Describe how you identified options for handling challenges

Assignment Help Basic Computer Science
Reference no: EM13778704

1. Provide an overview of tasks and key work activities (meetings, training, presentations, etc.) in which you were engaged during the week, with sufficient detail for your instructor to understand what you were involved in.

2. How did the projects in which you were involved demonstrate your knowledge, skills, and abilities in meeting your selected program competencies?

3. Have you implemented any changes this week in your approach to interpersonal communication, collaboration, project/time management or other aspects as a result of your experiences from the prior week? (N/A for Week One)

4. Reflect on your experiences during the current week and:

a. Describe key challenges (problems, issues, etc.) you encountered during the current week

b. Describe how you identified/evaluated options for handling those challenges

c. Describe how you resolved/overcame the challenge(s)

d. What aspects of prior coursework and/or work experiences helped you in identify/evaluating options and developing resolutions?

e. Were there any aspects of the situation(s) - either the problems themselves or the resolutions/outcomes - that were contrary to your assumptions or expectations based on what you have learned during coursework?

f. What did you learn as a result of this experience? What might you do differently in future to either minimize the chance of occurrence or in your approach to resolving/overcoming?

Reference no: EM13778704

Questions Cloud

Discuss remote access domain best practices : 1. Discuss LAN-to-WAN traffic and performance monitoring and analysis. Discuss WAN confguration and change management. Discuss remote access domain best practices
Question regarding the reliability and validity : Write a 1,050-word paper describing observation and measurement as they relate to human services research.
Explain network security and remote access : Conduct an online web search on Network Security and Remote Access. Write a report which provides the following: 10 Network Security Requirements, at least 1 has to address Remote Access
What is your organizations culture concerning assessment : What is this organization's culture concerning assessment? Why is this organization's culture on assessment important to understand?
Describe how you identified options for handling challenges : Describe how you identified/evaluated options for handling those challenges. Describe how you resolved/overcame the challenge(s)
Describe the two parts of an ip address : Describe the two parts of an IP address. Provide a step-by-step description of how a packet is routed, assuming that it must traverse at least one router.
Organizational leadership issues : When appropriate, how can managers assist employees in controlling their emotions and moods in the workplace?
How information speaker used indicated awareness : Discuss how the information and/or language the speaker used indicated awareness of and/or sensitivity to diversity as it related to the topic.
What is 128-bit encryption : Most Web browsers now use "128-bit encryption" to exchange data with secure Web sites. But what does this mean. What is "128-bit encryption". In terms of software available to the general public, is "128-bit encryption" the strongest.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How procedure calls go before registers saved in memory

How deep can the procedure calls go before registers must be saved in memory? (That is, what is the maximum number of "active'' procedure calls that can be made before we need to save any registers in memory?)

  Write down the quintuple in the dfa

Write down the quintuple in the DFA.

  What are the similarities between risc and cisc

What are the similarities between RISC and CISC

  Is the java source filename extension

is the Java source filename extension? What is the Java bytecode filename extension?

  Largest positive octal number that can be stored in pdp-9

Data was stored in the PDP-9 computer using six-digit octal notation. Negative numbers were stored in 8's complement form. What is the largest positive octal number that can be stored in this machine?

  Address the benefits and disadvantage of unix@,linux@

Programmability - address the benefits and disadvantages of using UNIX® or Linux® versus Microsoft® Windows Server® within the organization, then propose one of the products

  Describe how project portfolio management

Describe how project portfolio management is used by IT departments

  What is the network address of the first network

Using slash notation, what is the network address of the first network?

  Describe the complexities of auditing a cloud computing

1. explain the role auditing plays in the context of achieving trustworthy systems. 2. explain the complexities of

  Find and install xeyes

Find and install xeyes. Write an xeyes command to display a window that is 600 pixels wide and 400 pixels tall is located 200 pixels from the right edge of the screen and 300 pixels from the top of the screen.

  What are the main disadvantages of hypermedia

What are the main disadvantages of hypermedia when compared with conventional media such as books and videos?

  Major information security threats

Write a 3-to 4-page paper on at least three major information security threats that a specific organization you choose faces today. This portion of the assignment should provide a foundation for the sections to be added in Weeks 3 and 4

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd