What were two important segments in the PBS Makers Women Who Make America 3 of 3 video that added value to your knowledge and understanding of women in politics?

WOMEN IN POLITICS

DEPARTMENT APPLIED SOCIAL AND POLITICAL SCIENCES

READ IN ITS ENTIRETY: Type your responses directly on this document and once you have completed it, please upload the exam to Turnitin. If you do not follow these instructions, you will receive a zero for your final exam, no exceptions.

The exam is based on our assignments for WEEKS 4, 5, and 6.  Review your readings and videos. You are expected to take what we have read and watched and demonstrate your understanding by providing your responses to four (4) short essays in your words (do not just copy and paste information or you will not receive credit). Your writing should clearly illustrate that you learned the information from our materials by making the connections with particular points from the readings and videos (name the materials and exact events, people, thoughts, concepts, etc.). Review the rubric for standards for all writing assignments.

Watch passages to answer question

  • https://youtu.be/wMVg6hxXWnE “Viola Davis and Stacey Abrams On Black Women of Awards Season”
  • https://youtu.be/y3mj1yG38ig “The 2017 MAKERS Conference: Excerpt from the documentary, Makers — Women Who Make America”
  • https://youtu.be/-XVK2C7cKq8 “PBS Makers Women Who Make America 3of3”

 

INSTRUCTIONS: You are to write four (4) separate short essays (each one is worth 25 points) Each short essay must be a minimum of two (2) well-written paragraphs with no less than eight (8) comprehensive and definitive sentences.  For each of the following articles/videos write about the main themes and ideas, major argument and conclusion, and finally how did the article/video contribute to your understanding of women in politics. Your essay must cover all of these points.

Essay #1 – Conversation Between Viola Davis and Stacey Abrams (Video)

Essay #2 – Women and Social Change Leader (Article)

Essay #3 – Why Women in Politics 2012 (Article)

Essay #4 – You may choose to write about either Dr. Dorothy Height or Dr. Angela Davis (Video)

Extra Credit (worth 5 points): What were two important segments in the PBS Makers Women Who Make America 3 of 3 video (key people/events) that added value to your knowledge and understanding of women in politics (be specific how)?

Consider a noiseless channel with a bandwidth of 7 kHz transmitting a signal with four signal levels. What is the maximum bit rate, in bps, of this channel?

Question 1 (20 points)

Suppose you are tasked to setup a video Zoom meeting in your company conference room. Knowing that the conference room camera is Logitech Conference Video Conference Webcam, with Built-In Speakerphone. The microphone Bandwidth: 200 Hz – 8 kHz and transmit video using a matrix of (1280 x 720) picture elements, where each element can take on one of 32 intensity values. Assume that 30 pictures are sent per second.

  1. Find the video Data Rate R (bps). (10 points)
  2. Assume that the Zoom conference is transmitted over a CAT5 10/100 Mbps Ethernet cable operating at 800-MHz bandwidth and a -35dB signal-to-noise ratio. Find the capacity of the channel (bps). (10 points)

Question 2 (10 points)

Consider a noiseless channel with a bandwidth of 7 kHz transmitting a signal with four signal levels. What is the maximum bit rate, in bps, of this channel?

Question 3 (10 points)

You are tasked to create a network with minimum bandwidth capacity of 50 Mbps, the Network bandwidth of the channel is 45 MHz Assuming white thermal noise, what is the level of signal-to-noise ratio required to maintain the data rate?

 

Identify the key decision makers and stakeholders and those individuals included in the requirements analysis of project related to the deployment of a virtual infrastructure. Analyze the risks and benefits of deploying a Cisco-based LAN infrastructure.

Networking

Before beginning an IT project, you must have a solid understanding of the organization and the project needs. After gathering this information, develop an initial scope document and proposal for deploying a Cisco infrastructure that meets the following criteria:

  • Submit fully completed lab reports that document the specified configuration of Cisco devices.
  • Describe a project organization’s size, location, organizational user, and network.
    • Describe your organization in detail. Include information relative to its size, location, and other background.
    • Review the existing network infrastructure.
  • Identify the main business problems and requirements, including information relative to the organizational user, organizational systems, and network requirements.
    • Discuss any and all improvements you believe are appropriate to improve the cost and efficiency of managing the network.
  • Describe considerations for architecture, topology, device selection and placement, and protocols based on business needs and user requirements.
  • Identify the key decision makers and stakeholders and those individuals included in the requirements analysis of project related to the deployment of a virtual infrastructure.
  • Analyze the risks and benefits of deploying a Cisco-based LAN infrastructure.

 

Does the speaker make good eye contact, appear prepared, read from notes, connect to the audience, and generally look competent. What do you think the speaker’s intent is in this speech? Why?

Week 1 Assignment: Critique a Speech You See on Television or the Internet

For this assignment, watch any speech on television or the Internet for about 3 to 5 minutes. As you view the speech, discuss what you see:

Does the speaker make good eye contact, appear prepared, read from notes, connect to the audience, and generally look competent. What do you think the speaker’s intent is in this speech? Why? Write a one-page reflection describing what you viewed. Your paper must be in current APA style format.

 

Which section principles, framework, or process do you believe would be the most challenging aspect of risk management and why?

