literature review

1. Please fill out this form (also available in this week’s folder) to compare and contrast your three research articles (do not include your news article). 

2. Please write part 2 of your literature review. You will be essentially cutting and pasting your three objective summaries under Level II headings (see p 13 in your manuals)

Put them in an order that makes sense given how you compared and contrasted them.

Use your transition compare and contrast words (similiar to…etc) !!! 

Advanced PC Applications Lesson 6

 This project involves using mail merge to send the same company information to multiple prospective clients. You’ll assume the role of estimator at an engineering company. For this project, you’ll complete a one-table database with client information, a letter that integrates an Excel spreadsheet and Access merge fields, and final merge documents that display the actual field values.  

Programming jan 28

Instructions

Make sure to work through the notebooks in the Reading Assignment first. 

This homework is not related to Simulations directly. The goal is to make sure you are comfortable programming basic Python code using Jupyter Notebooks. Start early, ask questions. Watch video presentation for extra help.

Your entire homework description is contained in the following Jupyter Notebook: HW2_YourName.ipynb. Download it (right-click and ‘Save link as..’) and save it in your working folder, start Jupyter and open this notebook.

Follow the directions given in the notebook to complete all the tasks and submit the file. 

Discussion 7- Project HR & Stakeholder Mngt

Assigned Readings:

Chapter 9 – Managing Difficult Stakeholders

Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.

Also, provide a graduate-level response to each of the following questions:

  1. How does or can a project proceed without an executive sponsor?

Text

Title: Managing Project Stakeholders 

ISBN: 9781118504277 

Authors: Tres Roeder 

Publisher: John Wiley & Sons 

Publication Date: 2013-04-22

Project

 

This is the fourth in a series of five sequential assignments (the course project) in which you continue to act as the Chief Technology Officer (CTO) of a hypothetical, e-commerce start-up company of your design.

You have been working on delivering an information technology project plan in anticipation of the company relocating to a new facility.

  • In the first course project deliverable, you created a project plan inception document and supporting Gantt chart.
  • In the second course project deliverable, you developed the business requirements to be incorporated into the information systems design you are creating. You also updated your original supporting Gantt chart based on major and minor tasks identified in the business requirements document.
  • In the third course project deliverable, you created an infrastructure design that considered the key elements of software, hardware, security, and business process flow for your e-commerce startup company. Once again, you updated your supporting Gantt chart to reflect the major and minor tasks uncovered while developing the infrastructure design.

This fourth course project deliverable focuses on the project’s construction phase. In this assignment, you will develop the system implementation plan document. This document will include the engineering, furnishing, and installation (EFI) technical aspects of your e-commerce company’s information systems infrastructure. This assignment consists of two parts:

 

You are to write an 8–10-page system implementation document in which you:

  1. Use graphical tools to design the logical and physical layout of the planned e-commerce company’s information systems.
  2. Use graphical tools to illustrate the possible placement of key infrastructure elements with external connectivity (Internet) and internal connectivity (firewalls, LAN).
  3. Develop the bill of materials and tabulate it in a spreadsheet to include item, description, model number, and approximate cost.
  4. Document the methodology and process to include the engineering, furnishing, and installation of the identified inventory.
  5. Use three sources to support your writing.
    • Choose sources that are credible, relevant, and appropriate.
    • Cite each source listed on your source page at least one time within your assignment.
    • Access the library or review library guides for help with research, writing, and citation.

Systems Diagrams & Visualization (UML & Data Flow)

Create a set of UML and Data Flow diagrams. 

Details on the Project:  Systems Diagrams Specifications v2.pdf 

 Create the following UML diagrams to visualize the process of completing the IT project from the previous exercise (providing IT services for a new building): 

• Use Case diagram • Activity diagram • Communications diagram • Data Flow diagram 

Assume the following basic processes: 1. Procurement of all resources. 2. Setup of PCs and network servers. 3. Deployment and Testing of resources to the IT Area/Office. 4. Deployment and Testing of resources to the Administrative Area. 5. Deployment and Testing of resources to the Conference Room. 6. Deployment and Testing of resources to the Meeting Room. 7. Deployment and Testing of resources to the Individual Offices. 8. Deployment and Testing of resources to the Computer Labs. 9. Testing of all Other Locations.

 • Create a Use Case diagram to show all actors and the basic processes above o Procurement, Setup, Deployment & testing of each major location. 

