discussion nr 4

 

In this module, you learned about library databases and resources. In this discussion post, please address the following:

  • What is a library database?
  • Name at least 5 databases available through your Library Resources and how and why you would use them?
  • What databases do you think will be helpful to your research for your PowerPoint project?
  • Have you reached out to a Broward librarian for help? 

Narrated PowerPoint Presentation

Social, Cultural, and Ethical Issues

For your Final Project, you will create a PowerPoint presentation based on a topic from your current field of study. Since this is a fully online course and we do not meet in person in a traditional classroom setting, you will need to narrate this presentation so it can be viewed electronically.

To assist in the completion of your Final Project, some of the required pieces are included in this course as Milestones. These Milestones are completed throughout the course by the student and the instructor will provide feedback for each Milestone, in order to help the student better the overall quality of their project.  See below where the milestones align with the Final Project requirements.

Topic:

Choose a social, cultural, or ethical issue related to your current major or field of study. Chose ONE area to focus on. For example, you cannot talk about ethics in healthcare, public safety, or IT in general. You would need to pick a single ethical issue to discuss and not just ethics in general. (Milestone 2 & 3)

Research:

Conduct a search using both internet and library database resources. You must use at least 3 sources, one of which must be from the library database. Keep track of these sources! You will need to include a reference slide at the end of your presentation. (Milestone 4)

Content:

Create a NARRATED PowerPoint presentation that contains between 12 to 18 slides. You must add your voice using the narration feature in PPT. Include the following:

Title Slide (1 slide) – includes your name and the presentation title. (Milestone 2)

Introduction Slide (1 slide) – should be something catchy and explain why this issue is important. (Milestone 3)

Body/Content Slides (8-14 slides) – must be interesting, well organized, and presented clearly. Slides should not contain full sentences/paragraphs.
Summary Slide (1 slide) – may also include a way for others to get involved, help, or get more information.
Reference Slide (1 slide) – must be in APA style and be a minimum of 3 resources. When including hyperlinks in the reference list, they must be hyperlinked. (Milestone 4)

PowerPoint Elements:

Include the following PowerPoint elements:

Apply a single theme or design template.
Apply a transition to each slide.
Do NOT use animation.
Provide at least one hyperlink to a video or useful online article.
Use at least 5 open or creative commons images (Clipart, photos, shapes, etc). (Milestone 6)
Use smart art at least one time.
Include an original graph. (Milestone 5)
Include a footer on each slide with the slide number and your last name.

Narration:

To earn full points, your presentation must be narrated. Do NOT read word for word from your slides. Slides should only contain bulleted information, but full sentences should be spoken!  The narration audio should start automatically when you start the slideshow and should continue through the entire presentation.

Submission:

Please upload your completed PowerPoint project with a filename formatted as:

PowerPoint_SectionProject_yourfirstname_yourlastname.

Due DateAug 5, 2019 11:30 PMHide Rubrics

Rubric Name: Assignment 7: PowerPoint Project Rubric

This table lists criteria and criteria group name in the first column. The first row lists level names and includes scores if the rubric uses a numeric scoring method.Research and ContentExcellent5 pointsGood2.5 pointsPoor0 pointsTopic and title

Topic is about a single social cultural or ethical issue and appropriate for the project.  Topic was approved prior or made changes due to feedback.  Title slide is included with topic information

Topic is about about a general social cultural or ethical issue or is not appropriate for the project. Title slide is present

Topic is not appropriate or no feedback (if included) was incorporated in the topic or there is no title slide

/ 5Introduction Slide

 Introduction slide catches the users attention, it is catchy and shows why the issue is important.

Some elements are missing from the introduction slide

There is no introduction slide

/ 5Body

There are 8-14 slides for just content (not including title, introduction, summary, and reference slides).

There are less than 8 slides

There are less than 3 slides

/ 5Content

Content is clear, concise, and does not contain full sentences and paragraphs.  Flow is appropriate for presentation

Some of the elements are missing

Most of the elements are missing

/ 5Body/content well organized

Content is well organized, presented clearly, and does not contain full sentences and paragraphs

Content is not well organized or presented clearly or contains full sentences and paragraphs

Content is not well organized or presented clearly and contains full sentences and paragraphs

/ 5Summary Slide

Contains 1 slide with ways to get involved, help, or get more information

Contains a summary but does not show ways to get involved, help, or get more information

There is no summary slide

/ 5Reference Slide

There is a slide with 3 references in APA style

Some sources were written in APA style or they were incorrectly written in APA style

There are no references cited or non of the references were in APA style

/ 5Number and variety of sources

At least 3 internet and/or library database resources were used.  Sources were varied, from the internet and library, and at least 1 source is from an electronic library database. Links to references are hyperlinked. Feedback if included was incorporated into the reference area.

