Discussion 1- Project Process

Your author discusses five different Project Management Life Cycle Models (PMLC) in your book. 

For your discussion post answer the following question: 

1.  Identify which models you have experience using. 

2. Identify a project from your experience that would be a good fit for a specific PMLC model. 

[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]

Text-

Title: Effective Project Management 

ISBN: 9781119562801 

Authors: Robert K. Wysocki 

Publisher: Wiley 

Publication Date: 2019-05-07 

Edition: 8th Edition

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Problem 1- Planning project

Part 1
Your book talks about the “Scope Triangle” or the Iron Triangle. 
Question 1: Your book addresses six areas that are part of the iron triangle – 

  1. Describe each of the areas included in the iron triangle
  2. Of the six which areas do you feel are the most important and why? 

Question 2: You are managing a project and your sponsor has given the following constraints:

  1. The project must be completed in 2 months
  2. The project must include 7 core pieces of scope
  3. The project must stay within 1 million dollars

What concerns do you have with the three constraints above and how do you proceed?

Part 2

Scope Creep – Discuss ways in which scope creep occurred on projects with which you have been associated.  Was the project manager able to reverse scope creep? Is it possible to reverse scope creep and what is the impact? How do you identify scope creep?

Text

Title: Effective Project Management 

ISBN: 9781119562801 

Authors: Robert K. Wysocki 

Publisher: Wiley 

Publication Date: 2019-05-07 

Edition: 8th Edition

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Access Control

Discussion (350-400 words):
The Personal Identity Verification (PIV) card is used in non-military government agencies for authentication and identification to gain access to systems, networks, and online resources. These cards, in combination with a personal identification number, meet two-factor requirements. PIV credentials also are designed to help reduce counterfeiting and are tamper-resistant.An authenticator app, such as Google Authenticator, is another method to achieve two-factor authentication. It is a free app available for installation on mobile devices.The U.S. federal government authorizes the use of PIVs as well as authenticator apps, depending on the circumstances.Answer the following question(s):

  1. In what type of situation would an authenticator app provide adequate two-factor authentication for federal government use? Provide rationale or a citation for your answer.
  2. In what type of situation would a PIV be required for federal government use? Provide rationale or a citation for your answer.

Assignment (to be completed in the attached document only):
 

Assignment Requirements

This assignment helps you develop an information classification plan to ensure the privacy and confidentiality of corporate information and ensure that public information is accessible by all. You are provided with a worksheet named “Implementation of an Information Classification Policy” to complete this assignment. Before you begin this assignment, review all that you have learned related to information classification and access control. For this assignment:

  1. Complete the Information Classification Standard Matrix. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Datebase HW Week 6

 3.44 What is a referential integrity constraint? Define the term, and give an example of its use. Are null values allowed in foreign key columns with a referential integrity constraint? How does the referential integrity constraint contribute to database integrity? 

3.45 Explain the role of referential integrity constraints in normalization. 

3.46 Do relations StudID_SocialSecurityNumber and SocialSecurityNumber_StudName contain a transitive dependency? 

3.47 In normalization example 3, why is the EXTENDED_PRICE relation “silly”? 

3.48 In normalization example 4, under what conditions is the functional dependency (StudentID, Activity) S ActivityFee more accurate than Activity S ActivityFee 

3.49 If a determinant is part of a candidate key, is that good enough for BCNF? 

 3.50 In normalization example 5, why are the following two tables not correct? DEPARTMENT (Department, DeptBudgetCode, Buyer) SKU_DATA_4 (SKU, SKU_Description, Department) 

3.51 How does a multivalued dependency differ from a functional dependency? 

3.52 Consider the relation: PERSON (Name, Sibling, ShoeSize) Assume that the following functional dependencies exist: Name S S Sibling Name S ShoeSize Describe deletion, modification, and insertion anomalies for this relation. 

3.53 Why is BCNF referred to as the best of the forms? 

3.54 Consider the relation: PERSON_2 (Name, Sibling, ShoeSize, Hobby) Assume that the following functional dependencies exist: Name S S Sibling Name S ShoeSize Name S S Hobby Describe deletion, modification, and insertion anomalies for this relation. 

3.55 What must we know in order to find functional dependencies in a table? 

3.56 What is a multivalued dependency? 

3.57 How do the conditions for DK/NF correspond to the conditions for BCNF 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Extra -9

 

In discussing the IoT state of the Union Topic, Please respond to the following questions?

1) How can you generate value from the data transmitted through the connected devices and how would you manage this data?

2) the Internet of things data is noisy and contains gaps and false readings. Please describe how would you filter process transform and enrich this data and would it be possible to store this data in standard tables with rows and columns? 

