Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Assignment: When you respond to your peers, share additional resources that will help you and your classmates be successful

Assignment: When you respond to your peers, share additional resources that will help you and your classmates be successful

Computer Science

Assignment:

When you respond to your peers, share additional resources that will help you and your classmates be successful. What commonalities do you share with your classmates? What opportunities can you explore for collaboration and peer support?

PEER POST # 1

My name is Amanda and I am from NYC. I am pursuing a bachelors degree in Cyber security. I have no prior experience in the field because I wanted to be a teacher when I was younger. I decided to make the change 4 years ago and have been getting knowledge of cyber security from SNHU for the past 2 years. The only experience I have in project management or risk management would be from the classes I have taken online here at SNHU. Management is a great tool for projects in the computer science field, as well as in any other.

After reviewing the course outcomes risk management is an important part of IT. The execution is probably the main focus to manage these risks in a project. By understanding how to identify it right away and explaining it to others can be essential in your career. To be successful in this course by completing assignments, I will gain some experience in risk management. Also, I believe the course resources can help a lot.

PEER POST # 2

My name is Neal Roberts and I am currently pursuing my second degree information systems with a concentration in data analytics. I currently have a degree in computer science but I wanted to take it one step further and learn more about data analytics. I have encountered one thing to with mitigation and risk is a process within walmart for an associate to request a new software to be added to environment. This is done by fill our a form called an SMP. Then Security goes in and run risk analysis on the application to see what vulnerabilities it might have. In this course I hope to be able to gain a better understanding of the processes for mitigating risk and what is done when risk analysis is performed. This will give me a strong baseline for understanding the processes of protecting a business. In order to be successful in this course I will need a textbook/online resources to read and understand the topics. I will also need hands on learning by way of project that allow me to use risk analysis software.

Option 1

Low Cost Option
Download this past answer in few clicks

16.89 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE