For this module’s project you will need to select a “project” to work on. An

  
For this module’s project you will need to select a “project” to work on. An example could be Payment Card Industry (PCI), Windows 11 upgrade, or a project that your organization might be working on and do a risk management plan on the project. You can use one of the examples below or use the internet. You may use Rasmussen Library, Co-Workers, external resources and the internet to assist with your completion of this template.
With this module’s project, you are required to complete a risk assessment. You may choose your organization and add an additional four new entries for each section. An example has been entered for each section. Those who may not have access to an employer will need to extend their research to Rasmussen Library, connection within the security realm, or the use of the Internet. Again, this project is for you to look at things differently and find potential issues and how they would be mitigated. Documentation should be submitted in APA format.

Project – Chapter 1, pg. 7, Exercise #3 Identify and explain a specific busines

Project – Chapter 1, pg. 7, Exercise #3
Identify and explain a specific business process. How might this process be automated with mobile technologies? How might it be completely redesigned? Refer to the instructions in the textbook.Requirements:
Write a 2 to 3-page business process.
Please provide 3 – 5 peer-review references to substantiate your viewpoint. Note: Wikipedia and similar Websites do not qualify as quality resources.
Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
Include a cover page containing the assignment title, the student’s name, the professor’s name, the course title, and the date. The cover and reference pages do not count toward the page count. 

Discussion #2 Discussion #2After reading Chapter 3, which of the interaction ty

Discussion #2
Discussion #2After reading Chapter 3, which of the interaction types do you feel most influence interface design challenges? You are required to write a statement that is LIMITED to 150 words. This is an opinion question; therefore, research is not required. Should you cite the work of others, please provide the source of your opinion in APA format.
You must reply to one peer with 100 – 200 words. Initial response due by Thursday at 11:59pm, Peer Response Due By Sunday at 11:59pm. Failure to submit Initial Response before Thursday at Midnight results in a 50% deduction of points for initial contribution.        
Discussion #3
After reading Chapter 4, which of the cognitive frameworks do you feel best help users determine how to complete a task and activity? You are required to write a statement that is LIMITED to 150 words. This is an opinion question; therefore, research is not required. Should you cite the work of others, please provide the source of your opinion in APA format.
You must reply to one peer with 100 – 200 words. Initial response due by Thursday at 11:59pm, Peer Response Due By Sunday at 11:59pm. Failure to submit Initial Response before Thursday at Midnight results in a 50% deduction of points for initial contribution.

(Week 1) Discussion 1: Introductions & Why Mobile Apps? (Week 1) Discussion 1:

(Week 1) Discussion 1: Introductions & Why Mobile Apps?
(Week 1) Discussion 1: Introductions & Why Mobile Apps?Introduction:  Hello and welcome to ITS537 – InfoTech & Mobile Applications. Please take an opportunity to introduce yourself to your classmates. Feel free to share your:
Current occupation and employer (if applicable)
Experience and/or background with mobile technology
Why Mobile Apps? If potential customers cannot reach your services, they are lost potential customers. Smartphones, tablets, and other nontraditional devices are pervasive in the market. The onus of responsibility is on developers to help customers get a product anywhere. Do competitors offer products or services your organization does not? Is that why they have an app? Is there a market an organization desires to expand into? If an organization is already in that market, can it add features to an app that will draw more than its competitors?
Explain why mobile development is complex.
Identify why some organizations think they do not need a mobile presence.
Outline why organizations need a mobile application.
To participate in the discussion, respond to the discussion prompt by Thursday at 11:59 PM EST. Then, read a selection of your colleagues’ postings. Finally, respond to at least two classmates by Sunday at 11:59 PM EST in one or more of the following ways:
Complete the discussion by the assigned due date. Late assignments will not be accepted.
Do not claim credit for the words, ideas, and concepts of others.
Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive a zero for your work.

