MovieFlix: modernization of information management systems

Human Resource Management
Paper , Order, or Assignment Requirements

The owners of MovieFlix realize that they need to modernize their information management systems in order to make their processes run more smoothly and to solve some of their business problems.
• In 2-3 pages, discuss a technology system that you suggest for the company. (Do not use Mircosoft Suite Apha)
o Include why you selected that particular database or information system and how it will help improve MovieFlix’s processes.
o Describe the costs, including the license, etc. Look for a database that does exit that includes citations and references this requires research. How will the database or software help with their problem (integrity). How will this system help increase revenue cost component, how will this help from the bottom up. explain the database and why you selected it. Also what is the name of the database? Please make sure that your references backs your paper or points will be deducted, and remember to use In-text citations. Remember to use credible sources.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Security of Technical Systems in Organizations

Case Study In Computer Security
Paper , Order, or Assignment Requirements

This assignment comprises of four parts. All parts should be compiled into one Word document and submitted to the Submissions Area.
Part 1: Case Study 1: Textbook Chapter 2: “Security of Technical Systems in Organizations: An Introduction”
Many of the technical controls put into place can be circumvented with a simple phone call. Recently, famed hacker Kevin Mitnick demonstrated this, by breaking into Sprint’s backbone network. Rather than mounting a buffer overrun or denial-of-service (DoS) attack, Mitnick simply placed a call posing as a Nortel service engineer and persuaded the staff at Sprint to provide log-in names and passwords to the company’s switches, under the guise that he needed them to perform remote maintenance on the system. Once the password information had been obtained, Mitnick was able to dial in and manipulate Sprint’s networks at will.
Many people believe this was an isolated incident, and they would not fall for a similar act of social engineering, but Mitnick gained notoriety during the 1980s and 1990s, by performing similar techniques on computer networks around the world. Mitnick’s more notorious crimes included accessing computer systems at the Pentagon and the North American Defense Command (NORAD), and stealing software and source code from major computer manufacturers. Kevin Mitnick was arrested six times. He has been working as a consultant, specializing in social engineering techniques, having gone straight after serving a five-year sentence for his most recent crime. He has authored several books regarding social engineering, including The Art of Intrusion and The Art of Deception.
Create a 2- to 3-page report in a Microsoft Word document that includes responses to the following:
• Analyze what procedures could help prevent a similar breach of security at your organization.
• Phishing (the practice of luring unsuspected Internet users to fake Web sites by using authentic looking email) is usually associated with identity theft. Analyze whether this tactic could also be used to gain information needed to circumvent security controls. Why or why not?
• Many social engineering breaches involve using what is believed to be insider information to gain the trust of individuals in an effort to obtain confidential information. Test your ability to obtain what some might consider insider information using a search engine to find contacts or other useful information referencing your organization. Report your findings.
Part 2: Case Study 2: Textbook Chapter 5: “Network Security”
A recent network security breach at Tucson, Arizona–based CardSystem Solutions Inc. has exposed 40 million credit card customers to possible fraud, and is considered one of the largest card-information heists ever. CardSystem Solutions admitted that it improperly stored consumers’ data in its system. So possibly, the hackers apparently took advantage of network vulnerability in one or more of its systems. CardSystem is a third-party processing facility, which performs back office processing for MasterCard as well as several other banks and credit unions. Companies such as CardSystem perform payment processing, but need not store data for future use. Therefore, the incident calls into question the sloppy handling of customers’ personal information as well as lapses in security measures.
The thieves apparently installed scripts that allowed them to download the customer information. It is also unclear how long the information was being viewed or downloaded for fraudulent purposes. Proper auditing would have detected such an event in its earliest stages. But the security breach was apparently detected by MasterCard after they noticed fraudulent activity on their customer accounts. Some credit card companies have been mailing letters to the affected customers, but many do not automatically replace the cards unless a customer requests a replacement. It is uncertain whether or not the cost of lost customer goodwill will be associated with the mistake for CardSystem. But having your best customers inform you of a breach in trust of this magnitude could be devastating.
Companies such as CardSystem solutions are not explicitly covered under any federal regulation to ensure they are in compliance with security best practices. Therefore, this is going to fuel further debate for more stringent and wide-sweeping legislation. The Gramm-Leach-Bliley Act was designed to cover financial institutions and gives the Federal Trade Commission the power to enforce security guidelines, but third-party processing firms are not bound to any security guideline except by contractual agreement. However, in light of the recent security breaches, there are already calls to include any entity that’s dealing with sensitive financial information under the Gramm-Leach-Bliley Act to ensure compliance with security best practices.
• Describe a layered security approach that would prevent easy access to the information stored on CardSystem’s servers.
• Explain what measure could have allowed earlier detection of fraudulent activity, and aided in the investigation and why?
• Analyze what could have prevented a program being installed that allowed access to customer files.
• Describe the difficulty in adapting legislation to meet emerging business models in the information age.
Part 3: Ad-Ware and Forensics
Based on your learning of this week, respond to the following:
• Imagine that your computer has been infected with an Ad-Ware. You systematically follow steps to remove the Ad-Ware. You have used commercially available antispyware software, but to no avail. Discuss what may be wrong and what further steps you can possibly take to ensure complete eradication.
• Scan the popular press for computer crime cases. Gather information on the kinds of evidence that was collected, its usefulness in apprehending the culprit, and emergent problems and concerns, if any. Draw lessons and present best practices for computer forensics.
Part 4: Research Case Study
Using the Argosy University Online Library and the Internet, provide a significant case study that reports about one of the issues discussed during the course. Ensure that, if you wish to deviate from the topics discussed, the overall direction of the material still fits under the greater umbrella of computer security. The case study can be from a peer-reviewed journal or from a textbook. Try to find something close to your area of interest professionally. This will help you act as a computer security expert. After successfully providing a case study, create a report that includes:
• A short introduction to the case study.
• A set of five questions designed by you, highlighting the key points discussed in the case study.
• Answers to the questions you designed, explaining the key points of your interest for this particular case.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Business Analysis and System Recommendation (BA&SR)

