Week 6 Experience Portfolio

 

Hello,

i need this paper by 12/10 4pm.

Strictly No plagiarism please use your own words.

Length: Minimum of 600 words Create a portfolio related to work experience Network security and proxy related in IT. Submit a file that outlines any projects you have worked on as a student or professional that may influence a hiring manager or company to hire you.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism.

project

Project – Part 5 – Modules

Modify the pseudocode design that you created in ITP 100 Project – Part 4 to include at least the following modules.

•    studentID    – to Enter the Student ID

•    calcBill        – to Calculate the Bill

•    prtBill        – to Print the Bill

After the student has finished entering the course titles, the system will calculate and print the bill.

Create a hierarchy chart for the modules.  Save the hierarchy chart as ITP100Project-Part4-Hierarchy-LastName.doc

Save the pseudocode design using the filename ITP100Project-Part4-LastName.doc

Submit for a Grade:

•    Upload the files ITP100Project-Part4-Hierarchy-LastName.doc and ITP100Project-Part4-LastName.doc file to the ITP100_Project_Part4 file upload area.

Module 2 – SLP, SYSTEM DESIGN AND PROJECT PLANNING

 

This assignment consists of two parts:

Part 1: SLP Assignment Overview

When the requirements and design are completed for a project, the coding can begin. A good first step in development is to use the design to create a prototype, or proof of concept for the system. The prototype helps ensure the validity of the design and demonstrates that the basic concepts in the design will provide the desired solution. For this SLP assignment you will use your Design Document from the Case Study to guide the creation of a prototype for your integrated system.

Part 1 SLP Assignment Expectations

The Prototype should address the following requirements:

  • The prototype should match the overall design created in the Case Study assignment and should provide evidence that the intended design will work.
  • A basic visual interface to support navigation of the program and identify the future functionality of the application.
  • No subsystem functionality is required but stubs to connectivity points for subsystems should be identified and have the ability to perform basic functionality tests.
  • All code should be well-documented with comments.
  • The program should run without significant errors.
  • Include a document called operation.docxthat describes how to operate the application.
    • This document should provide sufficient information to allow the instructor to set up and operate the application.
    • Identify any external system requirements
    • Key parts of the application should be identified (i.e., tell the instructor where to find the important parts of the application).
    • This document should also provide a summary of how the prototype shows proof-of-concept for the project.
    • Include a section called STATUS with a summary of the current status of your project including problems encountered and how they will be addressed. Be sure to contact your instructor if you need help addressing any issues.

Part 2: SLP Assignment Overview

For this SLP assignment you will submit the Alpha version of your project. An alpha version of an application will have the major functionality operational but not fully completed. The purpose of the Alpha version is to ensure the major functional components of the application will work as intended. Your alpha version should have connections established to all outside components and internally developed functionality should be operational at a least a fundamental level.

Part 2 SLP Assignment Expectations

The Alpha version should address the following requirements:

  • The application should match the design created earlier in the course with the exception of any changes required to address problems or conform to a revised timeline.
  • All major functionality should be operational at least at a minimal level.
  • Connections to outside components should be functioning at a basic level to prove they will work for the final version of the application.
  • The visual interface should provide access to all major functions of the application.
  • There should be a demonstrable, functional connection to the required database for the project.
  • All code should be well-documented with comments.
  • The program should run without significant errors.
  • Include a document called operation.docx that describes how to operate the application.
    • This document should provide sufficient information to allow the instructor to set up and operate the application.
    • Identify any external system requirements
    • Key parts of the application should be identified (i.e., tell the instructor where to find the important parts of the application and changes that have been made since the last submission).
    • Include a section called STATUS with a summary of the current status of your project including work performed since the last submission, problems encountered and how they will be addressed. Be sure to contact your instructor if you need help addressing any issues.

Please submit all required project files and documents for grading. Do not zip the files together, you might experience problems submitting the assignment

Emerging Threats _ Discussion

What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802.11 wireless networking in your initial thread.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Project Assignment:

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • What are the key elements of a multilayer process for managing security vulnerabilities based on the concept of reasonable assurance?
  • What actions must be taken in response to a security incident?
  • What is computer forensics, and what role does it play in responding to a computer incident?

Provide three articles to substantiate the above three questions.

Using the APA format provide a citation for each of the articles you read

Suggestion: Use a search engine (Google) and keywords

Short research paper for PHD. Please read below before bidding. APA 7th edition format, 3 pages excluding title and references page, 5 References must

 Journal article link: https://www.researchgate.net/publication/334701620_Why_are_we_having_this_innovation_Employee_attributions_of_innovation_and_implementation_behavior

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies. Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

Provide a high-level overview/ summary of the case study

Note how constructive intentionality impacts innovation implementations

Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations. Please be explicit and detailed in answering this question.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.