PH.D Interview

 

Few more details for below questions to answer correclty about myself

1) Pursuing Master’s information systems security in university of cumberlands

2) Completed Master’s in information technology management from campbellsville university

3) Completed Master’s in Computer Science from Northwestern polytechnic university

4) Completed Undergraduate in computer science & engineering 

Academic Carrier 

1) Bachelor’s in computer Science Technology ( Jawaharlal Nehru Technological University Hyderabad)

Subjects: 

PROBABILITY AND STATISTICS, 

MATHEMATICAL FOUNDATION OF COMPUTER SCIENCE, DATA STRUCTURES THROUGH C++, 

DIGITAL LOGIC DESIGN, 

ELECTRONIC DEVICES & CIRCUITS

COMPUTER ORGANIZATION, 

DATA BASE MANAGEMENT SYSTEMS, 

OBJECT ORIENTED PROGRAMMING, 

ENVIRONMENTAL STUDIES, 

FORMAL LANGUAGES & AUTOMATA THEORY, DESIGN & ANALYSIS OF ALGORITHMS 

LINUX PROGRAMMING , SOFTWARE TESTING METHODOLOGIES, 

DATA WAREHOUSING AND DATA MINING 

COMPUTER GRAPHICS 

MOBILE COMPUTING 

DESIGN PATIERNS 

2) Master’s in Computer Science ( Northwestern Polytechnic University,Fremont,CA, USA)

Subjects: Data Modeling and Implementation Techniques, Java and Internet Applications, Advanced Structured Programming and Algorithms, UNIX/Linux Network Programming 

Network Analysis & Testing, Network Security i’undamentals and Computer Science Capstone Course 

3) Master’s in Information Technology Management (Campbellsville University, Louisville,KY,USA)

Subjects: 

Project Management,

Information System Infrastructure,Management Information Systems,Information System Security,

Team Management,

Negotiation and Conflict Mgt.

Current & Emerging Technology,

Disaster Recovery Planning,

Cyberlaw, Regulations, & Compliance, ITM Capstone

Presently Pursuing Subjects( University of cumberlands masters in Information Systems Security):

1) Access Control

2) Telecom Network Security

Current Job: Lead Software Engineer (Qlik)

Doctoral candidates should provide an authentic personal statement to each of the five following questions/prompts reflecting on their own personal interest. In the event that any outside resources are used, resources should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question/prompt. It is best to response to each prompt/question individually for clarity of the reviewer. Writing sample should be submitted in Microsoft Word format and include candidates name.

PhD IT

  1. Tell us about yourself and your personal journey that has led you to University of the Cumberlands.
  2. What are your research interests in the area of information technology? How did you become interested in this area of research?
  3. What is your current job/career and how will this program impact your career growth? 
  4. What unique qualities do you think you have that will help you in being successful in this program?
  5. How can obtaining a doctorate impact your contribution to the practices of information technology? Where do you see yourself after obtaining a doctorate from UC?
 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Week 5 – Discussion

Week 5 – Discussion

6969 unread replies.111111 replies.

Your initial discussion thread is due on Day 3 (Thursday) and you have until Day 7 (Monday) to respond to your classmates. Your grade will reflect both the quality of your initial post and the depth of your responses. Refer to the Discussion Forum Grading Rubric under the Settings icon above for guidance on how your discussion will be evaluated.

 When Should Mixed Methods Be Used?

Prior to beginning work on this discussion, read Chapters 1 and 2 of the Hesse-Biber e-book, Mixed Methods Research: Merging Theory with Practice, and the two required articles for this week. Mixed methods is a current popular methodology. While this type of methodology is useful for some studies, because of its dual nature as both quantitative and qualitative, it is not effective or appropriate for all research.

For this discussion, you will consider the use of mixed methods for the topic you have chosen for your Research Proposal. In your initial post, apply the scientific method to your research topic by defining your research question and determining the method(s) necessary to answer that question. Compare the characteristics and appropriate uses of the different methods and explain if your research question could best be answered through qualitative or quantitative methods, or a mix of both. Identify the dominant method (quantitative or qualitative) for your proposed study. Explain whether or not a mixed methods approach is the best way to study the topic, demonstrating that the second method is not added as an afterthought or merely to impress journal editors who favor mixed methods. If you have decided not to use mixed methods, explain why the study is best completed with either a quantitative or qualitative focus. Justify your design choice and support your position with scholarly sources. Include a discussion explaining how you would apply ethical principles to your design to address concerns which may impact your research.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Week 2 : Discussion

Week 2 – Discussion

6060 unread replies.102102 replies.

Your initial discussion thread is due on Day 3 (Thursday) and you have until Day 7 (Monday) to respond to your classmates. Your grade will reflect both the quality of your initial post and the depth of your responses. Refer to the Discussion Forum Grading Rubric under the Settings icon above for guidance on how your discussion will be evaluated.

 Problems in Designing an Experimental Research Study

Prior to beginning work on this discussion, please read the required articles by Skidmore (2008) and Henrich, Heine, & Norenzayan (2010). Carefully review the PSY635 Week Two Discussion ScenarioPreview the document. Apply the scientific method to the information included within the scenario and develop a null and a research hypothesis based on it. Using the hypotheses you have developed, compare the characteristics of the different experimental research designs discussed in the Skidmore (2008) article and choose the one that is most appropriate to adequately test your hypotheses. Identify potential internal threats to validity and explain how you might mitigate these threats. Apply ethical principles to the proposed research and describe the implications of this type of research in terms of the population(s) and cultural consideration(s) represented in the sample(s) within the scenario.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Week 3 – Assignment

Week 3 – Assignment

Research Methods Literature Review

Prior to beginning work on this assignment, review the qualitative and quantitative research designs encountered so far in this course.

