BEHS 380 6981 End of Life

 Hide Assignment InformationTurnitin®Turnitin® enabledThis assignment will be submitted to Turnitin®.Instructions

Due at the end of Week 3.

IMPORTANT: Your bibliography topic must be approved (by me) before you can carry out your project.

Using the UMUC library databases, you will be expected to compile a bibliography of at least 10 citations on a faculty approved topic that relates to end of life issues. Follow the direction in your syllabus.

The bibliography must be formatted using APA (American Psychological Association) style.

Grading Rubric for Bibliography Assignment:

10 Citations

2 points each

·         Correct APA format

·         Scholarly, peer-reviewed source

.5 points each

·         Mostly correct APA format – only minor errors

·         Scholarly, peer-reviewed source

0 points each

·         Incorrect APA format

·         Inappropriate source

Total possible points for citations: 20 points 

Due DateJul 5, 2022 11:59 PMHide Rubrics

Rubric Name: Bibliography

Print Rubric

CriteriaMeets Expectations2 pointsLevel 11 pointDoes not Meet Expectations0 pointsCriterion ScoreReference 1

Correct APA format
·         Scholarly, peer-reviewed source
·         Mostly correct APA format – only minor errors
·         Scholarly, peer-reviewed source

Mostly correct APA format, only minor errors

Scholarly, peer-reviewed source

Inappropriate source

Score of Reference 1,/ 2Reference 2Score of Reference 2,/ 2Reference 3Score of Reference 3,/ 2Reference 4Score of Reference 4,/ 2Reference 5Score of Reference 5,/ 2Reference 6Score of Reference 6,/ 2Reference 7Score of Reference 7,/ 2Reference 8Score of Reference 8,/ 2Reference 9Score of Reference 9,/ 2Reference 10Score of Reference 10,/ 2TotalScore of Bibliography,/ 20 

Information Governance Program

You have been assigned as a member of a team to evaluate the need for an Information Governance (IG) Program at your organization. You will prepare a written proposal justifying the need for the IG Program. What does an IG program do?

Deliverable 6 – Test Plans and Deployment

Scenario

You are the lead developer for the software development team at Great Code Inc. Your company has been contracted by the Acme Company, a small manufacturing company, to develop a set of software system solutions to bring their existing manual, paper ordering process into an automated, digital online ordering system. The Acme Company has very limited experience with the process of developing software.

Instructions

The Program Manger has asked you to develop a test plan for the Acme Company online ordering system project that includes the following:

  • Ensure that at least three types of testing techniques are detailed within the test plan.
  • Construct at least three test cases within each type of testing technique.
  • Within each test case, detail the scope of the test case, the procedure in executing the test, and the success/failure criteria.

Exp19_Excel_Ch04_HOEAssessment_Investments

  

Exp19_Excel_Ch04_HOEAssessment_Investments

Excel Chapter 4 Hands-On Exercise Assessment – Investments   

Exp19 Excel Ch04 HOEAssessment Investments

  

Project Description:

You have been hired as a junior financial analyst at Bristol Investments. As part of your tasks, you will help track transactions, commodity prices, and broker efficiency. To complete the task, you will create an Excel table, use data filters, conditional formatting, and lastly you will prepare the document to print.

     

Start Excel. Download and open the file named EXP19_Excel_Ch04_HOEAssessment_Investments.xlsx. Grader has automatically added   your last name to the beginning of the filename. 

 

Create a table named Transactions based on the data in   the Range A4:E248. 

 

Freeze the first row   containing column headings. 

 

Apply White, Table   Style Medium 4. 

 

Add a new column   named Percent Change

 

Enter a formula in   the Percent Change column using unqualified structured references to   calculate the percent change between the commodity purchase price and the   current price. (Purchase Price/Current Price).

 

Apply Percentage   Number format to the range F5:F248.

 

Add a Total Row to   the Percent Change column. Set the totals to display the average of percent   change column. 

 

Apply Solid Blue Data   Bars formatting to the Percent Change column. 

 

Filter the data to   only display Stocks and Bonds.

 

Sort the data by   Broker, then by Commodity, then by Purchase Price. 

