LIT101 week 3a

Discussion 3A: Identifying literary devices

No unread replies.No replies.

 For this first discussion board assignment, you will practice identifying literary devices in a work of literature. We will focus on several elements, starting with Theme. A theme is the overall message or idea an author is trying to convey in a work. Then, you will identify the known as symbol, motif in the work. Finally, you will identify other literary devices such as metaphors, personification, etc. in a work. Please review the following document for an excellent overview of all these terms, including examples.

·  Literary Devices and Terms: Theme https://www.litcharts.com/literary-devices-and-terms/theme (Links to an external site.)

Once you are reviewed this document, choose a work of your own. You can choose a work from Module 2, or any other work of prose (no poetry yet.. we will get to that). Please note, I know many of these works are LONG, so I don’t expect you to do an entire book. You can choose an appropriate excerpt to make it more manageable.

As another example, I chose the most famous Romeo and Juliet scene: The balcony scene. SCENE II.docx Download SCENE II.docxI identified some lines and phrases in which Shakespeare supported one of the themes of the play: Love triumphs over evil. In addition, I identified some areas where there were common motifs (i.e. light, color) and literary devices. This you can use as an example of how to do this in a work. Once you have done this to an excerpt of your own, answer the following questions:

  • What is the general plot of the story or scene?
  • What is a major theme of this story? (there can be more than one, but you can just use one). Give examples from the work.
  • What examples of symbol, motif, and leitwortstil are in this work of literature?
  • What other literary devices are used within this work of literature? Give examples from the work.

When completing your discussion, explain the answer to the question and use at least one example from each from your work. You should have a total of about 8-10 examples (not each, total).

Respond to others

Respond to at least two other persons; what did you learn from their post?

A vital part of managing and

A vital part of managing and administrating a large database is that of Database Backup and Database Recovery. Discuss this statement outlining the key issues. 

Also outline the options, and their requirements, available in implementing a Database Backup and Database recovery procedure with reference to the Oracle environment.

What are some threats that exist to data and features included in modern DBMS to enhance security? 

Is cloud computing solution in Backup and recovery good?

What is data_dictionary?

Outline what type of information is held in the DATA_DICTIONARY, and the uses of this information.

Give examples of the type of queries and information available.

What role does the DATA_DICTIONARY play in backup and recovery of a database?

What information IS HELD IN THE DATA-DICTIONARY FOR EXAMINING TABLESPACES AND THEIR STATUS

What are the major inputs into the physical database design process> What decisions are influenced by those inputs.

With an Oracle Database in mind, outline the basic storage options available

What are default tablespaces that are implemented when u install oracle and whats their role?

Week 4 Red Blue team

 Outline: For this exercise – please create the outline for your paper. The outline should include the following all in APA format:

  • Title page with title, name date, class, professor, and university info.
  • Top level headers which outline what you will be talking about in your paper.
  • Second level headers (sub-headers) which outline detail for each of your top level headers
  • A bibliography list with at least 3 sources.
  • Submit your outline in a word file with the following file naming convention: ISSC62_Outline_First_Last.doc(x)

My selection for week 2 to write the outline off of was: Thinking like a hacker to protect your network
 

Body of Knowledge Graphic Model

 

After completing your program of study (IT), you will ideally possess a body of knowledge that will allow you to contribute to society professionally and personally. Professionals need substantial knowledge and the ability to showcase their accolades and experience. Create a graphic model in which you demonstrate your research of professional opportunities, taking into consideration the discrepancies between your current qualifications and what you would need to become a more complete professional, and what actions you will take to reach professional and personal goals. You will highlight your expertise and the knowledge base that is imperative to obtaining the professional position you desire. Choose an appropriate graphic model for the assignment, and include the following:

  1. Name three companies and the positions you would like to obtain.

  1. Describe the core values, mission statements, and codes of conduct of the three companies you have chosen.

  1. What skills, qualifications, and experiences are necessary to obtain the posted positions you desire?

  1. In addition to your existing degree, consider internships, additional certifications, or other qualifications you may need in order to be an accomplished professional.

  1. Gather your body of knowledge and create a strategic roadmap that includes your current qualifications, addresses any deficiencies you have identified, and demonstrates a plan for how you will address those deficiencies ( Current qualification = Associate in Computer Engineering).

IT Security

 

Conduct the Assessment (Due Oct 12)- Page 29 of the NIST Guide

the parts in bold are to be completed by me. DO you need to see  the report for  the vulnerabilities and predisposing conditions?   We are using the NIST based on Tier 2. The link to the NIST can be found in the document 

Again, use the NIST report to address the following:

  1. Identify threat sources and events-p.30- Appendix D
    2)  Identify vulnerabilities and predisposing conditions-p.32- Appendix F-
    3)  Determine likelihood of occurrence-p.33- Appendix G-
    4)  Determine magnitude of impact-p.34-Appendix H-
    5)  Determine risk –p.35-Appendix I-

5) Identify Needed Controls and Programs-(Due Oct 12)

Research and specify security controls needed to close the security gaps in BRI.

Also, be sure to include a description of the following programs for securing BRI:

  • Security Awareness and Training Program (i.e., communications to employees regarding security)-Kamesha
  • Privacy Protection Program-Tara
  • Business Continuity/Disaster Recovery Program- 

Discussioon 250 words

 

If you were asked by your employer to develop a new Information Security Policy, where would you turn to find resources to build this policy? List the two most important items you would include in this new policy and explain why you felt these were most important.

A Discussion Board rubric clearly communicates expectations for participation, please see the NEC Grading Matrix for Discussion Board Postings as an example.

Advanced Modularization

  Overview: In this assignment, you will be analyzing the cumulative summing, the different number of parameters that can be passed to a method, and the design methods with no parameters. Instructions: Answer the following questions: 1. Describe how you create and use a method with multiple parameters. 2. Explain what happens when you call a method and the method ends. 3. Discuss the cumulative summing relationship. 4. List the four things you need to know when you call a method from a program or other method. 5. Modularized furniture comes with sections that can be assembled in a variety of configurations. What other everyday items are modularized? 6. As a professional programmer, you might never write an entire program. Instead, you might be asked to write specific modules that are destined to become part of a larger system. Is this appealing to you?