Hi, How Can We Help You?
  • Address: 1251 Lake Forest Drive New York
  • Email Address: assignmenthelpcentral@gmail.com

Author Archives: Academic Wizard

August 1, 2025
August 1, 2025

Height vs. Hair Correlation

Respond to the following in a minimum of 175 words:

Imagine you are a teacher for a class on statistics and you want to teach your students about correlation using the class data on hair length and height in inches.

Answer these questions for yourself before you run any data:

  • Do you think these two characteristics—height and hair length—are connected in any way?
  • How will you know if they are related to each other?
  • Do you expect them to be correlated? Why or why not? If yes, would you expect this correlation to be positive or negative? Strong or weak?
  • If you think there is a correlation, do you think it is based on causation? Why or why not? If yes, is this causation direct or indirect?

Use the data in the chart below to figure the Pearson Correlation Coefficient for this data set.

Height vs. Hair Correlation

Height in Inches

Length of Hair

Height vs. Hair Correlation

    1. Are height and hair length connected?,

    2. How can you determine if they are related?,

    3. Do you expect a correlation? If so what type?,

    4. Is any observed correlation due to causation?,

    5. What is the Pearson Correlation Coefficient for the dataset?

Height vs. Hair Correlation


Comprehensive General Answer:

Before running any calculations, we must assess whether height and hair length are likely related. Intuitively, these two characteristics don’t have a direct biological connection—height is genetically and nutritionally influenced, while hair length is primarily a matter of personal choice or cultural norms. However, there could still be a statistical correlation due to demographic or behavioral factors. For instance, in many populations, women may have longer hair on average and may also be shorter in height than men. This could produce a negative correlation, where as height increases, hair length decreases.

To determine whether a correlation exists, we would calculate the Pearson Correlation Coefficient (r), which measures the strength and direction of a linear relationship between two variables. A coefficient near +1 indicates a strong positive correlation, near -1 indicates a strong negative correlation, and around 0 suggests no correlation.

Even if we find a correlation, it does not imply causation. There is no biological mechanism where hair length affects height or vice versa. Any correlation would likely be indirect, resulting from other variables such as gender or age group distribution within the sample.

To conclude, while a weak negative correlation is possible due to sociocultural patterns, it’s not based on causation. Computing the Pearson r using actual values would confirm the presence and strength of any relationship.

Height vs. Hair Correlation

August 1, 2025
August 1, 2025

Christian Origins and Beliefs

Be sure you answer Part One, Part Two, Part Three, and the Reference section of this assignment before submitting.

Part One: Christian Beliefs
Respond thoroughly to the prompts in this part, using total of 250-350 words combined. Use the Bible and at least one academic source (textbook, topic overview, or peer-reviewed article). Cite all of the resources used with in-text citations. Include all the sources you cite on a reference section at the end of this document.

1. Summarize Christian beliefs about the origins of the universe:

<Answer>

Christian Origins and Beliefs
2. Summarize Genesis 1-2:

<Answer>

3. Summarize general revelation and special revelation:

<Answer>

4. Summarize the three major Creationism approaches to Genesis 1-2:

<Answer>

Christian Origins and Beliefs
Part Two: Current Understanding
Respond thoroughly to the prompts in this part, using total of 250-350 words combined. Use the Bible and at least one academic source (textbook, topic overview, or peer-reviewed article). Cite all of the resources used with in-text citations. Include all the sources you cite on a reference section at the end of this document.

1. My current beliefs about the origin of the universe:

<Answer>

2. My current beliefs about evolution:

<Answer>

3. My current beliefs about the age of the earth:

<Answer>

4. My current beliefs about if the Bible and science can be reconciled:

<Answer>

Part Three: Impact of Current Understanding
Respond thoroughly to the prompts in this part, using total of 250-350 words combined. Use the Bible and at least one academic source (textbook, topic overview, or peer-reviewed article). Cite all of the resources used with in-text citations. Include all the sources you cite on a reference section at the end of this document.

1. Therefore, this is what I believe about the nature of God:

<Answer>

2. Therefore, this is what I believe about the nature of Humanity:

<Answer>

3. Therefore, this is what I believe about the care for the Earth:

<Answer>

References:
Author, A. A., & Author, B. B. (Year). Title of article. Journal Title, Volume (Issue), Page numbers. Url/permalink

Christian Origins and Beliefs

© 2022. Grand Canyon University. All Rights Reserved.

