Exp22_PowerPoint_Ch03_CumulativeAssessment_IT_Careers

Exp22_PowerPoint_Ch03_CumulativeAssessment_IT_Careers

Exp22 PowerPoint Ch03 CumulativeAssessment IT Careers

PowerPoint Chapter 3 Cumulative Assessment – IT Careers 

  

Project Description:

As the department chair of Information Technology at the college, you often give presentations on IT Careers to potential students. You have been asked to to update the presentation with recent data on the programs you offer at the college that will prepare students for a career in IT.

     

Start PowerPoint. Download and   open the file named Exp22_PPT_Ch03_CumulativeAssessment_IT   Careers.pptx. Grader has automatically added your last name to the   beginning of the filename. 

 

Insert a Title and Content   layout slide after Slide 1. Type Jobs in IT in the Title Placeholder.
 

  Insert a Trapezoid List SmartArt graphic in the content placeholder. Type the   following in the Text pane as first level bullet points. Remove any unneeded   bullet points in the Text pane.
 

Software   applications developer
Information   security analyst
Computer   systems analyst
Database   administrator
Computer   network architect
Management   analyst

 

Apply the Moderate Effect   SmartArt style. Change the color to Colorful – Accent Colors.

 

On Slide 4, insert a two column,   seven row table in the content placeholder.
 

  Type the following information into the table:
  Row 1: Col 1: Profession; Col 2: Salary Per Year
  Row 2: Col 1 Software applications developer; Col 2: $103,560
  Row 3: Col 1: Information security analyst; Col 2: $95,510
 Row 4: Col 1: Computer   systems analyst;   Col 2: $88,270
  Row 5: Col 1: Database administrator; Col 2: $87,020
  Row 6: Col 1: Computer network architect; Col 2: $104,650
  Row 7: Col 1: Management analyst; Col 2: $82,450 

 

Apply the Light Style 2 – Accent   4 table style.

 

Add a new column to the left of   column 1. Merge the cells in the new column. Set the cell width of the merged   cell to 0.79“. Type 2016 in the new column and rotate the text 270°. Center   the text in the cell horizontally. Increase the font size of the text to 28   pt. Change the cell shading to White, Text 1.

 

Set the text in the table to   Center Vertically. Set the table height to 4.2” and the width to 10.7“.

 

Change the layout of Slide 3 to   Title Only.

 

Start Excel. Download and open   the file named ITData.xlsx and save   it as ITData_LastFirst.xlsx. Copy   the chart from the Job Growth Percentage worksheet and embed the chart using   Paste Special on Slide 3. Paste as Microsoft Office Graphic Object.
 

Note, Mac users: Paste as Microsoft   Office Graphic Object.

 

Size the chart to a height of 4.5“. Position the chart   horizontally at 1” and vertically at 1.85“.

 

On Slide 5, create a Clustered   Column chart with the following data:
 

  In cell A1, type Profession and in cell B1 type # of Jobs.Then populate A2:B7 with the   following values:
 

Software   applications developer 1,256,200
Information   security analyst  100,000
Computer   system analyst 600,500
Database   administrator 119,500
Computer   network architect 162,700
Management   analyst 806,400
 

  Change the source data to use the range A1:B7.

 

Make the following changes to   the clustered column chart:
  • Apply Chart Style 9
  • Apply the Layout 4 Quick Layout
  • Remove the legend and y-axis

 

Save and close Exp22_PPT_Ch03_CumulativeAssessment_ITCareers.pptx.   Exit PowerPoint. Submit the file as directed.

Project 4: Human Resources Insider Threat Guidelines

 

Project 4: Human Resources Insider Threat Guidelines
Step 9: Define Standards, Policies, and Guidelines

Before you can complete the Profile Matrix and develop solutions for your company, you will need to take a closer look at how standards, policies, and guidelines affect a company’s security posture. You probably already have questions about what policies were in place prior to the Childs incident. In this step, you dig deeper and learn more about the difference between standards, policies, and guidelines by creating a two- to three-page comparison report. Your report should answer the following questions:

  • What is the difference between standards, policies, and guidelines?
  • How do they relate to one another?
  • How well do they work in securing networks and data within the organization?
  • This report is particularly important because it will affect the recommendations you make to your boss regarding the case. You will use this report as Appendix C to your presentation.

Submit your Standards, Policies, and Guidelines Definition for feedback.

Submission for Standards, Policies, and Guidelines Definition

Project 2: Requirements

 

The heart of this course is a project, in which you will design, implement, and evaluate a user interface. User interface design is an iterative process, so you will build your UI not just once, but three times, as successively higher-fidelity and more complete prototypes. 

This project is the first step in the user interface design process.  By the end of Project 2 you will have completed the user research, created user personas, developed wireframes. In Project 3, you will develop a working prototype. In Project 4, you will revisit heuristic analysis and usability testing on the user interface and experience you designed.

Focus for this project is on user research and wireframes – understanding who the users are, what are they trying to accomplish, how can your interface design support and delight them. We review several approaches to structuring, performing, and documenting user research, including a special focus on personas of different types and on use cases. This project provides a walk-through planning and analysis stages for UX/UI projects: why the planning matters and methods that can be used.

You may choose to design a user interface for any industry. The type of user interface you create is also your choice (i.e. SmartTV, AR, VR, smartphone, app, website). If you need some ideas to get you started, browse these concepts:

PowerPoint presentation

 

  1. You will make a PowerPoint presentation of a vacation. The vacation trip will be to one of these three countries: Belize , Ireland or South Africa. You will depart (for one to two weeks) sometime between June 5  and June 19. This may be more difficult due to the pandemic. Take your entire family.*Include:   Web sites for planning the trip, Real costs, What is included if a package, Pics of attractions to visit, any special customs requirements.*Please include several  of the chapter #1 review items found on page 830  and Chapter #2 page 901 #7  . Must include sound— your voicePlease note page 892/893 to insert audio into your presentation. Please note page 894 to play sound (or music) over multiple slidesAt least 10 slides.Thank You.

Practical connection with Azure Cloud and its Issues

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. (Include references).Requirements: 

  • Provide a 500 word (or 2 pages double spaced) minimum reflection. 
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 
  • Share a personal connection that identifies specific knowledge and theories from this course. 
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.  
  • You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

research paper

 

you are going to explore the topic of identity theft. Specifically, you will be investigating behaviors associated with the prevention of identity theft. Construct a set of search terms and locate each of the following:

  • An empirical research study (also known as a research report) from a peer-reviewed journal
  • An article from a trade publication
  • A government publication
  • A blog or mailing list
  • A vendor white paper

In a short paper (2-3 pages), compare and contrast these sources as to their applicability and credibility for academic work versus professional work.

Case Study 7.1

Case Study 7.1

Address the two questions associated with the chapter 11 Self-Assessment “Personality, Leadership, and Change on page 418 in a two to four page paper (excluding title, abstract, and reference pages). 

Assignment must be in 7th edition APA compliance.

Please use this strategy when you analyze a case:

  1. Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).
  2. List all indicators (including stated “problems”) that something is not as expected or as desired.
  3. Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.
  4. Identify the areas that need improvement (use theories from your textbook)
    • Specify and prioritize the criteria used to choose action alternatives.
    • Discover or invent feasible action alternatives.
    • Examine the probable consequences of action alternatives.
    • Select a course of action.
    • Design and implementation plan/schedule.
    • Create a plan for assessing the action to be implemented.
  5. Conclusion (every paper should end with a strong conclusion or summary)