Executive Program Practical Connection Assignment

Executive Program Practical Connection Assignment on Infotech in a Global Economy

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

 Assignment: 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Do not use prior assignments in the completion of this activity. This is specific to the concepts presented in ITS832 and how you will use them or do use them in your professional lives.

BSA 4

 

Assignment Content

  1. Project implementation is arguably the most exciting stage of the project management process. It is during project implementation that project plans begin to come to life and assumptions are able to be tested and measured in real-life scenarios.

    One of the outcomes of project implementation is a set of deliverables that typically includes a system diagram; a network diagram; a database design document, including an entity-relationship diagram, a data dictionary, and table definitions; a clearly articulated cybersecurity plan; and source code.

    To complete this assignment, you will need to create the following components:

    • A system diagram that shows, in graphic form, the components of your project
    • Your system diagram should follow the system description you submitted in your Week 2 project plan (but may differ based on the research you have conducted since Week 2).
    • You may create your system diagram in Microsoft® PowerPoint®, Microsoft® Visio®, Lucidchart, or a graphics program of your choice.
    • A network diagram that shows, in graphic form, the flow of data within your project
    • Your network diagram should follow the network description you defined in the Week 2 project plan (but may differ based on the research you have conducted since Week 2).
    • You may create your network diagram in Microsoft® PowerPoint®, Microsoft® Visio®, Lucidchart, or a graphics program of your choice.
    • A database design document, including an entity-relationship diagram, a data dictionary, and table definitions, representing all of the data that must be stored and maintained within the context of your project and how that data is organized
    • A clearly articulated cybersecurity plan that explains how you plan to secure project data and processes
    • Source code (may be partial) for at least one software application
    • Your source code may be implemented in HTML/JavaScript, Java, C++, or another programming language.
    • Download and unzip the HTML/JavaScript/CSS sample code files for an example of a partial software application implementation.
    • A quality assurance and software test plan
    • Download the Software Test Plan for an example of what information is typically included and how it is typically organized in a software test plan.
    • Note: All deliverables must be portfolio ready, which means as complete and error-free as possible.

       

cross functional essay

Prepare a 3-5 page essay (excluding cover page, abstract, and references) on the relationships and interdependencies between marketing another functional areas. Follow APA  format with references 

Discussion

 What courses in your educational program address the development of communications skills? What skills do you believe employers are looking for? Do you believe there should be more emphasis on communications skills in your degree program? 

web security

Question 1-  Read this Time article and view the video explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  Include at least one quote enclosed in quotation marks and cited in-line. 

Question 2 –  Semi-literate children in a remote village were given access to a computer and taught themselves molecular biology.  Discuss in 500 words what this says about governments responsibility to break the digital divide.  Include at least one quote enclosed in quotation marks and cited in-line.  

Question 3 – Watch this video about Joseph Shumpeter’s concept of Creative Destruction. For example, many think that the introduction of self-driving cars will disrupt the job market for drivers. 

Discuss in 500 words your opinion on  what you think of the disruptive capacity of the gig economy on the labor market. Include at least 3 quotes enclosed in quotation marks and cited in-line by reference to a list at the end. 

Prioritizing Threats Executive Summary

 

Assignment Content

  1. Based on your completed security overview presentation that was “approved for action,” the team would like more information about the type of threats and challenges that should be addressed. They want to know which threats should be prioritized and the impact they have on the organization. They would like you to:

    • Identify common categories of cybersecurity threats.
    • Prioritize categories.
    • Recommend a cybersecurity category to address with the organization.
    • Identify challenges that mobile and cloud computing needs could bring to the organization.
    • Explain the importance of testing for the detection and intrusion of risks.
    • Write a 2- to 3-page executive summary to share with the executive staff about your recommendations, challenges, and explanations. Include the following in your summary:
    • A chart detailing 8 challenges and their impact
    • Your top 5 prioritized categories with a rationale for the prioritization
    • At least two references supporting your top 5 recommendations
    • Note: This executive summary will also be used in the Week 3 assignment.

       

NS!

1 What is the OSI security architecture?

2 What is the difference between passive and active security threats?

3 List and briefly define categories of passive and active security attacks.

4 List and briefly define categories of security services.

5 List and briefly define categories of security mechanisms.

6 List and briefly define the fundamental security design principles.

7 Explain the difference between an attack surface and an attack tree.

700 word discussion: Looking further into the chapter, theoretical grounds of policy implementation, Buse et al., (2012) When turning theory into practice, the authors stated that it was common for certain observations. What are those observations?

Chapter 16 – Following the chapter reading, the authors assert that the twentieth century is considered as the century of population explosion and fossil fuel burning, environmental policies and the transition to effective use of renewable energy sources as a priority with a strategic focus on specific countries around the world.  In addition, this move has created several different projects whose main focus is to formulate policies associated with climate change and energy governance.  Many of the policies and projects identified aim to support the energy sources switching between fuels like fossils and nuclear power to renewable like solar, wind, and or water.  Specifically, the chapter provides the foundations of policy implementation, and methods as well as investigations of five policy implementation case studies through a comparative analysis. 

700 word discussion: Looking further into the chapter, theoretical grounds of policy implementation, Buse et al., (2012) argue that policy implementation is the execution of a formulated policy – turning theory into practice.  When turning theory into practice, the authors stated that it was common for certain observations.  What are those observations?  

identify, and name those observations,

provide a clear narrative to support your response based on this case study — Not a general definition from the Internet

Information Systems

 Information Assurance (IA) is the practice of safeguarding information and managing risks related to the use, processing, storage, and transmission of information or data, the systems and processes used for those purposes. In financial industry, how does information assurance applied, in assuring that debit and credit card information and other financial information is protected. 

Need 350 to 400 words and 2 references