Specialization

 Journal Reflection on Topic Ideas  Share your topic idea(s) here. Here are some things to consider: Identify a topic in your specialization. (For IT students, Information Technology is not a topic, however, Millennial’s perceptions of smart phone technology could be a topic. These are examples).   What is the cited problem? The problem you want to … Read more

110p1

Project: Certification and Accreditation System Security Plan. The purpose of the system security plan (SSP) is to provide an overview of the security requirements of the system being certified. It describes the controls in place or planned for meeting those requirements. It also delineates the responsibilities and expected behaviors of all individuals who access the … Read more

Applied IT DQ 1

Using what you have learned in the IT Program thus far and conducting further research, discuss the following: The factors involved in the evaluation of an Information Technology project. The factors that must be considered when implementing short- versus long-term solutions. The value these solutions can bring to the organization. Project Plan Determination Discuss and … Read more

Assignment Question

The purpose of this assignment is to examine the components of a research article and help you identify guidelines for conducting critical analyses of published works.  The knowledge gained should be applied when completing your weeks 3 and 5 research assignments.  As you complete assignments it is a good idea to proof read your work or … Read more

Python programming

I need help to write this following code in python. 1. DynamicEntity (class) – Inherits from Entity DynamicEntity is an abstract class which provides base functionality for special types of Entities that are dynamic (e.g. can move from their original position). set_position(self, new_position: tuple[int, int]) -> None Updates the DynamicEntity’s position to new_position, assuming it … Read more

discussion

Investigate and discuss 2-3 potential employers of students in your field.  Are all profiles similar?  Do you notice some differences?  Search on social media for comments about these employers and its products and services.  What is the public’s perception?

Question1

 Search the internet and explain the following terms with case studies. Computer Crimes such as: Hacking, Online Scams, Fraud, Embezzlement, Sabotage, Forgery, and Legislation for Privacy and Access to Information