  • What are Christian beliefs about the origins of the universe?,

  • What do Genesis 1–2 describe?,

  • What is the difference between general and special revelation?,

  • What are the three major Creationism approaches?,

  • Can science and the Bible be reconciled?

August 1, 2025
August 1, 2025

Human Nature and the Fall

1) The Christian worldview provides an explanation for human nature and the story of the creation and fall (Gen. 1-3). A great deal of the suffering that people experience and much of man’s inhumanity to man are explained by this description of the fall of human nature. Is this characterization of human nature accurate? Why or why not? If not, what is an alternative explanation?

2) How does the fall relate to tragedies like 9/11, disasters such as the Tsunami of 2004 (an earthquake caused a tsunami that killed over 225,000 people), and the COVID-19 pandemic in 2020? Based on the topic Resources, how would you explain how a good, loving, and all-powerful God allows suffering and evil in his creation? Explain how your reaction to evil events has caused you to reassess your worldview.

3) According to the Bible and the Christian worldview, Jesus was fully God and fully human. Interacting with the readings, especially Philippians 2:5-11 and Hebrews 1:1-3, explain why this teaching of Jesus’s full divinity and full humanity is important to Christianity.

Human Nature and the Fall

4) Read the parable of the Prodigal Son (Luke 15:11-32) and answer the following questions:

Human Nature and the Fall

What do you believe is the main theme Jesus is communicating?

Explain the three principal characters. Who do you identify with the most, and why?

  • Is the Christian characterization of human nature accurate?,

  • How does the Fall relate to tragedies like 9/11 tsunamis, and COVID-19?,

  • Why is Jesus being fully God and fully human essential to Christianity?,

  • What is the main theme of the Prodigal Son parable?,

  • Which Prodigal Son character do you identify with most and why?

  • The Christian worldview holds that humanity was created good but fell into sin through the disobedience of Adam and Eve (Genesis 1–3). This view explains much of the brokenness in human experience—suffering, injustice, and moral failure—by attributing it to the Fall. According to Romans 5:12, sin entered the world through one man, and death followed as a consequence.
  • Human Nature and the Fall
August 1, 2025
August 1, 2025

Christian Origins Assignment

Be sure you answer Part One, Part Two, Part Three, and the Reference section of this assignment before submitting.

Part One: Christian Beliefs

Respond thoroughly to the prompts in this part, using total of 250-350 words combined. Use the Bible and at least one academic source (textbook, topic overview, or peer-reviewed article). Cite all of the resources used with in-text citations. Include all the sources you cite on a reference section at the end of this document.

1. Summarize Christian beliefs about the origins of the universe:

<Answer>

 

2. Summarize Genesis 1-2:

<Answer>

 

3. Summarize general revelation and special revelation:

<Answer>

 

4. Summarize the three major Creationism approaches to Genesis 1-2:

<Answer>

Christian Origins Assignment

Part Two: Current Understanding

Respond thoroughly to the prompts in this part, using total of 250-350 words combined. Use the Bible and at least one academic source (textbook, topic overview, or peer-reviewed article). Cite all of the resources used with in-text citations. Include all the sources you cite on a reference section at the end of this document.

1. My current beliefs about the origin of the universe:

<Answer>

Christian Origins Assignment

2. My current beliefs about evolution:

<Answer>

 

3. My current beliefs about the age of the earth:

<Answer>

 

4. My current beliefs about if the Bible and science can be reconciled:

<Answer>

 

Part Three: Impact of Current Understanding

Respond thoroughly to the prompts in this part, using total of 250-350 words combined. Use the Bible and at least one academic source (textbook, topic overview, or peer-reviewed article). Cite all of the resources used with in-text citations. Include all the sources you cite on a reference section at the end of this document.

1. Therefore, this is what I believe about the nature of God:

<Answer>

Christian Origins Assignment

2. Therefore, this is what I believe about the nature of Humanity:

<Answer>

 

3. Therefore, this is what I believe about the care for the Earth:

<Answer>

 

References:

Author, A. A., & Author, B. B. (Year). Title of article. Journal TitleVolume (Issue), Page numbers. Url/permalink

 

 

© 2022. Grand Canyon University. All Rights Reserved.

