What is the need for coaching in this situation? What does this person need to learn? What are their current skills? What is their current knowledge?

Diploma in networking

Assessment Task 2: Project

Task summary

For this task, you must provide effective on-the-job coaching to four different colleagues. There are three parts to this task:

Part A: You must prepare for coaching and develop a coaching session outline.

Part B: You must implement coaching sessions.

Part C: You must follow up on coaching sessions, seek feedback, and report on the progress of coaching.

Resources and equipment required to complete this task:

  • Access to textbooks and other learning materials
  • Access to a computer, printer, Internet and email software (if required)
  • Access to Microsoft Word (or a similar program).
  • Four colleagues (can be role played by other students).
  • A workplace or simulated workplace environment.
  • Access to relevant Commercial Cookery resources and equipment.
  • Coaching session template (provided). Keep a master copy of this as you will need to complete four in total.
  • Trainee feedback form (provided). Keep a master copy of this as you will need to complete four in total.

When and where is this task to be completed?

  • Workplace based students will complete the task in their workplace. Dates and times will need to be negotiated between the student, the four colleagues and their workplace supervisor.
  • Classroom based students will complete this task during class time, in a simulated workplace environment. The assessor will provide students with the date and times that they will be meeting with their trainees (roles played by other students) and implementing the coaching sessions.

What happens if I get something wrong?

  • If your assessor identifies that you have completed any part of this task incorrectly and/or have not submitted all items required, you will be given feedback and a date for resubmission. Your assessor will provide you with guidance as to what needs to be resubmitted and how.

Student instructions for Task 2

  • For this task you must select four colleagues or other students to play the role of ‘trainees’.
  • You must meet with each trainee and identify one skill/area they wish to improve. For example, this may be operating equipment, learning a procedure, learning a new cooking method, improving precision cuts and so on. You are then required to develop a coaching session outline for each trainee.
  • Once you have developed your coaching session outlines you must implement each coaching session and report the progress of each trainee to you supervisor (assessor).
  • Finally, you will answer a series of questions, reflecting on each coaching session, and seek feedback from each trainee.

 

Task 2: Part A – Prepare for coaching

For this part of the task you must organise a time to meet with each of the four trainees individually.

Talk to each trainee to learn about their current skills and knowledge and identify areas in which they may need training. Use the following points to guide your discussion:

  • What is the need for coaching in this situation?
  • What does this person need to learn?
  • What are their current skills?
  • What is their current knowledge?

After each discussion, develop a coaching session outline for each of the trainees, using the template provided.  Your coaching session outline must include:

  • The trainee’s need for coaching.
  • A description of the task/skill that you will be teaching the trainee.
  • When and where the training will occur. (Each coaching session must be delivered to each trainee individually, at different times.)
  • Resources required for the coaching session.
  • Session start time and end time.
  • A task analysis – you must provide a breakdown of the steps that you will take to teach the trainee the new task/skill.
Submission requirements for Task 2, Part A:

¨  Four coaching session outlines – one for each trainee.

As software becomes more pervasive, risks to the public (due to faulty programs) become an increasingly significant concern. Develop a doomsday but realistic scenario in which the failure of a computer program could do great harm, either economic or human.

Process frameworks & flows

Part 1 (ch 1)

Textbook assignment (may be slightly altered from the book):

1.6. As software becomes more pervasive, risks to the public (due to faulty programs) become an increasingly significant concern. Develop a doomsday but realistic scenario in which the failure of a computer program could do great harm, either economic or human.

Applying concepts: Eliciting requirements

1.1: Use the SafeHome case study scenario in section 1.5 to develop a list of 10 questions that should be asked about the project before the project proceeds. Questions should be specific to this scenario. Save as a doc or docx file.

Part 2 (ch 2)

Textbook assignment (may be slightly altered from the book):

2.1. Baetjer [Bae98] notes: “The process provides interaction between users and designers, between users and evolving tools, and between designers and evolving tools [technology].” List five questions that (1) designers should ask users, (2) users should ask designers, (3) users should ask themselves about the software product that is to be built, and (4) designers should ask themselves about the software product that is to be built and the process that will be used to build it. These questions should be more generic than the Applying Concepts assignment above.

