Hi, How Can We Help You?
  • Address: 1251 Lake Forest Drive New York
  • Email Address: assignmenthelpcentral@gmail.com

Blog

August 1, 2025
August 1, 2025

Christian Origins Assignment

Be sure you answer Part One, Part Two, Part Three, and the Reference section of this assignment before submitting.

Part One: Christian Beliefs

Respond thoroughly to the prompts in this part, using total of 250-350 words combined. Use the Bible and at least one academic source (textbook, topic overview, or peer-reviewed article). Cite all of the resources used with in-text citations. Include all the sources you cite on a reference section at the end of this document.

1. Summarize Christian beliefs about the origins of the universe:

<Answer>

 

2. Summarize Genesis 1-2:

<Answer>

 

3. Summarize general revelation and special revelation:

<Answer>

 

4. Summarize the three major Creationism approaches to Genesis 1-2:

<Answer>

Christian Origins Assignment

Part Two: Current Understanding

Respond thoroughly to the prompts in this part, using total of 250-350 words combined. Use the Bible and at least one academic source (textbook, topic overview, or peer-reviewed article). Cite all of the resources used with in-text citations. Include all the sources you cite on a reference section at the end of this document.

1. My current beliefs about the origin of the universe:

<Answer>

Christian Origins Assignment

2. My current beliefs about evolution:

<Answer>

 

3. My current beliefs about the age of the earth:

<Answer>

 

4. My current beliefs about if the Bible and science can be reconciled:

<Answer>

 

Part Three: Impact of Current Understanding

Respond thoroughly to the prompts in this part, using total of 250-350 words combined. Use the Bible and at least one academic source (textbook, topic overview, or peer-reviewed article). Cite all of the resources used with in-text citations. Include all the sources you cite on a reference section at the end of this document.

1. Therefore, this is what I believe about the nature of God:

<Answer>

Christian Origins Assignment

2. Therefore, this is what I believe about the nature of Humanity:

<Answer>

 

3. Therefore, this is what I believe about the care for the Earth:

<Answer>

 

References:

Author, A. A., & Author, B. B. (Year). Title of article. Journal TitleVolume (Issue), Page numbers. Url/permalink

 

 

© 2022. Grand Canyon University. All Rights Reserved.

 

  1. What are Christian beliefs about the origin of the universe?,

  2. What is the summary of Genesis chapters 1–2?,

  3. How do general and special revelation differ?,

  4. What are the three main Creationist approaches to Genesis 1–2?,

  5. How do your beliefs about origins affect your understanding of God humanity and the earth?

August 1, 2025
August 1, 2025

Maternal Health Causal Pathway

A causal pathway is the first step in organizing an intervention to address a public health issue. Think of a public health issue you want to address through a behavioral intervention. Throughout this course, we will work to address the public health issue within a specific population. Take a look back at Week 2 and review your discussion feedback as well as the “assignment preparation” module. The public health issue you select will be the same topic you address throughout the assignments this term.

A causal pathway is the outline to identifying the determinants of health of your selected public health issue. Use what you have learned from your studies material to “map” a path FROM the Structural Determinants of Health (SDOH) to a health outcome THROUGH the intermediary determinants of health for the public health issue you have selected.

Maternal Health Causal Pathway

Instructions

The SDOH Framework is outlined on page 25 of your textbook. Construct a “flowchart” (an example is provided below) and a narrative describing the pathway of your flowchart. It is highly encouraged to use PowerPoint to construct your map and use the “Notes” portion below to write the narrative describing the pathway. Please be aware that your ‘notes’ will not be visible in the ‘preview’ of the assignment during the submission process. The instructor will download the PPT file and view the notes on the download.

Maternal Health Causal Pathway

Your pathway should include at least one complete path from a structural determinant to the health outcome (i.e., there should not be any “gaps” in the connections between the mediating constructs in your illustration or narrative) and the points marked on your map for potential interventions.

Mark the “points of potential public health interventions” on your pathway with a star. You should have at least two points of intervention (one will be used as potential interventions to develop on later assignments). Provide a narrative (in the notes section under the slide) identifying and discussing each of the constructs in your model along with potential interventions that could be utilized to change the points you identified.

Points will be deducted for lack of correspondence between the structural determinants, the intermediary determinants and the health behavior and outcome, and for unprofessional presentation of your exercise (i.e., poor organization in your writing, misspelling, etc.). You do not need to cite literature or provide references in this exercise.

It may be helpful to review the Causal Pathway Example [PPTX] before beginning work on your assignment.

