least two organizational capabilities and compare and contrast each.
Please be sure to answer all the questions above in the initial post.
Please ensure the initial post and two response posts are substantive. Substantive posts will do at least TWO of the following:
· Ask an interesting, thoughtful question pertaining to the topic
· Expand on the topic, by adding additional thoughtful information
· Answer a question posted by another student in detail
· Share an applicable personal experience
· Provide an outside source
· Make an argument
At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread. Please ensure to use information from your readings and other sources from the UC Library. Use APA references and in-text citations.
System analysis and design
Briefly describe the System analysis and design in Computer science
Discussion help
After reading Chapter 8 discuss the importance of the personnel assigned to the Disaster Recovery Team and their role. You can use outside research, or your personal work experiences as your basis for discusson.
Note – attached text book
Exploring Multiple Levels of Dependencies
In this Task, we want to explore the dependencies of a project. The steps to follow are:
- Download the “OWASP Juice Shop” project source code and extract the zip file.
- Browse to http://npm.broofa.com.
- Find the “package.json” file in the Juice Shop source code and upload the file to the tool for analysis.
Observe the generated dependencies tree for this application. Note that there may be more than one path to a particular dependency; there are different levels of dependencies for a module to work. Use this dependencies tree as a sample and discuss how having multiple levels and paths of dependencies can affect the security of an application. Also, what do you think about remediation challenges in an application with a complex dependencies tree similar to this example?
write your analysis,/ Not more than One page/
Homework
Culture is an ongoing negotiation of learned patterns of beliefs, attitudes, values, and behaviors.
List some of your personal, social, and cultural identities. Are there any of these that are interrelated? In what way? For your cultural identities, which ones are dominant and which ones are nondominant? How does a person navigate between two cultural identities?
How does your personal, social, and cultural identities impact you as a communicator and as a listener?
Assignment
DEVELOPING INTIMACY WITH YOUR DATA
This exercise involves you working with a dataset of your choosing. Visit the Kaggle website, browse through the options and find a dataset of interest, then follow the simple instructions to download it. With acquisition completed, work through the remaining key steps of examining, transforming and exploring your data to develop a robust familiarisation with its potential offering:
Examination: Thoroughly examine the physical properties (type, size, condition) of your dataset, noting down useful observations or descriptions where relevant.
Transformation: What could you do/would you need to do to clean or modify the existing data to create new values to work with? What other data could you imagine would be valuable to consolidate the existing data?
Exploration: Using a tool of your choice (such as Excel, Tableau, R) to visually explore the dataset in order to deepen your appreciation of the physical properties and their discoverable qualities (insights) to help you cement your understanding of their respective value. If you don’t have scope or time to use a tool, use your imagination to consider what angles of analysis you might explore if you had the opportunity? What piques your interest about this subject?
(You can, of course, repeat this exercise on any subject and any dataset of your choice, not just those on Kaggle.)
Assignment Link: http://book.visualisingdata.com/chapter/chapter-4
Assignment Length (word count): At least 500 words (not including direct quotes).
Question answer from the book
Textbook Exercises
Chapter 5 Hashed Data Structures
1, 5, 9, 10, 11 (a)(b), 25, 26, 28
Chapter 6 Recursion
2 (a,b,c,d), 11(a, b, c, d)
Practical connection paper
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
NOTE: I am working as a Software Developer in and Insurance company. Please relate the skills and theories that have applied of this course in the current work.
5 computer discussions due in 24 hours
5 discussions
50 words each
Topic 7 Discussion & Attendance Activity: What to Expect in an IT Career
INSTRUCTIONS:
- Respond to the below topic in a minimum of 50 words. (5 points)
- Reply to at least 1 of your classmates. Be constructive and professional in your responses. (5 points)
Your participation in this online activity will count toward this week attendance.
What to Expect in an IT Career
Working in the technology field, please keep in mind that you work in a support capacity. Do your best to be helpful, resolved the issue the first time, and deliver as promise. One of the most important ways to achieve customer satisfaction is to do your best by being prepared, both technically and personally.
View the below YouTube video.
Play Video
In the role of technical support to users, what do you think is your strongest social skill that would help you succeed in this role? What is likely to be your greatest interpersonal weakness that might present a challenge to you in this role? What is one change you might consider making that will help you to improve on this weakness?
Topic 9 Discussion & Attendance Activity: Microsoft Word
INSTRUCTIONS:
- Respond to the below topic in a minimum of 50 words. (5 points)
- Reply to at least 1 of your classmates. Be constructive and professional in your responses. (5 points)
Your participation in this online activity will count toward this week attendance.
Microsoft Word – Tips and Tricks
Many of you may have some familiarity with word processing software, and even with Word. People who use word processing software can be casual users who use commands as they find them, or power users who understand the power of the program and who learn more about each command and how it can be used.
View the below YouTube video that share 25 Word 2016 tips and tricks.
Play Video
Did you discover any new tips using Microsoft Word from the above video?
https://www.youtube.com/watch?v=EYu3yyzdvck&feature=youtu.be
Topic 10 Discussion & Attendance Activity: Microsoft Excel
INSTRUCTIONS:
- Respond to the below topic in a minimum of 50 words. (5 points)
- Reply to at least 1 of your classmates. Be constructive and professional in your responses. (5 points)
Your participation in this online activity will count toward this week attendance.
Microsoft Excel – Tips and Tricks
Excel has more to it that meets the eye. At first glance it looks like a program to make charts, graphs, and other types of charts. One of the best features is its ability to use math formulas. This feature is helpful if you’re making any type of finance spreadsheet. With the right formulas, you can have Excel automatically add, subtract, multiply, divide, find the range, or just the sub total of any data entered in the cell(s). These formulas automatically update, so you can add data to your spreadsheet and know that it’s going to give you the right total(s) without you having to format it every time.
View the below YouTube video that share 25 Word 2016 tips and tricks.
Play Video
How many of you have already used Excel? What did you use it for? What features did you like? What did you dislike about it?
Topic 11 Discussion & Attendance Activity: Microsoft PowerPoint
NSTRUCTIONS:
- Respond to the below topic in a minimum of 50 words. (5 points)
- Reply to at least 1 of your classmates. Be constructive and professional in your responses. (5 points)
Your participation in this online activity will count toward this week attendance.
Microsoft PowerPoint
PowerPoint is a great tool that can help communicate ideas effectively. With PowerPoint, you can create notes for the speaker and handouts for the audience, as well as presentations.
View the below YouTube video on PowerPoint Do’s and Don’ts
Play Video
Discuss the general functions, benefits, business value, and practical uses of Microsoft PowerPoint.
Topic 12 Discussion & Activity: Identity Theft
INSTRUCTIONS:
- Respond to the below topic in a minimum of 50 words. (5 points)
- Reply to at least 1 of your classmates. Be constructive and professional in your responses. (5 points)
Your participation in this online activity will count toward this week attendance.
Protecting Yourself from Identity Theft
The fastest growing crime in the United States is identity theft. More than nine million people fall victim each year, with the unauthorized use of an existing credit card accounting for much of the problem. The National Crime Victimization Survey reports that household identity theft losses amount to more than $13 billion each year, and that figure does not account for the aggravation and time required to repair the accounts.
Watch the below YouTube video
Play Video
Do you know anyone who has been a victim of identity theft? What steps will you take to protect your identity?