• Create an Activity diagram to show the deployment and testing of resources into the Computer Labs o Network connectivity testing requires interaction between the PC and Network Specialist o Projector connectivity testing requires interaction between the PC and AV Specialist. 

• Create a Communications diagram to show collaboration between the PC Specialist, the Network Specialist and the AV Specialist during deployment and testing of resources into the Computer Labs. o If network connectivity issues arise, the PC Specialist will communicate with the Network Specialist. o If projector connectivity issues arise, the PC Specialist will communicate with the AV Specialist. 

• Create a Data Flow diagram to show the Procurement of all resources, based on this additional information: o The PC Specialist enters all purchases into the Purchase Application system once the resources are purchased. o The PC Specialists closes all purchases in the Purchase Application system once the resources are received. 

When references and citations are included, you must apply and use the basic citation styles of APA. Do not claim credit for the words, ideas, and concepts of others. 

Use in-text citation and list the reference on your supporting source following APA’s style and formatting. 
Do not copy and past information or concepts from the Internet and claim it as your work. It will be considered Plagiarism and you will receive zero for your work.

 The following is an example of UML & Data Flow diagrams:  Systems Diagrams & Visualization Example.pdf 

Network Lab 1……INT 2681

 

  1. Complete Netlab 1 and submit your lab summary here.

   NETLAB 1 A: DNS Footprinting/Social Engineering With Social Engineering Toolkit  

  1. Footprinting using nslookup 
  2. Comparing nslookup with dig 
  3. Virtual Machines: Kali Linux, pfSense, OpenSUSE 
  4. Using Social Engineering Toolkit (SET) 
  5. NETLAB 1 . B Package Crafting / Social Engineering with Social Engineering ToolKit.  
  6. Packet Crafting with Scapy
  7. Sending crafted packets 
  8. Virtual Machines: Kali Linux, pfSense, Owasp Broken App 
  9. Modifying SET Parameters. 
  10. Testing the SET Attack. 
  11. NETLAB 1. C: Reconnaissance with Nmap, Zenmap and Massacen.
  12. Reconnaissance Using Nmap 
  13. Reconnaissance Using Zenmap 
  14. Reconnaissance using Masscan 
  15. SAMPLE SCREENSHOT.pdf 

Instructions to follow

  

INSTRUCTIONS.

  1. NETLAB1, contains three different sub-labs. Please, read the      instruction for each submission carefully.
  2. As of today, most of your NETLAB will      be visible online.
  3. Each lab will be screenshot and attached to a word document,      PowerPoint (Converted to pdf)  before submission through Blackboard.      Please, read the instruction carefully.
  4. . Once you      submit, there is no other second submission.
  5. For each NETLAB, a minimum of five screenshots will be      accepted for full credit.
  6. Each lab should have about 20 screenshots per PowerPoint or      Word Document for full credit.
  7. Please, check the due dates for every LAB. There is much to      do; I suggest you begin as soon as you can.

USEFUL TIPS

  1. The goal of NETLAB is to give every student a real-life      hacking experience in a virtualized/sand Box environment, where you can      safely practice what you learn in theory in preparation for your CEH 11      certification.
  2. Please, note that the entire lab will give you a thorough      understanding of the most demanded and used tools in cyber security.
  3. Knowledge of Microsft Excel, Word, and PowerPoint will help      you a lot. Please, google, or use YouTube to learn some basic skills,      formatting, etc.
  4. Lastly, instructions for each labs, such as lab credentials      in all found in NETLAB. Please, make sure you preview the LAB, get      familiarized with it before you begin. 

Computer Science

 

For your project, complete the following using screenshots, images or diagram of sample products, processes, etc. to illustrate and descriptive texts to address the items below (you may also consult YouTube.com as a source). This is not a research paper; however, provide your source(s):

1. Identify at least three types of computers, how they process information, and the purpose and function of each computer.
2. Identify how software and hardware work together to perform computing tasks and how software is developed and upgraded.
3. Identify at least three different types of application software and provide a general description each application software.

4. Using an operating system, identify what is an operating system, how it works, and how it solves common problems related to the operating systems.
5. Illustrate the process of using an operating system to manipulate a computer’s desktop, files and disks.
6. Use screenshots, images or diagram of sample products, processes, etc. to illustrate and descriptive texts to explain each items provided.