SlideShare a Scribd company logo
1. Reply to Discussion ( Minimum 200 Words)
1. What types of ethical issues and information security issues
are common in organizations?
Ethical issues that companies are faced with is ensuring the
proper use of the employee, user, and technological data that
the company has in their possession. Some organizations have
been known in the past to sell the data that the users provide
them. This could be an ethical issue by selling the data that is
trusted to the organization this falls under the ethical issue of
confidentiality. Privacy is the issue of ensuring that the data is
secured against attacks and hacker trying to obtain the data.
Security issues include the organization developing policies and
procedures that ensure the proper use and protection of the data
the company has. To develop the policies and procedures a
company can have their team look at the OWASP top ten on the
OWASP website. (OWASP, 2017) This shows the top rated
security issues that the company can employ to ensure the
security of their data.
2. How can a company participating in e-business keep its
information secure?
A company can ensure that they are ad-hearing the OWASP
TOP ten along with making sure that the work stations and
servers are up to date with all current patches and anti-virus
software.
3. In regards to the organization or company you have chosen to
analyze this semester, what types of ethics and information
security concerns are there in your organization? What
recommendations would you make to the company to better
secure their information?
When it comes to recruiting service the data that we need to
protect is extremely important we take care of a significant
portion of the PII data. Ethical issues that come to though are
how the government uses the data which could be used for
personal gain or malicious purposes when it comes to the
applicant. I think that giving the applicant the power to put their
own information into a secure web site and then be allowed to
transmit their own information for security clearance would
allow the applicant and the air force to take the human element
middle man out of the equation and can help mitigate the ethical
issues that the organization is faced with. 1. What types of
ethical issues and information security issues are common in
organizations?
Ethical issues that companies are faced with is ensuring the
proper use of the employee, user, and technological data that
the company has in their possession. Some organizations have
been known in the past to sell the data that the users provide
them. This could be an ethical issue by selling the data that is
trusted to the organization this falls under the ethical issue of
confidentiality. Privacy is the issue of ensuring that the data is
secured against attacks and hacker trying to obtain the data.
Security issues include the organization developing policies and
procedures that ensure the proper use and protection of the data
the company has. To develop the policies and procedures a
company can have their team look at the OWASP top ten on the
OWASP website. (OWASP, 2017) This shows the top rated
security issues that the company can employ to ensure the
security of their data.
2. How can a company participating in e-business keep its
information secure?
A company can ensure that they are ad-hearing the OWASP
TOP ten along with making sure that the work stations and
servers are up to date with all current patches and anti-virus
software. Ensuring that the proper protocols and procedures are
in place when it come to the security of the information that the
organization is entrusted with is secure should be at the
forefront of all priorities of every company.
3. In regards to the organization or company you have chosen to
analyze this semester, what types of ethics and information
security concerns are there in your organization? What
recommendations would you make to the company to better
secure their information?
When it comes to recruiting service the data that we need to
protect is extremely important we take care of a significant
portion of the PII data. Ethical issues that come to though are
how the government uses the data which could be used for
personal gain or malicious purposes when it comes to the
applicant. I think that giving the applicant the power to put their
own information into a secure web site and then be allowed to
transmit their own information for security clearance would
allow the applicant and the air force to take the human element
middle man out of the equation and can help mitigate the ethical
issues that the organization is faced with.
Source
OWASP 17 October 2018) OWASP top 10, Retrieved
from; https://www.owasp.org/index.php/Category:OWASP_Top
_Ten_Project
2. Reply to Discussion ( Minimum 200 Words)
Part 1: Types of ethical and information security issues present
in e-business.
Well, ethics to mean means integrity, and integrity means doing
the right things even when nobody is looking. Ethics is about
know not only what to do, but what not to do. If I was an e-
business who had collected a massive customer database I
should keep that information trusted and secure. I shouldn't go
selling it to whomever might offer the highest price for it, as
tempting as it may be. Ethics also means not purposely doing
harm. This is where ensuring that information given to you,
perhaps transaction and banking information, should be locked
away in a secure database. It does not mean leave this data
exposed so that any hacker can easily gain access and wreak
havoc on our customers. We should also trust that our
employees act in an ethical manner. They should only access
that which they have been granted access to, and should not
share their credentials with others. Sharing log-in credentials in
the workplace violates trust, which is unethical, and it also
exposes information by opening it up to those who have no right
seeing it.
Part 2: how can we keep information secure.
We must use a multi-faceted approach. First, internally, we
must only provide access to those who need it. This is done via
identification, authentication, and then authorization. Identify
the user through a user name, or keycard. Authenticate them
with either passwords, biometrics, or a keycard. Then, when we
know who is at the computer, allow them to access the data that
they need. Second, we must secure the perimeter. Through the
use of firewalls, virus, and malware detection we can hopefully
keep intruders at bay. Finally, we must be ever vigilant and
make sure our software is kept up to date and that our protective
measures and policies are enforced.
Part 3: The company
It makes most sense to me to study the company I work for. It
allows me to not only learn about what issues we have, but I can
also point out things they may not yet have discovered.
Thankfully, and happily, I can say that the owners of the
company are all about doing things the right way the first time.
They do realize that they have humans that work for them and
that mistakes will be made. In regards to customer related
issues, they then make sure to work quickly to correct any
errors that may have occurred. As for information security,
most of the information we keep in house is paper and ink. I
have moved them more towards the digital age, archiving
documents digitally to make access to those items easier. We
do have a Sophos firewall, and utilize an outside IT company to
maintain our borders and our system. It was recently
discovered that in installing our new firewall, a key step was
missed. The step was prescanning everyone's computers for
viruses and malware before putting it in place. The best built
fence will keep out the unwanted, but if there is someone on the
inside to open the gate the fence isn't work anything. They will
now be coming in to scan and perhaps reimage everyone's
computer to remove trojans from the horse before they can do
further damage.
·
Agile Lean Transformational Leaders – Final Exam
Enterprise Lean is a coordinated state government program
directed through the Department of Administration. The
Enterprise Lean Program is an ambitious effort to reform and
reshape state government operations into those that are nimble,
embrace change, and continuously improve. In addition, the
Governor, has set forth several specific objectives for the
Enterprise Lean effort. They are:
1. Creating “one stop shop” opportunities for easier access to
government services;