There were not a variety of sources or less than 3 sources were listed.

No sources were cited or used.

/ 5This table lists criteria and criteria group name in the first column. The first row lists level names and includes scores if the rubric uses a numeric scoring method.PowerPoint ElementsLevel 35 pointsLevel 22.5 pointsLevel 10 pointsTranisitions

Transitions were correctly applied to every slide

Some slides had transitions

There were no transitions

/ 5Theme

A single theme or design was applied to all slides

Multiple themes were applied or the theme was not applied to all slides

No theme or design template was applied.

/ 5Hyperlink

A hyperlink to at least one video or useful online article was provided in the content (this does not include hyperlinks in citation/reference slide)

The hyperlink did not work properly or the link was not appropriate for the presentation

No hyperlink was present.

/ 5Images

5 or more images (clip art, photos, shapes, etc) were present.  Images were royalty free/creative commons and cited on the slide where the image resides

2 or more images were present and cited properly.  Or all images were present but not cited or not royalty free.

No images were present

/ 5Smart Art

Smart art was used

Smart art was not appropriate

No smart art used.

/ 5Chart

An original chart was included

A chart was included but it was not made by the student

There was no chart

/ 5Footer

A footer with slide number and last name was included on each slide. 

Footer is missing components

No footer was included

/ 5Spelling and Grammar

There are no spelling or grammar mistakes

There are some minor spelling and/or grammar mistakes

There are many spelling and/or grammar mistakes

/ 5Animation

There is no animation present

There is animation present but limited.

There is animation present

/ 5Correctly named PowerPoint

Powerpoint name was correctly formatted

Name is missing one of the areas

Powerpoint was not named correctly

/ 5This table lists criteria and criteria group name in the first column. The first row lists level names and includes scores if the rubric uses a numeric scoring method.NarrationExcellent10 pointsGood7.5 pointsFair5 pointsNeeds Improvement2.5 pointsPoor0 pointsNarration

Presentation was narrated but student did not read the slides word for word.  Student used full sentences

Some of the powerpoint was narrated or the student read some of the powerpoint word for word

student read the entire powerpoint word for word

an audio file was present, but did not work properly

There was no narration

/ 10This table lists criteria and criteria group name in the first column. The first row lists level names and includes scores if the rubric uses a numeric scoring method.Overall QualityExcellent10 pointsGood7.5 pointsFair5 pointsNeeds Improvement2.5 pointsPoor0 pointsOverall Quality of PowerPoint and Audio Presentation

Final project and audio presentation are cohesive, a pleasure to view and listen to, and is very informative.

Final project and audio presentation meet all the requirements and is easily understood and followed by the viewer/listener.

Final project and audio presentation are well constructed, but could do with some betterment in organization and presentation.

Final project and audio presentation do need a little more organization to be considered cohesive and more easily understood.

Final project and audio presentation need to be better organized and more polished if student wants the reader/viewer to fully understand the project.

/ 10Total/ 110

Overall Score

Level 4

90 points minimum

Level 3

60 points minimum

Level 2

40 points minimum

Level 1

0 points minimum

Submit Assignment

Files to submit(0) file(s) to submit

After uploading, you must click Submit to complete the submission.Add a FileRecord AudioRecord VideoComments

Skip Toolbars for Comments.More Insert actions.Format Paragraph Address Preformatted H1 – Heading 1 H2 – Heading 2 H3 – Heading 3 H4 – Heading 4 H5 – Heading 5 H6 – Heading 6 More Text actions.

More Paragraph Style actions.Font Family Arabic Transparent Arial (Recommended) Comic Sans Courier Ezra SIL Georgia SBL Hebrew Simplified Arabic Tahoma Times New Roman Traditional Arabic Trebuchet Verdana 돋움 (Dotum) 宋体 (Sim Sun) 細明體 (Ming Liu) Size 1 (8pt) 2 (10pt) 3 (12pt) 4 (14pt) 5 (18pt) 6 (24pt) 7 (36pt) Insert TableMore Table actions.Show All ComponentsSubmitCancel
 

500-3

  

List Outcomes from Your 16 -Week Course – List the outcomes (objectives) as written in the course syllabus from the 16 – week hybrid course.

