Data Modelling, Management and Governance-prepare and design a database management system for a sports club.

Data Modelling, Management and Governance

This assessment is an individual assignment and should include 2000 words. As part of assessment, it is required to prepare and design a database management system for a sports club. The detailed instructions are contained in the attached assignment brief.

What percentage of the managers knows about technology. What topic was the least or the most?

Experimental study of IT

Your job is to write a page report researching how much a manager knows about technology (material discussed in this course) and what should they know about technology.

One example would be to gather up to 10-20 resumes from the internet or from or other places.

You may select topics such as programming, web source code (HTML/JavaScript, web page design), IS application, E- commerce, ethics, privacy, security, database (access), spreadsheet, network and social Media.

Collect data, present the data with Excel and analyze the data. You may have a hypothesis that the manager should have 7 or more knowledge of IT topics.

Conclude your finding and give your own future direction for the managers.

In your report include your plan, how you have gathered the data, show the sample data, how you have organized the data, your analysis, and your final conclusion. For example what percentage of the managers knows about technology. What topic was the least or the most?

Cite a reference as how others have studied managers knowledge of information systems by resumes or any other techniques. (a good reference will get up to 10% extra point)

Write a minimum 3-page paper and draw a network diagram that will be inserted into your plan to present to your manager, who has a technical background, that details your plan and your timeline for implementation.

You have been hired as an experienced network engineer to design a network that will integrate SNMP, Netflow, and syslog to monitor network health. The wired network consists of five departments in a two-story building using IPv4 currently. Research and create a list of requirements for deploying SNMP, Netflow, and syslog into the network with minimal impact to users and customers. Including all three services into the network may require new IP addresses to be allocated. Make sure new IP addresses are listed in the requirements.

Write a minimum 3-page paper and draw a network diagram that will be inserted into your plan to present to your manager, who has a technical background, that details your plan and your timeline for implementation.

Make sure that:

1. Your plan includes equipment and configuration information.

2. Your plan is comprehensive and has one or more network diagrams that portray your plan.

3. Your plan includes your proposed network changes and a 2-sentence outage message that will be sent by a broadcast email to the affected users.

4. Your plan includes other concerns about this change and other departments that should potentially be contacted before the change.

5. Your plan contains an APA title page, running header, table of contents, abstract, and references page.

Parameters/Expectations:

In addition to the above criteria, please ensure the following:

1. The plan’s viewpoint and purpose should be clearly established and sustained.

2. The plan should follow the conventions of Standard English (correct grammar, punctuation, and spelling).

3. The plan’s writing should be well ordered, logical and unified, as well as original and insightful.

4. Current APA formatting and citation style should be followed.

Discuss how to conduct research and study of how much a manager knows about IT. For example topics include programming, web source code, database, knowledge mgmt, excel, etc.)

How to conduct a research, study of how much a manager knows about IT

1st paragraph ) Discuss how to conduct research and study of how much a manager knows about IT. For example topics include programming, web source code, database, knowledge mgmt, excel, etc.)

2nd Paragraph ) How to build an excel worksheet for payroll

Write down your thoughts and ideas about the security implications of incorporating this technology into the company’s operations, products, or services?What are the vulnerabilities or risks associated with this technology which could cause a loss of confidentiality, integrity, availability, etc.

Technology Selection Study Recommendation Paper

This assignment will be completed in two stages.

Stage 1: Post your draft of this paper no later than Sunday of Week 6 in the weekly conference for review and evaluation by your peers.

Stage 2: Using the feedback from your peers, revise and finalize your paper and then submit it for grading via your assignment folder.

Follow the instructions posted by your instructor regarding peer review and “best paper” voting.
For this paper, you will construct a recommendation to study and evaluate a specific technology.

To support your recommendation you will use information from either your Technology Review #1 or Technology Review #2.

Your sources which support your paper must have a publication date of 2017 or later, i.e. 2017, 2018, 2019, 2020, 2021.

GETTING STARTED

Choose one of your technology reviews (#1 or #2) and then use the authoritative sources from your bibliography to write a recommendation for study analysis for senior managers and executives.

