CLASS NAME:MIS600
PROFESSORS NAME:
STUDENTS NAME:
PROJECT NAME: NETWORK DESIGN
Content
Topic Page No.
Cover Page 1
Content 2
Executive summary 3
Project Charter 3
Earn Value Statement 11
Executive Summary
Network under a set of confined region is known as Intranet. It uses an IP protocol and IP-based tools like the file transfer application and web browsers that is provided by the server to only assigned IP address. Computer network communication is an important installation in a contemporary organization organisation. As the organization's service provision is improved through the reliable communication, its competition with related firms is enhanced and, therefore, valued competence. Ultimate network design as a mode of flow of information among employees and stakeholders in promotes coordination in the management, team work and services the business offer. This automatically improves the performance of the organisation at the good will of all workers.
It should be noted that an organisation's communication systems alone holds a large percentage in its performance that it should not be compromised, even on the slightest default. This would mean that the organisation would require an Information System that when a default occurs at any single point in the connection system, it would be easier to detect and reach that point as soon as possible. The design should be design with backbone network so temporally technical problem with not upset the performance of network communication. This is more appropriate in big organisations to maintain their data and communication confidentiality, integrity and accessibility. In networking design approach, the choice of device should be intelligently selected for the desired function, this will enhance performance in terms of managing security, traffic, errors in storage and transmitting information.
Documents and programs that are sensitive are run through LAN security domain system to create passwords for their protection against cybercrimes. The protected file would then be accessed by authorised personnel only. This would be an important idea where security of flowing information is paramount. Each set of the employee has got a privilege to prevent the access of any restricted file in the company.
Project Charter
Project Name
Network Design
Project Number
DW2
Project Team
Sponsor: Robert Elson
Author : Jacobs Adam
Manager: Joyce Rob.
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docxjasoninnes20
BUSINESS CASE CAPSTONE 2
BUSINESS CASE CAPSTONE 3
Business Case Capstone
Connie Farris
Raphael Brown
Jim Chambers
Shaun Cummings
Deandre Kralevic
Colorado Technical University
IT Capstone II
(IT488-1904B-01)
Henrietta Okora
Running head: BUSINESS CASE CAPSTONE 1
Business Case Capstone
Table of Contents
(Week 1) Section 1: Overview of the project (from IT487)3
Overview3
I75 Corridor4
Section 2: Requirements (from IT487)5
Section 3: Design (from IT487)7
Section 4: System development methodology9
Section 5: Work breakdown structure11
Section 6: Communication Plan13
(WEEK 2) Section 7: Quality Assurance Plan TBD15
(WEEK 3) Section 8: Documentation Plan TBD16
(Week 4) Section 9: Quality Assurance and results of test-case execution TBD17
Section 10: Project Closure18
References:19
(Week 1) Section 1: Overview of the project (from IT487)Overview
The Galactic Customer IT Services is IT Support Company with over 250,000 employees with companies in over 50 states with the main headquarters located in Gainesville, FL. The location chosen for the headquarters is based on a Telco Gateway Infrastructure that the main fiber-optic truck line runs along the I75 corridor, from Miami Lakes FL to the northern part of Michigan. This I75 corridor plays an important part of the Networking ability for the organization. The Galactic Customer IT Services is an IT support company, which provides IT support to various small to large companies both within the Unites States and support to various military bases overseas. This large customer service company has installed application software to its large Help Desk ticketing system. The next phase being implemented is the upgrading of its Networking Infrastructure, which also includes cloud-based networking. This Organization has several new updated Servers ready to install on the network. With the previous project being accepted the organization has decided to move forward to improving its networking infrastructure, however the organization has request the project team to draft a plan that requires the following in the plan: Requirements, Design, System Development Methodology, WBS (Work Breakdown Structure), Communications Plan, Quality Assurance Plan, Documentation Plan, and Quality Assurance and results of test-case execution be the project can be closed. I75 Corridor
http://gregkantner.com/blog/wp-content/uploads/2012/05/interstate-75-map.gif
Section 2: Requirements (from IT487)
The project requirements here are derived from the software requirements for the Galactic customer services. The project was to create new ticketing software that the customer wanted upgraded and to completely replace the previous product. The requirements are the following:
• Ticket system
• Ticke ...
RUNNING HEAD Customer Care Website Implementation1Customer .docxjoellemurphey
RUNNING HEAD: Customer Care Website Implementation
1
Customer Care Website Implementation
27
Customer Care Website Implementation
Table of Contents
4Executive Summary
4Integration Management
4Project Scope Statement:
5Project Scope Justification:
5Project Success:
5Functional Area Interfaces
6Project Team Members and Roles:
6Project Team Reporting Structure:
7Project Deliverables:
7Project Closure Information
9Scope Management
9Scope Definition
9Work Breakdown Structure
9Time/Schedule Management
9Activity List
12Project Milestones:
12Project Cost Management
14Project Quality Management
14Project Deliverable Quality Requirements
14Project Deliverable Quality Monitoring
15Project Deliverable Quality Reporting
15Project Deliverable Quality Discrepancy Decisions
15Project Human Resource Management
15Resource Analysis
17Resource(s) Doing the Most Work
17Alternative Resource Assignments
17Resource Gap Analysis
17Optimization:
18Communications Management
18Project Team Communications
19Project Team Conflict Resolution
20Project Information to Monitor
20How to Collect Project Information
20Frequency for Project Information Collection
21Project Status Information and Recipients
21Plan and Take Adaptive Action
21Methods to Analyze the Impact of the Status Information
21Process/Procedures to Make Decisions that Affect the Project Schedule and Budget
22People Who Will Be Involved in Making Project Status Decisions
22Method to Communicate Project Status Decisions
23Project Risk Management
23Risk Management Plan:
25Procurement Management
25Conclusion
26References
Executive Summary
In this project we intend to streamline and enhance our customer’s user experience for his or her support related needs after or before a purchase have been made. Currently we only support a customer over the phone. At peak hours, this causes line congestion and long wait time for our customers resulting in dip in customer satisfaction level. The creation of a customer care website will allow our company to engage with the customer at multiple points including telephone which we already do. 90% of the calls we log are for general questions or are mostly order related which might not require a call in case a portal is available. This projects aims to create a customer care portal mentioned above for better customer satisfaction.
Over the last three years, our annual sales and revenues have almost tripled. While a phone support option was initially sufficient, peak hour service provision has become problematic. In case we want to go along with our existing support model, we would require to at least double our voice support specialist strength. This would result in additional recurring expenses for the company towards employee salary and equipment. The project should be able to address this issue as well and enable the company to achieve better operational excellence. Enhancement to the website will also be possible and will help us to align better with our customers.
Integrat ...
Week Four JournalObjectiveYou will identify key ethical proble.docxalanfhall8953
Week Four Journal
Objective
You will identify key ethical problems facing the company, create potential solutions to those problems, and explain why certain solutions are better than others.
Instructions
In this assignment, you will identify problems that face the two companies that you have chosen to study in this course. You will explain those problems, how they affect the company, and who or what is responsible for those problems. Then, you will attempt to provide solutions to those problems, also identifying the difficulties in implementing those solutions.
