ET WK3 – S

 Research Paper – 5 Full pages

Contingency Planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.

Your paper should meet these requirements:

  • Be approximately 5 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques

 Wang, H.-M. (2003). Contingency planning: emergency preparedness for terrorist attacks.  IEEE 37th Annual 2003 International Carnahan Conference OnSecurity Technology, 2003. Proceedings., Security Technology, 2003. Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on, Security Technology, 535–543. https://doi.org/10.1109/CCST.2003.1297616 

finanance and blockchain

 

Prepare an 8 page APA style paper using the resources you have read in this course and at least 3 additional peer reviewed resources. Follow the writing requirements for this course. Include an introduction and conclusion in the paper. This paper should address the following questions:

(1) Does Blockchain technology have the potential to cause a shift in financial business practices that many experts are predicting? Explain why or why not. Support your answer with research.

(2) Is there evidence to suggest that Blockchain technology will change the way finance is applied and practiced? If there is, discuss that evidence. If there is not, what issues exist that impede its adoption?

(3) Which functions of financial management could be most impacted by Blockchain technology? How might the financial functions change? Support your answer with research.

Communication audit PPT

 

  1. Pay close attention to the rubric details for each of the following grading criteria as these will serve as your guidelines when preparing your presentation:
    1. Content
    2. Quality of Content
    3. Organization
    4. Written Communication
    5. Visual Aids
    6. Presentation Style
    7. Body Language
    8. Voice
    9. Grammar/Diction
  2. Create a simple thank-you note for your business/organization partner.
  3. Send or present the report to your business/organization partner.
  4. Submit the Audit Report Presentation and the note to the submission folder by the end of the workshop.

 //////////////////////////////////////////////////////////////////

Attached sample PPT. Need one presentation with 6-8 slides

A suitable system to implement. This system must be a data processing system that concerns the creation, storage, management, processing and visualising of a set of data with which you are currently involved.

   

Specification

Introduction

A suitable system to implement. This system must be a data processing system that concerns the creation, storage, management, processing and visualising of a set of data with which you are currently involved. 

This implementation MUST be undertaken using the Python 3 programming language (as per the work you have done in your learning sessions).

Part 1 System Build

Provide a concise written description of your selected data processing system (guideline word count 500 words). This can include diagrams or images if this is required to best support your description. Also, include the user stories that describe the functionality of the system. Whilst this will not directly accrue any marks, it is required to establish if your software implementation satisfies the requirements of the system.

Produce a Python 3 implementation of your chosen system. This must provide the data processing and visualisation relevant to your system and provide a graphical user interface (GUI) to this processing and visualisation.

You must utilise object-oriented programming where appropriate and structure your solution using the module and package approach adopted by good idiomatic Python 3 implementations (also referred to as being Pythonic). It is expected that the structure of your submitted Python project will also reflect this

   

structure, utilising a main project folder (with any necessary sub-folders) and appropriate Python 3 script files.

You are also expected to provide full documentation of the details of your implementation by including appropriate code comments within your Python 3 script files.

Part 2 Automated Testing

Provide a set of automated unit tests (using a suitable Python 3 automated testing  framework  such  as  the  unittest module)  that  exercise  and demonstrate the correct functionality for 4 separate methods taken from a class (or classes) that is involved with part of the data processing in your system. You can choose methods related to any of the CRUD functions. Do not include any method which would require testing of the GUI (this is beyond what was included as part of your learning during the module). Ensure you fully document your test code using appropriate code commenting.

Your automated unit tests must be provided within the Python project in a way that properly separates these tests from the production version of your implementation. Also, the automated unit tests must be able to be run from within the PyCharm Community Edition IDE you have worked with in your learning sessions, using the automated unit testing integration offered by this IDE.

Part 3 System Function Traceability Report

Produce a report that traces the functionality provided in your software implementation back to the specific requirement for that function in your system description. This must be done by mapping the user stories that represent your system requirements to the various classes and methods of those classes that you have implemented in your software solution.

You must also provide for each trace back a short explanation as to how the mapped class and /or method directly contributes to satisfying the “So that…” aspect of the user story involved.

A recommended approach here is to tabulate your mappings so they can be easily traced.

Part 4 Reflective Report

You are to write a short reflective report (guideline word count 500 words) focussing on one future trend in computing and considering how new ideas and theories could be applied in the application domain you have developed for this assignment.

   

You should consider both the potential benefits of the new ideas as well as the inherent complexities and present your reasoned evaluation and conclusions regarding the application of those new ideas within your chosen domain.

If your application is work related, you could conclude your reflective evaluation with recommendations relevant to your employer regarding the adoption, or otherwise, of new advanced computing techniques.