These decision makers will be responsible for determining which emerging technologies or emerging applications of technologies will become part of the company’s portfolio of Internal Research & Development projects during the next budget cycle.

Since your paper is being submitted for the Cybersecurity Category you must make sure that you address cybersecurity requirements and considerations in your recommendation.

Write down your thoughts and ideas about the security implications of incorporating this technology into the company’s operations, products, or services?

What are the vulnerabilities or risks associated with this technology which could cause a loss of confidentiality, integrity, availability, etc.

Throughout your recommendation (see below), you must keep your focus upon the security posture of this technology and its applications (e.g. products or services built upon this technology or which incorporate this technology).

RECOMMENDATIONS FOR STUDY

Your focus in this paper must be upon identifying and presenting information from authoritative sources which supports a recommendation to select this technology for further study as part of an Internal Research & Development project (IR&D). Your recommendation should be based upon the following (at a minimum):

o characteristics (features and capabilities) of the technology

o interactions among the selected technology, people, environments, and processes (how will it be used; use cases if known)

risks or vulnerabilities associated with adoption of this technology

costs and benefits associated with adoption of this technology

Addressing Costs and Benefits: Do not tell the reader how much the technology will cost.

Discuss instead how much it might cost to SECURE this technology against cyber-attacks and/or how difficult it will be to deny criminals and terrorists the use of this technology.

WRITING YOUR PAPER

Your paper must provide the reader with an overview of the technology followed by information about the potential security risks and/or benefits of its use (the security posture ).

You MUST use information paraphrased from the papers found during your Survey of the Professional Literature (with appropriate in-text citations).

Your paper should be 5 to 7 pages in length (excluding the title page and references page).
Additional Information

1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your Technology Selection Study Recommendation paper should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper.

3. Your paper should use standard terms and definitions for cybersecurity.

4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.

5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count.

6. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.

7. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).

Conduct a project stakeholder meeting to determine the project scope, budget, and timeline for converting the company’s system to a cloud-based system. Include at least 4 milestones in your timeline.

Project Scope, Budget, and Timeline Stakeholder Meeting Role Play

Description

Role-play the following fictional scenario using the information in your Role Information document to ensure your group’s needs are met with the ultimate decision on the scope, budget, and timeline.

The C-suite at Intuit, Inc. wants to convert their system to a cloud-based system in a 12-month project with a budget of $1,000,000.

As either an IT team member or a c-suite level manager, you have been appointed to the Cloud-Based Applications Project Team.

Conduct a project stakeholder meeting to determine the project scope, budget, and timeline for converting the company’s system to a cloud-based system. Include at least 4 milestones in your timeline.

One person from the IT group should facilitate the conversation.

Complete the Project Plan Template and the Cost-Benefit Analysis spreadsheet.

The cost-benefit analysis spreadsheet contains two tabs.

The first tab allows you to input budget in each category.

The second tab will automatically transfer numbers from the first tab and calculate summary, accumulated cost, and accumulated benefit; and plot a graph.

The intersect point between the accumulated cost and accumulated benefit will give you a break-even period of the project.

Discuss the characteristics of Hierarchical, network and relational database models and present practical applications where each one might be more appropriate to use.

Data Modelling and SQL

Masks / Deliverables of the Assignment 1: Marks are awarded for producing a properly documented system that meets the requirements as specified below:

Task 1: Understanding of database
By relating your discussion to the above scenario where applicable.

1. Discuss the characteristics of Hierarchical, network and relational database models and present practical applications where each one might be more appropriate to use.

2. Compare the SQL databases and NoSQL databases. Your discussion should include the advantages, disadvantages, and limitations of each.
Task 2: Conceptual Modelling [20%]

1. Identity all the possible entities you can find in the problem scenario and list them in alphabetical order.

2. Using Crow’s foot notation, design a conceptual data model for the Jet-Arline database in a modelling tool of your choice. All entity types and the relationships between them must be clearly shown.

Your design should show all cardinality and participation constraints accurately.

Any enhanced features used (e.g. generalization/specialization) must be indicated.

