{"id":9562,"date":"2022-05-20T18:01:49","date_gmt":"2022-05-20T18:01:49","guid":{"rendered":"https:\/\/highclasswriters.com\/blog\/?p=9562"},"modified":"2022-05-20T18:01:51","modified_gmt":"2022-05-20T18:01:51","slug":"fundamentals-of-information-technology","status":"publish","type":"post","link":"https:\/\/highclasswriters.com\/blog\/fundamentals-of-information-technology\/","title":{"rendered":"Fundamentals of Information Technology"},"content":{"rendered":"\n<p>Summative Assessment Outline:<br>Fundamentals of Information Technology<br>Competency Name: Fundamentals of Information Technology<br>Competency Statement: This competency is designed to promote a working knowledge and understanding of computer information<br>technology concepts, skills, and capabilities that support academic and professionally related goals and requirements. Students learn about the<br>application and science of information technology.<br>Summative Assessment Submission Title: Information Technology Plan<br>Competency Objectives:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Develop an understanding of the Internet and its impact on organizations.<\/li><li>Develop an understanding of how 1) Hardware, 2) Operating Systems, and 3) Databases work together to provide an effective<br>computing environment.<\/li><li>Develop an understanding of how Application System software supports decision-making in organizations by utilizing application<br>software (e.g. Microsoft Word, Excel and Access).<\/li><li>Develop an understanding of computer networks and the service they provide to organizations.<\/li><li>Develop an understanding of Information Security and its implications for organizations.<br>Program Learning Outcomes: PLO #4 &#8211; Technology: Apply technology to support decision making in businesses; leadership<br>Institutional Learning Outcomes: N\/A<br>Purpose of this Assessment<br>The purpose of this assignment is to demonstrate an understanding of how information technology can be implemented and used to support the needs of business<br>organizations.<br>Items Required for Submission<br>The item required for submission is an 11-16 page Information Technology Plan for Biggie Logistics.<br>Step ONE: Preparation<br>\u2022 To prepare for this assignment, read the case study here and consider the needs and circumstances of the organization in the study.<br>\u2022 After understanding the details presented, research credible academic resources to support the recommendations you will make in your Information<br>Technology Plan. Include at least five of these in the reference section of your Information Technology Plan, and cite them appropriately throughout your<br>paper.<br>Case Study<br>You have been hired as the new Chief Information Officer (CIO) for a large logistics company called Biggie Logistics. Biggie Logistics is moving its operations to<br>Ontario, Calif., so they can take advantage of access to the ports, rail, and freeway networks; and because the president, Mr. Big, likes the weather. The new<br>facility is a 20-acre campus of six large warehouses and a single two-story office building in the center of the campus, which will serve as the corporate office and<br>that will house Mr. Big and key company executives. Total staffing in the office building is expected to be between 50 to 100 people. The warehouse buildings are<br>100,000 to 200,000 square feet each, with only interior roof supports and four walls, all of which have loading doors.<br>Mr. Big is an important, successful businessman with a lot of street smarts. Unfortunately, he does not know much about technology and is counting on you to<br>explain in clear, common language what this technology stuff is all about. Since he never got around to going to college, he especially values academic research<br>to support recommendations made by his staff. During your initial meeting with Mr. Big, you learn of his particular areas of concern for the new operations center.<br>As CIO, Mr. Big is counting on you to set up the IT infrastructure at the new location.<br>Networks and Networking<br>Biggie Logistics needs staff to be able to communicate internally. In particular, Mr. Big would like answers to the following questions. Be sure to point out the best<br>solution, and show why other possibilities would not work as well.<br>\u274f What type of network infrastructure would allow the internal staff to receive email from each other?<br>\u274f What type of topology would you recommend for the network?<br>The Biggie Logistics new office building has Category 6 cabling for basic phone and network connectivity. Mr. Big explained that he is seeking your advice on how<br>to establish connectivity between the warehouses and the office building. Since disturbing the trucks coming and going is not an option, you have ruled out fiber<br>and twisted pair cabling connections.<br>\u274f What wireless solution will you recommend, and why? In this section of the Information Technology Plan, define the problem, limitations and constraints,<br>describe the recommendations and go through the alternatives and why you chose your solution. Make sure to cover the Wireless Network Topology<br>selection and provide a detailed discussion of Wireless Network Security.