For this reflective report you could consider any one of the following topics or chose any other current computing topic:

  Big Data / Data mining or analytics / Data visualisation

  Artificial Intelligence / Machine learning

  Robotics and Social Interaction

  Virtual or Augmented reality

  Security within Cloud computing

  The internet of things (IoT)

  Autonomous Transportation

  Wearable devices and sensors

You are not expected to reference research papers or present a very technical explanation of the topic – rather you are expected to focus on the advantages and complexities of applying the theory in your application area.

You should start your reflective report with a short description of your chosen topic (250 words or thereabouts would be appropriate for this) before presenting your evaluation of its application.

Citations of web sources for this is perfectly fine but your sources must be correctly cited and a reference list provided (as per the Harvard referencing scheme).

Quotations should be kept to a very minimum and 90% of the words should be your own.

Deliverables

A zipped archive of your main Python project folder which must include all relevant files need to both run your software implementation and run the automated unit tests. Also, include in this archive the word processed document that contains the concise description of the system and the associated user stories  (as  required in  Part  1).  Any details of  further  instructions  or  any additional Python 3 libraries (beyond those in the standard Python 3 installation) must also be provided in a  readme.txt file (to ensure your software implementation can be run). Provide this archive as a single zip file. This archive will be used when you provide your demonstration of your system.

A single word processed document that contains the traceability and reflective reports required for the Part 3 and Part 4 tasks. Make sure this document is

  

clearly organised into titled sections and that any diagrams and images are referenced with a figure number. Ensure it is evident which of these sections relates to which assessment task to avoid any ambiguity when your work is considered during marking. 

Also, ensure you provide any referenced work within this document (as per the normal Harvard referencing scheme).

Discussion 1

Resistance to change is a normal everyday aspect in the workplace.  Note what happens to the organizational climate when this resistance occurs and any tactics to reduce negative connotations when dealing with change.

Note: The first post should be made by Wednesday 11:59 p.m., EST. 

Need it in APA Format 

NO Plagiarism 

1 Page, Remember the APA cover page and the references 

discussion

 

Name the three essential elements of a basic structured cabling network? How are they installed and what are the components that are involved with them? 

Search the peer-reviewed literature to identify its potential impact on networking and what measures can be put in place to minimize the effect. 

For the final project, you will be conducting a forensics investigation using one of the following items: A smartphone A network (ideally, a wireless network)

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

Discussion 1

 Analyze the role of the IT manager in business and create a job description for an IT Manager. Your job description can be for the organization for which you currently work, or one for which you have worked in the past. Your description should include a minimum of six skills that an IT Manager should possess and a minimum of six responsibilities the role will include. In a separate paragraph, explain whether or not you plan to pursue a career as an IT manager. Describe at least one factor that might prevent you from pursuing a management role.

Your initial post must be a minimum of 300 words.

CS

 

This assignment provides you an opportunity to practice

  • writing a program which uses the Serializable Interface.
  • developing a program which will use the read only mode in Java Binary I/O.
  • developing a program which will use the read write (rw) mode in Java Binary I/O. 

Directions

Please solve three (3) programming problems related to the content presented in Chapter 17 in your text. You can find the programming problems in the attached file (Module 8 Programming Problems Worksheet.docx (Links to an external site.)).

  • Download the worksheet and save it as Mod8-Worksheet-Programming-Last-First.docx. For example, Mod8-Worksheet-Programming-Smith-John.docx.
  • Consider the problem, design an algorithm (or algorithms) that would solve the problem, and then implement the algorithm in Java.
  • Create a new folder and name it as Mod8-Java-Programming-Last-First, for example, Mod8-Java-Programming-Smith-John.
  • Write the source code for each problem and save them as .java files in the folder you created. There are three programming problems for this module so you should have three .java files. Name your java files as Mod8Problem#.java, for example, Mod8Problem1.java.
  • Copy data file(s) used for your program and/or output file into the folder. In this module, make sure to include Pledge.txt and Stu.dat in this folder.
  • Please insert the algorithm written in pseudocode as a comment in the beginning of your program.
  • Take screenshots of your running program – you can take screenshots using PrintScreen or any tool that you are familiar with, making sure that the console window in which you run the program appears on the screen.
  • Copy the screenshots in the worksheet. If your program has different outcomes, take screenshots of each variation.

Submission

  • Compress the folder that saves all of your java files as .zip file. Please note don’t save the worksheet in the same folder as they need to be submitted seperately.
  • Submit the following two files as attachments by clicking the Submit Assignment button above.
    • Mod8-Java-Programming-Last-First.zip (including .java files, data files, Pledge.txt and Stu.dat).
    • Mod8-Worksheet-Programming-Last-First.docx.