Please answer all questions in detail. Because this journal is worth 5% of your final grade, there is a high expectation for your participation. Grades for the journals are based on content, critical engagement, quality of reflection, and detail. Please submit the completed journal via the Assignment Basket found in the Week Four Journal tab on the left navigation toolbar by Day 7.
Problems Facing Not-for-Profit Company
1. Identify two to five problems that face your chosen not-for-profit company. Explain those problems.
a. Why do these problems exist? Present the background on these problems.
b. How do these problems impact the organization?
c. Who is responsible for these problems?
2. Identify potential solutions to those problems. Here, you can feel free to brainstorm and merely list various solutions to the problems that you identify.
3. Choose a best solution for each problem. Explain why that solution is the best solution. In addition, determine whether or not the solution is possible and what would need to be done to implement the solution.
Important note: Do your best to support your claims with evidence, facts, and information that you have learned about ethical theories and values throughout the course.
Problems Facing For-Profit Company
1. Identify two to five problems that face your chosen not-for-profit company. Explain those problems.
a. Why do these problems exist? Present the background on these problems.
b. How do these problems impact the organization?
c. Who is responsible for these problems?
2. Identify potential solutions to those problems. Here you can feel free to brainstorm and merely list various solutions to the problems that you identify.
3. Choose a best solution for each problem. Explain why that solution is the best solution. In addition, determine whether or not the solution is possible and what would need to be done to implement the solution.
Important note: Do your best to support your claims with evidence, facts, and information that you have learned about ethical theories and values throughout the course.
1
CLASS NAME: MIS600
PROFESSORS NAME: William Ying
STUDENTS NAME: Issah Musah, and Raj Patel
PROJECT NAME: NETWORK DESIGN
Content
Topic Page No.
Cover Page .
InfTo improve the quality of network performance through advanced communication
services and authorized users in equal access to state-of-the-art technology.
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docxjasoninnes20
BUSINESS CASE CAPSTONE 2
BUSINESS CASE CAPSTONE 3
Business Case Capstone
Connie Farris
Raphael Brown
Jim Chambers
Shaun Cummings
Deandre Kralevic
Colorado Technical University
IT Capstone II
(IT488-1904B-01)
Henrietta Okora
Running head: BUSINESS CASE CAPSTONE 1
Business Case Capstone
Table of Contents
(Week 1) Section 1: Overview of the project (from IT487)3
Overview3
I75 Corridor4
Section 2: Requirements (from IT487)5
Section 3: Design (from IT487)7
Section 4: System development methodology9
Section 5: Work breakdown structure11
Section 6: Communication Plan13
(WEEK 2) Section 7: Quality Assurance Plan TBD15
(WEEK 3) Section 8: Documentation Plan TBD16
(Week 4) Section 9: Quality Assurance and results of test-case execution TBD17
Section 10: Project Closure18
References:19
(Week 1) Section 1: Overview of the project (from IT487)Overview
The Galactic Customer IT Services is IT Support Company with over 250,000 employees with companies in over 50 states with the main headquarters located in Gainesville, FL. The location chosen for the headquarters is based on a Telco Gateway Infrastructure that the main fiber-optic truck line runs along the I75 corridor, from Miami Lakes FL to the northern part of Michigan. This I75 corridor plays an important part of the Networking ability for the organization. The Galactic Customer IT Services is an IT support company, which provides IT support to various small to large companies both within the Unites States and support to various military bases overseas. This large customer service company has installed application software to its large Help Desk ticketing system. The next phase being implemented is the upgrading of its Networking Infrastructure, which also includes cloud-based networking. This Organization has several new updated Servers ready to install on the network. With the previous project being accepted the organization has decided to move forward to improving its networking infrastructure, however the organization has request the project team to draft a plan that requires the following in the plan: Requirements, Design, System Development Methodology, WBS (Work Breakdown Structure), Communications Plan, Quality Assurance Plan, Documentation Plan, and Quality Assurance and results of test-case execution be the project can be closed. I75 Corridor
http://gregkantner.com/blog/wp-content/uploads/2012/05/interstate-75-map.gif
Section 2: Requirements (from IT487)
The project requirements here are derived from the software requirements for the Galactic customer services. The project was to create new ticketing software that the customer wanted upgraded and to completely replace the previous product. The requirements are the following:
• Ticket system
• Ticke ...
RUNNING HEAD Customer Care Website Implementation1Customer .docxjoellemurphey
RUNNING HEAD: Customer Care Website Implementation
1
Customer Care Website Implementation
27
Customer Care Website Implementation
Table of Contents
4Executive Summary
4Integration Management
4Project Scope Statement:
5Project Scope Justification:
5Project Success:
5Functional Area Interfaces
6Project Team Members and Roles:
6Project Team Reporting Structure:
7Project Deliverables:
7Project Closure Information
9Scope Management
9Scope Definition
9Work Breakdown Structure
9Time/Schedule Management
9Activity List
12Project Milestones:
12Project Cost Management
14Project Quality Management
14Project Deliverable Quality Requirements
14Project Deliverable Quality Monitoring
15Project Deliverable Quality Reporting
15Project Deliverable Quality Discrepancy Decisions
15Project Human Resource Management
15Resource Analysis
17Resource(s) Doing the Most Work
17Alternative Resource Assignments
17Resource Gap Analysis
17Optimization:
18Communications Management
18Project Team Communications
19Project Team Conflict Resolution
20Project Information to Monitor
20How to Collect Project Information
20Frequency for Project Information Collection
21Project Status Information and Recipients
21Plan and Take Adaptive Action
21Methods to Analyze the Impact of the Status Information
21Process/Procedures to Make Decisions that Affect the Project Schedule and Budget
22People Who Will Be Involved in Making Project Status Decisions
22Method to Communicate Project Status Decisions
23Project Risk Management
23Risk Management Plan:
25Procurement Management
25Conclusion
26References
Executive Summary
In this project we intend to streamline and enhance our customer’s user experience for his or her support related needs after or before a purchase have been made. Currently we only support a customer over the phone. At peak hours, this causes line congestion and long wait time for our customers resulting in dip in customer satisfaction level. The creation of a customer care website will allow our company to engage with the customer at multiple points including telephone which we already do. 90% of the calls we log are for general questions or are mostly order related which might not require a call in case a portal is available. This projects aims to create a customer care portal mentioned above for better customer satisfaction.
Over the last three years, our annual sales and revenues have almost tripled. While a phone support option was initially sufficient, peak hour service provision has become problematic. In case we want to go along with our existing support model, we would require to at least double our voice support specialist strength. This would result in additional recurring expenses for the company towards employee salary and equipment. The project should be able to address this issue as well and enable the company to achieve better operational excellence. Enhancement to the website will also be possible and will help us to align better with our customers.
Integrat ...
Week Four JournalObjectiveYou will identify key ethical proble.docxalanfhall8953
Week Four Journal
Objective
You will identify key ethical problems facing the company, create potential solutions to those problems, and explain why certain solutions are better than others.