Your submission will be assessed on the following criteria:

  • Create a pathway from the structural determinants to the selected health outcome.
    • Make sure the pathway clearly flows through the structural and intermediary determinants. Please note the structural determinants begin with a policy, governance, etc. as outlined in the SDOH Framework in your book on page 25.
  • Identify two points of intervention on the causal pathway.
    • Why are the points of intervention you identified relevant?
    • How do these points of intervention have the potential to have positive impacts?
  • Describe the connection between the constructs of the causal pathway and the health outcome(s).
    • Are the connections clear and easy to follow for someone else?
    • Are the constructs clearly explained?
  • Convey purpose, in an appropriate tone and style, incorporating supporting evidence and adhering to organizational, professional, and scholarly writing standards.

Please note the following when submitting your assignment:

The file must be a PPT or PPTX file of your presentation. You cannot upload slides from google slides or any other cloud-based service. You must upload as a PowerPoint file for the notes to be visible to the instructor when downloaded.

The Public Health Masters Program Library GuideLinks to an external site. and Writing CenterLinks to an external site. may also be helpful resources.

Topic pregnant women in low-income communities as a vulnerable healthcare population

Maternal Health Causal Pathway

  1. What is the selected public health issue and population?,

  2. How do structural determinants influence maternal health outcomes?,

  3. What intermediary determinants connect the structure to the health outcome?,

  4. What are two potential points of intervention in the pathway?,

  5. How do the components of the pathway clearly connect to the health outcome?

August 1, 2025
August 1, 2025

Data Analytics Career Plan

: Differentiates the Variety of Careers and Roles

The learner differentiates the variety of careers and roles related to the broad field of data analytics.

: Identifies Potential Career Goals

The learner identifies potential career goals based on foundational knowledge of self and career pathways.

INTRODUCTION

In this task, you will create a career plan differentiating three different roles or careers in data analytics. You will compare data analytics disciplines and address your academic skills and needs for the careers you are considering.

You will use the CliftonStrengths tool to assess your career strengths, describing and reflecting upon your personalized results.

Data Analytics Career Plan

REQUIREMENTS

Your submission must represent your original work and understanding of the course material. Most performance assessment submissions are automatically scanned through the WGU similarity checker. Students are strongly encouraged to wait for the similarity report to generate after uploading their work and then review it to ensure Academic Authenticity guidelines are met before submitting the file for evaluation. See Understanding Similarity Reports for more information.

Preparation Task Overview Submissions Evaluation Report

https://tasks.wgu.edu/student/012610805/course/33080017/task/4406/overview 6/12/25, 04:21 Page 1 of 6

Data Analytics Career Plan

 

Grammarly Note:  Professional Communication will be automatically assessed through Grammarly for Education in most performance assessments before a student submits work for evaluation. Students are strongly encouraged to review the Grammarly for Education feedback prior to submitting work for evaluation, as the overall submission will not pass without this aspect passing. See Use Grammarly for Education Effectively for more information.

Microsoft Files Note:  Write your paper in Microsoft Word (.doc or .docx) unless another Microsoft product, or pdf, is specified in the task directions. Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc.  All supporting documentation, such as screenshots and proof of experience, should be collected in a pdf file and submitted separately from the main file. For more information, please see Computer System and Technology Requirements.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

You must do the following:

A.   Create a career plan. 1.   Describe three different roles or careers in data analytics.

a.   Discuss the differences between the roles or careers from part A1. 2.   Describe how each role from part A1 supports the data analytics life cycle.

B.   Compare three different data analytics disciplines as described by ProjectPro. 1.   Identify three types of careers from the Bureau of Labor and Statistics government data

in your career plan. 2.   Identify your academic skills and needs for the careers considered in part B1.

C.   Identify a potential career goal in your career plan based on your strengths and academic/MSDA track interests. 1.   Reflect on your career strengths as identified in your personalized CliftonStrengths

assessment results.

D.   Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

https://tasks.wgu.edu/student/012610805/course/33080017/task/4406/overview 6/12/25, 04:21 Page 2 of 6

Data Analytics Career Plan

 

E.   Demonstrate professional communication in the content and presentation of your submission.

File Restrictions

File name may contain only letters, numbers, spaces, and these symbols: ! – _ . * ‘ ( ) File size limit: 200 MB File types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, csv, txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z

RUBRIC

A:CAREER PLAN

A1:ROLES OR CAREERS IN DATA ANALYTICS

A1A:DIFFERENCES BETWEEN ROLES OR CAREERS

NOT EVIDENT

The submission does not

provide a career plan.

APPROACHING COMPE- TENCE

The submission provides an

incomplete career plan.

COMPETENT

The submission provides a

clear, complete career plan.

NOT EVIDENT

A discussion of roles or ca-

reers in data analytics is not

provided.

APPROACHING COMPE- TENCE

The description addresses 1

or 2 different roles or ca-

reers in data analytics.

COMPETENT

The description addresses 3

different roles or careers in

data analytics.

NOT EVIDENT

A discussion of differences

between roles or careers is

not provided.

