Computer Science 513 assignment 3

Question 1: Convert 2 base-10 numbers – (106 and -2) –  to 8-bit binary numbers.  Then, add the two binary numbers.  Show your arithmetic. Question 2: Convert 2 base-10 numbers – (106 and 90) – to 8-bit binary numbers.  Then subtract the second number from the first number.  Show your arithmetic  Question 3: Is this … Read more

Week 2 Discussion – Project Structure

 You are working with your project sponsor to decide on the optimal project management structure for an upcoming complex project that will involve more than 100 members. The project is similar in complexity to the Marriott Hotel headquarters relocation project, described in the Marriot International Headquarters Headquarters and Hotel Project on the Montgomery County MD … Read more

INTRODUCTION TO CYBERSECURTY

Part I:  Course Feedback.  Please provide feedback on the course. What did you like, what did you learn, what did you not like and what can I do to improve the course?  Part II:  Mr Scott is considering partnering with a company.  The transaction is not public yet and Mr. Scott has asked what we … Read more

INTRODUCTION TO CYBERSECURTY

Assuming you are planning to work in the Northern Virginia area after graduation.  There are some resources to prepare you for this.  This week’s discussion is about planning for your future.   1. 1.  Review the 2022 Labor Market: https://www.nvcc.edu/osi/labor-market/_docs/23-001-IndexSurveyReport22-final-web.pdfLinks to an external site. 2.  2. Download and read/review the Greater Washington Technology Workforce Needs Assessment report.  … Read more

Career Path

For this assignment, you will conduct research on the career path (Software Developer) you plan to pursue and develop a PowerPoint presentation that addresses the following: Professional Organizations. Find a minimum of three professional organizations that may help someone enter the desired career field. Volunteer Opportunities. Identify volunteer opportunities related to the field you are … Read more

Communications

Explain why you agree or disagree with some of the suggestions covered this week for improving project communications, such as creating a communications management plan, stakeholder analysis, or performance reports for IT software development projects. Justify your response. What other suggestions do you have?

INTRODUCTION TO CYBERSECURTY

Discussion 3 Physical Vulnerability assessment of security perimeters of TechWorx. Assignment: Mr. Scott wants a Physical vulnerability assessment of the security perimeters of TechWorx.  Chapters 3.6 (Gupta and Goyal) Chapter 4 (Fennelly) Minimum Requirements: Inside the Techworx building: 1st-floor reception and access to stairs, elevators, loading dock, and restrooms 2d floor offices and conference rooms … Read more

assingment

Overview One important project planning activity is to create a communication  plan that helps establish clear and efficient lines of communication. In  this assignment, you will create a communication plan for the XYZ  Business Workflow project. Prompt Create a communication plan for the XYZ Business Workflow software  development project team. Use the scenario and project … Read more

diss 5 soft

 Find a simple recipe in a cookbook or online. Rewrite your recipe using a combination of pseudocode with either a flowchart or an IPO chart. Be sure you declare your variables in the pseudocode. Discuss what role thinking through a recipe like this plays in better programming.

Introducing to Cybersecurty

During this quarter we will use a fictitious company called TechWorx.   Your boss is the CEO, Mr. Mike Scott.  He does not know a lot about IT or Cybersecurity so he will rely on your recommendations and expertise.   He recently was at a meeting where the McCumber Cube came up.  He is interested in your … Read more