Instructions
In this assignment, you will identify problems that face the two companies that you have chosen to study in this course. You will explain those problems, how they affect the company, and who or what is responsible for those problems. Then, you will attempt to provide solutions to those problems, also identifying the difficulties in implementing those solutions.
Please answer all questions in detail. Because this journal is worth 5% of your final grade, there is a high expectation for your participation. Grades for the journals are based on content, critical engagement, quality of reflection, and detail. Please submit the completed journal via the Assignment Basket found in the Week Four Journal tab on the left navigation toolbar by Day 7.
Problems Facing Not-for-Profit Company
1. Identify two to five problems that face your chosen not-for-profit company. Explain those problems.
a. Why do these problems exist? Present the background on these problems.
b. How do these problems impact the organization?
c. Who is responsible for these problems?
2. Identify potential solutions to those problems. Here, you can feel free to brainstorm and merely list various solutions to the problems that you identify.
3. Choose a best solution for each problem. Explain why that solution is the best solution. In addition, determine whether or not the solution is possible and what would need to be done to implement the solution.
Important note: Do your best to support your claims with evidence, facts, and information that you have learned about ethical theories and values throughout the course.
Problems Facing For-Profit Company
1. Identify two to five problems that face your chosen not-for-profit company. Explain those problems.
a. Why do these problems exist? Present the background on these problems.
b. How do these problems impact the organization?
c. Who is responsible for these problems?
2. Identify potential solutions to those problems. Here you can feel free to brainstorm and merely list various solutions to the problems that you identify.
3. Choose a best solution for each problem. Explain why that solution is the best solution. In addition, determine whether or not the solution is possible and what would need to be done to implement the solution.
Important note: Do your best to support your claims with evidence, facts, and information that you have learned about ethical theories and values throughout the course.
1
CLASS NAME: MIS600
PROFESSORS NAME: William Ying
STUDENTS NAME: Issah Musah, and Raj Patel
PROJECT NAME: NETWORK DESIGN
Content
Topic Page No.
Cover Page .
InfTo improve the quality of network performance through advanced communication
services and authorized users in equal access to state-of-the-art technology.
Information Systems Capstone
Contents
1.0 Introduction
Singh, Shirah, and Barber Financial Holdings LLC. continues to grow its business, increasing their dependency on information technogy. The firm has reached a point where a more flexible, scalable, straightforward infrastructure, and easily managed applications are required for sucessful business practices. A solution like Amazon Web Services (AWS) can provide the computer power, storage, and other resources needed as the firm expands.
Solution
s of this magnitude do require a considerable amount of upfront investment, but will provide minimal cost for subsequential years reducing overall capital expenses. This solution will also enable minimal effort when moving applications to the cloud, minimizing support, to include administrative cost while retaining performance, security, reliability, and data integrity. 1.1 Company at a Glance
Singh, Shirah, and Barber Financial Holdings LLC., has drastically increased the number of clients and accounts over the past couple of years. This growth prompted the need for more qualified staff, additional offices and space, and newer communication technologies to facilitate services and improved management. The firm has acquired several buildings in various cities which are ready to be outfitted with network infrastructure, user workstations, peripherals and software applications. 1.2 Challenges
With just one present location in XYZ city growth in its industry is challenging, therefore the opening of several branch locations in various cities coupled with the data migration to a cloud service has become its number one project. The firm’s current infrastructure is limited, it does not currently have a full scale WAN and remote access (VPN), only a local LAN through the major local ISP is employed. All backups are stored onsite with tape copies sent to a cold off site location. Databases with all financial information are stored in the local server and there are no true access control restrictions. Additionally, there is only one system administrator performing all major database tasks and network functions.
Financial health is one of the most protected types of digital content. Finding ways to store, secure, and manage such data in this ever changing world of computing is a challenge. In order for the firm to grow and blossom, a large and fast LAN/WAN network is needed. Such network must provide access to internal resources via secure methods of authentication and also from the outside by a secure web interface client. VPN capabilities for traveling and visiting staff should provide a secure connection to internal resources. Access to the network and network shares must be tightly secured based on departmental roles. All databases will be kept in separate servers and backups will be conducted routinely (Weekly, Monthly; incremental/full). Access to database tables will be based on individual approval; single sign on authenti.
TechOut Solutions, LLC - A Short Introduction to Our Services and ProcessesKabeed Mansur
TechOut Solutions – founded in 2012 as a US-Bangladesh joint venture – assists US based clients with the design, development, and deployment of enterprise level IT solutions with a keen focus on quality assurance. By using our innovative offsite/offshore development model TechOut Solutions is able to deliver unparalleled value to our customers by reducing the risks traditionally associated with offshore development.
Our Mission: To become a trusted partner for our clients by providing them with low cost, high quality, and faster time-to-market software solutions.
Core Services:
Our offshore development team works in three core areas: Software Development, Web Development, and, Internet Marketing.
Software Development Services: Custom Software Development, .NET Application Development, Software Development in C/C++, and Mobile Application Development for Apple and Android.
Web Development Services: ASP.NET Development, PHP/MySQL (LAMP) Development, Java Web Application Development, and Mobile Web.
Internet Marketing Services: Search Engine Optimization, Social Media Marketing, and Pay Per Click Management.
Technologies:
ASP.NET, C#.NET, C/C++, VB.NET, JavaScript, Ajax, Ruby on Rails, JQuery, Objective C, Java - J2SE, JSP-Servlet, J2EE, EJB3, J2ME, PHP, .NET Framework, XNA, Spring MVC, .Net MVC Struts, iPhone, Android and Windows phone, MS SQL Server, Oracle, MySQL
HI Team,
I am looking for a job change. I am having 5+ years of development and 1 year of Pen testing Experience. I am looking for Hyderabad location. Details below
Relevant IT Experience: 5.7 Years
Web application security testing Exp : 1 year
Contact number: 9742855955
Notice period: 90 days (Negotiable)
Current Location: Bangalore
Preferred Location: Hyderabad
Thanks,
Raju
1. Discuss Blockchains potential application in compensation system.docxmonicafrancis71118
1. Discuss Blockchain's potential application in compensation systems (base wages, incentives, rewards).
2. How can a token economy affect employee compensation?
3. Based on your readings, do worldwide executives believe Blockchain has the potential to radical change the future of organizations?
.
1. Describe the characteristics of the aging process. Explain how so.docxmonicafrancis71118
1. Describe the characteristics of the aging process. Explain how some of the characteristics may lead to elder abuse (memory issues, vulnerability, etc.). Discuss the types of consideration a nurse must be mindful of while performing a health assessment on a geriatric patient as compared to a middle-aged adult.
2.
End-of-life care becomes an issue at some point for elderly clients. Even with the emergence of palliative care programs and hospice programs, most elderly people do not die in their own home as is their preference. What are the reasons for this trend? Discuss what you can do as a nurse to support your clients regarding end-of-life care in accordance with their wishes. Support your response with evidence-based literature.
.