Stage 4: System Recommendation and Final BA&SR Report | Complete Solution
Paper , Order, or Assignment Requirements

Before you begin work on this assignment, be sure you have read the Case Study, and reviewed the feedback received on your Stage 1, 2 and 3 assignments. Refer to the Business Analysis and System Recommendations (BA&SR) Table of Contents below to see where you are in the process of developing this report.
Overview
In this Stage 4 assignment, you will identify an enterprise hiring system for CIC and explain how it meets the requirements, and what needs to be done to implement the system within CIC. In addition, you will provide a complete final BA&SR Report incorporating feedback from earlier stages.

Business Analysis and System Recommendation (BA&SR) Table of Contents

I. Background and Organizational Analysis (Stage 1)
A. Introduction
B. Organizational Strategy
C. Components of an Information System
1. People and Technology
2. Processes
3. Data/Information
II. Strategic Use of Technology (Stage 2)
A. Decision Making
B. Communication
C. Collaboration
D. Relationships
E. Structure
F. Competitive Advantage
III. Strategic and Operational Outcomes (Stage 3)
A. Strategic Outcomes
B. Process Analysis
C. Requirements
IV. System Recommendation (Stage 4)
A. Benefits of an Enterprise Solution
B. Proposed IT Solution
C. How the Proposed IT Solution Meets the Requirements
D. Implementation Steps
E. Conclusion
Assignment
The first step is to incorporate the feedback you received on your Stage 3 assignment, making any needed corrections or adjustments. (If you have not incorporated the feedback from your Stage 1 and Stage 2 assignments, you should do so prior to submitting Stage 4.) For this assignment, you will add Section IV to Sections I, II and III, as outlined below. This assignment requires a complete BA&SR document with revisions made as needed based on the Stage 1, 2, and 3 project submissions and feedback. Note: This is a specific grading criteria in the rubric.
Section IV of the Business Analysis and System Recommendation will propose an IT solution to meet CIC’s organizational strategy and meet its operational needs. In Section IV, you will also Identify and explain the high-level steps that will need to take place in order to implement the system you have proposed.
Using the case study and the outline and resources listed below, develop your Section IV – System Recommendation. Approximate lengths for each section are provided as a guideline; be sure to provide all pertinent information.
IV. System Recommendation
A. Benefits of an Enterprise Solution: Explain what an enterprise system solution is in general (one paragraph) and how such a system would help CIC (one paragraph). (Two complete paragraphs in total) Note: Enterprise solutions are not the same as ERP applications.
B. Proposed IT Solution: There are many SaaS HR systems available. Conduct some research on the web (using the search term “SaaS HR system”) and identify a system that will support and improve the hiring process at CIC and that meets the requirements you listed in Section III -Strategic and Operational Outcomes (the Stage 3 Assignment). Be sure to evaluate potential solutions to align with the needs of CIC. Identify the vendor and the system you selected. (One paragraph)
C. How the Proposed IT Solution Meets the Requirements: Using the 10 requirements you listed in your Stage 3 assignment (and incorporating any feedback you received), you will now explain how the solution you have chosen fulfills these requirements.
First, insert an introductory opening sentence for this section. Then copy the entries for the 10 requirements into the Requirements column from the table in Section III (Stage 3 Assignment). Complete the table by providing the explanations of how the system you selected meets each requirement. (Provide an introductory sentence and copy the table and insert information within.)