Ø Identify recent technological changes which have broadened the scope and applicability of legal transactions

Ø Using freely available internet sources, search for and download state and federal statutes and case law pertaining to a Cyberlaw subject and cite that law using standard legal notation.

Ø Describe the legislative process and Court interpretation of statutes by case law with respect to cyber events.

Ø Identify the constitutional and statutory criteria which are designed to protect rights to intellectual property for copyrights, trademarks, and patents and show how those rights have been protected by Court action in internet transactions.

Ø Identify and describe statutory and case laws which the government uses to influence commerce on the internet.

Ø Describe the transition of traditional tort litigation to its use in internet transactions.

Ø Using freely available internet sources, search for and download state federal statutes and case law pertaining to an internet crime and cite that law using standard legal notation.

Ø Identify and discuss methods which are used to violate either private or public interest by malicious use of the internet.

Ø Describe the limitations of venue-based litigation in internet procedures and propose methods of resolution of disputes by new or different technology and procedures.

Work Experience: 

· Responsible in delivering the complete Project Plan with total supporting data which included the status Reports, Issues Log, Performance Testing Matrix, detailed Testing Reports, Fine tuning Recommendation reports to both Executive Management & Senior Management

· Responsible to provide Technical and Functional Support to the users, tester and Business System Analysts

· Managing and Preparation of the Test Plan and Test strategy for the various projects

· Liaison with the onsite and offshore teams for testing status and issue resolution

· Tested the data mapping, fixing errors

· Tested staging table for EDI 210 Invoice, Balance Due Invoice, EDI 810 Invoice inbound, 850 Inbound Purchase order

· Tested Web service using SoapUI

· Involved in User acceptance testing (UAT)

· Written standard test scripts for Oracle Financial, Procure to Pay, SOA, web services

· Involved in standard Functionality testing in Phase I Phase II for 3 Instance

· Documented and communicated test results to the test Management and Business Management Team

· Worked closely with Developers team for different issues

· Experience with test automation tools like JIRA

· Worked on the testing of SaaS, Web services, XML and web application.

Read and response to it, and i need quality respond. (Due on monday morning)

 

As an Information Assurance and Security Specialist the job role would be making sure that the organization is secured with all the correct standards and protocols. Some best practices would be to implement a formal IS Governance Approach, stop data loss, detect insider threat, back up all data, and being aware of social engineering, along with many other things to consider. Implementing a formal IS governance approach allows a company to establish and maintain an information security framework. The framework is design to align the assurance strategies and support the business. It extremely vital to have a security mechanism in place to stop or prevent data lost. Losing data can cause a company’s failure and trust of a consumer. A recent survey found that data stolen or misused from vendors and contractors as well as employees. With data being exposed to employees and outside vendors, there needs to be some line of defense to monitor user activity to detect any insider threat. Looking for unauthorized behaviors and making sure no one is violating the security policy. Back up of data can be crucial too, especially when there is a major disaster and/or breach of a system. Social engineering is becoming more and more popular as technology continues to increase. Having the correct training and knowledge keeps all employees aware of what social engineering is and how to mitigate anyone from trying to gain any sensitive information. (Donovan, 2017)

As an information security analysts the expectations are to plan and carry out security measures to protect the organization’s computer network and systems. While working on a project the most important requirements are confidentiality, integrity and availability. Confidentiality in my role is where I would help control who gets to read any information. Integrity, I will help assure that information and programs are change in a specified and authorize manner. Availability would be assuring that authorized users have access to the information and resources.

While working on the current project, I believe we will be successful as long as protocols and standards are followed and done correctly. Implementing a security policy will allow the organization to be profitable and grow. It takes a team for a business to strive and grow. Making sure that all employees are well trained and is aware of expectations of the company we have no choice but to strive for greatness.

Working with a team to complete a project is critical for success. Some best practices that a team member or an effective team should have are:

  • Being confident, not arrogant: Being confident is speaking up when something comes to mind, so that your opinion could be heard and possibly used.
  • Good Communicator: Communication is the key! Without it someone could be left out, not know what is expected, and possibly be slower. Everyone on the team should be well aware of the expectations, a timeline and how the team is progressing. This will help make sure things are done effectively and efficient for sure.
  • Responsibility and loyalty: Being accountable for your own actions, mistakes and successes helps lessen confusion and keeps the ball rolling. Loyalty is hand and hand, I would say. Because being loyal to me is being responsible and willing to go to the end weather its good or bad. There may be times when the project becomes to stressful or you just feel like you can’t do. Staying loyal and strong will help get you to the end. (Clarizen, 2017)

References

Clarizen, T. (2017). 10 Practices of Highly Effective Team Members. Retrieved from https://www.clarizen.com/10-practices-highly-effective-team-members/

Donovan, K. (2017). 10 Cybersecurity Best Practices for IT, IS, Network & Data Security. Retrieved from https://www.observeit.com/blog/10-best-practices-cyber-security-2017/

Report 3

  

Correlate job responsibilities with the 16 -week hybrid course outcomes listed above.