<br>Since Biggies Logistics is a U.S. government contractor, there are a couple of specific network security requirements for their campus, including: (1) it will be<br>required to provide confidential data security throughout the campus and (2) it will be necessary to implement a security program that will evaluate the privacy<br>and security risks and countermeasures associated with the various networking technologies used by Biggie Logistics.<br>\u274f Mr. Big wants to know how he can meet the government contractor \u201cconfidentiality\u201d contractual obligation. What will you recommend?<br>Mr. Big would also like you to outline a security program for Biggie Logistics. He would like details about the implementation plan regarding the key elements for<br>your security program.<br>\u274f What is important to consider as you make recommendations? Be sure to include Risk Assessment (risk matrix, ongoing process,<br>continuously\/regularly), Conduct Penetration Testing, and End User Education.<br>Computer Hardware, Software, and Databases<br>Currently, Biggie Logistics has no hardware, software, or databases. Mr. Big has asked for your recommendation regarding what the company should use. He<br>wants the selections to be scaled to the organization\u2019s projected size, and also be cost-effective to purchase, operate, and maintain.<br>\u274f What will you recommend, and why?<\/li><li>Please explain hardware form factors variations and make appropriate selections.<\/li><li>Discuss the types of software that you would recommend for Biggie Logistics.<\/li><li>Describe database differences and the selection methodology you used to select the appropriate database for the company.<br>Internet<br>Biggie Logistics will receive goods from all over the world, and will need to communicate with numerous vendors and suppliers over the Internet. Mr. Biggie<br>would like an explanation of the Internet and the technologies related to its effective use and communication. Naturally, Biggie Logistics plans to communicate<br>externally via email. Mr. Big would like to know what type of network device would allow his internal staff to connect to an Internet Service Provider and a web<br>based email hosting solution provider, so that they can receive email from customers.<br>\u274f What exactly is the Internet? Explain to Mr. Big what the Internet is, compare it to an internetwork, and explain the role of an ISP. Describe and provide the<br>function of a domain name, URL and browser. Finally, describe the domain name system (DNS) and the role the DNS hierarchy plays in the function of<br>the Internet.<br>\u274f What type of network device would allow his internal staff to connect to an Internet Service Provider and a web-based email hosting solution provider, so<br>they can receive email from customers? Identify the device and its two common names and describe its functions at the packet level.<br>Biggie Logistics has communications needs that span the globe, therefore it must ensure that it has the ability to communicate via the Internet and by phone,<br>regardless of damage caused by a natural disaster, such as a California earthquake.<br>\u274f Mr. Big wants your advice on how to set up an infrastructure for this potential communications challenge. What technology will you recommend?<br>Step TWO: Completing the Written Report<br>The written report must follow APA formatting and include the following sections. Each section should include the relevant heading:<br>A. Title Page<br>B. Introduction of the Information Technology Plan (1\/2 to 1 page)<br>C. Networks and Networking (4 to 5 pages)<br>D. Computer Hardware, Software, and Databases (2 to 3 pages)<br>E. Internet (3 to 5 pages)<br>F. Summary (1\/2 to 1 page)<br>G. References (1 page)<br>Step THREE: Complete Checklist for Submission<br>Before you submit, check to see if you believe you have met the criteria noted below.<br>Did you\u2026<br>\u00fc Provide an insightful and thorough analysis and presentation of all products and issues as they relate to the company? Did you make sure your<br>comparisons are clear and advantages are clearly defined and described?<br>\u00fc Demonstrate sophisticated understanding of all Information Technology issues?<br>\u00fc Develop a plan that demonstrates a sophisticated ability to integrate and synthesize materials from learning materials?<br>\u00fc Consistently and accurately recommend solutions to technology problems posed?<br>\u00fc Accurately and precisely integrate at least five references into the Information Technology Plan and provide well-documented in-text citations and a<br>reference page?<br>\u00fc Make sure your writing is logical and organized? Is your writing free of errors in grammar, spelling and writing mechanics? Is your report of the specified<br>length. Did you follow APA formatting throughout?<br>Step FOUR: Submit Your Work<br>\u2022 Your completed final assessment documents should be submitted through the Final Assessment page of your competency.