More Related Content
Similar to CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
Information Systems Capstone
Contents
1.0 Introduction
Singh, Shirah, and Barber Financial Holdings LLC. continues to grow its business, increasing their dependency on information technogy. The firm has reached a point where a more flexible, scalable, straightforward infrastructure, and easily managed applications are required for sucessful business practices. A solution like Amazon Web Services (AWS) can provide the computer power, storage, and other resources needed as the firm expands.
Solution
s of this magnitude do require a considerable amount of upfront investment, but will provide minimal cost for subsequential years reducing overall capital expenses. This solution will also enable minimal effort when moving applications to the cloud, minimizing support, to include administrative cost while retaining performance, security, reliability, and data integrity. 1.1 Company at a Glance
Singh, Shirah, and Barber Financial Holdings LLC., has drastically increased the number of clients and accounts over the past couple of years. This growth prompted the need for more qualified staff, additional offices and space, and newer communication technologies to facilitate services and improved management. The firm has acquired several buildings in various cities which are ready to be outfitted with network infrastructure, user workstations, peripherals and software applications. 1.2 Challenges
With just one present location in XYZ city growth in its industry is challenging, therefore the opening of several branch locations in various cities coupled with the data migration to a cloud service has become its number one project. The firm’s current infrastructure is limited, it does not currently have a full scale WAN and remote access (VPN), only a local LAN through the major local ISP is employed. All backups are stored onsite with tape copies sent to a cold off site location. Databases with all financial information are stored in the local server and there are no true access control restrictions. Additionally, there is only one system administrator performing all major database tasks and network functions.
Financial health is one of the most protected types of digital content. Finding ways to store, secure, and manage such data in this ever changing world of computing is a challenge. In order for the firm to grow and blossom, a large and fast LAN/WAN network is needed. Such network must provide access to internal resources via secure methods of authentication and also from the outside by a secure web interface client. VPN capabilities for traveling and visiting staff should provide a secure connection to internal resources. Access to the network and network shares must be tightly secured based on departmental roles. All databases will be kept in separate servers and backups will be conducted routinely (Weekly, Monthly; incremental/full). Access to database tables will be based on individual approval; single sign on authenti.
TechOut Solutions, LLC - A Short Introduction to Our Services and ProcessesKabeed Mansur
TechOut Solutions – founded in 2012 as a US-Bangladesh joint venture – assists US based clients with the design, development, and deployment of enterprise level IT solutions with a keen focus on quality assurance. By using our innovative offsite/offshore development model TechOut Solutions is able to deliver unparalleled value to our customers by reducing the risks traditionally associated with offshore development.
Our Mission: To become a trusted partner for our clients by providing them with low cost, high quality, and faster time-to-market software solutions.
Core Services:
Our offshore development team works in three core areas: Software Development, Web Development, and, Internet Marketing.
Software Development Services: Custom Software Development, .NET Application Development, Software Development in C/C++, and Mobile Application Development for Apple and Android.
Web Development Services: ASP.NET Development, PHP/MySQL (LAMP) Development, Java Web Application Development, and Mobile Web.
Internet Marketing Services: Search Engine Optimization, Social Media Marketing, and Pay Per Click Management.
Technologies:
ASP.NET, C#.NET, C/C++, VB.NET, JavaScript, Ajax, Ruby on Rails, JQuery, Objective C, Java - J2SE, JSP-Servlet, J2EE, EJB3, J2ME, PHP, .NET Framework, XNA, Spring MVC, .Net MVC Struts, iPhone, Android and Windows phone, MS SQL Server, Oracle, MySQL
HI Team,
I am looking for a job change. I am having 5+ years of development and 1 year of Pen testing Experience. I am looking for Hyderabad location. Details below
Relevant IT Experience: 5.7 Years
Web application security testing Exp : 1 year
Contact number: 9742855955
Notice period: 90 days (Negotiable)
Current Location: Bangalore
Preferred Location: Hyderabad
Thanks,
Raju
1. Discuss Blockchains potential application in compensation system.docxmonicafrancis71118
1. Discuss Blockchain's potential application in compensation systems (base wages, incentives, rewards).
2. How can a token economy affect employee compensation?
3. Based on your readings, do worldwide executives believe Blockchain has the potential to radical change the future of organizations?
.
1. Describe the characteristics of the aging process. Explain how so.docxmonicafrancis71118
1. Describe the characteristics of the aging process. Explain how some of the characteristics may lead to elder abuse (memory issues, vulnerability, etc.). Discuss the types of consideration a nurse must be mindful of while performing a health assessment on a geriatric patient as compared to a middle-aged adult.
2.
End-of-life care becomes an issue at some point for elderly clients. Even with the emergence of palliative care programs and hospice programs, most elderly people do not die in their own home as is their preference. What are the reasons for this trend? Discuss what you can do as a nurse to support your clients regarding end-of-life care in accordance with their wishes. Support your response with evidence-based literature.
.
1. Dis. 7Should we continue to collect data on race and .docxmonicafrancis71118
1. Dis. 7
Should we continue to collect data on race and ethnicity?
Topic
In what situations should we continue collecting data on race and ethnicity, and in what situations should we stop collecting data on race and ethnicity? (see Desmond & Emirbayer)
2. Jour. 7
We determine whether our society is "colorblind." Our objectives this week are to:
· Describe colorblind racism and new racism;
· Discuss social policy implications of erroneous beliefs that we live in a post-racial or colorblind society; and
· Summarize the perception gap between majority and minority groups and how that impacts support for public policy aimed at combating racial inequality.
Please read all the information provided within the module and the indicated course book readings, then proceed to complete and submit this week's assignments in a timely and effective manner.
Due Thursday
Both 200 each words
.
1. Differentiate crisis intervention from other counseling therapeut.docxmonicafrancis71118
1. Differentiate crisis intervention from other counseling therapeutic interventions. Provide examples to support your rationale. For follow-up discussion, critique the examples provided by your peers for validity.
2. Is the use of standard psychotherapeutic interventions appropriate during a crisis? Why or why not?
.
1. Describe the ethical challenges faced by organizations operating .docxmonicafrancis71118
1. Describe the ethical challenges faced by organizations operating globally. 550 words .
2. Pick one of the following terms for your research: code of ethics, conscious capitalism, corporate social responsibility (CSR), culture, ethical dilemma, external adaptation, mission culture, social capital, values-based leadership, or whistle-blowing. 500 words
.
1. Describe in your own words the anatomy of a muscle. This sho.docxmonicafrancis71118
1. Describe in your own words the anatomy of a muscle. This should include from the muscle down to the myofibrils.
2. Explain in your own words how an action potential results in a muscle contraction.
3. List and describe in your own words the characteristics of skeletal muscle (aka the abilities that a skeletal muscle has).
4. Muscle Tissue
: Describe the appearance of the three types of muscle tissue.
a. Skeletal muscle:
b. Cardiac muscle:
c. Smooth muscle:
5. Muscle Anatomy
: Put the structures in anatomical order from superficial to deep.