 

  1. What are Christian beliefs about the origin of the universe?,

  2. What is the summary of Genesis chapters 1–2?,

  3. How do general and special revelation differ?,

  4. What are the three main Creationist approaches to Genesis 1–2?,

  5. How do your beliefs about origins affect your understanding of God humanity and the earth?

August 1, 2025
August 1, 2025

Maternal Health Causal Pathway

A causal pathway is the first step in organizing an intervention to address a public health issue. Think of a public health issue you want to address through a behavioral intervention. Throughout this course, we will work to address the public health issue within a specific population. Take a look back at Week 2 and review your discussion feedback as well as the “assignment preparation” module. The public health issue you select will be the same topic you address throughout the assignments this term.

A causal pathway is the outline to identifying the determinants of health of your selected public health issue. Use what you have learned from your studies material to “map” a path FROM the Structural Determinants of Health (SDOH) to a health outcome THROUGH the intermediary determinants of health for the public health issue you have selected.

Maternal Health Causal Pathway

Instructions

The SDOH Framework is outlined on page 25 of your textbook. Construct a “flowchart” (an example is provided below) and a narrative describing the pathway of your flowchart. It is highly encouraged to use PowerPoint to construct your map and use the “Notes” portion below to write the narrative describing the pathway. Please be aware that your ‘notes’ will not be visible in the ‘preview’ of the assignment during the submission process. The instructor will download the PPT file and view the notes on the download.

Maternal Health Causal Pathway

Your pathway should include at least one complete path from a structural determinant to the health outcome (i.e., there should not be any “gaps” in the connections between the mediating constructs in your illustration or narrative) and the points marked on your map for potential interventions.

Mark the “points of potential public health interventions” on your pathway with a star. You should have at least two points of intervention (one will be used as potential interventions to develop on later assignments). Provide a narrative (in the notes section under the slide) identifying and discussing each of the constructs in your model along with potential interventions that could be utilized to change the points you identified.

Points will be deducted for lack of correspondence between the structural determinants, the intermediary determinants and the health behavior and outcome, and for unprofessional presentation of your exercise (i.e., poor organization in your writing, misspelling, etc.). You do not need to cite literature or provide references in this exercise.

It may be helpful to review the Causal Pathway Example [PPTX] before beginning work on your assignment.

Your submission will be assessed on the following criteria:

  • Create a pathway from the structural determinants to the selected health outcome.
    • Make sure the pathway clearly flows through the structural and intermediary determinants. Please note the structural determinants begin with a policy, governance, etc. as outlined in the SDOH Framework in your book on page 25.
  • Identify two points of intervention on the causal pathway.
    • Why are the points of intervention you identified relevant?
    • How do these points of intervention have the potential to have positive impacts?
  • Describe the connection between the constructs of the causal pathway and the health outcome(s).
    • Are the connections clear and easy to follow for someone else?
    • Are the constructs clearly explained?
  • Convey purpose, in an appropriate tone and style, incorporating supporting evidence and adhering to organizational, professional, and scholarly writing standards.

Please note the following when submitting your assignment:

The file must be a PPT or PPTX file of your presentation. You cannot upload slides from google slides or any other cloud-based service. You must upload as a PowerPoint file for the notes to be visible to the instructor when downloaded.

The Public Health Masters Program Library GuideLinks to an external site. and Writing CenterLinks to an external site. may also be helpful resources.

Topic pregnant women in low-income communities as a vulnerable healthcare population

Maternal Health Causal Pathway

  1. What is the selected public health issue and population?,

  2. How do structural determinants influence maternal health outcomes?,

  3. What intermediary determinants connect the structure to the health outcome?,

  4. What are two potential points of intervention in the pathway?,

  5. How do the components of the pathway clearly connect to the health outcome?

August 1, 2025
August 1, 2025

Data Analytics Career Plan

: Differentiates the Variety of Careers and Roles

The learner differentiates the variety of careers and roles related to the broad field of data analytics.

: Identifies Potential Career Goals

The learner identifies potential career goals based on foundational knowledge of self and career pathways.

INTRODUCTION

In this task, you will create a career plan differentiating three different roles or careers in data analytics. You will compare data analytics disciplines and address your academic skills and needs for the careers you are considering.

You will use the CliftonStrengths tool to assess your career strengths, describing and reflecting upon your personalized results.

Data Analytics Career Plan

REQUIREMENTS

Your submission must represent your original work and understanding of the course material. Most performance assessment submissions are automatically scanned through the WGU similarity checker. Students are strongly encouraged to wait for the similarity report to generate after uploading their work and then review it to ensure Academic Authenticity guidelines are met before submitting the file for evaluation. See Understanding Similarity Reports for more information.