APPROACHING COMPE- TENCE

The discussion of differ-

ences between the roles or

careers described is not ac-

COMPETENT

The discussion of the differ-

ences between the roles or

careers from part A1 is accu-

rate.

https://tasks.wgu.edu/student/012610805/course/33080017/task/4406/overview 6/12/25, 04:21 Page 3 of 6

 

 

A2:HOW ROLES SUPPORT THE DATA ANALYTICS LIFE CYCLE

B:COMPARISON OF DATA ANALYTICS DISCIPLINES

B1:CAREER TYPES

B2:ACADEMIC SKILL AND NEEDS

curate, or the roles or ca-

reers described differ from

part A1.

NOT EVIDENT

A description of how any

role supports the data ana-

lytics life cycle is not provid-

ed.

APPROACHING COMPE- TENCE

The description addresses

how 1 or 2 roles from part

A1 support the data analyt-

ics life cycle.

COMPETENT

The description addresses

how each role from part A1

supports the data analytics

life cycle.

NOT EVIDENT

A description of data analyt-

ics disciplines is not provid-

ed.

APPROACHING COMPE- TENCE

The comparison includes 1

or 2 data analytics disci-

plines as described by

Project Pro.

COMPETENT

The comparison includes 3

different data analytics disci-

plines as described by

Project Pro.

NOT EVIDENT

The submission does not

identify types of careers.

APPROACHING COMPE- TENCE

The submission identifies 1

or 2 types of careers in the

career path.

COMPETENT

The submission identifies 3

types of careers in the career

path.

NOT EVIDENT

The submission does not

APPROACHING COMPE- TENCE

The identified academic

COMPETENT

The identified academic skills

https://tasks.wgu.edu/student/012610805/course/33080017/task/4406/overview 6/12/25, 04:21 Page 4 of 6

 

 

C:CAREER GOAL

C1:CLIFTONSTRENGTHS REFLECTION

D:SOURCES

identify any academic skills

and needs.

skills and needs for the ca-

reers considered in part B1

are incomplete or do not

accurately align with the

careers considered in part

B1.

and needs for the careers

considered in part B1 are

complete and accurately

align with the careers consid-

ered in part B1.

NOT EVIDENT

The submission does not

identify a potential career

goal.

APPROACHING COMPE- TENCE

The potential career goal is

not based on the candidate’s

strengths and academ-

ic/MSDA track interests, or

it is unclear or inappropri-

ate.

COMPETENT

The potential career goal is

clear and is based on the can-

didate’s strengths and acade-

mic/MSDA track interests.

NOT EVIDENT

A reflection on the candi-

date’s career strengths is

not provided.

APPROACHING COMPE- TENCE

The reflection on the candi-

date’s career strengths is

incomplete or not aligned

with the personalized

CliftonStrengths assess-

ment results.

COMPETENT

The reflection on the candi-

date’s career strengths is

complete and aligned with

the personalized Clifton-

Strengths assessment re-

sults.

NOT EVIDENT

The submission does not

include both in-text cita-

tions and a reference list for

sources that are quoted,

APPROACHING COMPE- TENCE

The submission includes in-

text citations for sources

that are quoted, para-

COMPETENT

The submission includes in-

text citations for sources

that are properly quoted,

paraphrased, or summarized

https://tasks.wgu.edu/student/012610805/course/33080017/task/4406/overview 6/12/25, 04:21 Page 5 of 6

 

 

E:PROFESSIONAL COMMUNICATION

WEB LINKS

CliftonStrengths

paraphrased, or summa-

rized.

phrased, or summarized and

a reference list; however,

the citations or reference

list is incomplete or inaccu-

rate.

and a reference list that ac-

curately identifies the au-

thor, date, title, and source

location as available.

NOT EVIDENT

This submission includes

pervasive errors in profes-

sional communication relat-

ed to grammar, sentence

fluency, contextual spelling,

or punctuation, negatively

impacting the professional

quality and clarity of the

writing. Specific errors have

been identified by Gram-

marly for Education under

the Correctness category.

APPROACHING COMPE- TENCE

This submission includes

substantial errors in profes-

sional communication relat-

ed to grammar, sentence

fluency, contextual spelling,

or punctuation. Specific er-

rors have been identified by

Grammarly for Education

under the Correctness cate-

gory.

COMPETENT

This submission includes sat-

isfactory use of grammar,

sentence fluency, contextual

spelling, and punctuation,

which promote accurate in-

terpretation and under-

standing.

https://tasks.wgu.edu/student/012610805/cours

  1. What are three different roles or careers in data analytics?,

  2. How do these roles differ from one another?,

  3. How does each role support the data analytics life cycle?,

  4. What academic skills and needs are required for these roles?,

  5. What is your potential career goal based on your strengths and academic interests?

August 1, 2025
August 1, 2025

Remote Access Security Essentials

Complete the following activity after reading Chapter 13, the Unit VI Lesson, and participating in the Unit VI Live Lecture.