Task 3: Logical Modelling [25%]

1. Discuss the principles of normalization and demonstrate using examples the steps you followed to achieve normal forms in relation to the given scenario.

Your demonstration must show the full process with explanations, starting from UNF, 2NF to 3NF (Note:

There is no requirement here to go through the full list of attributes in the data model for the Jet-Airline).

2 Produce an ERD with all the normalized entities containing the relevant attributes.

State any de-normalization, if any, in all your relations and dearly state the reasons for de-normalizing relations in your implemented solution.

3 Map an ER model devised above into a set of logical relations in the relational data model.

Does the critical path actually ensure project success?

Each student will prepare a research paper discussing, in depth, a subject related to one of the topics covered in the course.

The paper should be from 2,000 to 3,000 words in length (8-12 pages) and contain a separate title or cover page and separate pages for the list of reference sources.

The paper is expected to be authoritative, and based on at least 10 high-quality sources (i.e., no Wikipedia, newspaper, or web page citations allowed).

Use the UMGC library to find relevant journal or respected trade publication articles for your report.

The majority of reference sources should be from recent publications no older than five years.

Follow the APA format for the paper and for all citations, figures, tables, and the list of references. You may include in your paper any of the articles assigned as readings, as well as any other reference sources encountered during the course.

The style and content appropriate for an academic literature review can be seen in most scholarly journals found in peer-reviewed literature.

Most articles will contain a section called, Literature Review. Look over a few to get a feel for the general style of writing expected.

The report should exhibit graduate-level writing, in terms of grammar, punctuation, format, quality of analysis, coherence, insight, logical flow, and reasoning.

The paper is NOT an essay, how to, or opinion piece, it is to be a research report based fully on facts and data derived from appropriate sources in the literature.

Provide a reference citation for EVERY statement of fact you include in your paper.

Do NOT string together direct quotes from reference sources to create a narrative in the report. More than three quotes within the paper will be too many.

Write in your own words and include quote marks for ALL material copied from other sources.

Remember, a literature review tells what other experts and researchers have discovered, NOT what you know or think. Save your own opinions about what all the facts mean for the conclusion of the review.

1. Title page and Abstract of the paper (Style according to the rules of the APA format.)

2. Final paper (Containing 8-12 pages, double spaced, 12 point font, one inch margins on all sides)

3. References – List of every reference source cited in the paper (and only cited sources), entered in correct APA format. At least 10 sources should be listed and cited within the report.

Discuss how you have incorporated the appropriate time needed for the activities listed in order to steward the time for the project accordingly.Explain how a biblical point of view of stewardship with time will ensure minimization of cost; and

Company Description, Work Breakdown Structure, and Cost

Description

This Discussion Board will provide you and your classmates with a basic description and work breakdown structure for your chosen company. To complete the thread, you must meet all of the following criteria:

1. Provide a brief background of your chosen company (name, locations, etc.);

2. Develop an initial Work Breakdown Structure (WBS) in Microsoft Project for your Capstone Project. After your WBS has been created, briefly discuss how you have incorporated the appropriate time needed for the activities listed in order to steward the time for the project accordingly.

Explain how a biblical point of view of stewardship with time will ensure minimization of cost; and

3. Develop an initial cost estimation in Microsoft Project for your Capstone Project.

*Attached are examples*

Select an organization of your choice and research 5 of their most common vulnerabilities, threats, and risks:describe how the organization approached remediation and/or mitigation. Annotate those that were fixed or unable to be fixed.

Identifying and Mitigating Risks

Description

You have been learning about various vulnerabilities and their associated risks this week. Keep in mind that companies are not always able to fix all their discovered vulnerabilities.

Select an organization of your choice and research 5 of their most common vulnerabilities, threats, and risks.

Write a 2 – to 3-page recommendation on the steps the organization should take to remediate or mitigate these vulnerabilities, threats, and risks.

If you found actual examples of an organization’s vulnerabilities, risks, or threats, describe how the organization approached remediation and/or mitigation. Annotate those that were fixed or unable to be fixed.

Include impacts to the organization in terms of people, network, data, or reputation.

Cite references as necessary to support your assignment.

Format your citations according to APA guidelines.