Preparation Task Overview Submissions Evaluation Report

https://tasks.wgu.edu/student/012610805/course/33080017/task/4406/overview 6/12/25, 04:21 Page 1 of 6

Data Analytics Career Plan

 

Grammarly Note:  Professional Communication will be automatically assessed through Grammarly for Education in most performance assessments before a student submits work for evaluation. Students are strongly encouraged to review the Grammarly for Education feedback prior to submitting work for evaluation, as the overall submission will not pass without this aspect passing. See Use Grammarly for Education Effectively for more information.

Microsoft Files Note:  Write your paper in Microsoft Word (.doc or .docx) unless another Microsoft product, or pdf, is specified in the task directions. Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc.  All supporting documentation, such as screenshots and proof of experience, should be collected in a pdf file and submitted separately from the main file. For more information, please see Computer System and Technology Requirements.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

You must do the following:

A.   Create a career plan. 1.   Describe three different roles or careers in data analytics.

a.   Discuss the differences between the roles or careers from part A1. 2.   Describe how each role from part A1 supports the data analytics life cycle.

B.   Compare three different data analytics disciplines as described by ProjectPro. 1.   Identify three types of careers from the Bureau of Labor and Statistics government data

in your career plan. 2.   Identify your academic skills and needs for the careers considered in part B1.

C.   Identify a potential career goal in your career plan based on your strengths and academic/MSDA track interests. 1.   Reflect on your career strengths as identified in your personalized CliftonStrengths

assessment results.

D.   Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

https://tasks.wgu.edu/student/012610805/course/33080017/task/4406/overview 6/12/25, 04:21 Page 2 of 6

Data Analytics Career Plan

 

E.   Demonstrate professional communication in the content and presentation of your submission.

File Restrictions

File name may contain only letters, numbers, spaces, and these symbols: ! – _ . * ‘ ( ) File size limit: 200 MB File types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, csv, txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z

RUBRIC

A:CAREER PLAN

A1:ROLES OR CAREERS IN DATA ANALYTICS

A1A:DIFFERENCES BETWEEN ROLES OR CAREERS

NOT EVIDENT

The submission does not

provide a career plan.

APPROACHING COMPE- TENCE

The submission provides an

incomplete career plan.

COMPETENT

The submission provides a

clear, complete career plan.

NOT EVIDENT

A discussion of roles or ca-

reers in data analytics is not

provided.

APPROACHING COMPE- TENCE

The description addresses 1

or 2 different roles or ca-

reers in data analytics.

COMPETENT

The description addresses 3

different roles or careers in

data analytics.

NOT EVIDENT

A discussion of differences

between roles or careers is

not provided.

APPROACHING COMPE- TENCE

The discussion of differ-

ences between the roles or

careers described is not ac-

COMPETENT

The discussion of the differ-

ences between the roles or

careers from part A1 is accu-

rate.

https://tasks.wgu.edu/student/012610805/course/33080017/task/4406/overview 6/12/25, 04:21 Page 3 of 6

 

 

A2:HOW ROLES SUPPORT THE DATA ANALYTICS LIFE CYCLE

B:COMPARISON OF DATA ANALYTICS DISCIPLINES

B1:CAREER TYPES

B2:ACADEMIC SKILL AND NEEDS

curate, or the roles or ca-

reers described differ from

part A1.

NOT EVIDENT

A description of how any

role supports the data ana-

lytics life cycle is not provid-

ed.

APPROACHING COMPE- TENCE

The description addresses

how 1 or 2 roles from part

A1 support the data analyt-

ics life cycle.

COMPETENT

The description addresses

how each role from part A1

supports the data analytics

life cycle.

NOT EVIDENT

A description of data analyt-

ics disciplines is not provid-

ed.

APPROACHING COMPE- TENCE

The comparison includes 1

or 2 data analytics disci-

plines as described by

Project Pro.

COMPETENT

The comparison includes 3

different data analytics disci-

plines as described by

Project Pro.

NOT EVIDENT

The submission does not

identify types of careers.

APPROACHING COMPE- TENCE

The submission identifies 1

or 2 types of careers in the

career path.

COMPETENT

The submission identifies 3

types of careers in the career

path.

NOT EVIDENT

The submission does not

APPROACHING COMPE- TENCE

The identified academic

COMPETENT

The identified academic skills

https://tasks.wgu.edu/student/012610805/course/33080017/task/4406/overview 6/12/25, 04:21 Page 4 of 6

 

 

C:CAREER GOAL

C1:CLIFTONSTRENGTHS REFLECTION

D:SOURCES

identify any academic skills

and needs.

skills and needs for the ca-

reers considered in part B1

are incomplete or do not

accurately align with the

careers considered in part

B1.

and needs for the careers

considered in part B1 are

complete and accurately

align with the careers consid-

ered in part B1.

