Discussion 8- Monitoring Project

  • Offer some insights, from researching the Internet, around the importance of client acceptance throughout the project.
  • If you were leading a project, and the project declines the final acceptance, what do you believe the team may have failed at?
  • Provide a few highlights that the course has offered you (you can pull from your practical connection assignment).

Text

A Guide to the Project Management Body of Knowledge (PMBOK Guide) Seventh Edition and The Standard for Project Management (RUSSIAN) 

ISBN: 9781628257007 

Authors: Project Management Institute Project Management Institute 

Publisher: Project Management Institute 

Publication Date: 2021-08-01

Social networking

 Social networking Web sites create online communities of Internet users that eliminate barriers created by time, distance, and cultural differences. These sites allow people to interact with others online by sharing opinions, insights, information, interests, and experiences.  Members may use the site to interact with friends, family members, and colleagues they already know, but that they may also wish to develop new personal and professional relationships on the sites.

Social network advertising uses social networks to inform, promote, and communicate the benefits of products and services, and there are several advertising strategies.  Banner ads on social networks can either be displayed to each visitor to the Web site or by using the information in user profiles, directed toward those members who would likely find the product most appealing.  People frequently make decisions based on input from their close group of friends and advertising and use an individual’s network of friends.  Company-owned social networking websites allow users to talk about new products, services, or improvements they would like to see and the company can implement customer-submitted ideas. Viral marketing is where users pass along a marketing message to others, creating the potential for exponential growth.

Many companies are using social media to advertise, collect information, or gather background on individuals. Do you think this is ethical?

Code of ethics

 IT workers have many different relationships, including those with employers, clients, suppliers, other professionals, IT users, and the society at large, and that in each relationship, an ethical IT worker acts honestly and appropriately. IT workers must set an example and enforce policies regarding the ethical use of IT. IT workers are in a unique position because they have the skills and knowledge to abuse systems and data or to allow others to do so.

Discuss an ethical issue IT organizations face today. Have you been personally affected by an IT ethical issue? Provide examples

API for App

Hello, I would like to know if you can help to indicate the requests (methods, url and description) necessary for the following application.

If you can develop documentation in Postman

The app is for organizations that help the elderly. Features include GPS tracking and task reminder

Cases (1 page each)

Case 1: Enumerating Systems on the Alexander Rocco Network

After conducting enumeration of the Alexander Rocco network, you discover several Windows computers with shared folders for the Help Desk Department. Youre concerned when you access one of the shared folders containing information for help desk personnel and find an Excel spreadsheet listing e-mail addresses and passwords for all employees. Help desk employees use this shared folder to access the Excel spreadsheet if users call saying they have forgotten their passwords and need this information even when theyre away from their offices.

Case Question

a. Based on this information, write a one-page memo to the IT manager, Donald Lee, describing the steps you would take after this discovery. The memo should also mention any information you find in the OSSTMM that relates to your discovery and offer recommendations.

___________________________________________________________________________________________________________________________________________________________________

Case 2: Researching enum4Linux on the Internet

You are given permission to use your credentials to run some basic security checks on the Alexander Rocco domain. You dont have access to Nessus or OpenVAS, so you have to use other tools to enumerate the domain. After some research, you come across the enum4linux tool. To make sure your boss is okay with this tool, you need to tell him why you want to use enum4linux and what its capable of.

Case Question

a. Write a one-page memo on the enum4linux tool in which you describe the goal of your enumeration and the checks available in enum4linux. Your memo should persuade your boss into letting you use the tool for enumeration purposes.

Evaluate CPU, RAM, input, output, and peripheral devices as components used in system architecture.

 

IT332-3: Evaluate CPU, RAM, input, output, and peripheral devices as components used in system architecture.

Purpose

Nearly everyone knows how to use a computer, but only a handful of users know or even show interest in what happens inside the computer. Throughout the past decades, the architecture has changed little; however, it is still far more advanced and more productive, which means also faster. In this assignment, you will have the opportunity to learn about computer architecture and explain how it processes information and operates.

Assignment Instructions

Write a 3-page paper (2 pages of written content and 1 diagram) explaining the inner workings of a computer. Include a discussion of the CPU and the concept of single, dual, and multi-core technologies. Also, explain the relation between CPU, memory, and bus. Discuss registers, data moving through the bus, memory allocation, and L cache.

The minimum concepts to cover and explain in the paper are the CPU, memory, bus, cache, address registers, data movement instructions, and multiprocessing. The items listed should be tied together and their interworking with each other described and explained.

Assignment Requirements

Your paper should be 2 pages of written content and 1 diagram. Be sure to use appropriate APA format and cite your textbook or other sources that you used in your paper.

The paper should contain sufficient information to adequately answer the questions and contain no spelling, grammar, or APA errors. Points deducted from grade for each writing, spelling, or grammar error are at your instructors discretion. 

For assistance with APA requirements, please go to Academic Writer. You will find the link in the Academic Tools section of the course.

Also review the university policy on plagiarism. If you have any questions, please contact your professor.