subject

Assignment: Provide a reflection paper of 500 words minimum (2 pages double spaced) of how the knowledge, skills, or theories of Risk Management and Information Security have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
I am currently working as a system analyst, Please relate it with my role and responsibilities And my role and responsibilities are as below:
• Study the existing system, reading manuals and information systems principles so as to best modify new and existing software.
• Analyzing the business applications, process and environments to acquire Knowledge and to identify gaps, potentials requirements, and business flow.
• Generating and managing business requirements documents, functional requirements, system requirements specification, and traceability matrix.
• Maintain computer system, security, and programming guidelines by writing and updating policies and procedures.
• Responsible for performing analysis, unit testing, execution of functional test plan, validation of test result and documentation.
• Perform troubleshooting, code migration, production support activities, and bug fixing.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 01:10
Problem 1 - hashing we would like to use initials to locate an individual. for instance, mel should locate the person mark e. lehr. note: this is all upper case. generate a hash function for the above using the numbers on your telephone. you know, each letter has a number associated with it, so examine your telephone keypad. generate 512 random 3 letter initials and take statistics on a linked list array size 512 to hold this information report how many have no elements, 1 element, 2 elements, does this agree with the hashing statistics distribution?
Answers: 1
question
Computers and Technology, 23.06.2019 18:00
Freya realizes she does not have enough in her bank account to use the debit card. she decides to use a credit card instead. which questions should freya answer before using a credit card? check all that apply. can i pay at least the minimum payment each month? can i make payments on time and avoid late fees? will i have to take out a loan? how much in finance charges can i afford to pay? should i talk to a consumer credit counseling service?
Answers: 1
question
Computers and Technology, 24.06.2019 00:30
Which boolean operator enables you to exclude a search term? a} not b} and c} or d} plus
Answers: 1
question
Computers and Technology, 24.06.2019 07:00
Guys do you know sh27 cause he hacked me : ( pidgegunderson my old user
Answers: 2
You know the right answer?
Assignment: Provide a reflection paper of 500 words minimum (2 pages double spaced) of how the knowl...
Questions
question
Mathematics, 31.08.2021 20:40
question
English, 31.08.2021 20:40
question
Physics, 31.08.2021 20:40
question
Mathematics, 31.08.2021 20:40
question
English, 31.08.2021 20:40
Questions on the website: 13722362