NOT EVIDENT

The submission does not

identify a potential career

goal.

APPROACHING COMPE- TENCE

The potential career goal is

not based on the candidate’s

strengths and academ-

ic/MSDA track interests, or

it is unclear or inappropri-

ate.

COMPETENT

The potential career goal is

clear and is based on the can-

didate’s strengths and acade-

mic/MSDA track interests.

NOT EVIDENT

A reflection on the candi-

date’s career strengths is

not provided.

APPROACHING COMPE- TENCE

The reflection on the candi-

date’s career strengths is

incomplete or not aligned

with the personalized

CliftonStrengths assess-

ment results.

COMPETENT

The reflection on the candi-

date’s career strengths is

complete and aligned with

the personalized Clifton-

Strengths assessment re-

sults.

NOT EVIDENT

The submission does not

include both in-text cita-

tions and a reference list for

sources that are quoted,

APPROACHING COMPE- TENCE

The submission includes in-

text citations for sources

that are quoted, para-

COMPETENT

The submission includes in-

text citations for sources

that are properly quoted,

paraphrased, or summarized

https://tasks.wgu.edu/student/012610805/course/33080017/task/4406/overview 6/12/25, 04:21 Page 5 of 6

 

 

E:PROFESSIONAL COMMUNICATION

WEB LINKS

CliftonStrengths

paraphrased, or summa-

rized.

phrased, or summarized and

a reference list; however,

the citations or reference

list is incomplete or inaccu-

rate.

and a reference list that ac-

curately identifies the au-

thor, date, title, and source

location as available.

NOT EVIDENT

This submission includes

pervasive errors in profes-

sional communication relat-

ed to grammar, sentence

fluency, contextual spelling,

or punctuation, negatively

impacting the professional

quality and clarity of the

writing. Specific errors have

been identified by Gram-

marly for Education under

the Correctness category.

APPROACHING COMPE- TENCE

This submission includes

substantial errors in profes-

sional communication relat-

ed to grammar, sentence

fluency, contextual spelling,

or punctuation. Specific er-

rors have been identified by

Grammarly for Education

under the Correctness cate-

gory.

COMPETENT

This submission includes sat-

isfactory use of grammar,

sentence fluency, contextual

spelling, and punctuation,

which promote accurate in-

terpretation and under-

standing.

https://tasks.wgu.edu/student/012610805/cours

  1. What are three different roles or careers in data analytics?,

  2. How do these roles differ from one another?,

  3. How does each role support the data analytics life cycle?,

  4. What academic skills and needs are required for these roles?,

  5. What is your potential career goal based on your strengths and academic interests?

August 1, 2025
August 1, 2025

Remote Access Security Essentials

Complete the following activity after reading Chapter 13, the Unit VI Lesson, and participating in the Unit VI Live Lecture.

You will develop a PowerPoint from the information below:

Summarize the content for the Unit VI Lesson in 2 to 3 slides. Next, create a slide for each numbered task below.

1. Identify and describe three key business drivers influencing remote access solutions and infrastructure. Why are these drivers critical to the development of a secure remote access strategy?

2. Explain two roles or functionalities of devices within a remote access infrastructure that you found particularly significant. Why did you choose these specific roles or functionalities?

Remote Access Security Essentials

Remote Access Security Essentials

3. What is one unresolved issue or question you have related to applying security best practices to protect the Remote Access Domain from threats?

Please use the speaker notes function to provide an explanation or justification for your answers on the slides. The presentation must have a title slide and a references slide. Your presentation must be at least five slides, not counting the title slide and references slide. APA Style must be used for citations and references

  1. What is the core content of the Unit VI lesson?,

  2. What are three key business drivers for remote access infrastructure?,

  3. Why are these drivers critical to a secure remote access strategy?,

  4. What are two significant roles or functions of devices in remote access?,

  5. What is one unresolved issue you have about securing the Remote Access Domain?


Comprehensive General Answer (PowerPoint Outline with Speaker Notes)

Below is a complete outline for your presentation, including titles, content, and speaker notes. You can build your PowerPoint using this structure.


Slide 1: Title Slide

  • Title: Securing the Remote Access Domain

  • Name

  • Course

  • Date


Slide 2: Unit VI Lesson Summary (Slide 1)

Content:

  • Remote Access Domain supports external network connectivity.