Course Outcome:

• Compose comprehensive definition of “emerging technologies”.

• Summarize, with a high level of understanding, key terminology common to management trends, principles and practices common to contemporary technology-intensive organizations.

• Analyze, compare and assess current and future management models utilized in contemporary emerging technology-intensive organizations. Explain how to avoid the pitfalls of emerging technology.

• Create an original analytical research report that complies with the course writing guides and the APA Publication Manual, 6th Edition

Job Responsibilities:

· Responsible in delivering the complete Project Plan with total supporting data which included the status Reports, Issues Log, Performance Testing Matrix, detailed Testing Reports, Fine tuning Recommendation reports to both Executive Management & Senior Management

· Responsible to provide Technical and Functional Support to the users, tester and Business System Analysts

· Managing and Preparation of the Test Plan and Test strategy for the various projects

· Liaison with the onsite and offshore teams for testing status and issue resolution

· Tested the data mapping, fixing errors

· Tested staging table for EDI 210 Invoice, Balance Due Invoice, EDI 810 Invoice inbound, 850 Inbound Purchase order

· Tested Web service using SoapUI

· Involved in User acceptance testing (UAT)

· Written standard test scripts for Oracle Financial, Procure to Pay, SOA, web services

· Involved in standard Functionality testing in Phase I Phase II for 3 Instance

· Documented and communicated test results to the test Management and Business Management Team

· Worked closely with Developers team for different issues

· Experience with test automation tools like JIRA

· Worked on the testing of SaaS, Web services, XML and web application.

Student Success Course

 

SWOT, grit, growth, victim, creator, motivation, academic integrity.  In the past few weeks, you have been writing short papers that incorporate ideas from sources you have found on the internet and on EBSCOhost.  This week, you will read one more article, and use it along with the others to write an essay about being successful in college.  This paper will be used to help determine your preparedness for future English courses in college.  Do your best work!

***

1.  Read the article Shifting out of the Drama Triangle: Victim vs. Creator Mindsets.

2.  Write a 5-paragraph essay which explains how having the creator mindset can foster greater success in college than having the victim mindset. For sources, be sure to use this week’s article as well as the articles required for weeks two and three to support your argument.

a.  The first paragraph is your introduction.  It should introduce the topic and contain the thesis statement.

b.  The second paragraph should have a topic sentence that relates to the thesis statement.  This paragraph should provide supporting evidence or ideas for your thesis that come from the designated article “Shifting out of the Drama Triangle.”  In this paragraph, you must incorporate one paraphrase from the article and cite it in text properly using APA citations.  This paraphrase must be highlighted in yellow.  Also you must also incorporate one short, direct quote from the article and cite it in text properly using APA citations.  This direct quote must be highlighted in blue.

c.  The third and fourth paragraphs are also supporting paragraphs for your thesis.  They should have topic sentences that support your thesis statement, and contain additional information that further supports the thesis.  Be sure to paraphrase or summarize the two articles you have already found regarding the growth mindset. Use your own words, but provide credit to the articles from which you have taken your ideas.

d.  The final paragraph is the conclusion. It should connect to the introductory paragraph and summarize the main points of the paper.

3.  List your sources in a References page at the end of your paper.

BA500-2

Correlate your job responsibilities with the eight-week online course outcomes listed above.

Should be Minimum 250 Words please.

Course Objective: 

· Students will demonstrate their knowledge of business and the realities of managing IT (will utilize MBA level IT/business textbook, discussion of current business and IT events, conduct research for capstone project paper and capstone presentation).

· Students will demonstrate their ability to analyze specific business and IT challenges (will utilize case studies and assignments from the textbook).

· Students will demonstrate the ability to create professional written documentation (will write case study summaries, complete written assignments, and write final project paper).

· Students will demonstrate the ability to complete a professional PowerPoint presentation (will develop a professional PowerPoint presentation based on their final project paper).

· Students will demonstrate the ability to engage in group discussions (will utilize class discussions with feedback to other students).

