Create a WBS for one of the following projects: • Introducing self-checkout registers at your school’s bookstore • Updating 50 laptops from Project 2007 to Project 2010 • Providing a new Internet cafe onsite at your organization • Developing an app that you and a friend will create and sell online within three months • Earning your CAPM or PMP certification Decide on all of the Level 2 categories for the WBS. Use your choice of software to create a WBS in chart form and as tasks in a Gantt chart. Do not enter any durations or dependencies.

Create a WBS for one of the following projects:

• Introducing self-checkout registers at your school’s bookstore

• Updating 50 laptops from Project 2007 to Project 2010

• Providing a new Internet cafe onsite at your organization

• Developing an app that you and a friend will create and sell online within three months

• Earning your CAPM or PMP certification

Decide on all of the Level 2 categories for the WBS. Use your choice of software to create

a WBS in chart form and as tasks in a Gantt chart. Do not enter any durations or dependencies.

Be sure to include all of the deliverables and work required for the project. Make

notes of questions you had while completing this exercise.

Part 1: “The Recommendation Report” Please respond to the following: When writing a recommendation report, discuss when you know you have written enough. Discuss the writer’s ethical obligations in general when writing recommendation reports.

Part 1:

“The Recommendation Report” Please respond to the following:

When writing a recommendation report, discuss when you know you have written enough.
Discuss the writer’s ethical obligations in general when writing recommendation reports.
Part 2:

In a separate post, follow up in a substantive post of up to 150 words to one of your fellow students. Support your positions with explanations and/or sources, as appropriate, but do not quote. (choose one: a, b, or c)

Describe the difference between a locally hosted service (ie. in an enterprise data centre) and a service provided using an SaaS provider. What are the critical points, other than cost, that an enterprise would need to consider in choosing to migrate from a locally hosted service to an SaaS service.

Describe the difference between a locally hosted service (ie. in an enterprise data centre) and a service provided using an SaaS provider. What are the critical points, other than cost, that an enterprise would need to consider in choosing to migrate from a locally hosted service to an SaaS service. Your description should take no more than two to 3 pages.
Describe the difference between locally hosted infrastructure (ie. in an enterprise data centre) and infrastructure provided using an IaaS provider. What are the critical points, other than cost, that an enterprise would need to consider in choosing to migrate from local hosted infrastructure to an IaaS service provider. Your description should take no more than two to 3 pages.
DTGOV, the department in our case study, wants to investigate moving to a service based model where many of its services would be supplied to its clients as a service, in addition to its plans to move to an IaaS model (See the DTGOV Roadmap and Implementation Strategy (Erl, Mahmood, & Puttini, 2013, p. 19)). There are a number of infrastructure models that could possibly be used to achieve this. Some of these models are:
Local hosted infrastructure and applications;
Local hosted infrastructure with some SaaS applications;
Hybrid infrastructure (some locally hosted infrastructure with some IaaS) and applications;
Hybrid infrastructure and applications with some SaaS applications;
Full IaaS model with some with SaaS apps;
Full SaaS model.
You are required to choose an infrastructure model that you think will achieve the DTGOV Roadmap;

Describe the benefits and drawbacks, excluding costs, of your chosen infrastructure model. Your description should take no more than two to 3 pages.

2 ptsQuestion 1 True False Cloud computing refers to data, applications, and even resources stored on computers that users access over the Internet

2 ptsQuestion 1

True

False

Cloud computing refers to data, applications, and even resources stored on computers that users access over the Internet

2 ptsQuestion 2

True

False

A “boot process” is the first thing that happens when the computer is on.

2 ptsQuestion 3

True

False

Sorting is one of the primary operations of a computer.

2 ptsQuestion 4

True

False

The Microsoft Office Suite (Word, Excel, Access, and PowerPoint) is one of the system software programs.

2 ptsQuestion 5

True

False

Solid State Drives (SSDs) can greatly speed up the start up time of the computer compared to a traditional hard drive.

2 ptsQuestion 6

Pressing and holding the Alt key, and then pressing the Tab key, will display the switch list which is all the open windows and running programs on your computer displayed as thumbnails in the center of the screen.

10/30/2015 Quiz: Exam1

https://alamo.instructure.com/courses/967530/quizzes/1266192/take 2/7

True

False

2 ptsQuestion 7

True

False

A desktop application is a program designed to run in a window on the desktop in Windows 7 or 8.

2 ptsQuestion 8

True

False

Folders are a method used by Windows to organize files on a disk.

2 ptsQuestion 9

True

False

The Windows Explorer (Computer) program allows you to see the folder hierarchy.

2 ptsQuestion 10

True

False

The Internet is considered to be part of the World Wide Web.

2 ptsQuestion 11

True

False

Currently we are in the 9th generation of computers which allows voice input, optics, and nano technology.

2 ptsQuestion 12

True

False

To select multiple contiguous files using the Windows File Manager program, hold down the Shift key while using any cursor movement key.

10/30/2015 Quiz: Exam1

https://alamo.instructure.com/courses/967530/quizzes/1266192/take 3/7

2 ptsQuestion 13

True

False

RFID refers to the ability of a computer to recognize text characters.

2 ptsQuestion 14

True

False

Data is considered to be raw facts.

2 ptsQuestion 15

True

False

Regular mobile Internet users are growing faster than consumer based PC use.

10 pts

embedded computer [ Choose ]

super computer [ Choose ]

personal computer [ Choose ]

portable computer [ Choose ]

mainframe computer [ Choose ]

Question 16

Match the word or phrase that best describes the following:

10 pts

Clipboard [ Choose ]

WordPad [ Choose ]

NotePad

Question 17

Match the word or phrase that best describes the following:

10/30/2015 Quiz: Exam1

https://alamo.instructure.com/courses/967530/quizzes/1266192/take 4/7

[ Choose ]

Snipping Tool [ Choose ]

Shortcut menu [ Choose ]

2 ptsQuestion 18

magnetic tape

SSD drives

hard drives

RAID drives

Which of the following media types uses sequential data access only?