Sarcolemma
Perimysium
Endomysium
Epimysium
6. Muscle Identification
: Palpate or locate each of the following muscles and list its origin, insertion, and action.
a. Masseter
b. Upper, middle, and lower trapezius
c. Sternocleidomastoid
d. Temporalis
e. Occipitofrontalis
f. Erector spinae
g. Scalenes
h. External/internal intercostalis
i. Rectus abdominis
j. External/internal oblique
k. Transverse abdominis
l. Rhomboids
m. Serratus anterior
n. Pectoralis major and minor
o. Teres major and minor
p. Latissimius Dorsi
q. Infraspinatus
r. Suprasinatus
s. Subscapularis
t. Deltoid
u. Triceps brachii
v. Biceps brachii
w. Brachialis
x. Brachioradialis
y. Wrist and finger flexors
z. Wrist and finger extensors
aa. Iliopsoas
bb. Tensor fasciae latae
cc. Gluteus maximus
dd. Gluteus medius
ee. Quadriceps
ff. Hamstrings
gg. Sartorius
hh. Adductor longus
ii. Gracilis
jj. Tibialis anterior
kk. Gastrocnemius
ll. Soleus
mm. Peroneals
.
1. Describe how your attitude of including aspects of health literac.docxmonicafrancis71118
1. Describe how your attitude of including aspects of health literacy changed during this course.
2. Describe your approach to incorporating evidence-based literature in health teaching.
3. Describe one theory of teaching or learning that you applied it to your power point presentation.
4. Describe two ways that you have grown as a health educator by taking health promotion course
.
1. Choose a behavior (such as overeating, shopping, Internet use.docxmonicafrancis71118
1. Choose a behavior (such as overeating, shopping, Internet use, etc.) Identify examples of each of the stages of change—pre-contemplation through maintenance—using the behavior you selected as the focus.
2. What are your thoughts on using the readiness assessment tool for addictive behaviors?
What is the stage of readiness in each of these areas for Brian and/or Alyssa?
Need for change
Commitment to change
Self-awareness
Environmental awareness
Personal closeness
Identify a possible next step in the process for the individual you selected that you feel will assist them in their readiness for change.
Be sure to rate each of the readiness assessment areas. Your next steps should be appropriate to the data you discuss in the readiness assessment.
see attachment:
.
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docxmonicafrancis71118
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)
Natalie got the call she had been waiting for over six long months. Her complaint to the human resources department of Franklin Industries had been dismissed. It was HR’s conclusion that she was not retaliated against for reporting an alleged embezzlement by the Accounting Department manager. In fact, HR ruled there was no embezzlement at all. Natalie had been demoted from assistant manager of the department to staff supervisor seven months ago after informing Stuart Masters, the controller, earlier in 2015, about the embezzlement. Her blood started to boil as she thought about all the pain and agony she’d experienced these past six months without any level of satisfaction for her troubles.
Natalie Garson is a CPA who works for Franklin Industries, a publicly owned company and manufacturer of trusses and other structural components for home builders throughout the United States. Six months ago she filed a complaint with HR after discussing a sensitive matter with her best friend and coworker, Roger Harris. Natalie trusted Harris, who had six years of experience at Franklin. The essence of the discussion was that Natalie was informed by the accounting staff of what appeared to be unusual transactions between Denny King, the department manager, and an outside company no one had never heard of before. The staff had uncovered over $5 million in payments, authorized by King, to Vic Construction. No one could find any documentation about Vic, so the staff dug deeper and discovered that the owner of Vic Construction was Victoria King. Further examination determined that Victoria King and Denny King were siblings.
Once Natalie was convinced there was more to the situation than meets the eye, she informed the internal auditors, who investigated and found that Vic Construction made a $5 million electronic transfer to a separate business owned by Denny King. One thing lead to another, and it was determined by the internal auditors that King had funneled $5 million to Vic Construction, which, at a later date, transferred the money back to King. It was a $5 million embezzlement from Franklin Industries.
Natalie met with Roger Harris that night and told him about the HR decision that went against her. She was concerned whether the internal auditors would act now in light of that decision She knew the culture at Franklin was “don’t rock the boat.” That didn’t matter to her. She was always true to her values and not afraid to act when a wrongdoing had occurred. She felt particularly motivated in this case—it was personal. She felt the need to be vindicated. She hoped Roger would be supportive.
As it turned out, Roger cautioned Natalie about taking the matter any further. He had worked for Franklin a lot longer than Natalie and knew the board of directors consisted mostly of insider directors. The CEO of Franklin was also the chair of Page 181the board. It was well known in the company that whatev.
1. Cryptography is used to protect confidential data in many areas. .docxmonicafrancis71118
1. Cryptography is used to protect confidential data in many areas. Chose one type of cryptography attack and briefly explain how it works (examples include: ciphertext-only attack, known-plain-test attack, chosen-plaintext, chosen-ciphertext attack, timing attack, rubber hose attack, adaptive attack).
2. Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT
.
1. Compare and contrast steganography and cryptography.2. Why st.docxmonicafrancis71118
1. Compare and contrast steganography and cryptography.
2. Why steganography and how does it work? List examples of suitable carriers of steganographic payloads.
3. Experiment with the tool – Steganography Online (http://stylesuxx.github.io/steganography/) to get a feel of how the steganographic tool works.
4. In steganalysis, which methods are used to detect steganography?
Briefly describe how cryptography is applied in ATM, SSL, digital signatures, hashes and drive encryption.
.
1. Date September 13, 2017 – September 15, 2017 2. Curr.docxmonicafrancis71118
1. Date: September 13, 2017 – September
15, 2017
2. Current Exchange Rate ($ / rupee):
1/64.16
3. During the past week (or since your last entry), what has been the major economic or
business news relating to
India? http://www.thehindu.com/business/Industry/economy-suffers-as-firms-tackle-
debt/article19677814.ece
In India this year, there are a fair amount of firms and businesses that are having issues paying off
interest on their loans. On top of this, fewer loans are happening and the state’s GDP growth rate has
lowered this year. The article lists several factors, one of which is pretty simple; interest rates are high
at the moment. This article on business interested me because this is an issue that is relatable to every
modernized country on Earth, how to pay off debt when you aren’t making enough this year to cover
costs? You can’t, so the unpaid portions add up. I didn’t feel like there was a strong bias in this article,
but I’m also not accustomed to the Indian financial market or its businesses. How is this story relevant
to my understanding of India? It lets me take an inside look at the current economy and how they might
be fairing in comparison. It also shows that business and banking policies are not that different on some
levels.
4. During the past week (or since your last entry), what has been the major political
news in India? http://www.thehindu.com/news/national/andhra-pradesh/patronising-congress-
again-a-historic-necessity/article19679153.ece
First, why do I consider this major political news in India? The discussions and accusations being talked
about in the article are serious and can definitely effect votes for the mentioned political parties, which
in turn can change or add new laws, regulations, taxes, and etc. The title seemed incredibly familiar to
what we always see in American newspapers about our politics. I felt that the author, or maybe the
newspaper, might actually lean more towards the BJP and TDP’s opposing forces. Other than that, there
were tons of biased quotes from both parties. So, why do I think this topic is relevant to my
understanding of India? Simply put, just as with business and banking, there is this kind of familiarity in
a way. This article lets me get an inside view on the current parties and the accusations being made,
showing me that politics is a somewhat universal language, one part attack ads, one part confusion, and
one part progress.
5. What new information have you found related to religion in
India?http://www.thehindu.com/society/faith/tendencies-of-
prakriti/article19656107.ece
We talked a lot about how the culture of India and the religions of it can definitely be intertwined. This
short article tells of the three ‘gunas’, which I didn’t know much about if anything really. As far as biases
go, you could say that the article is biased to what it is teaching about this religious aspect, but honestly,
it feels more informative. Why is thi.
1. compare and contrast predictive analytics with prescriptive and d.docxmonicafrancis71118
1. compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples. (250 words and two references no plagiarism)
2. Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.(250 words and two references no plagiarism)
.
1. Creating and maintaining relationships between home and schoo.docxmonicafrancis71118
1. Creating and maintaining relationships between home and school are pivotal to the overall success of our ELL students. Discuss some ways you might cultivate these partnerships throughout the school year.
2. There is research supporting the theory that students who are literate in their home language are more likely to be literate in their second or subsequent language. Thinking of this, what are the potential effects of home language on the development of English and classroom learning?
.
1. Compare and contrast Strategic and Tactical Analysis and its .docxmonicafrancis71118
1. Compare and contrast Strategic and Tactical Analysis and its application to street crimes such as robbery and property crimes such as burglary. In your opinion is one more suited in addressing criminal behavior?
Strategic analysis involves the analysis over the long-term, whereas tactical analysis involves analysis in a more direct manner. Each has analysis scheme has their uses in addressing criminal behavior. To use an example with drug activity strategic analysis would be better suited to understanding who could be the future customers of drug dealers, where are possible locations that could facilitate such deals, and helping law-enforcement and community leaders come up with measures to combat drug sales. However, the tactical analysis would focus more on finding out where the current supply of drugs is coming in from, who the leader(s) is(are), and cracking down on local dealers. While there is overlap between the two, I believe that tactical analysis is the best when addressing criminal behavior, because of the more immediate results that it provides.
2. What is CPTED? Please elaborate on how CPTED may be an effective means to reduce a criminals Modus operandi? Provide an example.
CPTED is an acronym that stands for crime prevention through environmental design which is “The proper design and effective use of the built environment can lead to a reduction in the fear and incidence of crime, and an improvement in the quality of life” (Cozens, Saville, & Hillier, 2005). This means that CPTED is all of the passive defenses that the environment provides law-abiding citizens against criminally minded individuals. These defenses can be broken down into six different aspects that work together to create CPTED they are: territoriality, surveillance, access control, target hardening, image/maintenance, and active support (Cozens, Saville, & Hillier, 2005). All of these aspects work together to decrease crime in the area.
respond to this discussion question in 250 words
.
1. Coalition ProposalVaccination Policy for Infectious Disease P.docxmonicafrancis71118
1. Coalition Proposal
Vaccination Policy for Infectious Disease Prevention and Control
Scope of the Problem
Vaccines have done an excellent job at preventing many diseases, some of which can be deadly if not prevented. When bacteria or viruses enter the body, they immediately begin to attack and multiply, which then causes an infection. The immune system will then fight off the infection and establish antibodies, which will help recognize and fight off the same disease in the future. For this very reason, it has been important for children to be vaccinated at an early age so that they may establish those antibodies their bodies need. Vaccines act as the disease so that the body may produce antibodies, but the good thing is that it won’t cause an infection (CDC, 2017).
There are current policies that mandate vaccinations in the U.S., for example, all children are required to be up to date on their vaccines before beginning school. The problem is that there are many loopholes and exceptions to the rule, whether it’s due to religious reasons or other medical issues. Because of this, there are still many children and adults who have yet to be fully compliant with vaccine requirements
Some important statistics to note (Johns Hopkins Medicine):
· CDC estimated 2,700 new cases of hepatitis A in the U.S.
· It is estimated that in 2011, 19,000 new cases of hepatitis B and 17,000 cases of hepatitis C occurred.
· In 2012, nearly 10,000 new cases of tuberculosis were reported.
· Approximately 36,000 people per year die from influenza and pneumonia.
· 50,000 new cases of HIV infection occur annually.
· In 2012, new cases of STD’s were reported, including HPV, Chlamydia, Gonorrhea, HIV, and Syphilis.
Who is affected by this problem? Identify.
Children are mainly affected by this problem due to parents’ hesitancy for vaccinations. Although law mandates for children to be vaccinated for school enrollment, parents have the option to use exemptions to avoid having their children vaccinated. Currently, medical exemptions are allowed for medical reasons in all states, and it is estimated that one to three percent of children are excused from vaccinations because of these exemptions. Parents have continued to use reasons to avoid vaccinations, for example, the belief that the decline in vaccine-preventable diseases is due to improved health care, hygiene, and sanitation (Ventola, C. L., 2016).
Health disparities among Blacks, Hispanics, and Whites have played a huge role in terms of vaccination coverage. Studies have shown that health insurance has a direct impact on the vaccination coverage in adults, therefore, low-income families who can’t afford health insurance will most likely not get the vaccines they need. With that being said, uninsured prevalence was higher among non-Hispanic blacks (19.5%) and Hispanics (30.1%) compared with non-Hispanic whites (11.1%) (Lu, P., et al, 2015).
What has been written on the issue and policy options?
There ha.
1. Company Description and Backgrounda. Weight Watchers was cr.docxmonicafrancis71118
1. Company Description and Background
a. Weight Watchers was created by Jean Nindetch in 1963 when she began to invite her friends and neighbors so that they can discuss their weight loss issues and how they could lose weight successfully. The basic concept of WW plan consisted of two components: the WW program and group support. Comprised of a food plan and an activity plan. WW eliminated counting calories by introducing a point system.
b. Targeted women 25 to 55
c. 2017 about 1 million members who attended 32,000 WW meetings around the world organized by more then 9,000 leaders who had successful lost weight using WW.
d. Record high revenue 2011 $1.8 billion, in 2012 a slight reduction occurred but beat all pre-2011 numbers, in 2013 is when business began take a turn for the worse.
e. December 2015, WW launched a SmartPoints system which was a scale for food management. It was introduced to work along with a new weight management program called “Beyond the Scale.” Even thought doctors and nutrition’s approved the program, then-CEO David Kirchhoff felt it wasn’t enough because the programs didn’t take into account social, environmental and behavioral factors that led members to fail at their weight loss journey. Shortly after in August 2013, CEO Kirchhoff resigned in order to “pursue other opportunities” which left WW struggling to adjust their business strategy in the Internet Age.
