Graduate research jan 31

Assignment Content

  1. STOP!  Have you watched the two, past assigned, short videos on APA 7 Title Page and References Page? If not, you must do that first, because this submission requires both.    In class today, you were asked to find your first research article that explores your approved research question. (DO NOT ATTEMPT THIS ASSIGNMENT UNLESS YOU HAVE COMPLETED THE PREVIOUS ASSIGNMENT and gained approval: Brainstorming and Research Question.)   For this assignment, I want you to create a single, APA 7-compliant, Word document. To earn full credit, you must do the following: 
    • Page 1 = 20 pts: Proper APA 7 Title Page (watch the video and see p. 31 in the Foundations text to help you create a perfect title page)
    • Page 2 = 60 pts (breakdown below): Simply answer the following questions
    • (1) What is your approved research question from the Brainstorming Research Question HW assignment? (5 pts) 
    • (2) What is the title of the research article you found? (5 pts)
    • (3) Does the article contain the methodology the researchers used to conduct the study/research? To get full credit, you must (a) name the methodology, (b) cut and paste the paragraph from the article that details the methodology, AND (c) highlight indicator words(30 pts)
    • (4) Does the article contain findings or results of the research? To get full credit, you must (a) cut and paste excerpts from the article that detail the findings (go to Discussion section or at times Conclusion), AND (b) highlight specific words that detail the findings(20 pts)
    • Page 3 = 20 pts: Create a proper APA 7 References Page with your ONE research article (refer to the video and see pp. 33-34 for the FORMAT you must use to create your reference and p. 32 for a perfect sample of what a References Page looks like.)

Conducting and Reporting an IT Infrastructure Compliance Audit Responses

Provide (4) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1, 2, 3 and 4 below. Ensure you list and break down each response in a word document, along with its reference. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. 

Click on ATTACHED file for the instruction and responses.

Respon

 Please see the attached word document and responses to person 1 and person 2 based on their discussion. 

Respond to your 2 people:

  • Respond to at least two people, constructively commenting on their critical analysis of risks in relation to “Hintel,” and the risk management framework they have chosen and why.

  • Provide sensitive and insightful feedback, encouraging further dialogue through open-ended questions.

Forensic

part-1

Your organization suspects that they have a malware infection somewhere in the environment. List several ways you could detect the infected system(s). What is the most practical means you can devise to identify the infected system(s)? What was one other means you initially considered but rejected? Why did you reject that method?

Provide a paragraph each for the list of ways to detect infected systems, the most practical means you found, and a rejected means and why it was rejected.

part-2

Based on the knowledge you have achieved thus far in this class, compose a minimum 2-page, double-spaced expository essay using the current APA version with a title page and reference page detailing what career-building networking and advancement skills you could utilize as an IT professional and describe how you will use this knowledge in your present or future career. For example, you could find and get involved with local security associations and learn about the opportunities in your area. Example associations would be IEEE, ISSA, ASIS, Infragard, (ISC)2, and the AISP. Most have membership discounts for students. Include any information you can find out in your lab. Provide at least four ideas and explain thoroughly. You must have at least two references.

Portfolio Section 2 (Connection with other fields)

Section 2 asks you to demonstrate that you can integrate other fields of work into your core engineering.

What is “another field”?  

We’re talking about other disciplines. Not another programming language, not databases….these are work that would cross all fields. “Another field” is 

1. Another engineering field

2. A science field (biology, chemistry etc) 

3. Math or Statistics

4. etc

(My major is computer science.)

(Page 8-9 of the file is an example.)

Write a program to display

  

(C program)

Write a program to display the duplicate values in an array.

Description of what the program does

 

Summary of the problem’s specifications and assumptions

 

Parameters

 

Algorithm(s) used (including any special notes)

 

Output (any print statements, files created, etc.)

 

Return values (does it return any parameters?)

Java Program

 

Write a super class program called lastNameFirstNameInitialSuperPgm3 containing:
  a) methodOne   that accepts one int and can not be inherited displaying the
                 the int value received.
  b) methodTwo   that accepts two strings and displays I am super methodTwo   
  c) methodThree that accepts nothing and displays I am super methodThree   
  

2) Write a sub-class named lastNameFirstInitialSub1
  that inherets all methods from your super class in question 1 ( lastNameFirstNameInitialSuperPgm3 )


3) Write a sub-class program called lastNameFirstInitialSub2 containing
  all inheritable methods from your super class in question 1 ( lastNameFirstNameInitialSuperPgm3 )
  overloading methodTwo by displaying "Hello I am sub class Two"