subject
Computers and Technology, 11.12.2019 00:31 dee3293

Assignment: provide a reflection paper of 500 words minimum (2 pages double spaced) of how the knowledge, skills, or theories of risk management and information security have been applied, or could be applied, in a practical manner to your current work environment. if you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. requirements: provide a 500 word (or 2 pages double spaced) minimum reflection. use of proper apa formatting and citations. if supporting evidence from outside resources is used those must be properly cited. share a personal connection that identifies specific knowledge and theories from this course. demonstrate a connection to your current work environment. if you are not employed, demonstrate a connection to your desired work environment. you should not provide an overview of the assignments assigned in the course. the assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. i am currently working as a system analyst, relate it with my role and responsibilities and my role and responsibilities are as below: a. study the existing system, reading manuals and information systems principles so as to best modify new and existing software. b. analyzing the business applications, process and environments to acquire knowledge and to identify gaps, potentials requrements, and business flow. c.generating and managing business requirements documents, functional requirements, system requirements specification, and traceability matrix. d. maintain computer system, security, and programming guidelines by writing and updating policies and procedures. e. responsible for performing analysis, unit testing, execution of functional test plan, validation of test result and documentation. f. perform troubleshooting, code migration, production support activities, and bug fixing.

ansver
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 03:00, SKYBLUE1015
What are the different parts of computer
Answers: 2
image
Computers and Technology, 23.06.2019 17:10, madams4450
Ac++an of of pi. in , pi is by : pi = 4 – 4/3 + 4/5 – 4/7 + 4/9 - 4/11 + 4/13 - 4/15 + 4/17 . ., to pi (9 ). , if 5 to pi, be as : pi = 4 - 4/3 + 4/5 - 4/7 + 4/9 = 4 – 1. + 0.8 - 0. + 0. = 3.. atoofbe to pi?
Answers: 2
image
Computers and Technology, 23.06.2019 21:30, quintonps12
Which of the following includes the three primary network access technologies? dsl, cable modem, broadband lan, wan, man voip, uc, iptv tcp/ip, ftp, dhcp
Answers: 2
image
Computers and Technology, 24.06.2019 05:30, roderickhinton
Someone plzz me which of these defines a social search? a. asking a search engine a question that is answered by a real person on the other sideb. modifying search results based on popularity of a web pagec. modifying search results based on a ranking of a web page
Answers: 2
You know the right answer?
Assignment: provide a reflection paper of 500 words minimum (2 pages double spaced) of how the know...

Questions in other subjects:

Konu
Social Studies, 04.08.2019 02:30