The Completion of the Spring 2017 Semester and the Beginning of the Summer 2017 Term

In the Regent University Spring 2017 term, I completed five undergraduate courses. Their course titles are Computer Architecture, Introduction to Information Systems, and Network & Telecommunication Concepts; and Data Structures & Algorithms; and Software Engineering. The mentioned courses involved learning my computer science major requirements, and them all quantifying as three-credit courses involved them scheduled as accelerated courses. In the Regent University College of Arts & Sciences, accelerated courses are equivalent in course load to fifteen-week courses for three-credits that are regionally accredited, but their duration is eight weeks. Thus, enrollment counselors and academic advisers typically suggest that I complete two three-credit courses per eight-week session. However, in my case, three completed in the second session of the Spring 2017 term because I seek completion of my undergraduate program by August. A couple Saturdays ago, I attended Commencement. Therefore, four courses remain in my academic program with anticipation for completing this program by the completion of the Regent Summer 2017 term.

Shaking hands with Dr. Morsen-Riano
Me shaking hands with Dr. Moreno-Riano, an honor.

For the Summer 2017, my courses mostly involve major requirements, though a recent introduction to the Regent University course catalog, Discrete Mathematics, is a general education requirement. My remaining courses are Mobile & Smart Computing, Linear Algebra, and Network Security. These mentioned courses will build on mathematical, computer science, and information systems skills. In addition, the Biblical integration required for every course challenges me as a student that I may consider the effects of applying my research to contemporary issues. Contexts of belief might be considered immaterial for results, but this is the distinction between theoreticians and Regent academic requirements based on the Biblical Scriptures. As the follower of Christ, James (KJV), said, “But be ye doers of the word, and not hearers only, deceiving your own selves” (1:22). Therefore, I should focus my computer science skills for a career based on ethics. There might be various spheres of knowledge in the world, but without seeing their applications, this knowledge are branches of logic without fruit or stagnant waters. In seeking software engineering as my career, I intend on learning cyber security at the graduate level so that I may understand mathematically scientific applications in contexts of ethical defensibility. As this is the case, I applied for admissions to the Regent University Masters of Science in Cybersecurity program, and Regent University approved my application for the Fall 2017 term.

Considering Business and Organizational Applications

As the latter half of the second week in the final Spring 2017 session transpires, studying the fundamentals of computer science and information systems enables future research opportunities. In my Networks & Telecommunication Concepts course, study topics expressed with descriptive brevity offers a challenge for interpretations because observations are expressed mathematically and empirically; essentially, a personal view can be accurate if and only if the observations are accurate. When learning a subject previously not understood from study, there is a requirement that trusting education material is acceptable. An introductory ethics course will probably offer information describing the aspects of the triple-sided argument: ethos, logos, and pathos. In the experience of this writer, mathematically scientific concepts require logic, yes, but in a world where every action is a choice, right bias thus a beneficial ethic is necessary. Further, emotional content being a part of life is a risk, but vision for improving from previous choices demands that the threat of emotional dysfunctionality be addressed for realizing opportunity.

With a particular relation to contemporary notions of emotional desensitization because of the exponential rate of information development is the threat of refracting on lessons learned rather than reflecting, so to speak; data received, but not processed with intentional vision threatens integrity in a way sort of similar to the Aristolean notion of recklessness as an extreme against the metric of virtue.  The Apostle Paul (KJV) said to the Colossians, “Beware lest any man spoil you through philosophy and vain deceit, after the tradition of men, after the rudiments of the world, and not after Christ” (2:8). In exposition to organizational risk assessment, a normative design of a system built for social integrity would involve a derivation model of data conceptually applicable to integration onto economically beneficial unstructured decisions; that normalizing discernment for an organization is encouraged. Thus, Software Engineering as well as Data Structures & Algorithms being the two additional courses for the session that this writer is enrolled in might enable accurate understanding for business and organizational solutions.