For your literature review, you will select one design from each of the following categories.

Category

Non-experimental

Quantitative experimental

Qualitative

Mixed methods

Designs

Descriptive

Archival

Observational

Correlational

Survey research

Pretest-posttest control group

Posttest-only control group

Solomon four-group

Ethnography

Phenomenology

Grounded theory

Narrative

Participatory action research (PAR)

Explanatory

Exploratory

Triangulation

Parallel

Visit the Research Methods research guide in the Ashford University Library and search the databases for a minimum of one peer-reviewed journal article published within the last 10 years about each of the research designs you selected. The articles must not be research studies using the designs. Instead, they must be about how to conduct a study using the design. Examples of acceptable articles for this assignment are listed at the Suggested Articles tab in the Research Methods research guide.

In your paper, briefly outline the topic you selected for your Final Research Proposal in Week One and apply the scientific method by suggesting both a specific research question and a hypothesis for the topic. Evaluate your chosen peer-reviewed articles summarizing each and explaining how the research design described could be useful for designing original research on your topic. Compare and contrast the paradigms or worldviews inherent in the methodology associated with each research design. Apply professional standards and situate yourself as a researcher by identifying which of these approaches best fits with your worldview.

The Research Methods Literature Review

Must be four to six double-spaced pages in length (not including title and reference pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.).

Must include a separate title page with the following:

Title of paper

Students name

Course name and number

Instructors name

Date submitted

Must use at least four peer-reviewed sources published within the last 10 years.

Must document all sources in APA style as outlined in the Ashford Writing Center.

Must include a separate reference page that is formatted according to APA style as outlined in the Ashford Writing Center.

Carefully review the Grading Rubric (Links to an external site.) for the criteria that will be used to evaluate your assignment.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Cloud Computing Services

 

Compare and contrast two different cloud computing services (Amazon Web Service and Microsoft Azure). Explain the differences and the similarities and select your choice of providers if you had to make the decision for your business. Write up a comparison of the services offered (2 pages maximum). Once again, it is essential that you use your own words (do not just copy and paste from the Internet).

These two links may offer some additional information for this assignment but you are encouraged to use additional sources for your project/assignment.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Essay Writing_Threat Agents

 This assignment will be checked for plagiarism by the professor and this assignment should be a minimum of 600 words. Please find the below attachment and refer to chapter 5 to prepare the answer. And I need the answer by Saturday (02/08/2020). 

Question:

 

Using “Figure 5.4 AppMaker DFD with data types” as the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?

Note: Please find the attachment below for the answer. You need to refer to chapter 5 and particularly figure 5.4 for the answer.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Week 4 – Assignment

Week 4 – Assignment

Research and Critique a Qualitative Study

Prior to beginning work on this assignment, be sure to have read all the required resources for the week.

Locate a peer-reviewed qualitative research study in the Ashford University Library on the topic you chose in Week One for your Final Research Proposal. You may choose to use a qualitative study that was included in the literature review you used in the Week One assignment by searching the reference list for qualitative research studies on the topic. It is also acceptable to utilize a qualitative research study on your topic that was not included in your literature review.

Once you have located an appropriate qualitative study, identify the specific qualitative research design used. Summarize the main points of the study including information on the research question, sampling strategy, research design, data analysis method(s), findings, and conclusion(s). Evaluate the published qualitative research study focusing on and identifying the researchers paradigm or worldview and any evidence of reflexivity described in the report. Explain whether or not potential biases were adequately addressed by the researchers. Describe how the researchers applied ethical principles in the research study.

The Research and Critique a Qualitative Study

Must be three to four double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.).

Must include a separate title page with the following:

Title of paper

Students name

Course name and number

Instructors name

Date submitted

Must use at least one peer-reviewed source from the Ashford University Library in addition to those required for this week.

Must document all sources in APA style as outlined in the Ashford Writing Center.

Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.

Carefully review the Grading Rubric (Links to an external site.) for the criteria that will be used to evaluate your assignment.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Submissions Should Be A Maximum Of 500 Words Or 125 Words Per Question/Prompt

Tell us about yourself and your personal journey that has led you to University of the Cumberlands.

What are your research interests in the area of information technology? How did you become interested in this area of research?

What is your current job/career and how will this program impact your career growth? 

What unique qualities do you think you have that will help you in being successful in this program?

How can obtaining a doctorate impact your contribution to the practices of information technology? Where do you see yourself after obtaining a doctorate from UC?

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Wk 3 – Risk And Threat Assessment Report

Assignment Content

  1.    Your Smallville client has asked Gail Industries to investigate the exposure to external users doing transactions over the internet. As the Gail Industries IT manager, you must prepare the report for the executive leadership. Write as if to the client.

    Review the .

    Analyze risks and threats associated with operating systems, networks, and database systems.

    Write a 4- to 5-page report for the top management, including a 1-page executive summary. Include the following in your BUSINESS report:

    • Risk and threats associated with conducting transactions over the internet
    • Threats related to operating systems, networks, and system software
    • Risk related to different database deployment models in a distributed environment
    • Please note that all assignments are required to have a minimum of 3 references with in-text citations. If you are unsure of what is required, please ask well in advance. Use APA format guidelines.

      Note: You will address risk mitigation and provide recommendations in Week 4.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

The Role Of Scientist-Practitioners

Create a 10-12-slide presentation about the role of scientist-practitioners. Include the following in your presentation:

  1. A title page
  2. A description of the key knowledge, skills, and abilities of an effective scientist-practitioner
  3. A description of how research reports are an essential component for the scientist-practitioner
  4. A description of why data management and presentation are key components of research reports
  5. A reference page
  6. At least three scholarly sources
  7. Detailed speaker notes that represent what would be said if giving the presentation in person

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"