2. Increasing secure and effective electronic delivery of
government services;
3. Streamlining common functions and activities;
4. Saving money through more efficient and effective service
delivery.
The programs focus is to improve organizational performance
through Lean thinking, concepts, tools, and methods.
You are tasked to lead this effort. You find several examples of
waste in state government and you proceed to categorize them
as follows:
Types of Waste
Examples
Defects
Incorrect data entry
Overproduction
Preparing extra report; reports not acted upon; multiple copies
in data storage
Transportation
Extra Steps in processes – distances traveled
Movement
Extra steps; extra data entry
Waiting
Processing monthly or in batches
Overprocessing
Extra sign-offs and hand-offs of work
Inventory
Transactions not processed
Underutilized Resources
People doing unchallenging work
Using this scenario please answer the following questions:
1. What are three (3) Lean leadership challenges faced by you
as the Lean Enterprise Program leader? List and describe each
one.
2. How would you overcome each of these challenges? What
would you do? Describe your method(s).
3. Select two of the types of waste from the list. What Lean
tools (i.e. Kaizen events, 5S, Kanban) would you deploy to
address the wastes you have selected? Explain why you
selected the particular tool. Describe how you might engage the
employees in understanding the use, and importance, of the
tool.
1. Reply to Discussion ( Minimum 200 Words)
The project planning phase includes developing a project
schedule to follow during the life of the project. Developing a
project schedule requires both a scientific and artistic touch.
You have to be able to reflect what is written on the work
breakdown structure (WBS) and also have the political
background for the politically driven aspects of the project.
There are key sources to help develop a good schedule like the
scope statement, the work breakdown structure (WBS),
historical information, and expert judgements. The scope
statement has important information on the project deliverables,
as well as any assumptions and/or constraints that were noted.
The work breakdown structure identifies every task that needs
to happen for the project to finish. Any historical information
on previous projects would help create a good schedule,
especially the "lessons learned" sections of previous projects
and it's always good to run ideas through the senior functional
and technical, and/or managerial personnel to get feedback on
the current project at hand. To develop a schedule you have to
develop a network layout or diagram of the work breakdown
structure work packages because ultimately the tasks in the
network are the work packages, and the work packages have to
be accounted for in the schedule. In developing a good work
schedule it is also important to consider risks and develop
strategies to deal with any identified risks that may occur.
The project plan is important in a project because it the formal
document that guides the execution of a project. The project
plan coordinates all of the various processes and documents
used to manage and control a project. It can help generate
subsidiary plans and allows for risk management to be discussed
because risks are identified during this time. Planning helps
prevent future problems and poor planning can cause a number
issues later on such as unanticipated risks, insufficient detail, or
inadequate time for design or rework of components to the
project.
Top down or bottom up are two different estimation techniques
used. These two techniques can also be used to build a work
breakdown structure. The top down approach is less accurate
because it really depends on experience and analogy. The
bottom up approach starts at the task level, and "rolls up" to the
final project costs. It seems the bottom up method is more
commonly used for both developing the work breakdown
structure as well as estimating project costs.
2. Reply to Discussion ( Minimum 200 Words)
· What is are the key steps in developing a project schedule?
· Network diagrams
· Gantt charts
· Mileston charts
· Why is project plan important in a project?
· As the text describes, unexpected difficulties can arise and its
better to have them expected than unexpected. By planning and
discussing, we would be able to possibly gauge the impact of
what one of those difficulties could bring to the project.
Another point is that you could pick a design that is not user
friendly. This is a huge issue with the overall impact of the
project especially if the project will be customer based. The
user experience needs to be friendly and suitable for a vast
majority. Another I would like to highlight is inadequate time
for the design. That is really important because if the product is
rushed, it may not have been able to get the best results possible
and when it comes to business that can become costly.
· Discuss two types of Estimation techniques.
· Resource requirements - This establishes what will be needed
in order for the project to be completed and should already have
been determined prior to the estimation process.
· Historical Information - This covers a range of things that
were previously discovered on prior projects that are similar to
what the team is trying to do. This can highlight prior expenses,
methods used, files that have research into the matter and other
important pieces. The background research is important to the
projects development.
1. Reply to Discussion ( Minimum 200 Words)
Summarize the benefits of using advanced CSS3 for visual
effect
The new cascading style sheet version CSS3 has been a huge
leap forward from the old CSS3. The new version enhances the
look of your HTML page and it is compatible with older
versions which is nice. There are many times where a new
update, not just in CSS but anything you can think of, is not
compatible with a previous version. It is also simple and
independent. CSS2 was one large program and the new CSS3 is
compiled of small modules which in turn makes it easier and
simpler to use. It is now view and change friendly. Since it is
now broken up into smaller modules, it is simpler to change the
parts individually without massively affecting the other
components, which do not require any major changes. CSS3 is
like an independent language and is not dependent on
JavaScript. This makes it load faster and the new language is
compatible with all browsers.
It is now independent and cross browser compatible. It also
offers designers with special processes, which allow them to
design components in a very easy manner. It also has attractive
backgrounds. It allows designers to choose from multiple
backgrounds, which can be applied with ease. It also allows the
designers to apply beautiful borders on the page or site they are
creating. It has easy coding for images and animations. It allows
easy integration of the various images, which includes 3D, in
the project. Lastly, it offers testing features. Previous versions
required a lot of time to test to detect issues and bugs. However,
with CSS3’s smaller modules, testing of the individual
components becomes easy.
References
Web Development Tutorials, Tips & Techniques Home All
Tutorials Subscribe 9 Great benefits to using CSS3 (2015,
September 17). In CSSnewbie. Retrieved from
https://cssnewbie.com/9-great-benefits-to-using-css3/
2. Reply to Discussion ( Minimum 200 Words)
CSS3 has made quite a few things easier to create and a lot
more simple when trying to code it. As the CSS technology
emerged it made coding large websites much easier. As they
have modified and strealined the CSS technology, they have
only made it even better.
One of the best qualities of CSS3 is that it can immensely help
the visual enhancement of your website.
CSS3 allows for a very easy integration of images, 3D images,
videos and animations.
Along with these big features, you can easily customize your
text and look of the page inside of your CSS3 file. Basically all
these enhancements bring a lot of life and visual appeal to your
website. While doing this, CSS3 allows for the creation and
modification of these visual enhancements very easily.
So for my website this week, I plan on doing something with
transportation I believe. I think it will be cool to do some visual
effects with transportation type themes. Perhaps I can put in a
moving car or plane going across the screen or something to
that affect.