<br>Scoring Rubric for Summative Assessment<br>Criterion EMERGING<br>(1)<br>DEVELOPING<br>(2)<br>PROFICIENT<br>(3)<br>EXEMPLARY<br>(4)<br>PLO: Analysis<br>Analysis of<br>Company Needs<br>Incomplete analysis of<br>all products and issues<br>as they relate to the<br>company.<br>Superficial analysis of<br>some of the issues as<br>they relate to the<br>company, and many<br>products are ignored and<br>not fully explained;<br>strengths and<br>weaknesses barely<br>identified.<br>Thorough analysis of<br>most of the products and<br>issues as they relate to<br>the company.<br>Comparisons are partially<br>provided and some<br>advantages are<br>presented.<br>Insightful and thorough<br>analysis and presentation<br>of all products and issues<br>as they relate to the<br>company. Comparisons are<br>clear and advantages are<br>clearly defined and<br>described.<br>Information<br>Technology<br>Issues<br>Demonstrates only<br>surface understanding of<br>Information Technology<br>issues.<br>Demonstrates partial<br>understanding of<br>Information Technology<br>issues.<br>Demonstrates adequate<br>understanding of all<br>Information Technology<br>issues.<br>Demonstrates sophisticated<br>understanding of all<br>Information Technology<br>issues.<br>Synthesis Develops a plan that<br>demonstrates a lack of<br>ability to integrate and<br>synthesize materials<br>from learning materials.<br>Develops a plan that<br>demonstrates a partial<br>ability to integrate and<br>synthesize materials from<br>learning materials.<br>Develops a plan that<br>demonstrates an<br>adequate ability to<br>integrate and synthesize<br>materials from learning<br>materials.<br>Develops a plan that<br>demonstrates a<br>sophisticated ability to<br>integrate and synthesize<br>materials from learning<br>materials.<br>Accuracy Rarely accurately<br>recommends solutions<br>to technology problems<br>posed.<br>Occasionally accurately<br>recommends solutions to<br>technology problems<br>posed.<br>Sometimes accurately<br>recommends solutions to<br>technology problems<br>posed.<br>Consistently and accurately<br>recommends solutions to<br>technology problems<br>posed.<br>PLO: Sources Integrates few or no<br>academic references<br>into the analysis.<br>Limited integration of<br>references into the<br>Information Technology<br>Plan and fails to cite all of<br>them appropriately.<br>Accurately integrates at<br>least five references into<br>the Information<br>Technology Plan with<br>citations.<br>Accurately and precisely<br>integrates at least five<br>references into the<br>Information Technology<br>Plan with well-documented<br>citations.<br>PLO: Writing and<br>Organization<\/li><\/ol>\n\n\n\n<p>Writing is not logical or<br>organized. Sentences do<br>not form a cohesive<br>whole and structure of<br>sentences is distracting<br>Writing lacks logical<br>progression or<br>organization. Sentences<br>are awkward and often<br>unclear. Word choice is<br>Writing is generally<br>logical and organized.<br>Sentences are wellphrased and varied in<br>length and structure.<br>Writing is logical and<br>organized. Sentences are<br>well-phrased and varied in<br>length and structure. Word<br>choice is consistently<br>and confusing to the<br>reader. Words are used<br>inappropriately. There<br>are several errors in APA<br>style, grammar, spelling<br>and writing mechanics.<br>The paper is shorter than<br>the specified length.<br>acceptable but range of<br>words is limited or lacks<br>precision. The writing has<br>errors which impact the<br>understanding of the<br>paper and cause a<br>distraction. The paper is<br>shorter than the specified<br>length.<br>Word choice is generally<br>precise and mostly<br>accurate. There are<br>occasional errors in APA<br>style, grammar, spelling<br>and writing mechanics.<br>The report is of the<br>specified length.<br>precise and accurate. The<br>writing is free of errors in<br>grammar, spelling and<br>writing mechanics. The<br>report is of the specified<br>length.. APA style usage is<br>flawless.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summative Assessment Outline:Fundamentals of Information TechnologyCompetency Name: Fundamentals of Information TechnologyCompetency Statement: This competency is designed to promote a working [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-9562","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Fundamentals of Information Technology - Highclasswriters<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/highclasswriters.com\/blog\/fundamentals-of-information-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fundamentals of Information Technology - Highclasswriters\" \/>\n<meta property=\"og:description\" content=\"Summative Assessment Outline:Fundamentals of Information TechnologyCompetency Name: Fundamentals of Information TechnologyCompetency Statement: This competency is designed to promote a working [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/highclasswriters.com\/blog\/fundamentals-of-information-technology\/\" \/>\n<meta property=\"og:site_name\" content=\"Highclasswriters\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-20T18:01:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-20T18:01:51+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/highclasswriters.com\/blog\/fundamentals-of-information-technology\/\",\"url\":\"https:\/\/highclasswriters.com\/blog\/fundamentals-of-information-technology\/\",\"name\":\"Fundamentals