Reference Mini Case 1 and Mini Case 2 found in your module resources. Students w

Reference Mini Case 1 and Mini Case 2 found in your module resources. Students will submit a context diagram for the order system, and create a decision table, to be submitted as a Word document. Your document should also include a narrative explaining each. 
Reference the following Mini Case 1 and Mini Case 2 (Also found in Module Resources). Students will submit a context diagram for the order system, and create a decision table, to be submitted within a Word document. Your document should also include a narrative explaining each.
Complete the following tasks:
Mini Case 1: Kitchen Gadgets task
Mini Case 2: Big State University task
Mini Case 1: Kitchen Gadgets
Kitchen Gadgets sells a line of high-quality kitchen utensils and gadgets. When customers place orders on the company’s website or through electronic data interchange (EDI), the system checks to see if the items are in stock, issues a status message to the customer, and generates a shipping order to the warehouse, which fills the order. When the order is shipped, the customer is billed. The system also produces various reports.
Task:
Draw a context diagram for the order system.
Mini Case 2: Big State University
The Big State University course catalog reads as follows: “To enroll in MIS 260, which is an advanced course, a student must complete two prerequisites: MIS 120 and MIS 222. A student who completes either one of these prerequisites and obtains the instructor’s permission, however, will be allowed to take MIS 260.”
Task:
Create a decision table that describes the Big State University course catalog regarding eligibility for MIS 260. Show all possible rules.
What to Submit
Homework Activity Module Four should follow these formatting guidelines: 1–2 pages, double-spacing, 12-point Times New Roman font, one-inch margins, and citations in APA.
See attached mini cases.

Submit your project plan. The project plan is a Word document that is a combinat

Submit your project plan. The project plan is a Word document that is a combination of a written explanation of the project plan and the explanation of the control plan. The WBS and timeline are represented with screenshots of the Gantt chart, resource chart, and cost table. Ensure each chart and graph is properly noted and has text explanation.
Note that the course project intent is to introduce students to an entire systems analyst process. Each milestone is fairly significant in size if performing an actual project. For the intended learning and exposure to the course project topics, please know that assumptions will have to be made and that any such assumptions should be documented. 
You will submit your Project Plan. The project plan is a Word document that is a combination of a written explanation of the Project Plan and the explanation of the Control Plan. The WBS and timeline are represented with screenshots of the Gantt chart, resource chart, and cost table. Ensure each chart and graph is properly noted and has text explanation.
Specifically the following critical elements must be addressed:
Project Plan: Illustrate your recommended implementation and management strategies. Be sure to include screenshots of all relevant diagrams, charts, and tables.

Work Breakdown Structure: Describe all of the essential roles and functions required for implementing the solution. Who will be doing the work and what, specifically, will they need to do?
Project Monitoring and Control Plan: How are you going to ensure that the project is going smoothly? What is your plan of attack to ensure that all controls are adhered to? What is the defined critical path? Be sure that you frame your response for communicating effectively to your target audiences.
Timeline: What is the estimated amount of time for implementation? Create a visual representation that captures your timeline (e.g., Gantt chart) based on the systems development life cycle.

What to Submit
Milestone Two should follow these formatting guidelines: 2–3 pages, double-spacing, 12-point Times New Roman font, one-inch margins, and citations in APA.

You will submit your roles and responsibilities portion of the final project. Wh

You will submit your roles and responsibilities portion of the final project. Who are the key leaders of the organization specific to how their responsibilities are connected to the security of the organization’s information? You must also identify key ethical considerations. What are the ramifications of key leaders not properly accounting for ethical and legal considerations? What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confidentiality, integrity, and availability of information. 
Employing information assurance best practices will ensure a firm is able to eliminate hierarchical structures, become more flat, and have greater customer touch points by leveraging the correct information at the right time. Successful firms will maintain an established information assurance plan and posture that is implemented and reviewed on a weekly basis.
The ability to properly assign roles is crucial to the design of an effective information assurance plan. Without clearly identified roles and responsibilities, the key members of an organization would not have a clear understanding of what was expected of them. The establishment of roles and responsibilities assists each member to communicate clearly and effectively throughout the organization.
Prompt
In Module Four, you will submit your roles and responsibilities portion of the final project. Your submission should answer the following questions: Who are the key leaders of the organization specific to how their responsibilities are connected to the security of the organization’s information? You must also identify key ethical considerations. What are the ramifications of key leaders not properly accounting for ethical and legal considerations? What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confidentiality, integrity, and availability of information.
Specifically, the following critical elements must be addressed:
Information Security Roles and Responsibilities

Analyze the role of the key leaders within the organization specific to how their responsibilities are connected to the security of the organization’s information. What is the relationship between these roles?
Evaluate key ethical and legal considerations related to information assurance that must be taken into account by the key leaders within the organization. What are the ramifications of key leaders not properly accounting for ethical and legal considerations?
What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confidentiality, integrity, and availability of information.

What to Submit
Your paper must be submitted as a two- to three-page Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format.

Why does the use of passwords put the overall security of the network in jeopard

Why does the use of passwords put the overall security of the network in jeopardy? First, explain the techniques and tactics that hackers commonly utilize in order to compromise passwords. Next, navigate to the following site: How Big Is Your Haystack? Once in the site, experiment with passwords of varying lengths and character types. Then, discuss your findings in the discussion topic. Be sure to discuss the impact that changing the structure of the password had on overall password security. 

  Based on this week’s lectures take an inventory of door and window locks in yo

 
Based on this week’s lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security. 
Instructions: Please download the Assignment 3 Door and Window Lock Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit to this dropbox.

your PowerPoint on your research findings (tell us the “story” of your findings,

your PowerPoint on your research findings (tell us the “story” of your findings, USING THE RUBRIC)
Remember IMPACT: For example, If I explained that research shows how harmful childhood obesity is, what causes it, and how to prevent it, you might be inspired to check on your own child’s diet although I never told you to do that.
The student sample has LOTS of slides. That is fine, but MOST powerpoints that earn 100 have between 7-15

 In this part of the project, you will use advanced controls in your GUI applica

 In this part of the project, you will use advanced controls in your GUI application. Read the CIS355A Module 3 Project Guide and view the project video below for instructions and details to help guide you through your efforts. 
Due by saturday please