subject
Computers and Technology, 11.12.2019 00:31 dee3293

Assignment: provide a reflection paper of 500 words minimum (2 pages double spaced) of how the knowledge, skills, or theories of risk management and information security have been applied, or could be applied, in a practical manner to your current work environment. if you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. requirements: provide a 500 word (or 2 pages double spaced) minimum reflection. use of proper apa formatting and citations. if supporting evidence from outside resources is used those must be properly cited. share a personal connection that identifies specific knowledge and theories from this course. demonstrate a connection to your current work environment. if you are not employed, demonstrate a connection to your desired work environment. you should not provide an overview of the assignments assigned in the course. the assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. i am currently working as a system analyst, relate it with my role and responsibilities and my role and responsibilities are as below: a. study the existing system, reading manuals and information systems principles so as to best modify new and existing software. b. analyzing the business applications, process and environments to acquire knowledge and to identify gaps, potentials requrements, and business flow. c.generating and managing business requirements documents, functional requirements, system requirements specification, and traceability matrix. d. maintain computer system, security, and programming guidelines by writing and updating policies and procedures. e. responsible for performing analysis, unit testing, execution of functional test plan, validation of test result and documentation. f. perform troubleshooting, code migration, production support activities, and bug fixing.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 24.06.2019 10:20
Write a program that keeps asking the user for new values to be added to a list until the user enters 'exit' ('exit' should not be added to the list). these values entered by the user are added to a list we call 'initial_list'. then write a function that takes this initial_list as input and returns another list with 3 copies of every value in the initial_list. finally, inside print out all of the values in the new list. for example: input: enter value to be added to list: a enter value to be added to list: b enter value to be added to list: c enter value to be added to list: exit output: a b c a b c a b c note how 'exit' is not added to the list. also, your program needs to be able to handle any variation of 'exit' such as 'exit', 'exit' etc. and treat them all as 'exit'.
Answers: 2
question
Computers and Technology, 24.06.2019 13:30
What is the most important for you to choose before you build a network?
Answers: 1
question
Computers and Technology, 25.06.2019 02:30
Technology has changed communications by replacing or supplementing traditional modes of communication that were primarily
Answers: 2
question
Computers and Technology, 25.06.2019 07:50
The β€œtab” key can a. create extra cells in a word table *b. move from cell to cell in a word table c. move from the top of a column to the bottom of a column in a word table d. none of the above a. none of these answers are correct b. move from cell to cell in a word table c. move from the top of a column to the bottom of a column in a word table d. create extra cells in a word table
Answers: 2
You know the right answer?
Assignment: provide a reflection paper of 500 words minimum (2 pages double spaced) of how the know...
Questions
question
Mathematics, 20.09.2020 07:01
question
Mathematics, 20.09.2020 07:01
question
Biology, 20.09.2020 07:01
question
Mathematics, 20.09.2020 07:01
Questions on the website: 13722363