Discussion #1 After reading Chapters 1 and 2 of the Preece text, what does inte

Discussion #1
After reading Chapters 1 and 2 of the Preece text, what does interaction design mean to you? You are required to write a statement that is LIMITED to 150 words . This is an opinion question; therefore, research is not required. Should you cite the work of others, please provide the source of your opinion in APA format.
You must reply to one peer with 100 – 200 words. Initial response due by Thursday at 11:59pm, Peer Response Due By Sunday at 11:59pm. Failure to submit Initial Response before Thursday at Midnight results in a 50% deduction of points for initial contribution.

Imagine that you are employed as an IT project manager by a fast-food organizat

Imagine that you are employed as an IT project manager by a fast-food organization. This organization operates many fast-food shops within the region and would like to promote its brand by creating a mobile application that will provide its customers with the ability to view the nearest fast-food shop location within their geographical area.
As a member of the software development team, you estimate a total project cost of $175,000. You have designated control points to measure project progress. At control point 2, the following data is available:
Budget Cost of Work Performed: $34,000.
Actual Cost of Work Performed: $37,500.
There are various stakeholders that are interested in the progress of the project. These stakeholders include the marketing management team (internal customers), software designers, programmers, testers, and upper management. The software development team has attempted to release a mobile application of this magnitude in the past; however, lack of sponsorship, mobile development expertise, and technical infrastructure has limited the team’s success.
Instructions
Write a 3 page paper in which you:
Identify at least four attributes of the mobile application development project that can be measured and controlled and evaluate how each is a critical factor for the success of the project.
Generate a project plan summary of the various project milestones. Develop a WBS that details work packages required to complete the project scope.
Develop a workflow model that can be used to inspect and detect defects during the acceptance of this mobile product through the use of graphical tools in Microsoft Word or Visio or an open-source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
Describe how the defects detected during the acceptance of the mobile application should be reported and explain the circumstances in which a defect may not require reporting.
Analyze the communication needs of the different project stakeholders. Explain the types of project status reports that would be useful to each.
Compute the cost variance, schedule variance, cost performance index, schedule performance index, and estimated actual cost using the information presented at control point 2. Interpret the project schedule and budget status from the calculations.
Explain how the work package, binary tracking, and earned valued reporting can be used effectively during the maintenance phase of the software life cycle if various change requests may be assigned to individuals and processed on an individual basis.
Develop a risk register that will document all of the estimated risks. Assign one risk management technique for each risk and explain the basis for your selection.
Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.
The specific course learning outcome associated with this assignment is:
Evaluate project monitoring and risk management strategies for a software development project.
TO TUTOR: THIS IS MY PROFESSOR’s SPECIFIC INSTRUCTIONS OR INSIGHTS HOW HE WANTS IT DONE.
Instructor Insights for Week 8 Assignment
From Instructor: This paper is similar to the Week 6 assignment. You will make a Project plan for a different scenario with some of the same information (WBS) and some new parts that were not in the Week 6 assignment.
This time, it is a fast food chain restaurant owner who wants to make a Find the Location of their nearest restaurant, creating an app to locate the closest restaurant.
Some new things, like the budget, are shared. You will need some information to use the beyond-the-scenario to enhance your project plan.
There are eight (8) questions to answer to make up this project plan.
identify at least four attributes of the mobile application development project that can be measured and controlled and evaluate how each is a critical factor for the success of the project.
Attributes are parts of the project that must be completed based on the scenario. This scenario does not spell out the development, but you have all seen Apps that locate things. Use that experience to say what screens would be needed to make the content for this project.
Generate a project plan summary of the various project milestones. Develop a WBS that details work packages required to complete the project scope.
*** There is no format specific here for the WBS. I will take either the MS Project version of Figure 5-5 or the Table 5-4 formats. NOT THE DIAGRAM.
Either of these two methods. The level two information, as per the textbook, will be the major milestones.
I will accept any of these two formats for the WBS.
Like Table 5-4 Like an outline (book calls it a Tabular format)
Like Figure 5-5 MS Project format.
3. Develop a workflow model that can be used to inspect and detect defects during the acceptance of this mobile product through the use of graphical tools in Microsoft Word or Visio or an open-source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
This is a workflow diagram Flow chart diagram like Figure 8-8. You need to research defect detection and correction to make a plan and put it into diagram format.
Describe how the defects detected during the acceptance of the mobile application should be reported and explain the circumstances in which a defect may not require reporting.
This question is research and report. You should have a bunch to write about as you made the diagram above. This a paragraph formatted about the defects detected during the “Acceptance” part of building the application. (Final testing after the program is built)
Analyze the communication needs of the different project stakeholders. Explain the types of project status reports that would be useful to each.
This goes with the Discussion post for this week as well; it is the same research. Just apply it to this scenario. Different stakeholders get different communications. Look at the list of stakeholders in the scenario and what communication each will receive.
Compute the cost variance, schedule variance, cost performance index, schedule performance index, and estimated actual cost using the information presented at control point 2. Interpret the project schedule and budget status from the calculations.
This is a calculation based on the scenario. The scenario provides some budget information for the calculations.
Explain how the work package, binary tracking, and earned valued reporting can be used effectively during the maintenance phase of the software life cycle if various change requests may be assigned to individuals and processed on an individual basis.
This is a research and report question. Base the answer on the scenario. In other work, look at change requests after the project is complete (maintenance phase) and how work would be accomplished and by whom. Again, this is based on this IOS app that was created.
Develop a risk register that will document all of the estimated risks. Assign one risk management technique for each risk and explain the basis for your selection.
***Just 3 to 4 risks are fine.
Look up a risk register. An example in the book is Table 11-4. Just make a spreadsheet and fill out risks that the project of building this software much face which can be technological, financial, organizational, outside factors or others.
You will also need to assign the risk management technique (a way to mitigate the risk) as part of a written answer for each risk. Short on explaining why it is a risk, how you would mitigate it, and why the mitigation would lessen or eliminate the risk.