Cyber Security

ISO 31000:2018 provides guidelines for understanding risk management for an organization. Read the standard and answer the following questions:

  1. Review the diagrams for risk management principles, framework, and process. Select one of the diagrams and provide a 600 – 1000 word response summarizing the diagram’s information.
  2. Which section principles, framework, or process do you believe would be the most challenging aspect of risk management and why? Your response must be 400 – 600 words.

You must include 1 additional reference other than ISO 31000 from a peer-reviewed journal.

 

 

Discuss the potential impacts of fair value within the professional field. What should be considered in regard to fair value accounting and whether it is the best decision for the company? What information would be most valuable to management, lenders, and investors as it relates to fair value or other concepts covered in the course?

Fair Value Under Fire

Revisit the article Fair Value Under Fire and consider other resources used throughout the course. Discuss the potential impacts of fair value within the professional field. What should be considered in regard to fair value accounting and whether it is the best decision for the company? What information would be most valuable to management, lenders, and investors as it relates to fair value or other concepts covered in the course?

In your responses to your peers, discuss the impacts of fair value as they relate to organizations that regulate accounting practices. What should businesses do to ensure alignment with them in their accounting practices?

 

Describe the latest trends of software project management strategies and suggest at least three methodologies of software project management strategies for this project. Select the optimal software project management strategy for this project and provide a rationale.

Implementing Best Practices

Scenario
Imagine that you are employed by an organization that would like to further invest in the development of internal iOS applications. The organization finds it very costly to maintain vendor-built and maintained iOS apps. It believes that the strategy of developing internal iOS apps could provide cost savings in the long run.

One of your responsibilities at this organization is to advise upper management on the latest trends and methodologies of software project management strategies. Upper management has asked you to identify and analyze the challenges and issues that the software development teams may experience if they transition to this new strategy. In addition, you are asked to provide your suggestions and solutions to mitigate the challenges and issues.

Instructions
Write a 4–6 page paper in which you:

Describe the latest trends of software project management strategies and suggest at least three methodologies of software project management strategies for this project.
Select the optimal software project management strategy for this project and provide a rationale.
Select three typical constraints that may exist while managing and leading software projects within this organization. Analyze why the determination and clarification of these constraints are essential within the planning phases of the project.
State the relationship between the organizational structure and a project manager’s level of authority and responsibility.
Suggest how a typical software engineering team could be staffed and describe each team member’s role. Determine the skills that are required for each team member for the success of the software project development.
Select two software project management frameworks as options for software development. Discuss how each framework provides an opportunity for efficient project resource management. Use examples to justify your answer.
Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources

Develop a conceptual diagram depicting the main operating functions starting with processing groups, like hardware interface commands, scheduler, interrupts, resource allocation and handling, services, and security.

Analyze Computer Operating Systems

Instructions
For this assignment, you must write an article using the template provided in the weekly resources that evaluates the strengths and weaknesses of the Windows, Linux, and macOS operating systems so consumers can make an informed choice when purchasing an OS for their home computer system.

Your article must answer the following questions:

Can the OS be customized? If so, how can this be accomplished? What is the risk of manipulating the kernel, as it is done in Linux?
IS the OS easy to use? Support your answers.
What is the average cost of the OS?
Can the OS support portable media?
What are the security features of the OS?
Is the OS stable and reliable?

Develop a conceptual diagram depicting the main operating functions starting with processing groups, like hardware interface commands, scheduler, interrupts, resource allocation and handling, services, and security. Insert it in your article, and submit the original image.

What is the name of this e-commerce company? What is the fictional name of the CEO, and what is the fictional name of the CIO?

Identifying Your Company and Your Role

What is the name of this e-commerce company? (Do not choose a real company.) What is the fictional name of the CEO, and what is the fictional name of the CIO? (You can use a friend or family member if you want, or some celebrity or fictional character.)

In 1–2 paragraphs, describe what kind of business your fictional company is in. Do they sell a product? A service? A new government (non-political, please) agency? A nonprofit or charity, perhaps? The one stipulation is that they must conduct business online, and they must be growing.

Finally, choose one of the following roles on the team. Pick one that is closest to your concentration you have studied. For example, software engineering would be closest to software development, forensic investigation would be closest to cybersecurity. If you have any questions on how to answer this, reach out to your instructor. Which of the following is your major (concentration) closest to?

Software Development.
Networking.
IT Project Management.
Data Analytics.
Data Management.
Cybersecurity (yes, this is the correct spelling).

Now that you have identified your area of expertise based on the concentration you have studied, you will need to identify the members of your team. You will take the place of one of the members, so put your name in where it belongs; the other roles can have fictional names assigned to them.

Cybersecurity Specialist:
Networking Specialist:
Data Management Specialist:
IT Project Manager (Assistant to the Project Manager):
Software Development Team Lead:

Describe what kind of business your fictional company is in. Do they sell a product? A service? A new government agency? A nonprofit or charity perhaps?

E-Commerce Company and Project Team

Description of your company:
Describe what kind of business your fictional company is in. Do they sell a product? A service? A new government (non-political please) agency? A nonprofit or charity perhaps?  The one stipulation is that they must conduct business online and they must be growing.

Be sure to include your name in the appropriate role.

  • Cybersecurity Specialist:
  • Networking Specialist:
  • Data Management Specialist:
  • IT Project Manager:
  • Software Development Team Lead: