Preview the document

COMPUTER SCIENCE

 

Read the Orlando Marathon Case StudyPreview the document, found in this week’s module. Then respond to the following questions by due date listed in the syllabus:

  1. Consider  the responsibilities of risk management programs and risk in volunteer  management. What steps should be taken to prepare for the event in  compliance with the responsibilities of risk management programs and in  the aftermath of the Boston Marathon events. Assume that terrorism  threats on this event would be extremely heightened.
  2. What are all of the risks that you need to consider for the organization and for volunteers?
  3. In  what ways would you approach each of these risks? (Think about  elimination, reduction, assumption, transfer, etc). Explain your  rationale.

By the Saturday following the due date listed on  the syllabus at 11:59pm, respond to at least 1 other student. Do you  agree with the steps they selected to prepare for the event? Are there  risks they did not identify that should be included? 

week8-550

 

Chapter 13 covers the various business and IT organizational models

Chapter 13

Read Chapter 13 and answer the following questions:

  1. Describe the differences between the centralized and decentralized business model.
  2. Describe the differences between the centralized and decentralized IT model.
  3. Which organizational variation provides the best environment for taking advantage of the SOA framework? What makes this variation advantageous?
  4. Does a decentralized IT model work within the SOA framework parameters? Why or why not?
  5. Is it possible to adopt SOA principles in a decentralized business model?

week 2 group discussion

  400 words

This assignment should be in APA format and have to include at least two references.

What happens when we place the authentication system in our demilitarized zone (DMZ)—that is, in the layer closest to the Internet? What do we have to do to protect the authentication system? Does this placement facilitate authentication in some way? How about if we move the

authentication system to a tier behind the DMZ, thus, a more trusted zone? What are the implications of doing so for authentication performance? For security? 

paper

References:    Pinto, J. (2019). Project Management: Achieving Competitive Advantage(5th ed). Boston: . Pearson. 

write 500 words

 

provide a graduate-level response to each of the following questions:

  1. What are the practical implications internally (in terms of team motivation) and externally (for the customer) of making overly optimistic project delivery promises?

2.Consider a project to build a bridge over a river gorge.  What are some of the resource constraints that would make this project challenging?

3.It has been argued that a project schedule that has not been resource-leveled is useless.  Do you agree or disagree with this statement?  Why or why not?

………………………………………

write in new doc

 Activity 6

Case Study 11.1: It’s an Agile World

This case illustrates a common problem in software and IT development, where programmers and IT staff are anxious to lock in specifications as early as possible so they can “get to work” without having to worry about invasive or disruptive input from the end users.  Unfortunately, what typically happens is that the finished product is not what the users needed or thought they needed and a long list of fixes and modifications are needed to make it work correctly.  This case is based on a true story in a hospital IT department that routinely struggled with these sorts of user conflicts until they sifted to an Agile methodology.

Questions

  1. Why does the classic waterfall project planning model fail in this situation?  What is it about the IT department’s processes that leads to their finished systems being rejected constantly?
  2. How would an Agile methodology correct some of these problems?  What new development cycle would you propose?
  3. Why are “user stories” and system “features” critical components of an effective IT software development process?
  4. Using the terms “Scrum,” “Sprint,” and “User stories,” create an alternative development cycle for a hypothetical software development process at Northwest Regional Hospital.

Case Study 12.2: “First Come, First Served”: Resource Challenges for Sunrise Restoration

This case is intended to highlight the challenges in resource assignment, particularly in the common cases where project managers within the same firm are competing with each other for the use of scarce and valuable human resources to accomplish their tasks.  Without clear guidance from top management and a valid priority system, the ability to acquire resources is often the result of chaotic bargaining and negotiation among equals. This case is based on a real situation and the outcomes were very much in line with the way they are described in the case.  The business owner did not want to simply invest in more resources for fear that they would be underutilized.  He much preferred the system of negotiating among his project managers, even if that led to inefficient utilization of the resources that were available.  Students can be asked to take the side of the owner or Tyler to debate the options that Sunrise can use to manage its resources.

Questions

  1. Describe some of the resource constraints that Sunrise and its project managers are facing.
  2. Is Sunrise’s current model of prioritizing resource assignments viable?  Why or why not?
  3. How could technology alleviate some of Sunrise’s resource management issues?
  4. Would Tyler’s suggestion to hire additional technicians and purchase more equipment solve the resource problems at Sunrise?  Why or why not?

Discussion 13

FORUM DESCRIPTION

Chapter 10 discusses situational awareness. Much of the security efforts of the past have been centered around prevention and protection. The increasing sophistication of cyber attacks have shown that no controls are 100% effective, and some compromises do occur. There is a rising realization that in addition to considering prevention and protection, controls that address detection and response are necessary to improve security posture. Please describe how situational awareness is a driver for detection and response controls. 

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, describe how situational awareness is a driver for detection and response controls.  

B) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.
 

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)

Network

Identify a network that you are familiar with at home or at work. List at least 3 hardware components. What do they each do? You do not need to cite and reference but you do need to explain how they are used.  

500 words.

project

Assignment 2

DEVELOPING INTIMACY WITH YOUR DATA

This exercise involves you working with a dataset of your choosing. Visit the Kaggle website, browse through the options and find a dataset of interest, then follow the simple instructions to download it. With acquisition completed, work through the remaining key steps of importing, exploring and examining your data to develop a robust familiarization with its potential offering:

Thoroughly examine the physical properties (type, size, condition) of your dataset, noting down useful observations or descriptions where relevant.

What could you do/would you need to do to clean or modify the existing data to create new values to work with? What other data could you imagine would be valuable to consolidate the existing data?

Using a tool of your choice (such as Excel, Tableau, R) to visually explore the dataset in order to deepen your appreciation of the physical properties and their discoverable qualities (insights) to help you cement your understanding of their respective value. If you don’t have scope or time to use a tool, use your imagination to consider what angles of analysis you might explore if you had the opportunity? What piques your interest about this subject?

(You can, of course, repeat this exercise on any subject and any dataset of your choice, not just those on Kaggle.)

Getting Started with R Tool

Complete this tutorial to assist with the assignment

· Data Importing Using R – http://www.r-tutor.com/r-introduction/data-frame/data-import

· R Data Type – http://www.r-tutor.com/r-introduction/basic-data-types

· R Data Vectors – http://www.r-tutor.com/r-introduction/vector

· R Data Frame – http://www.r-tutor.com/r-introduction/data-frame

· Data Import – http://www.r-tutor.com/r-introduction/data-frame/data-import

· Data Statistic – http://www.r-tutor.com/elementary-statistics