Req.
Number Requirement
(from Requirements table in Section III) Explanation of How the Proposed System Meets the Requirement
U-1
U-2
U-3
U-4
UR-1
SS-1
SS-2
SP-1
SP-2
SP-3
D. Implementation Steps: First, insert an introductory opening sentence for this section. Then address each of the 7 implementation areas below by addressing the questions provided and identifying appropriate implementation steps. Label each paragraph with the area being addressed for clarity. (one paragraph for each item)
Implementation Areas:
1. Vendor agreement – What does CIC need to do to be able to start using the system? How much will it cost to use the system? [web research and vendor information]
2. Hardware and telecommunications
a. What hardware will CIC need to have to implement the solution? [Chapter 2; vendor information]
b. What kind of telecommunications will be needed for the solution, including local connectivity inside CIC and Internet access?
3. Configuration
a. What options does the vendor offer for configuring the off-the-shelf system to CIC’s needs? [vendor information]
b. How will the configuration be done and by whom?
4. Testing – How will CIC test the system to see if it is working properly for its needs? Choose one of the ten requirements in Requirements (Section C) above and explain how this will be tested to ensure it is working properly and the requirement is met.
5. Employee preparation – Identify what CIC will need to do in each of the following areas to prepare the employees (including the hiring managers) to use the new system:
a. Leadership (2-3 sentences)
b. Change Management (2-3 sentences)
c. Training (2-3 sentences
6. Data migration – What existing data would need to be entered into the system to get started, and how might this be accomplished?
7. Maintenance – Who will provide updates and corrections to the system?
E. Conclusion: Close your Business Analysis and System Recommendation with a brief summary of the key points including the benefits CIC can expect to gain from this solution and the alignment with strategic objectives. (One well-written paragraph).
NOTE: This final submission should be a cohesive Business Analysis and Systems Recommendation Report for the CIO of Chesapeake IT Consulting. Sections I, II and III should have been updated to reflect substantive feedback received during the grading process. The formatting should be consistent throughout the document, and the writing should flow well from beginning to end. Headings, numbering, and footers should be correct for a final submission. Although you prepared this in stages, the final product should not seem to be piecemeal or disconnected.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Network Design Paper: assess UMUC’s technical requirements.

UMUC CMIT 265 Network Design Paper | Part 1 Part 2 Part 3
Paper , Order, or Assignment Requirements

I. Network Design

A. Network Topology

Technical Requirements

In this section, you will assess UMUC’s technical requirements. Use the information provided in the scenario to analyze the need for network topology, cables and connectors, networking and internetworking devices, wide area networking design, and computer systems. If you need more information, feel free to ask your instructor or make some assumptions. If you make assumptions, be sure to list them. This section should be used to describe the technical requirements of the task at hand. That is, you will be making explicit the requirements as you understand them, which will lead to the next section (your proposed solution).

