Draw a diagram

  

  1. This      is problem 5.13 from your text book. You can use any Free UML tool      (see the list on the Moodle or Visio software tool) You need to draw a UML      diagram for a system.

Consider a hospital’s patient monitoring system. Each patient is connected to machines monitoring blood pressure, heart rate, and EKG. These machines issue a Boolean signal indicating a FAIL or WORKING condition. The results of each of these machined are ‘ORed’ together to form a signal called ALARM. The ALARM signals for each of the rooms (one patient per room) are then ‘ORed’ together and sent to the nurse’s station. If any machine on any patient indicates a failure, the emergency alarm is sounded and the nurse is directed to the appropriate patient and machine. Draw a data flow diagram/ UML diagram for such a system.

COM303 Week 2 Discussion 4

  

Choose one of the proverbs listed in this week’s reading on pages 45-47 and articulate how someone in the non-dominant culture may interpret that message? Is there a proverb, adage, or saying from today that you think speaks from a place of power, from the dominant culture in the United States?  How are non-dominant citizens implicated by that saying?

Research Paper

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Access Control- Crime Prevention Through Environmental Design (CPTED)

 

Topic:  Perform a Vulnerability Assessment of your place of employment or  living area. If you use your work area make sure you inform the Security  Manager to get permission as to what you are doing. If you live in a  gated community inform the security guard of your activities.

Instructions:  Please download the Assignment 1 Vulnerability Assessment template (MS  Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. (click here for link).

For this assignment: The  4 Heading-1s are required. Each Heading-1 must have at least 3  Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once completed name your file: YourName_Assignment_1_Vulnerability_Assessment.docx and  submit to the appropriate assignment folder. 

Resubmission: You may re-submit ONLY if your initial grade is a “C” (70%) or less.

Plagiarism: Zero marks for the first attempt and second attempt will result in failing the course

Assignment 1 Vulnerability Assessment Template.docx 

 

Also review the additional files attached for detailed information on Vulnerability Assessments. 

BE JAA7

 

 Summary:

Pick one of the following terms for your research: Compliance, codes of ethics, ethics officers, formal controls, or ethics audit. 

Instructions

Journal Article Summary & Discussion:

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words-this should be in the 150-200-word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

DISCUSSION: Using 300-350 words, write a brief discussion, in your own words of how the article relates to the selected weekly reading assignment Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format. Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required.

Quatitative Research paper

 Please use APA formatting and include the following information in the article with 600 to 800 words and properly cited.

  1. Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  2. Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researchers trying to explore? What statistical analysis was used?
  3. Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  4. Conclusions:  Evaluate the article in terms of significance, research methods, readability, and the implications of the results.  Does the piece lead to further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.)
  5. References 

Attaching the document for reference.