Module 5 – Project: Read and Write to Files   Introduction In this part of t

 
Module 5 – Project: Read and Write to Files
 
Introduction
In this part of the project, you will use read and write to files. Read the CIS355A Module 5 Project GuideLinks to an external site. and view the project video below for instructions and details to help guide you through your efforts.

Evaluate the most significant security problems associated with the web. First,

Evaluate the most significant security problems associated with the web. First, explain which threats are most significant and why. Next, discuss how identifying these potential threats can assist in the creation of an effective plan to mitigate these threats. Finally, in responding to your peers’ posts, discuss any potential threats that were not identified as well as the potential harm these threats could cause.

In order to effectively respond to applicable threats, information technology ad

In order to effectively respond to applicable threats, information technology administrators must be able to accurately evaluate the threat environment. The ability to engage in this evaluation originates from the performance of a risk assessment. Performing a risk assessment can take on many forms. One recent method of engaging in risk assessment has come in the form of utilizing firewalls and fire wall audit tools. Through these measures, IT administrators can map the network and critically analyze where any potential vulnerabilities may lie. The outcomes of these measures results in increased awareness of the most likely types of threats that may materialize, and enables administrators to configure the network in order to mitigate and address these weaknesses and vulnerabilities.
Prompt
In Module Five, you will submit the risk assessment portion of the information assurance plan. You will provide the organization with an assessment of the threat environment and the risks within, as well as methods designed to mitigate these risks. Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most important areas for improvement to current protocols and policies?
Specifically, the following critical elements must be addressed:
Risk Assessment

Analyze the environment in which the organization operates, including the current protocols and policies in place related to information assurance.
Evaluate the threat environment of the organization.
Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most important areas for improvement to current protocols and policies?
Assess the threats to and vulnerabilities of the organization by creating a risk matrix to outline the threats and vulnerabilities found and determine possible methods to mitigate the identified dangers.

What to Submit
Your paper must be submitted as a three- to four-page Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format.

  Using the Campus Bikes case study found in your module resources, complete the

 
Using the Campus Bikes case study found in your module resources, complete the Module Five Homework Activity. Using a Word document, you will answer four prompts based on the case.
Submit your assignment here. Make sure you’ve included all the required elements by reviewing the guidelines and rubric.
 
Using the case study Campus Bikes, complete the Module Five Homework Activity. Using a Word document, students will answer four prompts based on the case.
Answer the following prompts via a Word document:
List possible objects in the new bike shop system, including their attributes and methods.
Identify at least three possible use cases and two actors.
Create a use case diagram that shows how service requests are handled.
Create a state transition diagram that describes typical customer states and how they change based on specific actions and events.
What to Submit
Homework Activity Module Five should follow these formatting guidelines: 1–2 pages, double-spacing, includes identification of 3 objects, 2–3 methods and attributes, 3 use cases and 2 actors for each of the objects in the new bike shop’s system, 12-point Times New Roman font, one-inch margins, and APA citations.

In your initial post, discuss your thoughts on the value of developing case diag

In your initial post, discuss your thoughts on the value of developing case diagrams. Do you believe case diagrams will benefit the process, or do you believe they do not bring value to the process? Support your opinion. There is not a right or wrong answer. This is a reflection of your thought. This topic in particular is one that is and can be very polarized in an IT department.
In responding to your peers, select a post you align with, and discuss how you will work with Dan DisAgree on your project team. Dan DisAgree has the opposite opinion of case diagrams than you; however, Dan is reasonable and open to change. In your post, include at least one of Dan’s disagreements and provide a persuasive response to influence Dan’s opinion. 

Answer these questions: 1. What would you need to do to establish a viable and s

Answer these questions:
1. What would you need to do to establish a viable and sustainable security program?
2. How would you present the need for security to the employees of an organization?
3. How would you develop, purchase, or implement a security solution for an enterprise
Writing Requirements
APA format, 3–4 pages in length (excluding cover page, abstract, and reference list)
Be sure to include a minimum of 3-4 outside resources.
Use the APA template located in the Course Information folder to complete the assignment.

Discussion Details: The Conceptual Framework of the College of Education (COE) d

Discussion Details:
The Conceptual Framework of the College of Education (COE) describes the candidate as The Educator as Decision-Maker. This concept embodies the College’s constructivist approach to teaching and learning. Students’ prior knowledge, skills, and attitudes, including dispositions, interconnect with the knowledge, skills, attitudes and expectations they encounter as ASU. As a result of this fusion, students develop and acquire new knowledge, skills, and attitudes that manifest themselves in the students’ informed decision-making capabilities.
· Provide a reflective statement (written or video) discussing how your thought processes, academic development, and professional disposition as a change agent, lifelong learner, and reflective practitioner have been impacted by the learning content provided during this course.
· Discuss at least 3 specific content-related topics between modules 1 – 5 and address how each of those topics provided learning gains that clarified previous misconceptions, changed perspectives with new moments of discovery, and enhanced opportunities for life application to your personal or professional skill set. If necessary, pose questions to the instructor regarding concepts that may still be unclear from modules 1 – 6.
Three Topics
-How assistive technology adaptations can be used to promote independence in daily living
-Examine the features of an effective AT assessment to ensure that the individual and device combine to provide and effective person-technology match
-Examine the components of an augmentative and alternative communication system and how they combine to provide individuals with severe speech problems opportunities to communicate on a daily basis across environments 
 
*need discussion by tomorrow morning if possible. assignment due on sunday*
Assignment Details 
ChatGTP Assignment
Using ChapGPT, create an assignment related to any topic you learned about this semester. 
Include:
Assignment Objective
Assignment Overviews
Assignment Guidelines:
Grading Rubric
If you aren’t familiar with ChapGPT, use this link: https://www.zdnet.com/article/what-is-chatgpt-and-why-does-it-matter-heres-everything-you-need-to-know/
Topic: Assistive Technology 

APA FORMAT, 350 words and proper references and NO PLAGIARISM. 1) Why do some su

APA FORMAT, 350 words and proper references and NO PLAGIARISM.
1) Why do some supervisors fail to delegate effectively? If this situation were a common problem in an organization, what could be done to increase supervisors’ skills in delegating effectively?
2) What are the five components of the basic communication process model? Define each. Identify some of the important forms of electronic communication discussed in the text.