You will develop a PowerPoint from the information below:

Summarize the content for the Unit VI Lesson in 2 to 3 slides. Next, create a slide for each numbered task below.

1. Identify and describe three key business drivers influencing remote access solutions and infrastructure. Why are these drivers critical to the development of a secure remote access strategy?

2. Explain two roles or functionalities of devices within a remote access infrastructure that you found particularly significant. Why did you choose these specific roles or functionalities?

Remote Access Security Essentials

Remote Access Security Essentials

3. What is one unresolved issue or question you have related to applying security best practices to protect the Remote Access Domain from threats?

Please use the speaker notes function to provide an explanation or justification for your answers on the slides. The presentation must have a title slide and a references slide. Your presentation must be at least five slides, not counting the title slide and references slide. APA Style must be used for citations and references

  1. What is the core content of the Unit VI lesson?,

  2. What are three key business drivers for remote access infrastructure?,

  3. Why are these drivers critical to a secure remote access strategy?,

  4. What are two significant roles or functions of devices in remote access?,

  5. What is one unresolved issue you have about securing the Remote Access Domain?


Comprehensive General Answer (PowerPoint Outline with Speaker Notes)

Below is a complete outline for your presentation, including titles, content, and speaker notes. You can build your PowerPoint using this structure.


Slide 1: Title Slide

  • Title: Securing the Remote Access Domain

  • Name

  • Course

  • Date


Slide 2: Unit VI Lesson Summary (Slide 1)

Content:

  • Remote Access Domain supports external network connectivity.

  • Core concepts: VPNs, firewalls, RADIUS servers, endpoint security.

  • Secure remote access ensures compliance and risk mitigation.

Speaker Notes:

The Unit VI lesson highlights the importance of securing the Remote Access Domain as organizations increasingly support hybrid and remote work environments. Topics covered include virtual private networks (VPNs), authentication servers like RADIUS, and policies for endpoint security.

Remote Access Security Essentials


Slide 3: Unit VI Lesson Summary (Slide 2)

Content:

  • Threats: unsecured endpoints, data leakage, and session hijacking.

  • Countermeasures: encryption, MFA, continuous monitoring.

  • Emphasis on policy enforcement and zero trust architecture.

Speaker Notes:

The lesson discusses security threats and stresses the need for strict controls. Solutions include encryption protocols, multi-factor authentication (MFA), and continuous monitoring. Zero Trust models are emphasized for all remote access users.


Slide 4: Business Drivers for Remote Access

Three Key Business Drivers:

  1. Workforce Mobility – Remote and hybrid work models demand access from anywhere.

  2. Cost Optimization – Reduces physical infrastructure costs.

  3. Business Continuity – Ensures operations during disasters or disruptions.

Speaker Notes:

These drivers are critical because they shape the demand for scalable and secure remote access solutions. For example, after the COVID-19 pandemic, workforce mobility became non-negotiable. Business continuity, especially in disaster recovery planning, is essential to maintaining customer trust and operations.


Slide 5: Key Remote Access Device Roles

Two Important Roles/Functionalities:

  1. VPN Gateways – Encrypt and tunnel traffic between remote users and internal networks.

  2. RADIUS Servers – Provide centralized authentication and accounting.

Speaker Notes:

I selected VPN gateways and RADIUS servers because they are foundational to secure remote access. VPNs ensure encrypted communication, while RADIUS servers centralize user verification. Together, they minimize unauthorized access and enforce access policies effectively.


Slide 6: Unresolved Question

Unresolved Issue:

  • How can organizations balance security with user experience in remote access—especially when implementing zero trust without overburdening users?

Speaker Notes:

Zero Trust improves security but can frustrate users with repeated authentication prompts. I’m still uncertain how to maintain high security standards without compromising user productivity or creating friction in daily operations.


Slide 7: References

APA-Style References:

August 1, 2025
August 1, 2025

Architecting the IT Governance Plan

As a consultant to, or manager of, an IT unit within your selected organization, you must be keenly aware of challenges facing your selected organization. This assignment asks you to identify, intellectually discuss, and broadly report on at least two of the most important (in your view) strategic issues faced by your selected organization. In particular, note how these issues have influenced the organization you are considering. Why has the consideration of them positively affected that organization? Conversely, what have been the negative effects on the organization because of not considering them? Make sure you relate the issues and concerns you discuss to IT Governance. Additionally, if failure to properly consider an IT Governance issue has caused the organization problems, how would you alter the IT Strategy? Alternately, if the Governance Issues have aided the organization, what more might you recommend doing? Please provide some detail/examples as you write this paper.

Your paper’s title might be: Considering the Strategic Issues: Their Impact on IT Governance.