2. Problems Posed In The Case
a. CEO Jim Chambers resigned in September 2016 afterward a tumultuous year with stock prices dropping 54% that year alone and seven straight quarters of declining sales.
b. Next generation diet programs and online apps like MyFitnessPal and FitBit were providing the same services for free of charge. CEO Chambers admitted that “consumers have changed and that WW hadn’t kept the pace.”
c. As obesity levels increased worldwide, the market for weight loss products was growing exponentially, however, WW had to increase customer value and seek new target segments to fend off competitors from traditional rivalry’s like Nutrisystem, Slim Fast, Medifast, Jenny Craig and the Biggest Loser.
d. Emergence of fad diets
e. Decreased effectiveness of marketing and advertising programs
f. The need for developing new and innovative products and services that could be delivered online or via mobile apps
g. WW International faced stock price volatility because of rival weight management options such as the over-the-counter weight-loss drug Alli launched by GlaxoSmithKline in June 2006 and the development of Allergan’s Lap-Band device.
h. Worldwide Health Organization estimated 2.3 billion people to be overweight by 2015 and more than 700 million obese.
i. The development of effective weight-management methods i.e. pharmaceuticals, surgical options such as the Lap-Band.
3. Financial Analysis
a. In 2017, revenue was 1.3 billion and in 2018 revenue was up by 5.77% at 1.5 billion.
4. Strategic Options
a. During the dot-com era they creat.
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docxmonicafrancis71118
1. Come up with TWO movie ideas -- as in for TWO screenplays that you'd be interested in writing.
You will eventually choose ONE screenplay to live with for the duration of this course. You will distill each idea into a single sentence. We call this a LOGLINE.
A good logline: 1. Must include your PROTAGONIST. 2. Must be under 50 words. 3. Must contain the word "BUT" ("but" signifies conflict).
After you write the logline. Tell us about your PROTAGONIST. What is her/his most pressing DESIRE? What are some of the potential OBSTACLES that can get in the way?
TRY TO KEEP IT SIMPLE!
Here's an example:
MOVIE IDEA #1
WORKING TITLE: "COLLATERAL"
LOGLINE: A cab driver dreams of starting his own limo company, BUT when a hitman gets into his cab, our hero must figure out how to survive the night.
PROTAGONIST: Max (Cab Driver)
DESIRE: To stop Vincent (the Hitman)
POTENTIAL OBSTACLES: The HITMAN who never fails. THE COPS who think Max is the hitman. THE GANGSTERS who want the hitman dead. MAX’s own timid and hesitant nature.
2.What is the INCITING INCIDENT in your two film ideas? What is the 1stACT BREAK?
Example:
MOVIE TITLE: COLLATERAL
INCITING INCIDENT: Vincent gets into Max’s cab, makes Max an offer
1STACT BREAK: Body drops on Max’s cab; Reveal Vincent is a Hitman
(To discover your inciting incident possibly contemplate what the worst thing that could happen to your particular character would be)
Interview questions
1. Do you have a specific reason why you wanted to become a physical therapist?
2. Why do think it’s a good idea to be a physical therapist?
3. What did you get your bachelor degree on?
4. Were you in any kind of program for PT?
5. What kind of opportunities were there for you after getting your bachelor degree?
6. What were some of the difficulties you faced when you were looking for jobs?
7. What are some things I should know before I continue?
8. What are some jobs that I can apply to, to get experience with what a want to pursue?
9. How long did it take you to finish school and start your job?
10. What are some skills a person should have that wants to do DPT?
Unal 2
Seyma Unal
English 101 Z02N
Ms. Claytor
24 June 2019
Isabella Mia Interview as a Physical Therapist
Isabella Mia is a physical therapist who is working in the US as a therapist for the last 10 years. I have selected her for the interview because the physical therapist is a tough job and it is important to consider a person who has worked in it for a long time to get the right insights. She is a very dedicated person towards her work and this the reason behind her success in this field. I met her for this interview on a coffee shop and following is the information that I got from her.
Seyma Unal : Do you have a specific reason why you wanted to become a physical therapist?
Isabella Mia : I believe that this is a very rewarding career. I always wanted to do something that can ease other people and in this profession, we have contact with customers .
1. Choose a case for the paper that interests you. Most choose a .docxmonicafrancis71118
1. Choose a case for the paper that interests you. Most choose a case that they experienced on the job (e.g., company merger, reorganization, adoption of innovation or new procedure). If you have never experienced anything remotely like this, then you could choose a case in your community that interested you (e.g., political issues like taxes, land acquisition, school boards). If none of those apply then you can choose a case that is personal to you (e.g., getting a raise, selling something to a client or customer). If you have never worked, then choose a case you may experienced as an intern or student. I am pretty liberal about the kind of case that you choose.
2. Choose a case that involved a failed change attempt or proposes a change that has never been attempted. DO NOT CHOOSE A CASE THAT WAS SUCCESSFUL. The outline is hard to use when describing successful change attempts.
3. Write the paper as an expanded outline. That means writing paragraphs under the lower level headings. By using the outline as headings, you won’t leave something out.
4. With regard to length, some overwrite Section I. I think they get into describing the problem and go on a tirade. Although cathartic, it eats space. Section II should be relatively brief and the shortest of the three sections. Section III is where you should be writing a lot. That is where you are showing me that you can use the course content to propose an effective change.
5. Remember that you will be sending the paper to me as an attachment. I will grade it and make comments in the file. I will return it to you at the SAME address from which I received it. IF FOR SOME REASON, YOU DON’T WANT ANYONE TO SEE THE PAPER, USE YOUR STUDENT EMAIL ADDRESS. DO NOT USE YOUR WORK ADDRESS.
6. I will erase all papers at the end of the term. I never share papers with others.
Below I will give you some insights into the outline.
SUGGESTED OUTLINE FOR CHANGE MANAGEMENT PAPERS
I. Statement of problem area. In this section, describe the change attempt and the key players.
A. Background of change attempt.
1. Nature of change (What is being proposed?).
In this section, provide an overview of the change including a brief history.
2. Issues (Why is it being proposed?).
If you are writing about a failed change, indicate why it was proposed and how it failed. If you are writing about a proposed change, then describe the problem it is intended to resolve.
3. Change Agent(s). This section is focused on the people who proposed or will propose the change. If there are only a few change agents, you can describe what each on is like. If you are there many, then describe their general characteristics.
4.
A. Personality. What are they like? If you want, you can refer to the personalities I mention in the handout on integrative bargaining.
B. Power. What kind of power do the change agents have and how much? Is their power formal (e.g., authority) and/or or informal (e.g., expertise, chari.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2024.06.01 Introducing a competency framework for languag learning materials ...
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
1. CLASS NAME:MIS600
PROFESSORS NAME:
STUDENTS NAME:
PROJECT NAME: NETWORK DESIGN
Content
Topic
Page No.
Cover Page
1
Content
2
Executive summary
3
Project Charter
3
Earn Value Statement 11
2. Executive Summary
Network under a set of confined region is known as Intranet. It
uses an IP protocol and IP-based tools like the file transfer
application and web browsers that is provided by the server to
only assigned IP address. Computer network communication is
an important installation in a contemporary organization
organisation. As the organization's service provision is
improved through the reliable communication, its competition
with related firms is enhanced and, therefore, valued
competence. Ultimate network design as a mode of flow of
information among employees and stakeholders in promotes
coordination in the management, team work and services the
business offer. This automatically improves the performance of
the organisation at the good will of all workers.
It should be noted that an organisation's communication systems
alone holds a large percentage in its performance that it should
not be compromised, even on the slightest default. This would
mean that the organisation would require an Information System
that when a default occurs at any single point in the connection
system, it would be easier to detect and reach that point as soon
as possible. The design should be design with backbone network
so temporally technical problem with not upset the performance
of network communication. This is more appropriate in big
organisations to maintain their data and communication
confidentiality, integrity and accessibility. In networking design
approach, the choice of device should be intelligently selected
for the desired function, this will enhance performance in terms
of managing security, traffic, errors in storage and transmitting
information.
Documents and programs that are sensitive are run through LAN
security domain system to create passwords for their protection
against cybercrimes. The protected file would then be accessed
by authorised personnel only. This would be an important idea
3. where security of flowing information is paramount. Each set of
the employee has got a privilege to prevent the access of any
restricted file in the company.
Project Charter
Project Name
Network Design
Project Number
DW2
Project Team
Sponsor: Robert Elson
Author : Jacobs Adam
Manager: Joyce Robert
Prioritization
To design network that will provide information and
communication confidentiality, integrity and accessibility
Owner(s)
Jacobs Adam
Start Date
11/09/15
Scheduled Completion Date
12/15/15
Mission/ Purpose
Based on customer’s statistical report, we are designing network
that will provide faster, with increased security assurance and
24/7 direct online support platform.
Project
4. Description and Project Product
It is assured to increase online communication and coordination
between sales services and customers.
Optimize the customer choice to online shopping.
Additional capacity with be added to the design to align the
company’s current market demand.
Rejuvenating company network infrastructure, plan and trend
through the network design. Incorporating additional features
and the new branches that are currently established.
Objectives
Increase sales through the utilizing the speed of the network.
use
Business NeedSince customers are the main financial sponsors
of the company, and by popular request, we intend to recreate
the website to meet the following criteria:· Mobile friendly·
Enhance information security
· Add new functionality
· Improve usability
· Keep up to date and shake things
Milestones
Network is expected to be mobile friendly i.e. with Wi-Fi
capabilities
By 11/30/15 midway of the project is evaluated according to
standard.
Last revision date by 12/07/15
Budget
Estimated Labor
$150000.00
5. Estimated Materials
$12000.00
Estimated Contractors
$20000.00
Estimated Equipment and Facilities
$21000.00
Estimated Travel
$8500.00
Total Estimated Cost
$211500.00
User Acceptance Criteria
User friendly and security assurance network structure is the
minimum success criteria as defined by the key stakeholders.
Contractors and customers will be in charge of testing and
evaluating the quality network and feedback will be collected
through employees and document report from contractors.
High-Level Project Assumptions
It is anticipated that similar project will be taken in about eight
years’ time, since vulnerability of network increase with time,
and technology will keep changing, preference will keep
changing based on factors like the economy, climate or
influence from our competitors market strategy. The network
design will create feasible working environment.
High-Level Project ConstraintsCreating perfect network
communication structure to suit both customer and business
needs.Providing fraud free network, customers are expect to
create online account with sensitive information such as social
security number, credit card and address. Project must be
completed on time to avoid exceeding budget.
6. Exclusions and Boundaries
Creating perfect network environment to suit both customer and
business needs.
Software interface is limited to be compatible to existing
hardware.
Project must be completed at most not more than a week after
stipulated deadline.
Budget must not increase more than 5% of the stipulated
budget.
Network technical support unit will be decentralized to
accommodate influx calls that will expected from employees
who may encounter technical problem. Feedback from users
should use during in the designing process.
Major Risks
Provide a written description of software process and hard
process.
Regular technical review to ensure that design meets standards.
Budget is expected to rise if design do not meet specification
and thee the need to fix flaws.
Experts are required to answer question about the tools used in
design.
Establishing a procedure for tracking and reviewing contractors
Documentation is required for all formal, informal procedure
and deliverables. Availability of testing tool.
KEY STAKEHOLDERS
Project Manager Authority Level
CEO: Robert Elson , (makes final financial decision of the
project)
7. Project Core Team
Author : Jacobs Adam
Owner/Sponsor: Robert Elson
Head of Contractors : Peter Christian
Manager : Joy Roberts
Subject Matter Experts (SMEs)
Programmers and software tester and equipment’s tools:·
Functionality testing· Usability testing· Interface testing·
Compatibility testing· Performance testing· Security testing
APPROVALSType NameSignatureDate
Project Manager Approval
Robert Elson
09/01/15
Customer/Sponsor Approval
Jacobs Adam
09/01/15
8. Earn Value Statement
Statement of Work—Project Description and
Project Product
The project intends to design easy to use network design that
will accommodate shareholder demand and leverage the
company on competitive edge against its rival.
Specification of the network is based on collective inquiry,
user’s feedback and sponsors request, and the priority is meet
the national regulation standard.
Scrum agile method approach will be employ in this design
development project, this will allow the product use by the
development team, while in design is in process, so that
feedback will be used to make correction on inherent and
apparent weakness that will be detected at the early stage..
The project team will be group in three, the developers, the
testers and the users. The user group will consist of
shareholders and designated team professional. Strong chain of
feedback mechanism will be establish between users and the
developers to report any fault at the early development stage.
However early glitch may also be detected at the testing level
and reported to the developers.
9. Project DeliverablesNetwork design will be will have about
500sqft Wi-Fi capability, encryption tool for the protection of
sensitive’s information of inputs made by client when hosting
on the network. Users will be authenticated. .
Project Objectives
The Objectives is to design company’s network to incorporate
additional features and also correct inherent apparent weakness
that have been reported on major cases by shareholders. It is
also intended to give competitive advantage over business
rivals. Project is schedule to complete in three commencing
from 09/09/15 to 12/15/15.
50% of the total budget will be disbursed for the comment of
the project and the remaining 50% will be disbursed at the
midway of the project. Provision of 5% increase of the original
budget is made available in the budget coffers to accommodate
anticipated increase project cost.
However, with the introduction of improved working tools,
project is expected to compete within budget.
Project Assumptions
Work space will be required to accommodate all working station
(i.e. developers, testers and users team station) and team
members.
Project is likely to take longer than will be expected since the
sponsors are part of the design process with direct influence on
the project, sponsors preference might keep changing.
In addition to the testers and the users who may report design
flaws ,experts or outsourced team may be required to
independently assess performance, evaluate and test network,
feedback may be employ to make to make required changes
when the need arise to extend service or employ feedback from
auditors to make any changes.
Other opportunities may be consider to affect design during
process if it will give competitive advantage over business
10. rivals.
Project ConstraintsOver security is concern like authentication
process may discourage and prolong access to network facility
.Project cascaded team and process may slow work. Project
design needs dedicated and reliable server, free from threat and
can host all team members time. Daily project routine needs to
be documented and review by head of project before going to
the next step, the procedure sometimes slow down development
process. Team are expected to have long meeting with legal
advisor before of the work begins.
Exclusions
Based on available spaces and tools, only 8 members are
required to the task.
Acceptance Criteria The network must operational or
compatible to the major internet devices protocols.
APPROVALSType NameSignatureDate
Project Manager Approval
Robert Elson
11/9/15
Customer or Sponsor Approval
Jacobs Adam
11/9/15