Applying concepts: Process framework diagram and flow model

2.1: Utilizing the information in chapters 1 and 2, utilize MS Visio to create a process framework model with umbrella activities that include at least 2 tasks with an activity and an action section broken down into a task set for each. Use figure 2.1 as a guide. Keep the 3 P’s (Problem, Project, People) in mind as you work. This article provides additional insights into what should be included. Look at section 2.3 for examples of what can go into a task set.

Save your work as a jpg and insert it into a document. Do not submit vsdx files.

2.2: Next, select one of the process flow models in Figure 2.2. Make a preliminary decision on which would fit your proposed framework and discuss in at least one paragraph which you would choose and detail your justification for your choice.

Research and Evaluate the ways to discover ontologies in unstructured data. Using one of the tools (RStudio, Python, Jupyter, RapidMiner, or Tabeau), perform an ETL on any unstructured dataset you can find online; cite sources. Discuss your process and evaluate your results.

Research and Evaluate the ways to discover ontologies in unstructured data.

Research and Evaluate the ways to discover ontologies in unstructured data. Using one of the tools (RStudio, Python, Jupyter, RapidMiner, or Tabeau), perform an ETL on any unstructured dataset you can find online; cite sources. Discuss your process and evaluate your results. (300 words)

List and describe 5 advantages and disadvantages of virtualization.

Virtualization

1) Read Virtualization Essentials – https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/ebook/gated-vmw-ebook-virtualization-essentials.pdf

2) List and describe 5 advantages and disadvantages of virtualization.

Looking at the online website, how would you suggest that the issues requiring revision are corrected based on what you have learned in the class so far?

Human Computer Inter & Usability Writing question Usability Journal

Each day, we use the Internet on our personal computers and mobile devices to access information and purchase goods. Websites often have their own mobile form factor while others maintain the same Website user experience, creating challenges when trying to use navigation, overcome errors, search, and complete the most mundane tasks. For this assignment, you are to review a website as well as a Mobile Site. For example, you would evaluate Amazon.com on Microsoft Edge (PC) and Amazon.com on your iPhone using Safari. Conducting a heuristic evaluation (self-evaluation), you will write an assessment on each Website answering the following questions:

  1. What Website did you evaluate?
  2. What industry does the company participate in?
  3. Looking at the online website, address three issues that require revision? For each issue, please provide a screenshot and explicitly mark why you feel this issue is problematic.
  4. Looking at the online website, how would you suggest that the issues requiring revision are corrected based on what you have learned in the class so far?
  5. Moving to the mobile site, compare those same three features. Did you find the user experience to be problematic or better suited for the mobile form factor?
  6. With the mobile site, how would you enhance the experience for those same issues you found on the Website to be problematic.

This paper length is 4 -6 pages. Since this is a personal review of a website, sources are not necessary. However, you are still to follow the APA format in presenting the paper.

Using the Wix website developer or another free website builder, create a web-based tutorial to present your findings developed in your cybersecurity executive summary.

Managerial Cybersecurity Website Tutorial Assignment

Before you begin this project, review all the information on this page.

Managerial Cybersecurity Website Tutorial (An Individual Endeavor)

For this deliverable, you or your team will create a web-based tutorial to inform company stakeholders about your cybersecurity topic. Moreover, this site could appear on a company’s intranet and would be available to management. Thus, much of your information contained within the executive summary would be applicable to this endeavor. Furthermore, some the content could be corroborated and expanded through links to direct sources (e.g., articles, authoritative websites, industry leaders, videos, etc.).

Using the Wix website developer or another free website builder, create a web-based tutorial to present your findings developed in your cybersecurity executive summary.

For an individual endeavor, identify the format and structure of your web tutorial by researching other web tutorials. After reviewing a variety of learning tutorials on the Web, you will settle on an appropriate design to convey the information contained within the executive summary. In addition, to help in designing your website tutorial, a grading rubric will be made available for your review.

The final version of your web tutorial is due in (Week 16) where you will post the URL in an MS Word document.

Develop a solution for a particular cybersecurity topic. Research the cybersecurity security topic- your solution should be supported by at least six references which should include peer-reviewed articles, white papers, trade journals, surveys, websites, and other sources.

Health Monitoring

Instructions

Executive Summary

Before you begin this project, review all the information on this page.