More Related Content

Similar to 1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx

Information Management best_practice_guide
Information Management best_practice_guideInformation Management best_practice_guide
Information Management best_practice_guideChristopher Bradley
 
Atha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docxAtha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docx
jaggernaoma
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
Priyanka Aash
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
aryan532920
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
Ravindra Babu
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider Attack
Susan Kennedy
 
Running head APPLE INC. PAGE 1APPLE INC. PAGE 12.docx
Running head APPLE INC.  PAGE 1APPLE INC.  PAGE 12.docxRunning head APPLE INC.  PAGE 1APPLE INC.  PAGE 12.docx
Running head APPLE INC. PAGE 1APPLE INC. PAGE 12.docx
toddr4
 
Compliance is a Team Project
Compliance is a Team ProjectCompliance is a Team Project
Compliance is a Team Project
The TNS Group
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)
hassan777898
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
sodhi3
 
SME- Developing an information governance strategy 2016
SME- Developing an information governance strategy 2016 SME- Developing an information governance strategy 2016
SME- Developing an information governance strategy 2016
Hybrid Cloud
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
PECB
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
Robert 'Bob' Reyes
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
Livingstone Advisory
 
Tips for businesses to minimize employee data theft instances
Tips for businesses to minimize employee data theft instancesTips for businesses to minimize employee data theft instances
Tips for businesses to minimize employee data theft instances
XNSPY
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
V2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
V2Infotech1
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
ObservePoint
 
Discussion 14by Santan Reddy Putchakayala - Friday, 10 Aug.docx
Discussion 14by Santan Reddy Putchakayala - Friday, 10 Aug.docxDiscussion 14by Santan Reddy Putchakayala - Friday, 10 Aug.docx
Discussion 14by Santan Reddy Putchakayala - Friday, 10 Aug.docx
theresiarede
 

Similar to 1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx (20)

Information Management best_practice_guide
Information Management best_practice_guideInformation Management best_practice_guide
Information Management best_practice_guide
 
