Category: Computer Science

SOFTWARE – ASSIG

  Why is project scope management so challenging in IT projects? And What suggestions do you have for preventing scope creep in projects? Go to following PMI site  and review top 5 causes of Scope Creep for more information. https://www.pmi.org/learning/library/top-five-causes-scope-creep-6675

Read More

Network Architecture

 Implement a LAN, CAN, and WAN for a university with three campuses. The campus locations are Washington, DC; Vienna, VA, and Phoenix, AZ. Include the architecture and components for each location. Writing Requirements APA format, 3-4 pages in length (excluding cover page, abstract, and reference list) Paper should include at least 3-4 references

Read More

SOFTWARE MANAGEMENT -4

1. Using Microsoft Project, add a project start time of 0 (or January 1) and a required project completion time of 180 days, calculate the ES, EF, LS, and LF times and total slack for each activity. If your calculations result in a project schedule with negative total slack, revise the project scope, activity estimated […]

Read More

Intro Comp

In this discussion, you are going to explore how digital computing has changed the world. You will select a specific area to research the impacts of digital computing. Feel free to choose something that you find particularly interesting or that relates to your future career goals. Since digital computing has now impacted just about every […]

Read More

SECURITY ASSESSMENT & TESTING

Business case:  Financial institution ( i.e. Bank)  The bank has a data center with the following assets.  Database   for customers  ( 55,000 customers )  Database   for employees  ( 500 Employees)  Serves, data storage, and long-term archive   and address the blow given questions Question 1 :  How to Perform an IT Cyber Security Risk Assessment for this […]

Read More

SECURE CLOUD ARCHITECTURE

As the  IT Manager, you were tasked to improve the performance of the local airport passenger processing system.  The new airport will have fewer employees and a faster passenger processing system. This is to make the Airport more efficient and more secure. The new system will replace the boarding pass and ID Control personnel with […]

Read More

Tech Brief on Current Alerts

  Choose an Alert closely related to the weekly topic and write a concise summary using the template. Assignment Directions:   The US Government Cybersecurity & Infrastructure Security Agency (CISA) provides timely notification to critical infrastructure owners and operators concerning threats to critical infrastructure networks. Each week, review the .     Choose a topic closely related […]

Read More

Understanding Different Data Backup Techniques

  Identify the differences between using the two different combinations of data backup techniques.  Assignment Directions: Briefly discuss the differences between using the two different combinations of data backup techniques.  In a word document, discuss the assigned topic in approximately ten sentences.   

Read More

Creating an Effective Disaster Recovery Plan

  Discuss how a proper disaster recovery plan should be created. For this discussion, point out all the key elements of a disaster recovery plan and how these elements should be implemented. Respond to two peers.   Compare and contrast their disaster recovery plans with yours.  Expound on key differences and similiarities. 

Read More

HW: Are Your Articles Research Articles?

Assignment Content In class today, you were asked to find research articles that explore your approved research question. (DO NOT ATTEMPT THIS ASSIGNMENT UNLESS YOU HAVE COMPLETED THE PREVIOUS ASSIGNMENT and gained approval of a research question: Research Question Proposals.) For this assignment, follow directions CAREFULLY: Step 1: download the document below which is your Finals Packet: […]

Read More