Cybersecurity Executive Summary (An Individual Endeavor)

For this project, you or your team will write an executive summary apprising management or other stakeholders of the most relevant and critical cybersecurity issues and possible solutions related to your cybersecurity topic. It is important to develop solutions from a managerial perspective considering risk assessment operational, strategic, and possibly global consequences.

Deliverable:

4–6-page executive summary that should adhere to the following:

Develop a solution for a particular cybersecurity topic.

Research the cybersecurity security topic- your solution should be supported by at least six references which should include peer-reviewed articles, white papers, trade journals, surveys, websites, and other sources. Your executive summary should include the following sections:

  • Problem/Opportunity Identification
  • History
  • Current Status
  • Requirements
  • Proposed solution

Conclusion

Use the discussion forums to buttress and integrate important cybersecurity domains. You may want to address the specific cybersecurity domains most important to your topic by addressing the following:

  • Brief overview/history and status of the problem.
  • Why is it important to management?
  • How does it work and give an example.
  • Solution/recommendation based on your research.
  • Charts, graphs, tables are encouraged.
  • Works Cited page.
  • Appendix.

Your executive summary is due at the end of Week 16 and it must be uploaded and attached by each team member in this assignment area It should be double-spaced, use a 12-point Times New Roman font, and written in APA format with one-inch margins. Be sure to cite your sources using APA style and formatting unless otherwise specified. Please single space references. No quoting- paraphrase only!

What is meant by Binary representation. List 2 components that computers are made of. What is the function of each component? What is the different between Input and Output devices? Give an example for each.

Module 2 Discussion

Briefly give an answer to the following questions:
1-) What is meant by Binary representation.
2-) List 2 components that computers are made of. What is the function of each component?
3-) What is the different between Input and Output devices? Give an example for each.

Many organizations have policies and procedures in place regarding information systems and security. However, many of these policies are stored in locations not readily available to employees. What would be your approach to ensure all employees of the organization are fully aware of the policies to secure the organizational infrastructure along with practices accepted by the organization?

Short answer Discussion questions

Disaster Recovery

IV Work at the XYZ Financial Bank, and a fellow co-worker approaches you and states the only safeguard controls needed for the bank are the physical controls. Based what you have learned about safeguard controls, discuss whether you support your co-worker’s position, or refute the claim of just using physical controls. Defend your answer.

V Risk mitigation, which is part of the risk management plan, takes place once you have identified and analyzed your risks. Risk mitigation is identifying the strategies you are going to use to accept, avoid, share/reduce, or work around the identified and analyzed risks. Which of the seven domains do you think will be the easiest to identify, and which will be the hardest? Defend your answer.

 

Cybersecurity Law and Policy

IV A single point of failure is a huge issue and is to be prevented at all costs. Especially when it comes to policies and documents because those are critical to day-to-day operations. Communication is key and it is vital that everyone is on the same page. One advantage that comes to mind when separating duties for a combined effort is that everyone can focus on one thing at a time and not be overwhelmed with so much at once. This will aid in empowering your team to achieve the objectives of the organization as well as making your employees specialists in their respective duties. Another advantage is accountability in the workplace. If someone doesn’t do their part in their duties, you can hold them accountable for not fulfilling their duty or see if they are able to fulfill that duty so you can set them up for success with another duty if they aren’t able to fulfill that duty.

V Many organizations have policies and procedures in place regarding information systems and security. However, many of these policies are stored in locations not readily available to employees. What would be your approach to ensure all employees of the organization are fully aware of the policies to secure the organizational infrastructure along with practices accepted by the organization?

Analyze a business case study by applying Systems Analysis and Design concepts, principles, processes, and techniques. Apply industry driven techniques for designing, developing, deploying, and securing enterprise applications.

Assignment 1 Systems Planning Vision Statement

Assignment Instructions

Purpose

The purpose of this assignment is to create a Vision Statement for your Case Study project so that we can summarize the important features of the new system. This also provides an opportunity for you gain insight to the Case Study and its scope for future development activities.

Objectives

CO4: Develop major life cycle deliverables like Vision Document, SRS (Software Requirements Specification), or SDD (System Design Document).

CO7: Apply requirements gathering and other traditional analysis techniques.

CO9: Analyze a business case study by applying Systems Analysis and Design concepts, principles, processes, and techniques.

(SLO):Apply industry driven techniques for designing, developing, deploying, and securing enterprise applications.