312 Course Reflection

  As your study in this course (Data Structures and Algorithms in Programming) draws to a close, it is important to step  back and reflect on new levels of understanding, skills, and knowledge  that you developed as a result of your efforts throughout this course.  It is particularly important to reflect on the course outcomes (what you were intended to learn in this course). Please respond with your reflection and outcomes of this course with 150 words or more. Below are topics that were covered during the course. 

Stacks and Queues

Sorting and Graph Data Structure

Recursion and Trees

ArrayList, Linked List, Vector, and Search Algorithms

HW

 

Write a work in APA Style that discusses each of the AACN Essentials and describe how you met each essential. Incorporate evidence from your previous Nursing Evolution assignments, as well as detailed examples from your didactic, skills lab, and clinical rotations.

For each essential include the following:

  • A brief summary explanation of the essential that is cited with at least one scholarly source
  • At least one example of how you met the essential during your nursing program

Two page memorandum to explain the concepts of data security while migrating from on-prem to cloud (No plagiarism, APA format) $8

Complete this Microsoft Education lesson to learn how to secure your Azure Storage account, https://docs.microsoft.com/en-us/learn/modules/secure-azure-storage-account/.  

 Consider the below scenario and  answer to the below question. 

  • Your organization’s CEO has been considering how to address projected growth in your data processing functions by moving the workload to a cloud service provider. Current functions are executed in an on-prem data center on the same Local Area Network as the principal employee workforce. It is assumed some processing functions will remain on-prem during the transition.
  • You’ve just completed a Privacy Impact Assessment on the customer data your organization maintains and have assessed that it will require protection to ensure it is not openly accessible to the public.
  • Your CEO has asked what data security considerations must be addressed prior to proceeding to a cloud implementation.

In a one to two-page memorandum written to your CEO, explain the concepts of data security which will need to be addressed; these may not have held as high a priority in your on-prem deployment. Your CEO does not have an IT background, so structure your discussion for a non-technical audience. Remember, your CEO just wants to know what needs to be done. He doesn’t need to know the specific implementation details.

 Ensure you’re using standard formatting for class papers and that you cite and reference any sources used. Any misspellings or grammar issues will result in deductions from the total score. 

 The paper requirements are meant to guide you in your assignment submission. The most important point is to make it readable, include the author’s name, course name, assignment name, date, and cite your sources of information.

Paper Requirements:

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double-Space (or equivalent) 
  • Citation Style: APA (The point is to use a style that makes your document readable and give credit to the sources you used.)
  • Coversheet
  • List of References Page.
  • Proofread – Edit for spelling, grammar, punctuation, etc.
  • Use only course text, professional journal articles, or other reputable resources.
File

1000 words

 

Final Project – IoT Security Research

Attached Files:

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices. Your writing, an academic paper, a WORD document in submission, should be in APA fromat with references, in your own words of about 800~1000 words (excluding the references). 

Operating System project 1

pls ready the following instruction in the pdf because there are four options but we have to exclude the fourth option because it can only be done by the professor approve. therefore, from one to three option would be the focus on this assignment. 

Data Structures HW

I need hw 3 to be done ASAP. Looking for someone who can finish it in less than 2 hours. EST. The assignment is on zybooks I will give you my log in information.

Informational Interview

 Part 1 (recommend completing during Week 5)

In Part 1 of this activity, you will complete the following tasks: 

  • Watch “How to Do an Informational Interview.”
  • Select your prospective interview candidate. See below for guidance on identifying a suitable interviewee.
  • Gather professional/biographical details about your prospective interview subject.
  • Request an interview by email, by phone, or in person. If you’re going to send your request by email, review this site for suggested wording. Consider CC’ing me on the request.

To identify a suitable interview subject, find professionals in your career you would like to explore. Think about tapping these sources:

  • Check with your personal and professional networks and professors to connect you with professionals in your field of interest.
  • Check within Community Connect within CareerQuest or the UMUC/UMGC Alumni LinkedIn group for access to potential alumni and mentors. 
  • Consider members within student or professional organizations you have joined or would like to join. 

There are no restrictions on your interviewee’s location. CareerQuest has a video chat feature you can use if you connect with your subject through that platform. 

After you explore your interviewee options, request the interview. Reach out in a timely manner, as many professionals have demanding schedules and may not be available right away. It is also wise to consider having more than one potential interview candidate, in case your first choice doesn’t pan out.

As you prepare for your interview, bear in mind these tips: 

  • Maintain a professional demeanor, both in writing and orally.
  • Draft a list of questions in advance.
  • Schedule the interview for no longer than 20 minutes.

Part 2 (recommend completing during Week 6)

Prepare for your interview well in advance. In Part 2 of this activity, you will prepare for and conduct your informational interview by completing the following tasks: 

  • Determine the logistics of your interview. Will you meet in person? Via video chat or web conference (Zoom, Google Hangouts, FaceTime, Skype, etc.)? An interview in real time is preferable, but if you and your subject are unable to arrange that, you can use email.
  • Draft your interview questions. See below for guidance.
  • Conduct the interview.

Here are some questions you might consider: 

  • What sparked your interest in this career field? 
  • What does a typical day entail in your line of work? 
  • What do you like most about your career field? 
  • What are some challenges you face in this career choice? 
  • How do you handle your work-life balance? 
  • What suggestions do you have for someone who is interested in this field? 
  • Who else do you recommend I talk to? 

Part 3 (due by the end of Week 7)

After your interview, summarize your notes in two or three paragraphs. Include the name of the interviewee, a short biography describing his or her professional background and experiences, and a brief synopsis of your interview details/highlights. Be sure to include a reflection on why you chose to interview this person and what you learned relative to your career. Finally, make sure to include the questions you asked. You may find this template helpful.  This documentation is due by the end of Week 7.

Discussion: Software Development Security

 

Your Task: Develop an “intake” briefing for a group  of software engineers who have been tasked with developing a standard  set of security review processes for virtual teams. The purpose of these  processes is to ensure that compliance for software security  requirements is verified resulting in software applications and  software-based products where security is “built in.” The company also  intends that these processes be used towards the organization’s  achievement of Capability Maturity Model Integration (CMMI) Level 3 —  Defined.

Background: Software development is a complex task,  especially as technology changes at the speed of light, environments  evolve, and more expectations are placed upon vendors who want to be  competitive within the software market. Many software development  organizations also depend upon virtual teams whose members are  geographically dispersed. This complexity also makes implementing and  testing security features (for software applications) much more  challenging.

Format: This week, the format for your deliverable  (posting) will be “Talking Points.” Talking points are presented in  outline format and contain the content that you would put on slides in a  slide deck. Your outline should include 5 to 7 major points (“slide  titles”) followed by 3 to 5 supporting points for each. Remember to put  enough information into the talking points that your peer reviewers can  understand what you intend to cover in each section of your briefing.  Remember to introduce the topic at the beginning, present your analysis,  and then close your briefing with an appropriate summary. Include a  list of sources (3 or more) which attendees could refer to if they wish  to fact check your work.

Assignment

  

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:

This is a required assignment, worth 100 points, and must be submitted by the due date. Late assignments will not be accepted.

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Submit your Practical Connection Assignment here.