Imagine that you have been hired as a project manager assisting in the developm

Imagine that you have been hired as a project manager assisting in the development of an iOS application and cloud-based solution that is designed to streamline your organization’s delivery operation. As the project manager, you are to manage the development and release of the mobile client platform in the cloud-based infrastructure that will use GPS to track the shipment and delivery of goods in airplanes across the United States.
The iOS mobile client will have three modules consisting of a search customer screen, a search address screen, and confirm delivery screen. Programmers have reviewed the requirements and estimate that each module will take one programmer 300 hours to complete.
In addition to delivering the iOS mobile application, your project will require upgrading the internal network and application infrastructure to a cloud-based model to support the new iOS mobile platform. This effort will require your team to procure network appliances to optimize the security factors of the cloud-based platform.
One last component of the project scope is to provide training to operation support staff and 30 cargo airplane pilots staffed across four regions of the United States. Your project team consists of three programmers, a technical writer, three technical trainers, two network engineers, and one system administrator.
Instructions
Section 1: Written Project Plan
Write a 3 page paper in which you:
Determine the factors that must be considered and observed throughout the work breakdown structure (WBS) development process, and explain why.
Create a work breakdown structure for the scope of the project. Note: The WBS must be in the indented format as shown in Figure 5-3 in Chapter 5 of the text.
Analyze the various activities required for this project and provide an estimate of the duration for each activity based on the number of resources available for the project. Include assumptions and basis for each estimate.
Recommend the estimation technique that should be used for each activity (that is, PERT, Delphi, analogy, expert judgment, or rule of thumb).
Determine the major milestones that the project will encounter.
Describe the logical sequence of planned activities required to achieve the project and analyze how monitoring durations on the critical path influence the success of the project.
Section 1 of your assignment must follow these formatting requirements:
This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.
Section 2: Gantt Chart
Use Microsoft Project (or its equivalent) to create a Gantt chart in which you:
Document all resources that would be required for this project within the Resource Sheet form.
List the activities required for the project. Break down the activities by the major milestones.
Enter the estimate of required durations and dependencies, and assign the resources for each activity.
Generate a Gantt chart that shows all of the project deliverables, from beginning to end.
Section 2 of your assignment must follow these formatting requirements:
Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into a Word document.
The specific course learning outcome associated with this assignment is:
Plan a software development project.

