Week 5 project

 

Putting It All Together

This assignment has 3 parts. Be sure to check off each one so you know that you accomplished it. You will be creating a personal résumé in Microsoft Word, and a PowerPoint presentation, and then zipping these files with your Excel spreadsheet that you created for the Week 4 Project into a compressed folder (a .zip file) to upload to the Week 5 Project submission area.

Create your résumé for when you are about to graduate from your program of Psychology. Don’t limit yourself to experiences and achievements you have today; you may add experiences and achievements you expect to have by the time you graduate. Later, you can keep adding skills and experiences to your résumé as you complete classes, gain more job experience, or change jobs.

Tip: You learned about tables in Week 2. Tables are great for creating résumés. Most of the time borders are turned off on the tables after the résumé is created although sometimes a top or bottom border is turned on to separate categories. However, the easiest way to create your résumé is to use a Word résumé template.

Click on the link below, Week 5 Project Tips, for some visual aids on how to tackle this week’s project.

Week 5 Project Tips

Part I: The Resume

Create your résumé based on the following criteria in Microsoft Word and save it as W5P_Resume_LastName.docx. Remember that the program will automatically add the extension of .docx.

  1. Ensure that the résumé was logically laid out and easily understood
  2. Create categories: create distinct separation and identification of important line-item job skills and experiences using bullets or numbers with appropriate application.
  3. Have content separation: provide a distinguishing feature that separates one line or paragraph from the others.
  4. Modify text: modify default typeface in one line or section and modify the default color or style of a line or section.
  5. Modify text size: modify the default typeface size by changing the points in at least one line on the page
  6. Create an overall professional look to your résumé.
  7. Include a header with your name and include page numbers. In reality, you would only do this if your résumé was more than one page, but you are demonstrating your skills in this document.

Part II: The PowerPoint

Create a new PowerPoint presentation and save it with the file name of W5D_Presentation_LastName.pptx.

  1. Choose a slide design that suits you. On your first slide, include a title of your choosing to introduce yourself. In the subheading, include the course number, your name, and the date.
  2. Create five slides where you can share your hobbies, interesting times in your life, or just different things about you. You should not include any personal information such as your address, social security number, student ID, or anything sensitive that you would not share publicly. Make sure that whatever you share is classroom appropriate.
  3. Create one slide that will be an “invitation” to your graduation party. Identify the who, what, when, where, and why of the party details. Include appropriate graphics and text formatting to make your invitation appealing.

All slides should be formatted creatively and appropriately.

Part III: The Zip Folder

Create a new folder called W5P_LastName. Put your résumé Word file, your PowerPoint file, and your Excel file from Week 4 Project into this folder and “zip” the folder following directions below to upload one file as your Week 5 Project submission. In the Comments box, briefly share your experiences with completing this project.

This is a handy way to treat multiple files. Once uploaded, be sure to download and unzip your folder to make sure that it contains exactly what you want in it. Sometimes in a rush, students upload empty folders and lose one-fourth of their grade for the class. Don’t let this mistake happen to you!

* To zip the folder on a PC:

  • Right-click on the main folder (W5P_LastName).
  • From the drop-down menu select Send To -> Compressed (zipped) Folder
  • Attach the resulting ZIP file to your response in the classroom.

* To zip the folder on a MAC:

  • Right-click on the main folder (W5P_LastName).
  • From the drop-down menu select Compress.
  • Attach the resulting ZIP file to your response in the classroom.

Week 3 IT impact

This week we will tackle the tough topics of anonymity, net neutrality, censorship, and controlling speech. All these topics can easily start a debate among the most conservative individuals. It is important to understand these concepts can sometimes counteract the progression of technology in society.

Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 200 words and appropriately cites your resources.

Respond to two of your classmates by Sunday at midnight. Your responses should be at least 100 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.

You will not be able to see your classmates’ posts until you make your first post.

Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade. 