of Information Technology - Highclasswriters\",\"isPartOf\":{\"@id\":\"https:\/\/highclasswriters.com\/blog\/#website\"},\"datePublished\":\"2022-05-20T18:01:49+00:00\",\"dateModified\":\"2022-05-20T18:01:51+00:00\",\"author\":{\"@id\":\"https:\/\/highclasswriters.com\/blog\/#\/schema\/person\/06412d8249aafcb0c75ea9958c98aaae\"},\"breadcrumb\":{\"@id\":\"https:\/\/highclasswriters.com\/blog\/fundamentals-of-information-technology\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/highclasswriters.com\/blog\/fundamentals-of-information-technology\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/highclasswriters.com\/blog\/fundamentals-of-information-technology\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/highclasswriters.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fundamentals of Information Technology\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/highclasswriters.com\/blog\/#website\",\"url\":\"https:\/\/highclasswriters.com\/blog\/\",\"name\":\"Highclasswriters\",\"description\":\"Essay Writing Service\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/highclasswriters.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/highclasswriters.com\/blog\/#\/schema\/person\/06412d8249aafcb0c75ea9958c98aaae\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/highclasswriters.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/99ccb26aea1053c4c33c76cde1eee45f1ec58485d03e72c412d111c386e42174?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/99ccb26aea1053c4c33c76cde1eee45f1ec58485d03e72c412d111c386e42174?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/highclasswriters.com\/blog\"],\"url\":\"https:\/\/highclasswriters.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fundamentals of Information Technology - Highclasswriters","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/highclasswriters.com\/blog\/fundamentals-of-information-technology\/","og_locale":"en_US","og_type":"article","og_title":"Fundamentals of Information Technology - Highclasswriters","og_description":"Summative Assessment Outline:Fundamentals of Information TechnologyCompetency Name: Fundamentals of Information TechnologyCompetency Statement: This competency is designed to promote a working [&hellip;]","og_url":"https:\/\/highclasswriters.com\/blog\/fundamentals-of-information-technology\/","og_site_name":"Highclasswriters","article_published_time":"2022-05-20T18:01:49+00:00","article_modified_time":"2022-05-20T18:01:51+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/highclasswriters.com\/blog\/fundamentals-of-information-technology\/","url":"https:\/\/highclasswriters.com\/blog\/fundamentals-of-information-technology\/","name":"Fundamentals of Information Technology - Highclasswriters","isPartOf":{"@id":"https:\/\/highclasswriters.com\/blog\/#website"},"datePublished":"2022-05-20T18:01:49+00:00","dateModified":"2022-05-20T18:01:51+00:00","author":{"@id":"https:\/\/highclasswriters.com\/blog\/#\/schema\/person\/06412d8249aafcb0c75ea9958c98aaae"},"breadcrumb":{"@id":"https:\/\/highclasswriters.com\/blog\/fundamentals-of-information-technology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/highclasswriters.com\/blog\/fundamentals-of-information-technology\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/highclasswriters.com\/blog\/fundamentals-of-information-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/highclasswriters.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Fundamentals of Information Technology"}]},{"@type":"WebSite","@id":"https:\/\/highclasswriters.com\/blog\/#website","url":"https:\/\/highclasswriters.com\/blog\/","name":"Highclasswriters","description":"Essay Writing Service","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/highclasswriters.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/highclasswriters.com\/blog\/#\/schema\/person\/06412d8249aafcb0c75ea9958c98aaae","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/highclasswriters.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/99ccb26aea1053c4c33c76cde1eee45f1ec58485d03e72c412d111c386e42174?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/99ccb26aea1053c4c33c76cde1eee45f1ec58485d03e72c412d111c386e42174?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/highclasswriters.com\/blog"],"url":"https:\/\/highclasswriters.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/posts\/9562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/comments?post=9562"}],"version-history":[{"count":1,"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/posts\/9562\/revisions"}],"predecessor-version":[{"id":9563,"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/posts\/9562\/revisions\/9563"}],"wp:attachment":[{"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/media?parent=9562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/categories?post=9562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/tags?post=9562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}