3) describe the process for analyzing data generated from the Internet of things connected devices? please name some of the analytic devices out there?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Security basics

 Using the template write 2 tips you learned from the reading material. Each tip should be 2 -3 sentences in length and should be different from others you’ve previously provided.  Citations and references are not required.  

I wrote the topic for each tip in the word doc. 2-3 sentences for each tip.

due March 4 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

C# static class values and methods

Research static class variables and methods. Provide as much information about both that you can find and provide at least one simple code example for both that explains how they are constructed/work.

350 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Healthcare Networking and Security

1. Design a detailed disaster preparedness for the network of a 120 inpatient bed facility.

2. Using the core functions of the National Institute of Standards and Technology (NIST) framework, design a security plan on how to better protect the facility’s cyber security above.

3. Using draw.io, design a network topology to include a DM and explain 2 security implications of the DMZ.

Note: You MUST have a cover page with all the details for a standard paper. All your citations and references MUST be properly formatted in accordance with the latest APA standards. Your work MUST to logical, technical, and reflective of graduate writing.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment: Development Plan for Three Skills

What to submit/deliverables: Word document that contains the Week 9 Assignment Template.

What is the value of doing this assignment? For the last nine weeks, you’ve been learning how the 10 Skills are an essential part of being successful in the future world of work. In Week 4 Assignment, you began to reflect on your skills and goals and how the 10 Skills have helped you reach accomplishments. Your understanding of the skills has been refined, and now it’s time to reflect on your strengths and areas for growth again in order to develop a plan moving forward.

For this assignment, you’ll identify three skills that you’d like to focus on and develop a plan for. This could be the three skills you wrote about for Week 2 Assignment or three new skills. As you think of which skills you’d like to improve upon, consider choosing skills at varying levels. You might, for example, choose a skill that you are already strong in, but would be excited to continue exploring and building upon, as well as a skill in which you might have more room for growth. At the end of the assignment, you’ll leave with the beginning of a tangible plan for personal and professional development that you can review with the Career Center team.

Your goal for this assignment is to: Practice your communication skill by using the Week 9 Assignment Template to outline a plan for developing skills to support a successful learning experience and career. To truly develop your communication skill it is important that you write using your own words and do not cut and paste from the Skills Definition table or any other source. (See the Skill Development Plan Sample .)

Steps to complete: In Week 9, complete and submit your Development Plan for Three Skills using the following steps:

STEP 1: Identify the targeted skill. Summarize your strengths and areas of improvement in this skill area. Then, identify your desired outcomes around this skill area and write a positive goal statement. Review the Skills Definition table if you need a quick reminder of the 10 skills. Complete the following sections of the template:

• Target Skill
• Strengths
• Areas of Improvement
• Desired Outcome
• Goal Statement

STEP 2: Specify the actions you can take to work towards your goals, with specific strategies and practices that you can apply. Identify any potential obstacles and challenges to achieving your goal. Complete the following sections of the template:

• Practices for Growth
• Action Steps
• Potential Obstacles and Challenges

STEP 3: Keeping your action plan in mind, identify trusted supporters and university resources that can help you in your skill development plan. Complete the following sections of the template:

• Key Supporters
• Supporting University Resources

STEP 4: Reflect on the connections between skill development and your overall personal, academic, and professional goals. Complete the following sections of the template:

Benefits From Change and Connections to Personal, Academic, and Career Goals.

STEP 5: Complete Steps 1–4 for the two other skills you have identified. When you are done you should have three plans filled out in the template for three different skills.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assembly language code

 

1. Create a variable that is a BYTE with the value 67. What is the value shown in memory? Show work verifying the value that is set.

2. Create a variable that uses 8-bits and correctly stores the value -83. Show what the memory contains and work verifying the result.

3. Create an unsigned 16-bit number that stores the value 13330 (decimal). Show what the memory contains and work verifying the result.

4. Create a signed 16-bit number and store the value -32 (decimal). Show what the memory contains and work verifying the result.

5. Create a variable to hold the value 12345678h (unsigned). (a) Move that variable’s value to the EAX register. (b) Set the AH register to 12. (c) Set the AL register to the value 34. Show the values of the EAX register before and after each parts (a)-(c). Verify that data is being moved as expected and describe it.

6. Write a program using signed 8-bit variables that computes finalVal = 2*X + 3*Y – Z. X, Y, and Z should be variables that are created in your .data section. Additionally, start with X = 1; Y should be set to five times the value of X. Z should be two times the value of X. Only X should be set in the data section; Y and Z should start uninitialized and then set in the main procedure as described. Create the program in assembly to compute finalVal. Does the value that is computed make sense (show work). In separate runs of the program double your value of X continuing to set the values for X, Y, and Z such that Y = 5X and Z = 2X until the value stored in finalVal no longer make sense. What are the values of X, Y, and Z before and after the result stored is correct. Show the contents in memory and describe why the value in finalVal no longer makes sense.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now