  • Core concepts: VPNs, firewalls, RADIUS servers, endpoint security.

  • Secure remote access ensures compliance and risk mitigation.

Speaker Notes:

The Unit VI lesson highlights the importance of securing the Remote Access Domain as organizations increasingly support hybrid and remote work environments. Topics covered include virtual private networks (VPNs), authentication servers like RADIUS, and policies for endpoint security.

Remote Access Security Essentials


Slide 3: Unit VI Lesson Summary (Slide 2)

Content:

  • Threats: unsecured endpoints, data leakage, and session hijacking.

  • Countermeasures: encryption, MFA, continuous monitoring.

  • Emphasis on policy enforcement and zero trust architecture.

Speaker Notes:

The lesson discusses security threats and stresses the need for strict controls. Solutions include encryption protocols, multi-factor authentication (MFA), and continuous monitoring. Zero Trust models are emphasized for all remote access users.


Slide 4: Business Drivers for Remote Access

Three Key Business Drivers:

  1. Workforce Mobility – Remote and hybrid work models demand access from anywhere.

  2. Cost Optimization – Reduces physical infrastructure costs.

  3. Business Continuity – Ensures operations during disasters or disruptions.

Speaker Notes:

These drivers are critical because they shape the demand for scalable and secure remote access solutions. For example, after the COVID-19 pandemic, workforce mobility became non-negotiable. Business continuity, especially in disaster recovery planning, is essential to maintaining customer trust and operations.


Slide 5: Key Remote Access Device Roles

Two Important Roles/Functionalities:

  1. VPN Gateways – Encrypt and tunnel traffic between remote users and internal networks.

  2. RADIUS Servers – Provide centralized authentication and accounting.

Speaker Notes:

I selected VPN gateways and RADIUS servers because they are foundational to secure remote access. VPNs ensure encrypted communication, while RADIUS servers centralize user verification. Together, they minimize unauthorized access and enforce access policies effectively.


Slide 6: Unresolved Question

Unresolved Issue:

  • How can organizations balance security with user experience in remote access—especially when implementing zero trust without overburdening users?

Speaker Notes:

Zero Trust improves security but can frustrate users with repeated authentication prompts. I’m still uncertain how to maintain high security standards without compromising user productivity or creating friction in daily operations.


Slide 7: References

APA-Style References:

August 1, 2025
August 1, 2025

Architecting the IT Governance Plan

As a consultant to, or manager of, an IT unit within your selected organization, you must be keenly aware of challenges facing your selected organization. This assignment asks you to identify, intellectually discuss, and broadly report on at least two of the most important (in your view) strategic issues faced by your selected organization. In particular, note how these issues have influenced the organization you are considering. Why has the consideration of them positively affected that organization? Conversely, what have been the negative effects on the organization because of not considering them? Make sure you relate the issues and concerns you discuss to IT Governance. Additionally, if failure to properly consider an IT Governance issue has caused the organization problems, how would you alter the IT Strategy? Alternately, if the Governance Issues have aided the organization, what more might you recommend doing? Please provide some detail/examples as you write this paper.

Your paper’s title might be: Considering the Strategic Issues: Their Impact on IT Governance.

Cybersecurity Integration Presentation

SLP Assignment Expectations

Upload your 4- to 5-page paper to the SLP 2 Dropbox once it is completed.

Follow the number of pages required in the assignment excluding cover page and references. Each page should have about 300 words.

Your assignment will be graded according to the  MSITM SLP Grading Rubric.

 

Module 2 – Resources

Architecting the IT Governance Plan

Required Reading

Use  How to find resources in Skillsoft  to access material in Skillsoft.

Required Reading

IT Governance Plan

ITIL® 4 Foundation: Introduction. Available in the Trident Online Library in Skillsoft.

Modern Data Management: Data Governance. Available in the Trident Online Library in Skillsoft.

ITIL

Architecting the IT Governance Plan

TestPrep ITIL 4 Foundation. Available in the Trident Online Library in Skillsoft.

Go to Library Access in Additional Library Resources, select Skillsoft Books. In the search box enter TestPrep ITIL 4 Foundation, select the Courses tab, then select TestPrep ITIL 4 Foundation.

Securing the Enterprise

Securing Against Threats, Securing for Enterprise, and Jailbreaking Devices. Available in the Trident Online Library in Skillsoft.

Business Continuity and Disaster Recovery

CISSP 2021: Business Continuity Planning. Available in the Trident Online Library in Skillsoft.