Atha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docxAtha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docx
 
web-MINImag
web-MINImagweb-MINImag
web-MINImag
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider Attack
 
Running head APPLE INC. PAGE 1APPLE INC. PAGE 12.docx
Running head APPLE INC.  PAGE 1APPLE INC.  PAGE 12.docxRunning head APPLE INC.  PAGE 1APPLE INC.  PAGE 12.docx
Running head APPLE INC. PAGE 1APPLE INC. PAGE 12.docx
 
Compliance is a Team Project
Compliance is a Team ProjectCompliance is a Team Project
Compliance is a Team Project
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
 
SME- Developing an information governance strategy 2016
SME- Developing an information governance strategy 2016 SME- Developing an information governance strategy 2016
SME- Developing an information governance strategy 2016
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
Tips for businesses to minimize employee data theft instances
Tips for businesses to minimize employee data theft instancesTips for businesses to minimize employee data theft instances
Tips for businesses to minimize employee data theft instances
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
 
Discussion 14by Santan Reddy Putchakayala - Friday, 10 Aug.docx
Discussion 14by Santan Reddy Putchakayala - Friday, 10 Aug.docxDiscussion 14by Santan Reddy Putchakayala - Friday, 10 Aug.docx
Discussion 14by Santan Reddy Putchakayala - Friday, 10 Aug.docx
 

More from ambersalomon88660

1. Lists crimes and crime involvement on the Mendez brothers.2.I.docx
1. Lists crimes and crime involvement on the Mendez brothers.2.I.docx1. Lists crimes and crime involvement on the Mendez brothers.2.I.docx
1. Lists crimes and crime involvement on the Mendez brothers.2.I.docx
ambersalomon88660
 
1. Lists and analyzes strengths and weaknesses based on each of th.docx
1. Lists and analyzes strengths and weaknesses based on each of th.docx1. Lists and analyzes strengths and weaknesses based on each of th.docx
1. Lists and analyzes strengths and weaknesses based on each of th.docx
ambersalomon88660
 
1. List eight basic initiatives that companies can use to gain c.docx
1. List eight basic initiatives that companies can use to gain c.docx1. List eight basic initiatives that companies can use to gain c.docx
1. List eight basic initiatives that companies can use to gain c.docx
ambersalomon88660
 
1. Koffman Corporation is trying to raise capital. What method wou.docx
1. Koffman Corporation is trying to raise capital. What method wou.docx1. Koffman Corporation is trying to raise capital. What method wou.docx
1. Koffman Corporation is trying to raise capital. What method wou.docx
ambersalomon88660
 
1. List all the entities that interact with the TIMS system. Start b.docx
1. List all the entities that interact with the TIMS system. Start b.docx1. List all the entities that interact with the TIMS system. Start b.docx
1. List all the entities that interact with the TIMS system. Start b.docx
ambersalomon88660
 
1. Know the terminology flash cards.2. Know the hist.docx
1. Know the terminology flash cards.2. Know the hist.docx1. Know the terminology flash cards.2. Know the hist.docx
1. Know the terminology flash cards.2. Know the hist.docx
ambersalomon88660
 
1. Journal Entry The attached (BUROS Center for Testing).docx
1. Journal Entry  The attached (BUROS Center for Testing).docx1. Journal Entry  The attached (BUROS Center for Testing).docx
1. Journal Entry The attached (BUROS Center for Testing).docx
ambersalomon88660
 
1. Introduction and thesisThrough extensive research I hope to f.docx
1. Introduction and thesisThrough extensive research I hope to f.docx1. Introduction and thesisThrough extensive research I hope to f.docx
1. Introduction and thesisThrough extensive research I hope to f.docx
ambersalomon88660
 
1. Is it important the hospital to have a licensure to ensure that.docx
1. Is it important the hospital to have a licensure to ensure that.docx1. Is it important the hospital to have a licensure to ensure that.docx
1. Is it important the hospital to have a licensure to ensure that.docx
ambersalomon88660
 
1. INTRODUCTION In recent years, energy harvesting fro.docx
1. INTRODUCTION In recent years, energy harvesting fro.docx1. INTRODUCTION In recent years, energy harvesting fro.docx
1. INTRODUCTION In recent years, energy harvesting fro.docx
ambersalomon88660
 
1. INTRODUCTIONThe rapid of economic growth in China, is a fou.docx
1. INTRODUCTIONThe rapid of economic growth in China, is a fou.docx1. INTRODUCTIONThe rapid of economic growth in China, is a fou.docx
1. INTRODUCTIONThe rapid of economic growth in China, is a fou.docx
ambersalomon88660
 
1. Introduction to the Topica. What is outsourcingi. Ty.docx
1. Introduction to the Topica. What is outsourcingi. Ty.docx1. Introduction to the Topica. What is outsourcingi. Ty.docx
1. Introduction to the Topica. What is outsourcingi. Ty.docx
ambersalomon88660
 