The choice of an appropriate input device for a product is often based on both t

The choice of an appropriate input device for a product is often based on both the type of device being used and the target market for that device. For instance, a device targeted to college students and one targeted to older individuals may use different input methods. Suppose that you are developing a device to be used primarily for Internet access that will be marketed to senior citizens. What type of hardware would you select as the primary input device? Why? What are the advantages and disadvantages of your selected input device? How could the disadvantages be minimized? What are other groups that have special technology needs? As future technology developers and innovators, do we have a responsibility to ensure technology is accessible to all groups? Incorporate Christian scripture and faith in your post and provide technical depth to all of your responses. 

Selecting a Topic Choose a topic of interest below, or select one relevant to

Selecting a Topic
Choose a topic of interest below, or select one relevant to Cyber and Digital Forensics. Submit your topic as the Week 1 research paper submission. Your instructor may make recommendations on the appropriateness/breadth of your submission. The idea for a research topic may come from your curiosity, coursework, interactions with colleagues, faculty members, and general observation. All topics must be related to the contents of this course.
Explore the idea; examine its significance and feasibility. Conduct preliminary research on the idea. Review the relevant literature. Examine the gap areas in research and identify issues you want to address.
Prepare a rough outline of the research proposal you would like to submit. Discuss the topic, draft a proposal with your instructor, exchange ideas, and incorporate suggestions.
Conduct further research on the topic.
Make a detailed proposal.
In the project proposal, you should:
Introduce the topic
Explain your rationale for selecting the project
Describe the significance of the project
State the objective of the project and project outline
Describe the methodology to be adopted
State the timeline for the project completion
Alternative Topics (but not limited to):
Analyze different phases of forensic investigation and recommend a strategy to use digital forensics for assessing the vulnerability of various components of an information system.
Compare and contrast different forensics techniques and analyze the legal implications of those techniques.
Compare and contrast various techniques of recovering data on different operations systems.
Include references in APA format.

https://www.volersystems.com/design-tips/122-data-acquisition-basics/%22
https://www.youtube.com/watch?v=PxrlD3MEJQE
 https://www.youtube.com/watch?v=PxrlD3MEJQE 

Selecting a Topic Choose a topic of interest below, or select one relevant to

Selecting a Topic
Choose a topic of interest below, or select one relevant to Cyber and Digital Forensics. Submit your topic as the Week 1 research paper submission. Your instructor may make recommendations on the appropriateness/breadth of your submission. The idea for a research topic may come from your curiosity, coursework, interactions with colleagues, faculty members, and general observation. All topics must be related to the contents of this course.
Explore the idea; examine its significance and feasibility. Conduct preliminary research on the idea. Review the relevant literature. Examine the gap areas in research and identify issues you want to address.
Prepare a rough outline of the research proposal you would like to submit. Discuss the topic, draft a proposal with your instructor, exchange ideas, and incorporate suggestions.
Conduct further research on the topic.
Make a detailed proposal.
In the project proposal, you should:
Introduce the topic
Explain your rationale for selecting the project
Describe the significance of the project
State the objective of the project and project outline
Describe the methodology to be adopted
State the timeline for the project completion
Alternative Topics (but not limited to):
Analyze different phases of forensic investigation and recommend a strategy to use digital forensics for assessing the vulnerability of various components of an information system.
Compare and contrast different forensics techniques and analyze the legal implications of those techniques.
Compare and contrast various techniques of recovering data on different operations systems.
Include references in APA format.

https://www.volersystems.com/design-tips/122-data-acquisition-basics/%22
https://www.youtube.com/watch?v=PxrlD3MEJQE
 https://www.youtube.com/watch?v=PxrlD3MEJQE