· Students will demonstrate the ability to deal with real business/IT dilemmas, successfully analyze situations, and propose real solutions (will utilize case studies, assignments, and capstone project—if possible, engage with business organization to work with problem discovery and present business solutions)

Job Description

· Analyze, design prototype, test, document, and implement new or modify existing software to support various business processes.

· Develop an area of expertise within Sales, customer service, Order Entry/Order Management and Billing/Collections in due course of time

· Learn overall business operations and help develop innovative solutions to improve productivity

· Assist key users in testing new functionality, documenting and retaining ERP knowledge

· Documented testing results and updated the same for verification to the management

· Involved in developing Test Plans and Test cases for the entire functionality of the portal.

· Understanding and analyzing the Business functionality of existing systems of issue to resolve

· Written Standard test scripts for Oracle Accounts Payable and Oracle accounts receivable Modules 

· Able to extract back end data using SQL/Toad queries

· Responsible for Test Plan Preparation, Test Strategy Preparation, Team Meetings Facilitation, Defect Tracking Facilitation, etc.

· Tested Web service using SoupUI

· Involved in User acceptance testing (UAT)

· Involved in standard Functionality testing in Phase I Phase II for 3 Instance

· Extensive experience in MS Office tools including MS Projects, PowerPoint and Visio.

· Able to take preventative action when any risks become techniques.

· Actively maintain awareness and understanding of current developments and best practice in testing.

· Knowledge of execution, scripting and planning.

· Making sure that all testing plans comply with company guidelines, standard and regulations.

· Worked Closely with Developers team for different issues

· Experience with test automation tools like QTP, JIRA, 

read it and respond to it. i need quality response. Due tomorrow

 

What security considerations are involved?

Since I recommend a cloud-based network Verbania would need a cloud-based security software and a security software for their office computers. Cloud-based security offer the same functionalities as you would with any traditional IT security such as protecting your important information from theft, data leakage and deletion. The great aspect of having a cloud-based security is that you will operate at different levels and still be protected.  Another aspect of cloud-based security it allows you attack the threat from different angles verse traditional IT security. With cloud-based security most company have their data center located in different country that have strict laws on how people can gain access to your company data and by having multiply data center in different country you will have a greater chance of protecting your important asset from data leakage and deletion.

Cloud Security

Traditional IT Security

Third-Party Data Centers

In-House Data Centers

Low Upfront Infrastructure Investments

High Upfront Costs

Quickly Utilization

Lower Efficiency

Reduced Time to Market

Longer Time to Market

Usage-Based Cost

Higher Cost

Quick scalable

Slow Scaling

The next security you must worry about is the security on your company computer. I recommend Verbania to go with McAfee Security Suite. The reason I choose the software is that I can protect the company across multiply device that may connect to the company network and do work on it also; if the company allow the employees to connect their personal devices to the network it can install the software to the devices to protect the company from external threats (McAfee, n.d.).

Reference

Amazon. (n.d.). AWS: What is Cloud Security? Learn the basics about security in the cloud. Retrieved from https://aws.amazon.com/security/introduction-to-cloud-security/

McAfee. (n.d.). McAfee: Explore the McAfee product portfolio. Retrieved from https://www.mcafee.com/enterprise/en-us/products.html

response 4 karenis

Before connecting to a wireless network there are a number of concerns that must be addressed. They are as follows:

  • Denial of Service is one of the simplest network attacks to perpetrate as it requires limiting access to services (Wilkins, 2011). This can be done by sending a large amount of traffic to the target but in case of wireless networks, something as simple as a microwave or a competing access point on the same channel can cause an interruption.
  • Passive Capturing is performed by getting in range of a target wireless LAN and then eavesdropping and capturing data. This can be used to break the existing security settings and analyzing non-encrypted data.
  • Configuration Problems can be simple enough for attackers to penetrate into. If the security configuration is weak, it opens doors for attackers to gain access to the device and for external use.

Wireless Application Protocol (WAP) is one of the modes of transmission of data over wireless networks. It is one of the specifications for a set of communication protocols that standardize the way wireless devices can be used to access the internet and for instant messaging (Rouse, 2010). There are various layers of WAP:

  • Wireless Application Environment
  • Wireless Session Layer
  • Wireless Transport Layer Security
  • Wireless Transport Layer

 Also, there are certain pros and cons associated with the protocol which are as follows:

Pros:

  • Sending and receiving data in real-time.
  • No apprehension of hardware obsolescence.
  • Most modern mobile devices support WAP.
  • Its implementation aligns with the internet model.