Backup & Recovery: Business Continuity & Disaster Recovery. Available in the Trident Online Library in Skillsoft.

Data Governance

Modern Data Management: Data Quality Management. Available in the Trident Online Library in Skillsoft.

Data Access & Governance Policies: Data Classification, Encryption, and Monitoring. Available in the Trident Online Library in Skillsoft.

Cybersecurity

Mitigating Security Risks: Cyber Security Risks. Available in the Trident Online Library in Skillsoft.

An Executive’s Guide to Security: Understanding Security Threats. Available in the Trident Online Library in Skillsoft.

Mitigating Security Risks: Maintaining a Secure Workplace. Available in the Trident Online Library in Skillsoft.

Optional Reading

Mitre. (n.d.).  IT governance . https://www.mitre.org/publications/systems-engineering-guide/enterprise-engineering/enterprise-planning-and-management/it-governance

Chapters 1-12, in:

Axelos. (2020). ITIL 4: Digital and IT Strategy. TSO. Available in the Trident Online Library (Skillsoft Books).

Chapters 1-10, in:

Smallwood, R. F. (2020). Information governance: Concepts, strategies and best practices. Wiley & Sons. Available in the Trident Online Library (Skillsoft Books).

Please note that this link will open in a new window and may require activation of a LinkedIn account on the first attempt. Trident students may use their student email address to access this free subscription to LinkedIn Learning as a part of this course.

Getting Started with Network Administration  – LinkedIn Learning

Architecting the IT Governance Plan

  • What are two major strategic issues your selected organization faces?,

  • How have these issues positively influenced the organization when addressed?,

  • What negative effects resulted from not addressing these issues?,

  • How do these issues relate specifically to IT governance?,

  • What IT strategy changes or enhancements would you recommend in response?

August 1, 2025
August 1, 2025

Cybersecurity Integration Presentation

U.S. laws and regulations. The M&A team has provisionally accepted the draft cybersecurity strategy and draft implementation plan which you prepared previously. The M&A team has now requested that you contribute a set of summary slides for the M&A team’s Decision Briefing (presentation) to the Padgett-Beale Board of Directors. This briefing is one of the final steps in obtaining approval for the M&A team’s plan for integrating the newly purchased company – Island Banking Services – into Padgett-Beale as Padgett-Beale, Inc Financial Services (PBI-FS).

Cybersecurity Integration Presentation

Before you begin developing your presentation, review your work products from Projects 1 & 2. As you do so, identify the most likely or most significant barriers to success (factors which increase the risk of failure). These can include barriers arising from external factors as well as issues arising from internal company sources. Consider culture and organizational conflict as well as legal and regulatory issues. For each factor, identify a countermeasure or compensatory action which the company could take to reduce the risk of failure. Select the five most significant barriers to success from your analysis. You will include these in your presentation slides.

Develop Your Presentation:
Using your prior work (Projects 1 & 2), develop a high-level summary presentation of your Cybersecurity Strategy and the Implementation Plan. You will need between 20-30 slides to fully address the requirements listed below; this slide count includes the slides for titles, section titles, and references. Remember to include speaker notes for the agenda slide, section title slides, and content slides. Your notes should be at least 20 words / one paragraph but no longer than 150 words / 3 paragraphs per slide.

Your presentation must include the following:

· Title Slide with title, your name, the date, and this course

· Agenda Slide

Cybersecurity Integration Presentation

· Overview of the M&A effort (multiple slides – use the assignment overviews / background sections to put together a summary that answers: who, what, where, why, how)

· Section Title Slide: Cybersecurity Strategy

· Content Slides: provide a summary of your proposed Cybersecurity Strategy (Project 1)

· Section Title Slide: Cybersecurity Implementation Plan

· Content Slides: provide a summary of your proposed Cybersecurity Implementation Plan

· Section Title Slide: Barriers to Success

· Content Slides: five separate slides – one for each factor (identify each barrier to success and provide a recommended countermeasure or compensating action that the company could implement to reduce the risk of failure). This section will expand upon your “barriers to success” as discussed in Project #2.

· Section Title Slide: Summary & Recommendations

· Content Slide: present a recommendation that the strategy & implementation plan be approved by the Board of Directors for adoption and implementation by the company. Include 5 major business benefits of adoption and implementation. This may be new content (not previously included in projects 1 & 2).

· Section Title Slide: References

· Content Slides(s) that include reference list entries for your resources. Do not cite your own work for Projects 1 & 2.