1. Introduction 1. Technology and communication 1. Technology .docx
1. Introduction 1. Technology and communication 1. Technology .docx1. Introduction 1. Technology and communication 1. Technology .docx
1. Introduction 1. Technology and communication 1. Technology .docx
ambersalomon88660
 
1. In your definition of a well-run company, how important a.docx
1. In your definition of a well-run company, how important a.docx1. In your definition of a well-run company, how important a.docx
1. In your definition of a well-run company, how important a.docx
ambersalomon88660
 
1. In Chapter four titled Academy Training you learned about academi.docx
1. In Chapter four titled Academy Training you learned about academi.docx1. In Chapter four titled Academy Training you learned about academi.docx
1. In Chapter four titled Academy Training you learned about academi.docx
ambersalomon88660
 
1. In 200 words, describe how Hamlet promotes andor subverts th.docx
1. In 200 words, describe how Hamlet promotes andor subverts th.docx1. In 200 words, describe how Hamlet promotes andor subverts th.docx
1. In 200 words, describe how Hamlet promotes andor subverts th.docx
ambersalomon88660
 
1. Image 1 courtesy of httpswww.virginiahospitalcenter.com.docx
1. Image 1 courtesy of httpswww.virginiahospitalcenter.com.docx1. Image 1 courtesy of httpswww.virginiahospitalcenter.com.docx
1. Image 1 courtesy of httpswww.virginiahospitalcenter.com.docx
ambersalomon88660
 
1. If I were to create an SEL program, I would focus on self-awar.docx
1. If I were to create an SEL program, I would focus on self-awar.docx1. If I were to create an SEL program, I would focus on self-awar.docx
1. If I were to create an SEL program, I would focus on self-awar.docx
ambersalomon88660
 
1. Identify and discuss the factors that contribute to heritage cons.docx
1. Identify and discuss the factors that contribute to heritage cons.docx1. Identify and discuss the factors that contribute to heritage cons.docx
1. Identify and discuss the factors that contribute to heritage cons.docx
ambersalomon88660
 
1. I think that the top three management positions in a health pla.docx
1. I think that the top three management positions in a health pla.docx1. I think that the top three management positions in a health pla.docx
1. I think that the top three management positions in a health pla.docx
ambersalomon88660
 

More from ambersalomon88660 (20)

1. Lists crimes and crime involvement on the Mendez brothers.2.I.docx
1. Lists crimes and crime involvement on the Mendez brothers.2.I.docx1. Lists crimes and crime involvement on the Mendez brothers.2.I.docx
1. Lists crimes and crime involvement on the Mendez brothers.2.I.docx
 
1. Lists and analyzes strengths and weaknesses based on each of th.docx
1. Lists and analyzes strengths and weaknesses based on each of th.docx1. Lists and analyzes strengths and weaknesses based on each of th.docx
1. Lists and analyzes strengths and weaknesses based on each of th.docx
 
1. List eight basic initiatives that companies can use to gain c.docx
1. List eight basic initiatives that companies can use to gain c.docx1. List eight basic initiatives that companies can use to gain c.docx
1. List eight basic initiatives that companies can use to gain c.docx
 
1. Koffman Corporation is trying to raise capital. What method wou.docx
1. Koffman Corporation is trying to raise capital. What method wou.docx1. Koffman Corporation is trying to raise capital. What method wou.docx
1. Koffman Corporation is trying to raise capital. What method wou.docx
 
1. List all the entities that interact with the TIMS system. Start b.docx
1. List all the entities that interact with the TIMS system. Start b.docx1. List all the entities that interact with the TIMS system. Start b.docx
1. List all the entities that interact with the TIMS system. Start b.docx
 
1. Know the terminology flash cards.2. Know the hist.docx
1. Know the terminology flash cards.2. Know the hist.docx1. Know the terminology flash cards.2. Know the hist.docx
1. Know the terminology flash cards.2. Know the hist.docx
 
1. Journal Entry The attached (BUROS Center for Testing).docx
1. Journal Entry  The attached (BUROS Center for Testing).docx1. Journal Entry  The attached (BUROS Center for Testing).docx
1. Journal Entry The attached (BUROS Center for Testing).docx
 
1. Introduction and thesisThrough extensive research I hope to f.docx
1. Introduction and thesisThrough extensive research I hope to f.docx1. Introduction and thesisThrough extensive research I hope to f.docx
1. Introduction and thesisThrough extensive research I hope to f.docx
 
1. Is it important the hospital to have a licensure to ensure that.docx
1. Is it important the hospital to have a licensure to ensure that.docx1. Is it important the hospital to have a licensure to ensure that.docx
1. Is it important the hospital to have a licensure to ensure that.docx
 
1. INTRODUCTION In recent years, energy harvesting fro.docx
1. INTRODUCTION In recent years, energy harvesting fro.docx1. INTRODUCTION In recent years, energy harvesting fro.docx
1. INTRODUCTION In recent years, energy harvesting fro.docx
 
