Assignment and Discussion

 Week 6 – Discussion 

Explain in your own words why you believe planning is important. Select one of the following businesses: a large bank, a government agency, or a hospital, and explain which systems you feel are mission critical. Then explain how the loss of these systems would affect the organization.

Internet Research – WK 6

Go online and search for information about companies that have been harmed or bankrupted by a disaster. Choose one such company and create a brief case study about it. Successful narratives will focus on the manner in which the organization was impacted, including financial losses, losses of sales, or the need for layoffs. Your assignment should be 3-4 paragraphs in length.

 

Week 6 Assignment

  • 6.2 What protocols comprise TLS?
  • 6.3 What is the difference between a TLS connection and a TLS session?
  • 6.4 List and briefly define the parameters that define a TLS session state.
  • 6.5 List and briefly define the parameters that define a TLS session connection.
  • 6.6 What services are provided by the TLS Record Protocol?
  • 6.7 What steps are involved in the TLS Record Protocol transmission?
  • 6.8 What is the purpose of HTTPS?
  • 6.9 For what applications is SSH useful?
  • 6.10 List and briefly define the SSH protocols.

End search 2

Research project manager’s positions and please post the following. Please do not copy and paste from web sites.

  1. Find three different job postings in the area you live in for a Project Manager. What are the items in the three job ads that are the same? Are there any major differences? Also, look up how much a project manager earns in your area. 
  2. In your opinion was any of the information that you uncovered in your search interesting or surprising?

2000 words

Ethical Hacking

 

Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.

Your assignment should be 3-4 paragraphs in length.

Information Governance discussion 7

Chapters 17/18 – From our weekly chapter reading, digital preservation can be defined as the long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required to be retained.  Though this assessment holds true to the authors, business organizations continue to face significant challenges in meeting their LTDP needs, especially those organizations whose primary mission is to preserve and provide access to permanent records.

Q1: Looking forward, the authors concluded that, there is going to be a great need for collaboration between both internal and external stakeholders to develop governance policies and strategies to govern and control information assets over long periods of time, among other requirements.  For this to be achievable, the chapter has identified one most important consideration that must be met.  What is that consideration?  Identify, and provide a brief narrative to support your answer.

Module 2 – SLP, SYSTEM DESIGN AND PROJECT PLANNING

 

This assignment consists of two parts:

Part 1: SLP Assignment Overview

When the requirements and design are completed for a project, the coding can begin. A good first step in development is to use the design to create a prototype, or proof of concept for the system. The prototype helps ensure the validity of the design and demonstrates that the basic concepts in the design will provide the desired solution. For this SLP assignment you will use your Design Document from the Case Study to guide the creation of a prototype for your integrated system.

Part 1 SLP Assignment Expectations

The Prototype should address the following requirements:

  • The prototype should match the overall design created in the Case Study assignment and should provide evidence that the intended design will work.
  • A basic visual interface to support navigation of the program and identify the future functionality of the application.
  • No subsystem functionality is required but stubs to connectivity points for subsystems should be identified and have the ability to perform basic functionality tests.
  • All code should be well-documented with comments.
  • The program should run without significant errors.
  • Include a document called operation.docxthat describes how to operate the application.
    • This document should provide sufficient information to allow the instructor to set up and operate the application.
    • Identify any external system requirements
    • Key parts of the application should be identified (i.e., tell the instructor where to find the important parts of the application).
    • This document should also provide a summary of how the prototype shows proof-of-concept for the project.
    • Include a section called STATUS with a summary of the current status of your project including problems encountered and how they will be addressed. Be sure to contact your instructor if you need help addressing any issues.

Part 2: SLP Assignment Overview

For this SLP assignment you will submit the Alpha version of your project. An alpha version of an application will have the major functionality operational but not fully completed. The purpose of the Alpha version is to ensure the major functional components of the application will work as intended. Your alpha version should have connections established to all outside components and internally developed functionality should be operational at a least a fundamental level.

Part 2 SLP Assignment Expectations

The Alpha version should address the following requirements:

  • The application should match the design created earlier in the course with the exception of any changes required to address problems or conform to a revised timeline.
  • All major functionality should be operational at least at a minimal level.
  • Connections to outside components should be functioning at a basic level to prove they will work for the final version of the application.
  • The visual interface should provide access to all major functions of the application.
  • There should be a demonstrable, functional connection to the required database for the project.
  • All code should be well-documented with comments.
  • The program should run without significant errors.
  • Include a document called operation.docx that describes how to operate the application.
    • This document should provide sufficient information to allow the instructor to set up and operate the application.
    • Identify any external system requirements
    • Key parts of the application should be identified (i.e., tell the instructor where to find the important parts of the application and changes that have been made since the last submission).
    • Include a section called STATUS with a summary of the current status of your project including work performed since the last submission, problems encountered and how they will be addressed. Be sure to contact your instructor if you need help addressing any issues.

Please submit all required project files and documents for grading. Do not zip the files together, you might experience problems submitting the assignment

Journal Article Analysis

 Select any one from the below key terms.

Key Terms:

  • Styles of Negotiation
  • Anchoring in Negotiation
  • Mediation
  • Arbitration

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions

Physical security 6

 Subject name: Physical Security

Provide a reflection of at least 500 words (or 2 pages double-spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories, and knowledge could be applied to an employment opportunity in your field of study. 

REQUIREMENTS:

Provide a 2 page double spaced minimum reflection (i.e. no less than 2 full pages of content). This does not include the required APA Cover Page and reference page.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

Project Computer Science

Projects 200-400 words.
  1. Using the Internet as a resource, research multiple file systems for hard disks supported in Windows, such as MS DOS’s FAT file system, the 32-bit FAT file system, and the NTFS file management system. Submit your findings in a report.
  2. Compile a list of various data-compression techniques that are commonly employed in today’s computer systems. Which of these techniques is the most efficient? That is, which of these techniques has the maximum gain in storage space with the least effect on processing time?
Additional Resources
  1. MFD-Master File Directory: http://www.boogles.com/local/papers/tcfs-thesis/subsection2_7_2_2.html
  2. Data Compression: http://www.cisco.com/c/en/us/support/docs/wan/data-compression/14156-compress-overview.html
  3. Variable-length records: http://www.ibm.com/support/knowledgecenter/SSB27U_6.2.0/com.ibm.zvm.v620.dmsa5/hcsd2c10242.htm
  4. ISAM Databases: http://www.mixsoftware.com/product/db/intro1.htm
  5. International Organization for Standardization: http://www.iso.org/iso/home.html