Example (Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)

Secure Network Contractors believes that students and faculty health, well¬being, and morale have a significant impact on the learning experience and productivity of the academic institution. Secure Network Contractors understands the following technical requirements. The university has invested in a new building that will bestow an academic ambience while providing students and faculty a world class research and learning environment. The university has hundreds of Faculty that teach and perform research within the new academic building. Faculty should be able to seamlessly transition between the newly leased building, and other buildings on the UMUC campus. Students will be required to have a similar experience as classes take place in multiple buildings across campus each day. Faculty and students will be required to print regardless of location, and therefore needs shared printing resources. All computers should be able to communicate, but the human resources department should operate on a separate network due to the sensitive and personally identifiable information they handle. We understand that the newly leased building will need to wirelessly communicate with other buildings on campus, and we will address this in the Wide Area Network (WAN) section that follows. Etc. (students should continue to explain the technical requirements).

Proposed Topology

Select one or more topologies to use for this design (i.e., star, bus, mesh, ring, and please note that the star topology is the most commonly used). This section should be used to provide the details of your proposed solution. Be specific and include the model, manufacturer, features, and cost of devices where appropriate. Students should include a visual representation of the topology selected. Topologies can be created using Microsoft Visio, or you can create a free account at draw.io (https://www.draw.io) and create diagrams. Be sure to review the types of topologies and highlight the benefits and drawbacks for each.

Example (Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)

Secure Network Contractors believes that from a comparison of all the types available a ring topology is the best solution based on the requirements described by the University of Maryland University College (UMUC). We believe a ring topology satisfies the requirements of forming a single, continuous pathway for data to be transmitted through each node. A ring network topology in where each node connects to exactly two other nodes. A node on a network can be considered a computer, laptop, printer, or mobile device. Each node has a unique network address, which is referred to as the Media Access Control (MAC) address. The MAC address provides… Etc. (students should continue to explain their proposal).

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the technical requirement you made explicit in aforementioned paragraph.

Example (Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)

Secure Network Contractors believes that a ring topology is the best solution based on the requirements described by the University of Maryland University College (UMUC). Specifically, the requirement that data flows in one direction, reducing the chance of packet collisions. The ring topology reduce the need for network servers because they are not needed to control network connectivity between each workstation. Etc. (students should continue to explain their proposal).

B. Cables and Connectors

Note: (Students shouldconsider the needs for both a wired and wireless implementation as your proposal should include both.)

Technical Requirements

In this section, you will assess UMUC’s technical requirements related to cables and connectors. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Cables and Connectors

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to justify your proposed solution based on the technical requirements and assumptions., The justification should explain why you chose what you did and how it meets the UMUC’s goals for training and presentation to students

C. Networking and Internetworking Hardware

Technical Requirements

In this section, you will assess UMUC’s technical requirements related to networking and internetworking hardware. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Networking and Internetworking Devices

This section should be used to provide the details of your proposed LAN solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to justify your proposed solution based on the technical requirements and assumptions.

D. Wide Area Network (WAN) Design

Technical Requirements

In this section, you will assess UMUC’s technical requirements related to the Wide Area Network (WAN) design. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Wide Area Network (WAN) Design

This section should be used to provide the details of your proposed ISP solution, Be sure to cover what options are available through leased lines, metro Ethernet, and dedicated connections are based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to justify your proposed solution based on the technical requirements and assumptions.

E. Computer Systems Hardware

Technical Requirements

In this section, you will assess UMUC’s technical requirements related to the computer systems hardware for both classroom end points and servers as well as what would be needed for dedicated IT use. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Computer Systems Hardware

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to justify your proposed solution based on the technical requirements and assumptions.

II. Network Addressing and Security

A. Subnetting

Overview

Subnetting is a process of breaking a large network into small networks known as subnets. Subnetting happens when we extend the default boundary of the subnet mask. Basically, we borrow host bits to create networks (i.e., subnets).

We have been assigned the network address 192.168.2.0. Based on the chart below, we know this is a Class C address. This is determined by observing the first octet of the IP address, which is 192. This octet falls in between 192 and 223.