Cybersecurity Integration Presentation

SLP Assignment Expectations

Upload your 4- to 5-page paper to the SLP 2 Dropbox once it is completed.

Follow the number of pages required in the assignment excluding cover page and references. Each page should have about 300 words.

Your assignment will be graded according to the  MSITM SLP Grading Rubric.

 

Module 2 – Resources

Architecting the IT Governance Plan

Required Reading

Use  How to find resources in Skillsoft  to access material in Skillsoft.

Required Reading

IT Governance Plan

ITIL® 4 Foundation: Introduction. Available in the Trident Online Library in Skillsoft.

Modern Data Management: Data Governance. Available in the Trident Online Library in Skillsoft.

ITIL

Architecting the IT Governance Plan

TestPrep ITIL 4 Foundation. Available in the Trident Online Library in Skillsoft.

Go to Library Access in Additional Library Resources, select Skillsoft Books. In the search box enter TestPrep ITIL 4 Foundation, select the Courses tab, then select TestPrep ITIL 4 Foundation.

Securing the Enterprise

Securing Against Threats, Securing for Enterprise, and Jailbreaking Devices. Available in the Trident Online Library in Skillsoft.

Business Continuity and Disaster Recovery

CISSP 2021: Business Continuity Planning. Available in the Trident Online Library in Skillsoft.

Backup & Recovery: Business Continuity & Disaster Recovery. Available in the Trident Online Library in Skillsoft.

Data Governance

Modern Data Management: Data Quality Management. Available in the Trident Online Library in Skillsoft.

Data Access & Governance Policies: Data Classification, Encryption, and Monitoring. Available in the Trident Online Library in Skillsoft.

Cybersecurity

Mitigating Security Risks: Cyber Security Risks. Available in the Trident Online Library in Skillsoft.

An Executive’s Guide to Security: Understanding Security Threats. Available in the Trident Online Library in Skillsoft.

Mitigating Security Risks: Maintaining a Secure Workplace. Available in the Trident Online Library in Skillsoft.

Optional Reading

Mitre. (n.d.).  IT governance . https://www.mitre.org/publications/systems-engineering-guide/enterprise-engineering/enterprise-planning-and-management/it-governance

Chapters 1-12, in:

Axelos. (2020). ITIL 4: Digital and IT Strategy. TSO. Available in the Trident Online Library (Skillsoft Books).

Chapters 1-10, in:

Smallwood, R. F. (2020). Information governance: Concepts, strategies and best practices. Wiley & Sons. Available in the Trident Online Library (Skillsoft Books).

Please note that this link will open in a new window and may require activation of a LinkedIn account on the first attempt. Trident students may use their student email address to access this free subscription to LinkedIn Learning as a part of this course.

Getting Started with Network Administration  – LinkedIn Learning

Architecting the IT Governance Plan

  • What are two major strategic issues your selected organization faces?,

  • How have these issues positively influenced the organization when addressed?,

  • What negative effects resulted from not addressing these issues?,

  • How do these issues relate specifically to IT governance?,

  • What IT strategy changes or enhancements would you recommend in response?

August 1, 2025
August 1, 2025

Cybersecurity Integration Presentation

U.S. laws and regulations. The M&A team has provisionally accepted the draft cybersecurity strategy and draft implementation plan which you prepared previously. The M&A team has now requested that you contribute a set of summary slides for the M&A team’s Decision Briefing (presentation) to the Padgett-Beale Board of Directors. This briefing is one of the final steps in obtaining approval for the M&A team’s plan for integrating the newly purchased company – Island Banking Services – into Padgett-Beale as Padgett-Beale, Inc Financial Services (PBI-FS).

Cybersecurity Integration Presentation

Before you begin developing your presentation, review your work products from Projects 1 & 2. As you do so, identify the most likely or most significant barriers to success (factors which increase the risk of failure). These can include barriers arising from external factors as well as issues arising from internal company sources. Consider culture and organizational conflict as well as legal and regulatory issues. For each factor, identify a countermeasure or compensatory action which the company could take to reduce the risk of failure. Select the five most significant barriers to success from your analysis. You will include these in your presentation slides.

Develop Your Presentation:
Using your prior work (Projects 1 & 2), develop a high-level summary presentation of your Cybersecurity Strategy and the Implementation Plan. You will need between 20-30 slides to fully address the requirements listed below; this slide count includes the slides for titles, section titles, and references. Remember to include speaker notes for the agenda slide, section title slides, and content slides. Your notes should be at least 20 words / one paragraph but no longer than 150 words / 3 paragraphs per slide.