1. INTRODUCTIONThe rapid of economic growth in China, is a fou.docx
1. INTRODUCTIONThe rapid of economic growth in China, is a fou.docx1. INTRODUCTIONThe rapid of economic growth in China, is a fou.docx
1. INTRODUCTIONThe rapid of economic growth in China, is a fou.docx
 
1. Introduction to the Topica. What is outsourcingi. Ty.docx
1. Introduction to the Topica. What is outsourcingi. Ty.docx1. Introduction to the Topica. What is outsourcingi. Ty.docx
1. Introduction to the Topica. What is outsourcingi. Ty.docx
 
1. Introduction 1. Technology and communication 1. Technology .docx
1. Introduction 1. Technology and communication 1. Technology .docx1. Introduction 1. Technology and communication 1. Technology .docx
1. Introduction 1. Technology and communication 1. Technology .docx
 
1. In your definition of a well-run company, how important a.docx
1. In your definition of a well-run company, how important a.docx1. In your definition of a well-run company, how important a.docx
1. In your definition of a well-run company, how important a.docx
 
1. In Chapter four titled Academy Training you learned about academi.docx
1. In Chapter four titled Academy Training you learned about academi.docx1. In Chapter four titled Academy Training you learned about academi.docx
1. In Chapter four titled Academy Training you learned about academi.docx
 
1. In 200 words, describe how Hamlet promotes andor subverts th.docx
1. In 200 words, describe how Hamlet promotes andor subverts th.docx1. In 200 words, describe how Hamlet promotes andor subverts th.docx
1. In 200 words, describe how Hamlet promotes andor subverts th.docx
 
1. Image 1 courtesy of httpswww.virginiahospitalcenter.com.docx
1. Image 1 courtesy of httpswww.virginiahospitalcenter.com.docx1. Image 1 courtesy of httpswww.virginiahospitalcenter.com.docx
1. Image 1 courtesy of httpswww.virginiahospitalcenter.com.docx
 
1. If I were to create an SEL program, I would focus on self-awar.docx
1. If I were to create an SEL program, I would focus on self-awar.docx1. If I were to create an SEL program, I would focus on self-awar.docx
1. If I were to create an SEL program, I would focus on self-awar.docx
 
1. Identify and discuss the factors that contribute to heritage cons.docx
1. Identify and discuss the factors that contribute to heritage cons.docx1. Identify and discuss the factors that contribute to heritage cons.docx
1. Identify and discuss the factors that contribute to heritage cons.docx
 
1. I think that the top three management positions in a health pla.docx
1. I think that the top three management positions in a health pla.docx1. I think that the top three management positions in a health pla.docx
1. I think that the top three management positions in a health pla.docx
 

Recently uploaded

Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 

Recently uploaded (20)

Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 

1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx

  • 1. 1. Reply to Discussion ( Minimum 200 Words) 1. What types of ethical issues and information security issues are common in organizations? Ethical issues that companies are faced with is ensuring the proper use of the employee, user, and technological data that the company has in their possession. Some organizations have been known in the past to sell the data that the users provide them. This could be an ethical issue by selling the data that is trusted to the organization this falls under the ethical issue of confidentiality. Privacy is the issue of ensuring that the data is secured against attacks and hacker trying to obtain the data. Security issues include the organization developing policies and procedures that ensure the proper use and protection of the data the company has. To develop the policies and procedures a company can have their team look at the OWASP top ten on the OWASP website. (OWASP, 2017) This shows the top rated security issues that the company can employ to ensure the security of their data. 2. How can a company participating in e-business keep its information secure? A company can ensure that they are ad-hearing the OWASP TOP ten along with making sure that the work stations and servers are up to date with all current patches and anti-virus software. 3. In regards to the organization or company you have chosen to analyze this semester, what types of ethics and information security concerns are there in your organization? What recommendations would you make to the company to better secure their information? When it comes to recruiting service the data that we need to protect is extremely important we take care of a significant portion of the PII data. Ethical issues that come to though are
  • 2. how the government uses the data which could be used for personal gain or malicious purposes when it comes to the applicant. I think that giving the applicant the power to put their own information into a secure web site and then be allowed to transmit their own information for security clearance would allow the applicant and the air force to take the human element middle man out of the equation and can help mitigate the ethical issues that the organization is faced with. 1. What types of ethical issues and information security issues are common in organizations? Ethical issues that companies are faced with is ensuring the proper use of the employee, user, and technological data that the company has in their possession. Some organizations have been known in the past to sell the data that the users provide them. This could be an ethical issue by selling the data that is trusted to the organization this falls under the ethical issue of confidentiality. Privacy is the issue of ensuring that the data is secured against attacks and hacker trying to obtain the data. Security issues include the organization developing policies and procedures that ensure the proper use and protection of the data the company has. To develop the policies and procedures a company can have their team look at the OWASP top ten on the OWASP website. (OWASP, 2017) This shows the top rated security issues that the company can employ to ensure the security of their data. 2. How can a company participating in e-business keep its information secure? A company can ensure that they are ad-hearing the OWASP TOP ten along with making sure that the work stations and servers are up to date with all current patches and anti-virus software. Ensuring that the proper protocols and procedures are in place when it come to the security of the information that the organization is entrusted with is secure should be at the forefront of all priorities of every company. 3. In regards to the organization or company you have chosen to
  • 3. analyze this semester, what types of ethics and information security concerns are there in your organization? What recommendations would you make to the company to better secure their information? When it comes to recruiting service the data that we need to protect is extremely important we take care of a significant portion of the PII data. Ethical issues that come to though are how the government uses the data which could be used for personal gain or malicious purposes when it comes to the applicant. I think that giving the applicant the power to put their own information into a secure web site and then be allowed to transmit their own information for security clearance would allow the applicant and the air force to take the human element middle man out of the equation and can help mitigate the ethical issues that the organization is faced with. Source OWASP 17 October 2018) OWASP top 10, Retrieved from; https://www.owasp.org/index.php/Category:OWASP_Top _Ten_Project 2. Reply to Discussion ( Minimum 200 Words) Part 1: Types of ethical and information security issues present in e-business. Well, ethics to mean means integrity, and integrity means doing the right things even when nobody is looking. Ethics is about know not only what to do, but what not to do. If I was an e- business who had collected a massive customer database I should keep that information trusted and secure. I shouldn't go selling it to whomever might offer the highest price for it, as tempting as it may be. Ethics also means not purposely doing harm. This is where ensuring that information given to you, perhaps transaction and banking information, should be locked away in a secure database. It does not mean leave this data exposed so that any hacker can easily gain access and wreak havoc on our customers. We should also trust that our employees act in an ethical manner. They should only access
  • 4. that which they have been granted access to, and should not share their credentials with others. Sharing log-in credentials in the workplace violates trust, which is unethical, and it also exposes information by opening it up to those who have no right seeing it. Part 2: how can we keep information secure. We must use a multi-faceted approach. First, internally, we must only provide access to those who need it. This is done via identification, authentication, and then authorization. Identify the user through a user name, or keycard. Authenticate them with either passwords, biometrics, or a keycard. Then, when we know who is at the computer, allow them to access the data that they need. Second, we must secure the perimeter. Through the use of firewalls, virus, and malware detection we can hopefully keep intruders at bay. Finally, we must be ever vigilant and make sure our software is kept up to date and that our protective measures and policies are enforced. Part 3: The company It makes most sense to me to study the company I work for. It allows me to not only learn about what issues we have, but I can also point out things they may not yet have discovered. Thankfully, and happily, I can say that the owners of the company are all about doing things the right way the first time. They do realize that they have humans that work for them and that mistakes will be made. In regards to customer related issues, they then make sure to work quickly to correct any errors that may have occurred. As for information security, most of the information we keep in house is paper and ink. I have moved them more towards the digital age, archiving documents digitally to make access to those items easier. We do have a Sophos firewall, and utilize an outside IT company to maintain our borders and our system. It was recently discovered that in installing our new firewall, a key step was missed. The step was prescanning everyone's computers for viruses and malware before putting it in place. The best built fence will keep out the unwanted, but if there is someone on the
  • 5. inside to open the gate the fence isn't work anything. They will now be coming in to scan and perhaps reimage everyone's computer to remove trojans from the horse before they can do further damage. · Agile Lean Transformational Leaders – Final Exam Enterprise Lean is a coordinated state government program directed through the Department of Administration. The Enterprise Lean Program is an ambitious effort to reform and reshape state government operations into those that are nimble, embrace change, and continuously improve. In addition, the Governor, has set forth several specific objectives for the Enterprise Lean effort. They are: 1. Creating “one stop shop” opportunities for easier access to government services; 2. Increasing secure and effective electronic delivery of government services; 3. Streamlining common functions and activities; 4. Saving money through more efficient and effective service delivery. The programs focus is to improve organizational performance through Lean thinking, concepts, tools, and methods. You are tasked to lead this effort. You find several examples of waste in state government and you proceed to categorize them as follows: Types of Waste Examples Defects Incorrect data entry Overproduction Preparing extra report; reports not acted upon; multiple copies in data storage Transportation