2 ptsQuestion 19

concentric

layered

hard

optical

Which of the following disks uses pits and lands?

2 ptsQuestion 20

external buses

peripheral nodes

device drivers

primary kernals

Small programs called ____________ are used to communicate with peripheral devices such as monitors, printers, and keyboards.

2 ptsQuestion 21

multitasking

looped threading

swap filing

multiprocessing

On a computer with two or more CPUs, ____ is a technique in which each processor or core works on a different job.

2 ptsQuestion 22

10/30/2015 Quiz: Exam1

https://alamo.instructure.com/courses/967530/quizzes/1266192/take 5/7

hard drive

optical drive

tape drive

flash drive

Which of the following memory storage options does NOT have any moving parts?

2 ptsQuestion 23

4

8

255

no limit

Generally, folders and file names in Windows may have up to _______ characters.

2 ptsQuestion 24

Ghost scripting

Virtual memory

Spooning

Parallel processing

____ uses a portion of a computer’s hard drive as additional RAM.

2 ptsQuestion 25

Which button in the three buttons shown here is used to minimize the window on the screen when using a program on the desktop?

2 ptsQuestion 26

kernel

shell

a programmer

neural net

Which of the following is the core of the operating system?

2 ptsQuestion 27

10/30/2015 Quiz: Exam1

https://alamo.instructure.com/courses/967530/quizzes/1266192/take 6/7

A

B

C

D

Which of the following items represents the protocol used in this web address?

A B C D

ftp:// www.microsoft.com/us/ (http://www.microsoft.com/us/) downloads/ index.html

2 ptsQuestion 28

Symbian OS

HP webOS

Blackberry OS

Android OS

Which of the following Operating Systems for phones was developed by Google?

2 ptsQuestion 29

10

20

40

60

Moore’s Law has held true for over __________ years.

2 ptsQuestion 30

RAM

ROM

Hard Disk

Flash Drive

Which of the following is sometimes referred to as volatile or temporary storage.

2 ptsQuestion 31

3

100

101

The binary equivalent or the decimal number 5 is__________ .

http://www.microsoft.com/us/
10/30/2015 Quiz: Exam1

https://alamo.instructure.com/courses/967530/quizzes/1266192/take 7/7

Not saved

The decimal number 5 cannot be expressed in binary.

2 ptsQuestion 32

.exe

.vbs

.com

all of these

Which of the following file types should NOT be opened when you get an unsolicited e­mail (SPAM).

10 pts

Commercial software [ Choose ]

Use it for free [ Choose ]

Should pay for it if you keep using it [ Choose ]

Source code availabe to public [ Choose ]

Centralized database [ Choose ]

Question 33

Match the word or phrase that best describes the following:.

10 pts

compressed folder [ Choose ]

move [ Choose ]

copy [ Choose ]

extracted file [ Choose ]

shift key held down [ Choose ]

1. Using A Microsoft Word Document, Please Review ONE Of The Films Presented At The Residency And Tell How That Film Represents A Contribution To The Field Of CyberLaw. 2. The Minimum Word Count Shall Be Not Less Than 1000 Words.

1. Using A Microsoft Word Document, Please Review ONE Of The Films Presented At The Residency And Tell How That Film Represents A Contribution To The Field Of CyberLaw. 2. The Minimum Word Count Shall Be Not Less Than 1000 Words.

1. Using a Microsoft Word document, please review ONE of the films presented at the residency and tell how that film represents a contribution to the field of CyberLaw.

2. The minimum word count shall be not less than 1000 words.

Part 1: Using the internet, search for commercial IDPS systems. What classification systems and descriptions are used and how can these be used to compare the features and components of each IDPS? Create a comparison spreadsheet identifying the classification systems you find.

Part 1: Using the internet, search for commercial IDPS systems. What classification systems and descriptions are used and how can these be used to compare the features and components of each IDPS? Create a comparison spreadsheet identifying the classification systems you find.

Part 2: What are some of the legal and ethical issues surrounding the use of intrusion detection systems logs and other technology tools as evidence in criminal and legal matters?

Part 3: Write a 2 – 3 page APA style paper summarizing the background, description, and purpose of NIST Special Publication 800-94, Guide to Intrusion Detection and Prevention Systems. The last section of your paper should be titled “Author Reflection” and should reflect your critique of the publication examined. You are not expected to read the entire guide, you should be mainly concerned with section two of the report, titled “Intrusion Detection and Prevention Principles” and section three of the report, titled “IDPS Technologies.”

Part 4:

Why is it so important in system engineering to become familiar with some of the analytical methods?
Identify and describe some of the technologies that are being applied in the design process. Provide some examples of typical applications, and describe some of the benefits associated with the application of computerized methods in the design process.
How does CAM and CAS relate to system engineering? Describe some possible impacts.
How is design review and evaluation accomplished? Why is it important relative to meeting system engineering objectives? Describe some of the checks and balances in the design process.
What is included in the establishment of a “functional” baseline, Allocated baseline, and Product baseline? Why is baseline management important?
What is configuration management (CM) and how does it relate to system engineering? Define Configuration Identification (CI) and Configuration Status Accounting (CSA).
Part 5: Select a system of your choice, and construct a sequential flow diagram of the overall system development process. Identify the major tasks in system development, and develop a plan/schedule of formal design review. Briefly describe what is covered in each.

Part 6: Discuss some of the problems associated with the application of computerized methods in the design process. Provide examples. What cautions must be observed?