Discussion_Grading_Rubric_Final (2).docx

Grading_Late_Discussion-1 (3).docx

Topics:

  • What is the Telecommunications Act of 1996?
  • How has the idea of offensive speech changed since technology has progressed?
  • Do you consider the internet an appropriate tool for children? At what age do you introduce children to the internet?
  • What is data leakage? What does the term insider threat mean?
  • What are some kinds of Web sites that should prohibit anonymity?

Radius Server

 

In this graded practice you will be using Remote Authentication Dial-In User Service (RADIUS) in a simple network. 

Remote Authentication Dial-In User Service (RADIUS) is a networking  protocol that provides centralized Authentication, Authorization, and  Accounting management for users who connect and use a network service.   A RADIUS server is often used to secure remote locations on a wireless  network.

Infer Stats in Decision-Making QUALITATIVE Journal Submit Article Reviews

You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.) 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References   

IS331 COMPUTER NETWORKING

                                                                      TERM PAPER

                                                                       TOPIC: EIGRP (Enhanced Interior Gateway Routing Protocol)

 

The term paper for this class is worth 200 points, and it requires you to do a research and write a 2500 word paper describing one of the following TCP/IP routing protocols, RIPv2, OSPF or EIGRP. The paper will include the following:

  • The paper must have a distinct and well written Introduction, Supporting Body and Conclusion;
    • In the body include the following
      • The history of the protocol chosen;
      • The programmable parameters of the protocol and how they affect traffic flow;
      • The major differences between the routing protocol chosen and the others that were not chosen;
      • How the chosen protocol can be used in a modern day routed network environment.

THAT IS TEN PAGES IN DOUBLE SPACE EXCLUDING WORKS CITED AND NO PLAGIARISM. THE INSTRUCTIONS FOR THE ASSIGNMENT EMBEDDED IN THE UPLOAD FILE.

discussion-5

  The differences between and advantages of MAC, DAC, and RBAC. 

  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes. 

Assignment

 

  • Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.
    • When should the architect begin the analysis?
    • What are the activities the architect must execute?
    • What is the set of knowledge domains applied to the analysis?
    • What are the tips and tricks that make security architecture risk assessment easier

CS

 

This assignment provides you an opportunity to practice

  • writing a program which uses the Serializable Interface.
  • developing a program which will use the read only mode in Java Binary I/O.
  • developing a program which will use the read write (rw) mode in Java Binary I/O. 

Directions

Please solve three (3) programming problems related to the content presented in Chapter 17 in your text. You can find the programming problems in the attached file (Module 8 Programming Problems Worksheet.docx (Links to an external site.)).

  • Download the worksheet and save it as Mod8-Worksheet-Programming-Last-First.docx. For example, Mod8-Worksheet-Programming-Smith-John.docx.
  • Consider the problem, design an algorithm (or algorithms) that would solve the problem, and then implement the algorithm in Java.
  • Create a new folder and name it as Mod8-Java-Programming-Last-First, for example, Mod8-Java-Programming-Smith-John.
  • Write the source code for each problem and save them as .java files in the folder you created. There are three programming problems for this module so you should have three .java files. Name your java files as Mod8Problem#.java, for example, Mod8Problem1.java.
  • Copy data file(s) used for your program and/or output file into the folder. In this module, make sure to include Pledge.txt and Stu.dat in this folder.
  • Please insert the algorithm written in pseudocode as a comment in the beginning of your program.
  • Take screenshots of your running program – you can take screenshots using PrintScreen or any tool that you are familiar with, making sure that the console window in which you run the program appears on the screen.
  • Copy the screenshots in the worksheet. If your program has different outcomes, take screenshots of each variation.

Submission

  • Compress the folder that saves all of your java files as .zip file. Please note don’t save the worksheet in the same folder as they need to be submitted seperately.
  • Submit the following two files as attachments by clicking the Submit Assignment button above.
    • Mod8-Java-Programming-Last-First.zip (including .java files, data files, Pledge.txt and Stu.dat).
    • Mod8-Worksheet-Programming-Last-First.docx.