Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

art 5: Unit 5 (15 pts)

Part 6: Unit 8 (10 pts)


Open and answer the Lesson-08-Assessment
GRADED Activity: Midterm Examination
Content marketing can be a very hectic mess unless you organize it into clear
business
processes. Consider the following process:
The content writer takes up & finishes the first draft of an article. Includes
descriptions of any custom images that are to be used in the article
The marketer gathers influencer contact information, to be used for advertising
and marketing once the article is done
The editor proof-reads the article, makes points on grammar, style, spelling, etc.
The designer creates custom images as asked, sending them over to the content
writer
The writer takes the comments into consideration, fixes any mistakes, and adds
the images to the article
The SEO expert makes sure that the article meets the right optimization best
practices & publishes the article
The marketer uses a combination of advertising & email outreach to make sure
that the article is read.
Activity: Construct the business process diagram and apply the flowcharting process
discussed.
Note: This example is taken from: https://tallyfy.com/business-process/
Do the above activity using Word or write it in a short bond paper73
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or
transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written
permission of SLU, is strictly prohibited.
References

https://explorable.com/hawthorne-effect

https://methods.sagepub.com/book/key-concepts-in-social-research/n22.xml

https://online.visual-paradigm.com/diagrams/tutorials/use-case-diagram-tutorial/

https://sites.google.com/site/2012itcs371devsec3fuzzysystem3/3

https://www.investopedia.com/terms/c/click_and_mortar.asp

https://www.mbaskool.com/business-concepts/marketing-and-strategy-terms/2587-
click
only-companies.html

https://www.sciencedirect.com/topics/computer-science/sequence-diagram

https://www.slideshare.net/fajarbaskoro/systems-request

https://www.tutorialspoint.com/software_engineering/case_tools_overview.htm

https://www.visual
paradigm.com/support/documents/vpuserguide/2821/286/7114_drawingbusin.html

https://www.youtube.com/watch?
v=DMPxxijmG7M&fbclid=IwAR0hx6Uo4PSlgqmMmAO
eX4e_R6mq0s4nMw-iwcXUOiixRkvkHeWxK8UTQj8

https://www.youtube.com/watch?
v=rAR5sbaphwU&fbclid=IwAR3EXVa8Rag6iV8zFswXc
FhRFOB_FaiEa7QD6QMukGoyaiQ6cRLH30xiCtY

McCombes, S. (2020, January 13). How to Do a Case Study: Examples and
Methods.
Retrieved June 7, 2020, from https://www.scribbr.com/methodology/case-study/

NewLeaf. (2012). ROI or Payback Period? Retrieved June 7, 2020, from
https://newleaf
llc.com/2012/08/roi-or-payback-period/

Requirements Modeling. Part 1 https://www.youtube.com/watch?v=2t0ichoFHG8
Part
2 https://www.youtube.com/watch?v=1u5KQh_B1_U

ROSENBLATT, H. (2014) Systems Analysis and Design, 10th edition. Shelly
Cashman
Series. Cengage Learning

Top five causes of scope creep ... and what to do about them. A Guide to the Project
Management Body of Knowledge (PMBOK® Guide)—Fourth edition
https://www.pmi.org/learning/library/top-five-causes-scope-creep-6675
Final Requirement: Business Case
The details of the Business Case is found in GIT-BUSINESS-CASE ASSIGNMENT-
GUIDE
Final Requirement.pdf and RESEARCH DOCUMENT FOR GIT BUSINESS
CASE.pdf74
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or
transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written
permission of SLU, is strictly prohibited.

MODULE 3
With the internet being the center for acquiring information nowadays, and more and
more
systems being developed to suit the needs of different businesses, all of which make
use of the
internet as a medium for marketing and operations, there is a question of how the
security of
everyone is maintained. Having a singular tool used as a platform by different
business and
individuals alike has definitely made it easier for everyone to communicate and do
transactions.
But it has also made it easier for others to exploit the vulnerability of persons who are
not
knowledgeable about the risks of using the internet.
To start with this module, take some time to reflect on the following questions:
1.
Have you ever felt that your security is compromised while using the internet?
2.
Do you think you have done something that might have been illegal?
3.
Have you ever searched anything in Google and used it as part of one of your
outputs?
4.
Have you created anything that was used by someone else without your consent
Explore Activity
1.
Search for an example of an apparent cybercrime. From this example, give your
thoughts on
how you think that could have been prevented.
2.
Downloading files through the internet is rampant, whether legal or not. An example
of which
is downloading of movies, TV series, or animes via a torrent client. Currently, this is
an illegal
act, but authorities have little resources to stop this completely. Do you think this kind
of activity
must be stopped, or do you think this is something that must be accepted as legal?
Unit 09: Cybercrime Laws
Study the presentation named GIT Lecture 9 - Cybercrime Laws in the
Philippines.pptx
Cybercrime Prevention Act of 2012. The State recognizes the vital role of information
and
communications industries such as content production, telecommunications,
broadcasting
electronic commerce, and data processing, in the nation’s overall social and
economic
development. The State also recognizes the importance of providing an environment
conducive
to the development, acceleration, and rational application and exploitation of
information and
communications technology (ICT) to attain free, easy, and intelligible access to
exchange and/or
delivery of information; and the need to protect and safeguard the integrity of
computer, computer
and communications systems, networks, and databases, and the confidentiality,
integrity, and
availability of information and data stored therein, from all forms of misuse, abuse,
and illegal
access by making punishable under the law such conduct or conducts. In this light,
the State shall
adopt sufficient powers to effectively prevent and combat such offenses by facilitating
their
detection, investigation, and prosecution at both the domestic and international
levels, and by
providing arrangements for fast and reliable international cooperati

You might also like