Your presentation must include the following:

· Title Slide with title, your name, the date, and this course

· Agenda Slide

Cybersecurity Integration Presentation

· Overview of the M&A effort (multiple slides – use the assignment overviews / background sections to put together a summary that answers: who, what, where, why, how)

· Section Title Slide: Cybersecurity Strategy

· Content Slides: provide a summary of your proposed Cybersecurity Strategy (Project 1)

· Section Title Slide: Cybersecurity Implementation Plan

· Content Slides: provide a summary of your proposed Cybersecurity Implementation Plan

· Section Title Slide: Barriers to Success

· Content Slides: five separate slides – one for each factor (identify each barrier to success and provide a recommended countermeasure or compensating action that the company could implement to reduce the risk of failure). This section will expand upon your “barriers to success” as discussed in Project #2.

· Section Title Slide: Summary & Recommendations

· Content Slide: present a recommendation that the strategy & implementation plan be approved by the Board of Directors for adoption and implementation by the company. Include 5 major business benefits of adoption and implementation. This may be new content (not previously included in projects 1 & 2).

· Section Title Slide: References

· Content Slides(s) that include reference list entries for your resources. Do not cite your own work for Projects 1 & 2.

Putting It All Together
MS Power Point .pptx format is the preferred delivery format; this application can be accessed via the Web or downloaded from UMGC under the university’s enterprise license for student use of Office 365. For more information see: https://www.umgc.edu/help/help-article-base.html?knowledgeArticleId=kA00W000000sZpeSAE&articleType=FAQ_IT__kav

If you are unable to use Power Point, you may use another presentation application to create your slides and speaker notes. After you have done so, print your presentation slides to PDF and deliver the assignment as a PDF document. If you deliver as PDF, you must make sure that your speaker notes are visible and accompany each slide.

Additional Information
1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your presentation should be professional in appearance with consistent use of fonts, font sizes, margins, etc.

3. You must include a title slide with the assignment title, your name, and the due date. Your reference list must be on a separate slide at the end of your file.

4. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.

5. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). To reduce visual clutter, you may put citations for sources into footnotes at the bottom of your slides (instead of putting citations at the ends of bullet points).

 

Copyright © 2022 by University of Maryland Global Campus. All rights reserved.

image1.png

Cybersecurity Integration Presentation

  1. What is the M&A background and purpose for the Island Banking Services integration?,

  2. What are the key components of the proposed Cybersecurity Strategy?,

  3. What is the structure of the Cybersecurity Implementation Plan?,

  4. What are the five most significant barriers to success and their countermeasures?,

  5. What business benefits justify adoption of the proposed strategy and implementation plan?

August 1, 2025
August 1, 2025

University Student Records Database

A prestigious university has recently implemented a consolidation strategy that will require it to centralize their student records. In order to move forward, the local university will need to develop a data model that will retain student records and perform various data extract transform and load (ETL) processes. Imagine that you have been hired as a database consultant to assist in the development of a data design strategy for the student records.

You met with various university subject matter experts and have determined the following after performing various business analysis processes:

  • Faculty groups are divided by core competencies that the university offers. For example, there are groups such as the art faculty, computer technology faculty, language faculty, and science faculty. Each faculty member has an assigned dean and is designated to teach at one particular campus and school. They are able to teach as many courses as required.
  • Courses are categorized by course code and title. Certain courses have prerequisites and the university has asked for this to be cataloged as well.
  • There are various schools within each campus. For example, the Los Angeles campus holds the following schools: School of Science, School of Law, and School of Computer Technology. Additionally, each school offers different professional study programs, such as Forensic Computer Science, Marine Biology, Business Management, and Civil Engineering, to name a few.
  • The study path for students requires that they be enrolled in a specific professional study program. The professional study program requires the students to complete a specific set of core courses. The university also requires that an online grade book be available. The online grade book should show grades awarded to students for specific courses and the term they completed the course.
  • The university identifies each student by their name, date of birth, social, and professional study program.

University Student Records Database

Instructions

University Student Records Database

Using these findings, write a 3–4 page paper in which you:

  • Analyze the university’s requirements and provide a proposal to organize all the required data elements. The proposal should include the following:
    • Provide an entity relationship model (ERM) that will describe the data structure that will store all data elements. Note: The graphically depicted solution is not included in the required page length.
    • Describe any assumptions or limitations for each relationship. For example, professors are able to teach more than one course, or students can only be enrolled in one program.
  • Create the primary key and foreign keys using a UML class diagram for each table.
  • Suggest at least four types of business intelligence reports that could help the university in course management, student enrollment, or historical tracking. Support your answer by providing specific business functions that these reports could be used for to assist executives of the university.
  • Consider outsourcing the functions above as an alternative for development of the database. Research the Internet and other media sources for vendors who develop registrar and school management database systems.
    • Suggest three vendors that developed and are employing efficient registrar and school management database systems and support your reasons to choose from one of these three vendors.
    • Compare and contrast the key aspects that each system offers. Examples of system aspects include but are not limited to cloud based, pricing model, open source, et cetera.
  • Go to the Strayer Library to locate at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
  • The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in any chart or drawing tool with which you are familiar. The completed diagrams or charts must be imported into the Word document before the paper is submitted.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all supports. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Propose a database design.
  • University Student Records Database,

  • How should the university’s data elements be organized to meet its needs?,

  • What is the proposed entity relationship model (ERM) and associated assumptions?,

  • What primary and foreign keys should be used in the UML class diagram?,

  • What four types of business intelligence (BI) reports would benefit university operations?,

  • What are three vendor options for registrar systems and how do they compare?

July 31, 2025
July 31, 2025

Kindergarten Reflections

KINDERGARTEN

Here are photos of my grandson, Noah, clearly reveling in the glory of his first day of Kindergarten using an Ipad in a remote learning environment! Do you remember YOUR first day of Kindergarten? For this discussion, let’s ponder and discuss answers to the following questions:

1. Did you attend kindergarten?,

2. What was it like for you?,

3. How is it the same or different from current Kindergarten classrooms you’ve seen?,

4. When looking at these photos and reminiscing about your own experiences, how close to Friedrich Fröbel’s original ideas are American Kindergartens?

 Kindergarten Reflections

Remember, you will use your Canvas Discussions to aid in writing Assignment IV. Please post your response by this module’s initial class date and return to this post to read peer responses. Reply to two of your peers’ posts  by module’s end.  These posts will also contribute to your participation grade.

Discussion Grading:

Kindergarten Reflections

Yes, I attended kindergarten, and it was a memorable experience. I recall being both excited and nervous, stepping into a classroom full of colorful posters, blocks, storybooks, and the gentle encouragement of a caring teacher. Activities were heavily focused on social interaction, storytelling, music, and hands-on play—some of which align with the core principles set forth by Friedrich Fröbel.

Comparing that experience to today’s kindergarten classrooms, especially in remote or digital environments like the one pictured with Noah, there are clear differences. Modern classrooms integrate far more technology, including iPads and virtual learning tools, and often emphasize early literacy and numeracy more heavily than in the past. While many programs still encourage exploration and play, the academic pressures have certainly increased.

Friedrich Fröbel believed that kindergarten should be a “garden for children,” emphasizing self-directed play, creative exploration, and a nurturing environment where children could grow naturally. In some ways, American kindergartens still reflect these ideals—especially in programs that use play-based curricula. However, the growing focus on standardized outcomes and early academics can conflict with Fröbel’s vision of natural development and joyful discovery.

Reflecting on both past and present, it’s evident that while the core of kindergarten remains focused on foundational learning and social development, the tools, expectations, and environments have evolved. Still, Fröbel’s influence lingers in the emphasis on creativity, the importance of the teacher-child relationship, and the value of learning through experience.

 Kindergarten Reflections
Ask ChatGPT
July 31, 2025
July 31, 2025

Genogram Research & Family Mapping

Another resource that you can use for creating a genogram is   How to Make a Genogram Online | EdrawMax Online.

Write a summary (in  a Word doc) on your research. Any information you use from any source  needs to be cited! Here are a few examples of topics you need to  discuss: .

· The history of genograms

· How genograms are used

Genogram Research & Family Mapping

· How genograms are completed

· What are the benefits and/or challenges of developing a genogram

· Any other information you’d like to share from your research

For the  second part of this assignment you will “map out” your immediate family.  You may need to contact extended family members for help. If that’s not  possible, no problem, do the best you can with the information you  have. You’ll start with you and your significant other as well as your  children. Then, if possible, please go back two generations. Remember, a  genogram is more than a family tree. You need  to identify relationships and their status (strong, weak, abusive,  etc.), behavioral patterns (teen pregnancy, divorce, substance abuse,  etc.), health issues and/or any other issues that you know of or become  aware of during your research. Don’t forget to include a key that  explains what the lines, shapes, colors, etc. mean.

Please  complete your genogram using genopro.com, as a Word doc using whatever  shapes, symbols, colors, etc. you want, or you can draw your genogram by  hand, scan it, and upload it as an attachment. PLEASE keep in mind that  this is not an art class – I’m not looking for a masterpiece. The  purpose of this assignment is for you to see what patterns emerge within your family. After you’ve completed your genogram please write a summary ( add to the Word doc you’ve started), that includes the answers to the following questions (as well as anything else you’d like to share): .

1. What  did you learn about your family history? (Please share as much as you  are comfortable with. This assignment is very personal and your  instructor is the only person who will read it.)

2. What was the experience of collecting information like for you?

3. Are  there any patterns that emerged that surprised you? (For example  communication, addiction, teen pregnancy, mental healthy issues, etc.)  Why or why not?