Class
Octet Decimal Range
A
1 – 126
B
128 – 191
C
192 – 223

Each class has a predefined default subnet mask that tells us the octets, which are already part of the network portion, as well as how many bits we have available to work with.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Define wastewater and provide an example of where wastewater originates in your community

Water and Waste
Paper , Order, or Assignment Requirements

Water is a seemingly abundant resource on the planet, but that perception would be incorrect. Although 70% of the Earth’s surface is covered by water, less than 1% of that is potable — fresh water that people can drink and water crops with. The rest is unusable with about 97% of it in the oceans, which are too salty for these purposes.

The average American uses about 100 gallons of water per day, depending on how you calculate water usage. The majority of that water is used in the bathroom for bathing and flushing toilets. In addition to the water used in homes, water used by businesses, industries, and storm runoff needs to be treated before it is released back into the environment. While nature can clean small amounts of wastewater, the billions of gallons of wastewater generated daily requires treatment plants. Once water has been treated it can be effectively released back into the environment without harmful effects to ecosystems and human health.

Review how wastewater is treated (the water that you send down the drain):

USGS (n.d.) What is Wastewater, and Why Treat it? Retrieved from https://water.usgs.gov/edu/wuww.html

In your posts this unit answer the following questions:

Define wastewater and provide an example of where wastewater originates in your community? Some common measures of water quality are contaminant nutrient levels (nitrates, nitrates, and phosphorus), temperature, turbidity, bacteria, pH, dissolved oxygen, and toxic substances. Choose a measure of water quality and provide an explanation of how this quality is measured for in water and what the allowable ranges are in the water supply. Review your local community, town, city, or state government’s website for information and policies on water conservation and wastewater treatment. You can also use the EPA site to learn about your local water. https://watersgeo.epa.gov/mywaterway/ Post at least one interesting fact that you learned in your research. Be sure to provide the resource for the information with your post. Lastly, describe the treatment process used to clean wastewater in order for it to be allowed back into the water cycle or reused. What is one way to now reuse non-potable wastewater? 200 WORDS

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Babycakes:Budget Planning and Control

Assignment: Budget Planning and Control
Paper , Order, or Assignment Requirements

Babycakes, a specialty bakery, is the company that will be considered for all parts of your budget planning and control report. For this assignment, you will develop a three to four (3 – 4) page paper in which you address the following.
1. Briefly discuss the ways a realistic budget will benefit the owner of Babycakes versus having no budget at all. Be sure to use Babycakes as the company and any specific product details in your explanation.
2. Prepare a sales budget for the LA Babycakes store for the 4th quarter of 2016. Present the number of units, sales price, and total sales for each month; include October, November, and December, and a total for the quarter. Use one-half of the Valentine’s Day sales as the basis for a usual day in the new quarter. Use 30 days for each month. Calculate the total sales for each month for October, November, and December.
3. Create three (3) new products, one (1) for each of the three (3) holiday seasons in the 4th quarter. Estimate the sales units, sales price, and total sales for each month. Describe the assumptions used to make these estimates. Include an overview of the budget in the report, presenting the actual budget as an appendix with all data and calculations. Add these amounts to your sales budget.
4. The owner of Babycakes is interested in preparing a flexible budget rather than the static budget she currently uses. She does not understand why, when sales increase, her static budget often shows an unfavorable variance. Explain how a flexible budget will overcome this problem. Use the details of your newly prepared budget for the 4th quarter of 2016 to address her concern.
5. Imagine that Babycakes is facing a financial challenge that is causing the actual amount of money that it spends to become significantly more than its budgeted amount. Include a discussion of your own unique cause of the overspending. Explain the corrective actions needed to address these challenges.
6. Integrate relevant information from at least three (3) quality academic resources in this assignment. Note: Please do not use your textbook as an academic resource. Also, Wikipedia and other Websites that are unreliable do not qualify as academic resources.
Your assignment must follow these formatting requirements.
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.
• An abstract is not required.
The specific course learning outcomes associated with this assignment are:
• Evaluate management control systems and examine their relationship with accounting and planning, including feedback and non-financial performance measurements.
• Evaluate decision-making tools for capital investments, budgeting, and budgeting controls.
• Analyze financial accounting tools and techniques that convert financial accounting data into information for decision making.
• Use technology and information resources to research issues in financial accounting for managers.
• Write clearly and concisely about financial accounting using proper writing mechanics.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

As an intern software developer for a retail bank, you have been tasked with developing use cases to support the ATM service.

