Category: Information Systems

Database Modeling And Normalization

 

Imagine that you work for a consulting firm that offers information technology and database services. Part of its core services is to optimize and offer streamlined solutions for efficiency. In this scenario, your firm has been awarded a contract to implement a new personnel system for a government agency. This government agency has requested an optimized data repository for its system which will enable the management staff to perform essential human resources (HR) duties along with the capability to produce ad hoc reporting features for various departments. They look forward to holding data that will allow them to perform HR core functions such as hiring, promotions, policy enforcement, benefits management, and training.

Using this scenario, write a 34 page paper in which you:

  • Determine the steps in the development of an effective Entity Relationship Model (ERM) Diagram and determine the possible iterative steps/factors that one must consider in this process with consideration of the HR core functions and responsibilities of the client.
  • Analyze the risks that can occur if any of the developmental or iterative steps of creating an ERM Diagram are not performed.
  • Select and rank at least 5 entities that would be required for the development of the data repositories.
  • Specify the components that would be required to hold time-variant data for policy enforcement and training management.
  • Diagram a possible 1:M solution that will hold salary history data, job history, and training history for each employee through the use of graphical tools. Note: The graphically depicted solution is not included in the required page length.
  • Plan each step of the normalization process to ensure the 3NF level of normalization using the selected 5 entities of the personnel database solution. Document each step of the process and justify your assumptions in the process.
  • Diagram at least 5 possible entities that will be required to sustain a personnel solution. The diagram should include the following:
    • Dependency diagrams.
    • Multivalued dependencies.
    • Note: The graphically depicted solution is not included in the required page length.

Your assignment must follow these formatting requirements:

  • Paper should be typed, double spaced, using Times New Roman font (12-point), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, your name, your professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in a drawing tool with which you are familiar. The completed diagrams or charts must be imported into the Word document before the paper is submitted.

Week 5 CIS 515

 

Many legacy systems require normalization. Identify at least two factors that should be considered in order to produce an optimal normalized set of tables when performing normalization. Include in your discussion a detailed example on how each factor would eliminate data redundancy.

Optimal database design recognizes proper organization of table structures and relationships. Suggest at least two methods that can be used to improve the design of a database system

Module 5 Discussion

 Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences? If so, why; if not, why not. What factors typically influence the end-user decision to report (or not report) a potential incident?

I need 250 words of discussion and 250 words reply for attached document
 

Week 5

Prompt B: Technology Takes Sides

In a world of social networking, Instagrams, Twitter, Pinterest, instant messaging, and Facebook, technology can help spread the word. These networks can organize and mobilize individuals from around the globe, sometimes for political or humanitarian purposes. World perspectives on local events can help shape response, action, and policy. Have you used technology or social media to learn about or share information about an event?

In this Discussion you will analyze the role of technology in global events, using this weeks Learning Resources and Week 4 Notes and Readings.

To prepare for the Discussion:

Consider the following:

  • Do you follow people on Twitter?
  • Do you tweet, use Pinterest, Facebook, or instant message your friends? How often?
  • Revisit the Tweeting Towards Freedom article in thisweeks Notes and Readings.
  • Consider if there a downside to have so much access? Identify an example of how new communication technologies have had an impact on the world stage and the impact it made.
  • Consider how the immediacy of communication can impact the spread of information about world events-both good and bad.Post a response (at least 200300 words) to the following prompt:

Not long ago, we had to wait for the evening news or morning newspaper to find out what happened in the world. In todays technological world we have instantaneous access to global events. Some believe that the nature of instantaneous access to global events has strong political impact.

Select a current event happening in the world or your community. Describe the event, why you picked it, and explain how technology played a role in the way the news of this event spread. Discuss the benefits and downside of having so much access to local and world news.

Research Paper: Develop A Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

Be approximately four to six pages in length, not including the required cover page and reference page.

Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignment For 500 Words

 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course(Telecomm Network Security) have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Case Study

Read the RR Communications Case Study on pages 156-159 in the textbook. Answer Discussion Questions 1-3 at the end of the Case Study. Your responses must be complete, detailed and in APA format. 

Discussion Questions 1-3 are below

1. List the advantages of a single customer service center for RR Communications.

2. Devise an implementation strategy that would guarantee the support of the divisional presidents for the shared customer service center.

3. Is it possible to achieve an enterprise vision with a decentralized IT function?

Pages 156-159 are attached to this question.

700 to 900 word count.

Required Annotated Bibliography For Min 600 Words With Below Required Format

  

Search the web (Google Scholar) and find 6 peer-reviewed articles published since 2015 that relate to the topic of security architecture and design and construct an annotated bibliography. If you have never written an annotated bibliography, please use the link below for guidance. 

  /////////////////////////////////////////////////////////////////////////

Make sure to follow APA style. Please make sure your submission is a minimum of 600 words in length and meets the minimum APA formatting guidelines:

   12-pt, Times New Roman font

   Double-spaced

   1 margins on all sides

   Please provide a title page including your Name, Course Number, Date of Submission, and Assignment name.

   Paraphrasing of content Demonstrate that you understand the article by summarizing it in your own words. Direct quotes should be used minimally.

Short Essay

The FDA has proposed rules that would classify cigarettes as a medical device and thereby severely restrict the types of advertising that could be used. What forms and types of feedback would the tobacco companies have during the rule-making process by the FDA?

Assignment 6 (DR)

 Using a Web browser, search for incident response template. Look through the first five results and choose one for further investigation. Take a look at it and determine if you think it would be useful to an organization creating a CSIRT. Why or why not?