4. How could a genogram help a couple strengthen (in general) their relationship?

5. How could parents (in general) use a genogram to educate their children?

6. Conclude your summary  by summarizing what you learned from this assignment and how you can apply it to your family.

Genogram Research & Family Mapping

  1. What is the history and purpose of genograms?,

  2. How are genograms constructed and what do they include?,

  3. What are the benefits and challenges of creating a genogram?,

  4. What patterns emerged in your family after completing your genogram?,

  5. How can genograms help couples and parents in relationships and parenting?

July 31, 2025
July 31, 2025

Child Welfare & Children’s Books

It is said child protective services suffer from high caseworker turnover and burnout.

1. Based upon the information/knowledge that you gained in the article above and the other readings in this course, address the following:

· Summarize the article read above making sure to discuss the resources mentioned in the article that may prove useful for caseworkers experiencing burnout.

· What, based on course concepts and your own understanding, are the major reasons for this?

· What can be done to improve child welfare services?

· Discuss the need for understanding cultural issues impacting the global phenomena of child maltreatment.

Child Welfare & Children’s Books

Assignment 2 – 2 page -MLA

this module’s reading in  Essentials of Children’s Literature, your three chosen books, and the one article you researched.

What comes to mind when you think of the terms Diversity and Inclusion? Are they the same? Are they different? How? This will start you on a journey to discover more about the importance of diversity and inclusion in children’s literature.

this has two parts:

Child Welfare & Children’s Books

1. Summarize the article on diversity in children’s literature or education that you researched. Provide a few sentences of engagement and commentary.  Remember that to find the article, you should use internet sites, such as  Children’s Literature Assembly.  If you opt for other sites, make sure your article is from a .org, .gov, or .edu site.

2. Summarize and analyze each of three children’s books on diversity and inclusion that you read. Introduce each book, the author, and intended age group. Provide a brief plot summary and describe the illustrations. What does each book suggest about the importance of diversity and inclusion in children’s books, and why? Align your ideas about your books with information contained within the article you chose. Make sure to cite your articles and books at the end of your posting in MLA format.   Remember that two of the books should feature characters from other ethnicities or cultures, and the third book should feature characters who are disabled (physical, developmental, learning, emotional, etc.). An excellent resource to start looking for books and blogs over Diversity and Inclusion in children’s literature is  EmbraceRace.org.  Another engaging site that allows you to search their book collections is  Diversebookfinder.org.  Remember that many books are available electronically for free through public libraries and online resources, such as  Worldreader.org .

Assignment 3 -MLA

you have been exposed to a number and variety of children’s books for an array of audiences. For this project, you will get to tap into your creative side and write a short children’s book, a Power Point (15-20 slides), This project must include illustrations and/or photography. Your book will need to feature some aspect of diversity and/or inclusion, either as a theme or with the characters you choose. Your book can be fiction (realistic, science fiction, fantasy, or historical fiction) or nonfiction (biography, autobiography, or memoir).

To help you get an idea for the structure, formatting, content, and use of text and space, open any children’s book and use it as a model.

For this project, you will:

· determine the targeted age group of your readers as this will set the purpose and tone

· focus on a lesson for the book to teach

· focus on some aspect of diversity or inclusion

· create a setting (time and place) and use vivid, engaging descriptions. There are two types of settings. Temporal setting refers to time (Autumn, evening, Christmas, dusk, dawn, 3am). Spatial setting refers to place (the kitchen, Austria, a ranch in West Texas, a National Park, an ostrich farm).

· use illustrations or photography appropriate to the age, audience, theme, and tone of your story. Illustrations and/or photographs may be your own, from someone you know (used with permission), or Creative Commons images from open source cites (e.g., Pixabay)

· use visual balance between negative and positive space

· avoid too much text bunched together on one page

· follow one of the children’s books we have read this semester as a model, in terms of dialogue, composition and placement of images, size of font, title and author pages, etc.

· spellcheck and proofread before submitting

· include a Works Cited slide to document any primary and secondary sources

· remember a book cover, a title, and author name

  1. What resources help caseworkers reduce burnout in child welfare services?,

  2. What causes high turnover and burnout in child protection agencies?,

  3. How can child welfare services be improved?,

  4. What is the significance of understanding cultural issues in global child maltreatment?,

  5. How do children’s books promote diversity and inclusion?

Child Welfare & Children’s Books

Part 2. Analysis

Include in the same file as your children’s book a 2 pages, double spaced) analysis of your creative choices for the book.  Explain:

· the age range you intended

· why the book’s focus or lesson is appropriate for the chosen age range

· how your book addresses diversity and/or inclusion

· why you chose the type of images that you used (the type of images, with a few specific examples — you do not have to explain every image)

· how the language you used is appropriate for the age range and purpose of the book (with a few specific examples)

· why you chose the sources you used, and how you used them; make sure to cite the sources appropriately.