  • 6. Extra Steps in processes – distances traveled Movement Extra steps; extra data entry Waiting Processing monthly or in batches Overprocessing Extra sign-offs and hand-offs of work Inventory Transactions not processed Underutilized Resources People doing unchallenging work Using this scenario please answer the following questions: 1. What are three (3) Lean leadership challenges faced by you as the Lean Enterprise Program leader? List and describe each one. 2. How would you overcome each of these challenges? What would you do? Describe your method(s). 3. Select two of the types of waste from the list. What Lean tools (i.e. Kaizen events, 5S, Kanban) would you deploy to address the wastes you have selected? Explain why you selected the particular tool. Describe how you might engage the employees in understanding the use, and importance, of the tool. 1. Reply to Discussion ( Minimum 200 Words) The project planning phase includes developing a project schedule to follow during the life of the project. Developing a project schedule requires both a scientific and artistic touch. You have to be able to reflect what is written on the work breakdown structure (WBS) and also have the political background for the politically driven aspects of the project. There are key sources to help develop a good schedule like the scope statement, the work breakdown structure (WBS),
  • 7. historical information, and expert judgements. The scope statement has important information on the project deliverables, as well as any assumptions and/or constraints that were noted. The work breakdown structure identifies every task that needs to happen for the project to finish. Any historical information on previous projects would help create a good schedule, especially the "lessons learned" sections of previous projects and it's always good to run ideas through the senior functional and technical, and/or managerial personnel to get feedback on the current project at hand. To develop a schedule you have to develop a network layout or diagram of the work breakdown structure work packages because ultimately the tasks in the network are the work packages, and the work packages have to be accounted for in the schedule. In developing a good work schedule it is also important to consider risks and develop strategies to deal with any identified risks that may occur. The project plan is important in a project because it the formal document that guides the execution of a project. The project plan coordinates all of the various processes and documents used to manage and control a project. It can help generate subsidiary plans and allows for risk management to be discussed because risks are identified during this time. Planning helps prevent future problems and poor planning can cause a number issues later on such as unanticipated risks, insufficient detail, or inadequate time for design or rework of components to the project. Top down or bottom up are two different estimation techniques used. These two techniques can also be used to build a work breakdown structure. The top down approach is less accurate because it really depends on experience and analogy. The bottom up approach starts at the task level, and "rolls up" to the final project costs. It seems the bottom up method is more commonly used for both developing the work breakdown structure as well as estimating project costs. 2. Reply to Discussion ( Minimum 200 Words)
  • 8. · What is are the key steps in developing a project schedule? · Network diagrams · Gantt charts · Mileston charts · Why is project plan important in a project? · As the text describes, unexpected difficulties can arise and its better to have them expected than unexpected. By planning and discussing, we would be able to possibly gauge the impact of what one of those difficulties could bring to the project. Another point is that you could pick a design that is not user friendly. This is a huge issue with the overall impact of the project especially if the project will be customer based. The user experience needs to be friendly and suitable for a vast majority. Another I would like to highlight is inadequate time for the design. That is really important because if the product is rushed, it may not have been able to get the best results possible and when it comes to business that can become costly. · Discuss two types of Estimation techniques. · Resource requirements - This establishes what will be needed in order for the project to be completed and should already have been determined prior to the estimation process. · Historical Information - This covers a range of things that were previously discovered on prior projects that are similar to what the team is trying to do. This can highlight prior expenses, methods used, files that have research into the matter and other important pieces. The background research is important to the projects development. 1. Reply to Discussion ( Minimum 200 Words) Summarize the benefits of using advanced CSS3 for visual effect The new cascading style sheet version CSS3 has been a huge
  • 9. leap forward from the old CSS3. The new version enhances the look of your HTML page and it is compatible with older versions which is nice. There are many times where a new update, not just in CSS but anything you can think of, is not compatible with a previous version. It is also simple and independent. CSS2 was one large program and the new CSS3 is compiled of small modules which in turn makes it easier and simpler to use. It is now view and change friendly. Since it is now broken up into smaller modules, it is simpler to change the parts individually without massively affecting the other components, which do not require any major changes. CSS3 is like an independent language and is not dependent on JavaScript. This makes it load faster and the new language is compatible with all browsers. It is now independent and cross browser compatible. It also offers designers with special processes, which allow them to design components in a very easy manner. It also has attractive backgrounds. It allows designers to choose from multiple backgrounds, which can be applied with ease. It also allows the designers to apply beautiful borders on the page or site they are creating. It has easy coding for images and animations. It allows easy integration of the various images, which includes 3D, in the project. Lastly, it offers testing features. Previous versions required a lot of time to test to detect issues and bugs. However, with CSS3’s smaller modules, testing of the individual components becomes easy. References Web Development Tutorials, Tips & Techniques Home All Tutorials Subscribe 9 Great benefits to using CSS3 (2015, September 17). In CSSnewbie. Retrieved from https://cssnewbie.com/9-great-benefits-to-using-css3/ 2. Reply to Discussion ( Minimum 200 Words) CSS3 has made quite a few things easier to create and a lot more simple when trying to code it. As the CSS technology emerged it made coding large websites much easier. As they
  • 10. have modified and strealined the CSS technology, they have only made it even better. One of the best qualities of CSS3 is that it can immensely help the visual enhancement of your website. CSS3 allows for a very easy integration of images, 3D images, videos and animations. Along with these big features, you can easily customize your text and look of the page inside of your CSS3 file. Basically all these enhancements bring a lot of life and visual appeal to your website. While doing this, CSS3 allows for the creation and modification of these visual enhancements very easily. So for my website this week, I plan on doing something with transportation I believe. I think it will be cool to do some visual effects with transportation type themes. Perhaps I can put in a moving car or plane going across the screen or something to that affect.