Cons:

  • It has low speed, security concerns, and a very small user interface.
  • Most of the people are unfamiliar to WAP.
  • It has an expensive business model.
  • The forms associated with WAP are hard to design.

References

Wilkins, S. (2011, November 2). Wireless Security Considerations: Common Security Threats to Wireless Networks. Retrieved from https://www.pluralsight.com/blog/it-ops/wireless-lan-security-threats

Rouse, M. (2010, November). WAP (Wireless Application Protocol). https://searchmobilecomputing.techtarget.com/definition/WAP

Word 2013 part 1 of 6 project. Need help asap

Open Protect Issues doc.

2. Format the text form the first paragrpah of text below the title to the end of the doc into two columns with 0.4 inch between columns.

3. Move the insertion pt to the end of the doc and then insert and continuous pt to the end of the doc and then insert a continuous section break to balance the columns on the second page.

4.Press ctrl+home to move the insertion pt to the beginning of the doc.

5. Display the INsert Pictures window (click the online pics button on the INSERT tab), type computer privacy magnifying glass in the search text box, and then press enter. Inert the clip art image with a man in a blue hat. ( if not available choose another related to computer and privacy.

6.Make the following cusomizstions to the clip art image: change the height to 1 in. Change the color of the clip art image to blue, acent color 1 light. Correct the contrast to brightness o percent normal contrast +20 percent. Change the positon fo the clip art image to postion in middle left with square text wrapping. Use the rotate object button in the arrange group and flip the clip art image horizontally.

7. MOve the insertion point to the beginning of the paragraph immediately below the INtellectual Property Protection headein ( located on sedon page). INsert the Austion Quote built in text box and then make the following customizations; TYpe in the text box: ” Plagiarism may be punished by law, and in many educational instutions it can result in suspension or even expulsion.” Selec tthe text and change to 11 pts. Change the width of the tex box to 2.8 in. CHange the postion of the text box to position in top center with square text wrapping.

8. Press ctl+end

9.Cahnge back to one column

10. Press enter twice and insert a shape near the insertion poin using the plaque shape (located in the second row in the basic shapes section) and make the foloowing cusomtizations: change the shape heigt to 1.4 in an the shape width to 3.9 in. Use th align button in the arrange group and distribute the shape horizontally. APply he subtle effect blue accent 1 shape stule (2nd col 4th row) Type the text Felicite’ Compagnie inside th eshape.Insert the symbol that automatically has the line over the e at the symbol dialog box with the normal text font selected. Insert the current date below the Felicite Compagnie and insert the current time below the date. Select the text in the shape, change the font o 14 and apply bold ofrmatting. Manually hyphenate the doc but do not hyphenate headings or proper names. Create a drop cap with the first letter of the word The that begins the first paragraph of text below the tite. Save.

sub:buscontrol plan discusiion

 

According to the required textbook for this course, on page 145, “Some strategies that can be used to test contingency plans are”:

 

  1. Desk Check Testing
  2. Structured walk-through Testing
  3. Simulation  Testing
  4. Simulation Testing
  5. Parallel testing Testing
  6. Full interruption Testing
  7. War gaming Testing

Discuss three (2) advantages and two(2) disadvantages of each type of testing listed above. When is each type of testing appropriate? Are there situations that preclude the use of a particular type of testing?  Read the required textbook by Whiteman, Mattord & Green, Chapter 4 for answers. You must include an APA formatted in-text citation & reference list from your textbook. Only other references should be scholarly references.

DQ requirement: Note that the requirement is to post your initial response no later than Thursday and you must post one additional post during the week. I recommend your initial posting to be between 200-to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words. All initial posts must contain a properly formatted in-text citation and scholarly reference to support an assumption.

Discussion Response Format:

Desk Check Testing

Disadvantages:

Two (2) disadvantages of Desk Check Testing are A and B.  A is considered a disadvantage because…….

Likewise, B is considered a disadvantage because……..

Advantages:

Two advantages of Desk Check Testing are C and D. C is considered an advantage because…….

Likewise, D is considered an advantage because……..

Structured walk-through Testing

Disadvantages:

Two (2) disadvantages of Structured walk-through Testing are E and F.  E is considered a disadvantage because…….

Likewise, F is considered a disadvantage because……..

Advantages

Two advantages of Structured walk-through Testing advantages are G and H.  G is considered a disadvantage because…….

Likewise, H is considered an advantage because……..

And so on

Simulation Testing

Simulation Testing

Parallel Testing

Full interruption Testing

War Gaming Testing