Putting It All Together
MS Power Point .pptx format is the preferred delivery format; this application can be accessed via the Web or downloaded from UMGC under the university’s enterprise license for student use of Office 365. For more information see: https://www.umgc.edu/help/help-article-base.html?knowledgeArticleId=kA00W000000sZpeSAE&articleType=FAQ_IT__kav

If you are unable to use Power Point, you may use another presentation application to create your slides and speaker notes. After you have done so, print your presentation slides to PDF and deliver the assignment as a PDF document. If you deliver as PDF, you must make sure that your speaker notes are visible and accompany each slide.

Additional Information
1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your presentation should be professional in appearance with consistent use of fonts, font sizes, margins, etc.

3. You must include a title slide with the assignment title, your name, and the due date. Your reference list must be on a separate slide at the end of your file.

4. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.

5. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). To reduce visual clutter, you may put citations for sources into footnotes at the bottom of your slides (instead of putting citations at the ends of bullet points).

 

Copyright © 2022 by University of Maryland Global Campus. All rights reserved.

image1.png

Cybersecurity Integration Presentation

  1. What is the M&A background and purpose for the Island Banking Services integration?,

  2. What are the key components of the proposed Cybersecurity Strategy?,

  3. What is the structure of the Cybersecurity Implementation Plan?,

  4. What are the five most significant barriers to success and their countermeasures?,

  5. What business benefits justify adoption of the proposed strategy and implementation plan?

August 1, 2025
August 1, 2025

University Student Records Database

A prestigious university has recently implemented a consolidation strategy that will require it to centralize their student records. In order to move forward, the local university will need to develop a data model that will retain student records and perform various data extract transform and load (ETL) processes. Imagine that you have been hired as a database consultant to assist in the development of a data design strategy for the student records.

You met with various university subject matter experts and have determined the following after performing various business analysis processes:

  • Faculty groups are divided by core competencies that the university offers. For example, there are groups such as the art faculty, computer technology faculty, language faculty, and science faculty. Each faculty member has an assigned dean and is designated to teach at one particular campus and school. They are able to teach as many courses as required.
  • Courses are categorized by course code and title. Certain courses have prerequisites and the university has asked for this to be cataloged as well.
  • There are various schools within each campus. For example, the Los Angeles campus holds the following schools: School of Science, School of Law, and School of Computer Technology. Additionally, each school offers different professional study programs, such as Forensic Computer Science, Marine Biology, Business Management, and Civil Engineering, to name a few.
  • The study path for students requires that they be enrolled in a specific professional study program. The professional study program requires the students to complete a specific set of core courses. The university also requires that an online grade book be available. The online grade book should show grades awarded to students for specific courses and the term they completed the course.
  • The university identifies each student by their name, date of birth, social, and professional study program.

University Student Records Database

Instructions

University Student Records Database

Using these findings, write a 3–4 page paper in which you:

  • Analyze the university’s requirements and provide a proposal to organize all the required data elements. The proposal should include the following:
    • Provide an entity relationship model (ERM) that will describe the data structure that will store all data elements. Note: The graphically depicted solution is not included in the required page length.
    • Describe any assumptions or limitations for each relationship. For example, professors are able to teach more than one course, or students can only be enrolled in one program.
  • Create the primary key and foreign keys using a UML class diagram for each table.
  • Suggest at least four types of business intelligence reports that could help the university in course management, student enrollment, or historical tracking. Support your answer by providing specific business functions that these reports could be used for to assist executives of the university.
  • Consider outsourcing the functions above as an alternative for development of the database. Research the Internet and other media sources for vendors who develop registrar and school management database systems.
    • Suggest three vendors that developed and are employing efficient registrar and school management database systems and support your reasons to choose from one of these three vendors.
    • Compare and contrast the key aspects that each system offers. Examples of system aspects include but are not limited to cloud based, pricing model, open source, et cetera.
  • Go to the Strayer Library to locate at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
  • The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in any chart or drawing tool with which you are familiar. The completed diagrams or charts must be imported into the Word document before the paper is submitted.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all supports. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Propose a database design.
  • University Student Records Database,

  • How should the university’s data elements be organized to meet its needs?,

  • What is the proposed entity relationship model (ERM) and associated assumptions?,

  • What primary and foreign keys should be used in the UML class diagram?,

  • What four types of business intelligence (BI) reports would benefit university operations?,

  • What are three vendor options for registrar systems and how do they compare?