Assignment 2 Use Cases Due Week 6
Paper , Order, or Assignment Requirements

As an intern software developer for a retail bank, you have been tasked with developing use cases to support the ATM service.

Prepare a 5-6 page paper in which you:
• Describe (in a one to two (1-2) page narrative) a use case, complete with typical and alternate courses, that documents the event of a bank customer withdrawing money from an ATM.
• Illustrate the use case using Visio or a similar product.
• Describe (in a one to two (1-2) page narrative) a use case dependency for making an account deposit. Illustrate this use case with Visio or a similar product.
• Describe (in a one to two (1-2) page narrative) a use case dependency for making an account transfer. Illustrate this use case with Visio or a similar product.
• Identify and explain at least one (1) ethical issue that the use case exposes in connection with the development or use of the ATM system.
• Research and cite at least three (3) authoritative academic sources.
The specific Course Learning Outcomes associated with this assignment are:
• Summarize the various requirements modeling techniques.
• Create a use case based on relating functional requirements.
• Analyze and articulate ethical, cultural, and legal issues and their feasibilities among alternative solutions.
• Use contemporary CASE tools in process and data modeling.
• Use technology and information resources to research issues in systems analysis and development.
• Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

21st Century Skills and Standards

Week#2 assignment
Paper , Order, or Assignment Requirements

21st Century Skills and Standards In this assignment, you need to think about 21st century support systems, the Common Core State Standards (CCSS), and International Society for Technology in Education Student (Links to an external site.)Links to an external site. (ISTE-S) standards and their relationship with quality instructional planning, delivery, and learner achievement. Using the Framework for 21st Century learning (Links to an external site.)Links to an external site. as a resource, you will redesign or modify a prior activity, such as a lesson plan or curriculum project, that you created in a prior course. The redesigned coursework need to be a representation of your mastery of the MAED program learning outcomes 5 and 7. This assignment will be uploaded to the course for evaluation and to your electronic portfolio (Pathbrite) (Links to an external site.)Links to an external site.. If you do not have previous projects to use in this assignment, please contact your instructor for guidelines on how to proceed. As needed, refer to the MAED Program Learning Outcomes (PLOs) listPreview the document.
Create your assignment to meet the content and written communication expectations below.
Content Expectations The Redesign expectations explain what you are required to do with the prior coursework you choose to redesign. The Summary expectations are for the separate written portion of this assignment.
Redesign – ISTE-S Standard (1 Point): Redesign a lesson plan or curriculum project that reflects a minimum of one ISTE-S standardPreview the document labeled with number, title, and objective(s). For example: Creativity and Innovation Apply existing knowledge to generate new ideas, products and processes. Redesign – Grade Level / CCSS Alignment (1 Point): Redesign a lesson plan or curriculum project that clearly labels a grade level and content specific CCSS (Links to an external site.)Links to an external site. (Math or English Language Arts) which is aligned with a minimum of one Core Subject and 21st Century Themes (Links to an external site.)Links to an external site. and a minimum of one Learning and Innovation Skill (Links to an external site.)Links to an external site., one Information, Media, & Technology Skill (Links to an external site.)Links to an external site., and evidence of at least one Life and Career Skill (Links to an external site.)Links to an external site.. Summary – Introduction/Conclusion (1 Point): In one paragraph, provide an introductory summary that concisely presents the scope and organization of the summary writing and a one-paragraph conclusion that summarizes the key points of your summary. Summary – Modification (2 Point): In one paragraph, summarize the changes you made to address ISTE- S, CCSS, and 21st Century Skills and how your activity addresses each. Explicitly state how your redesign assignment provides evidence of master of PLO’s 5 and 7. Summary – Evaluation (2 Point): In one paragraph, evaluate the appropriate 21st century support system components that align with your redesigned activity and, using examples, evaluate how each influences learner-centered instruction and the creation of a technology-enriched learning environment promoting learner achievement and innovations. 21st century support systems include: 21st century standards, assessment for 21st century skills, 21st century curriculum and instruction, and 21st century learning environments. Summary – Reflection (2 Point): In one paragraph, summarize your experience with the redesign in terms of challenges you encountered and how you overcame those challenges. Written Communication Expectations
Page Requirement (.25 points): Two to four pages, not including title and references pages. APA Formatting (.25 points): Use APA formatting consistently throughout the assignment. Syntax and Mechanics (.25 points): Display meticulous comprehension and organization of syntax and mechanics such as spelling and grammar. Source Requirement (.25 points): Reference three scholarly sources in addition to the course textbook. All sources on the references page need to be used and cited correctly within the body of the assignment.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Supporting Diversity Through 21st Century Teaching and Learning

Week#1 Assignment
Paper , Order, or Assignment Requirements

Supporting Diversity Through 21st Century Teaching and Learning This assignment re- introduces you to the framework of 21st Century Skills that you will consider each week as you work to redesign prior coursework for your ePortfolio. Note that a similar format is followed for each of the assignments in this course. You will upload this assignment to the course for evaluation and to your ePortfolio (Links to an external site.)Links to an external site. (Pathbrite).
Specifically, after reviewing the Framework for 21st Century Learning (Links to an external site.)Links to an external site., you will redesign or modify a prior assignment from one of your courses in the MAED program that represents your mastery of the MAED program learning outcomes 1, 2, and 3. An assignment you may want to redesign could be in the form of a lesson plan or teaching unit you previously created for a course. Your redesign of the assignment must show a representation of 21st-century learning through incorporation of student outcomes and support systems, which are defined as follows:
Student Outcomes: Learning and Innovations Skills (critical thinking, communication, collaboration, and creativity), Core Subjects 3Rs and 21st Century Themes, Information, Media, and Technology Skills, Life and Career Skills. Support Systems: Standards and assessments, curriculum and instruction, professional development, learning environments. When selecting an assignment to redesign, think about how the assignment should consider the diverse strengths, differences, cultures, and communities of students while offering a safe, collaborative, engaging, and inclusive learning environment. If you do not have previous work to use for this assignment, please contact your instructor for guidelines on how to proceed. As needed, refer to the MAED program learning outcomes (PLOs) listPreview the document.
Create your assignment to meet the content and written communication expectations noted below.
Content Expectations The Redesign expectations explain what you are required to do with the prior coursework you choose to redesign. The Summary expectations are for the separate written portion of this assignment.
Redesign – Outcomes (2 Points): Redesign of the lesson plan or teaching unit includes at least one component of the following 21st Century Student Outcomes: Core Subjects and 21st Century Themes, Learning and Innovation Skills, Information, Media, and Technology Skills, and Life and Career Skills. Redesign – Support Systems (1 Point): Redesign of the lesson plan or teaching unit includes at least one component of the following 21st Century Support Systems: 21st Century Standards, Assessment for 21st Century Skills, 21st Century Curriculum and Instruction, and 21st Century Learning Environments. Summary – Introduction/Conclusion (1 Point): A one paragraph introduction to the summary that concisely presents the scope and organization of the summary writing, as well as a one paragraph conclusion that recaps your summary’s key points. Summary – Modification (1 Point): For each revision, summarize in a paragraph how you revised the activity to address the components of 21st Century Student Outcomes and 21st Century Support systems. Explicitly state how your redesign assignment provides evidence of mastery of PLO’s 1, 2, and 3. Summary – Reflection (1 Point): In one page, reflect on your experience with the redesign in terms of challenges you encountered and how you overcame those challenges, including any difficulties experienced in revising to address the components of 21st Century Student Outcomes and 21st Century Support systems. Written Communication Expectations
Page Requirement (.5 points): Two to four pages, not including title and references pages. APA Formatting (.5 points): Use APA formatting consistently throughout the assignment. Syntax and Mechanics (.5 points): Display meticulous comprehension and organization of syntax and mechanics such as spelling and grammar.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"