 

Click and drag to set   the range A4:F249, which is the Transactions table, as   a print area. Be sure the value [#All]   follows the table name in the Print area box.

 

Set row 4 to repeat   when printed.

 

Save and close EXP19_Excel_Ch04_HOEAssessment_Investments.xlsx.   Exit Excel. Submit the file as directed.

Software Process Discussion

 Respond to the peer discussion with at least 75 words.

Discussion Topic:

In this module, we have studied various types of software development methodologies. Discuss.

Peer Response: 

 The application of standards sets the foundation for the decisions you will make throughout the development process and also allows you to have a good measure of how well the project is executed.  Without a suitable set of standards in place, a project will tend to run its own course and will be difficult to organize. 

ITS-834: Emerging Threats & Countermeasures. Discussion, Research Paper

Subject: ITS-834: Emerging Threats & Countermeasures

Reading Resources:

Satapathy and L. M. J. Livingston. (2016). “A Comprehensive Survey of Security Issues and Defense Framework for VoIP Cloud,” in Indian Journal of Science and Technology, 9(6).  https://doi.org/10.17485/ijst/2016/v9i6/81980

D. B. Rawat, 2019. “Fusion of Software Defined Networking, Edge Computing, and Blockchain Technology for Wireless Network Virtualization,” in IEEE Communications Magazine, vol. 57, no. 10, 50-55.  https://ieeexplore.ieee.org/document/8875714

J. Tioh, D. M. Mina and D. D. W. Jacobson, “Cyber Security Social Engineers an Extensible Teaching Tool for Social Engineering Education and Awareness,” 2019 IEEE Frontiers in Education Conference (FIE), Covington, KY, USA, 2019, pp. 1-5.  https://ieeexplore.ieee.org/document/9028369

T. Surasak and S. C. -. Huang, “Enhancing VoIP Security and Efficiency using VPN,” 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 2019, pp. 180-184.  https://ieeexplore.ieee.org/document/8685553

Chapters 11, 12, 13, and 14 in the course textbook

Textbook Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide ISBN: 9781119475958, Authors: Mike Chapple, James Michael Stewart, Darril Gibson, Publisher: John Wiley & Sons, Publication Date: 2018-04-10  

Discussion: Wireless Networking

Word count: 300+ words

Chapters 11, 12, 13, and 14 in the course textbook 

What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also, discuss methods used to secure 802.11 wireless networking in your initial thread.

Make sure to back up your statements with scholarly support.

· Please cite properly in APA 7

· At least one scholarly source should be used. 

· Use proper citations and references in your post.

Research Paper:

Number of pages: 4+

Considering the importance of data in the organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

· 4+ pages in length, not including the required cover page and reference page.

· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Note: plagiarism check required, APA7 format, include References, within 8hrs

This post has 2 individual assignments (a discussion and a research paper). Please provide answers in separate documents. 

Case Project Read Carefully

“See how many of the problems listed below you can solve working by yourself. Use books, manuals, online help, the Internet, and other resources, as necessary. Some of these problems are easier than others, so don’t work too long on a problem that seems difficult. As you work on these tasks, make some brief notes that describe your experience. Do some metacognition about your problem-solving approach.

This is the question to answer:

1. A user running Internet Explorer reports a message, “Internet Explorer cannot display the webpage.”What information about this problem can you provide the user”

Attached photo is a better view of the Case Project

Reflection for E-Commerce

In a short paper (1-3 pages), please address each of the topics below with a 1-2 paragraph narrative for each section.

1. Course Content: Describe the most important aspects of this course for you with respect to the content that was covered or activities in which you participated. Discuss the relevance and value or the practicum assignment with respect to your knowledge acquisition.2. Application of Course Content: Describe how you applied what you learned in this course at your workplace. Discuss how this course may have impacted your specific job, techniques you used at work, or other relevant aspects that show how what you learned was linked to your job.3. Job Experience Integration: Describe how your work experiences were used in the classroom and attributed to your performance in the course. Discuss how integrating your work experiences in class activities assisted in understanding topics discussed within the course.