database management systems

In 1981, Jim Grey introduced the ACID principle, which states that database management systems must ensure atomicity, consistency, isolation, and durability (particularly as it relates to transaction processing). This principle has guided the design of database management systems and support for transaction processing for decades. More recently, some database systems (particularly systems that are not based on the relational model and do not use SQL) have instead emphasized BASE (basically available, soft state, eventually consistent).

Discuss how each principle applies to life project. What advantages or disadvantages do you foresee when trying to apply the principles to projects? Which principle is more relevant and why?

N.B. Please add references.   

database

Describe a database for a system that you use either professionally or personally. This could be a database that you access directly or indirectly (such as the database at a store where you shop). Identify the social and ethical issues associated with that database. Are there unique privacy concerns or intellectual property concerns associated with the database? Recommend a solution to address these concerns.

241: Case Study Two Guidelines and Rubric Overview:

IT 241: Case Study Two Guidelines and Rubric Overview: This case study analysis is the second of two formative tasks that will support your understanding of the key course concepts of human behaviors that could potentially cause a security threat. These case study analyses will inform your approach for the milestone tasks and the final project. Prompt: Review the security policy template on the California Department of Technology website. For each of the six sections, summarize the content for the organization you have selected for the final project. Specifically, the following critical elements must be addressed:  Introduction: Provide a brief description of what this policy will state and why it is needed. State the security stance of your organization.  Roles and Responsibilities: Detail the specific responsibilities of each identifiable user population, including management, employees, and residual parties.  Policy Directives: Describe the specifics of the security policy.  Enforcement, Auditing, and Reporting: State what is considered a violation and the penalties for noncompliance. The violation of a policy usually implies an adverse action that needs to be enforced.  References: List all references mentioned in the policy, including organization standards, procedures, and government codes.  Control and Maintenance: State the author and owner of the policy. Describe the conditions and process in which the policy will be reviewed. A policy review should be performed on at least an annual basis to ensure that the policy is current. Guidelines for Submission: Your case study should be submitted as a three- to four-page Word document (in addition to the title page and references). Use double spacing, 12-point Times New Roman font, one-inch margins, and APA citation format. Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions. Critical Elements Proficient (100%) Needs Improvement (75%) Not Evident (0%) Value Introduction Accurately describes the policy Does not sufficiently describe the policy Does not describe the policy 10 Roles and Responsibilities Accurately details the specific responsibilities Does not sufficiently detail the specific responsibilities Does not provide the specific responsibilities 20 Policy Directives Sufficiently describes the specifics of the security policy Does not sufficiently describe the specifics of the security policy Does not describe the specifics of the security policy 20 Enforcement, Auditing, and Reporting Sufficiently states what is considered a violation and the penalties for noncompliance Does not sufficiently state what is considered a violation and the penalties for noncompliance Does not state what is considered a violation and the penalties for noncompliance 20 References Sufficiently lists all references Does not sufficiently list all references Does not list all references 10 Control and Maintenance Sufficiently describes the conditions and process in which the policy will be reviewed Does not sufficiently describe the conditions and process in which the policy will be reviewed Does not describe the conditions and process in which the policy will be reviewed 15 Articulation of Response Submission has no major errors related to citations, grammar, spelling, syntax, or organization Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas 5 Earned Total 100%

340 Milestone Two Guidelines and Rubric

IT 340 Milestone Two Guidelines and Rubric The final project for this course is the creation of network recommendations for a potential new office of the Newton Ad Agency. To help you succeed in this project, you will complete two final project milestones that provide the opportunity to draft key sections of the project. In Milestone One, you composed the first and second sections of the project, the introduction and the section on local area network (LAN) topology. Now, in Milestone Two, you will continue your work toward the final project by composing the next two sections of the final project. Section III focuses on the selection of an internet service provider, and section four focuses on hardware and software recommendations, printer configurations, and bandwidth. In this guide to Milestone Two, you will review the final project scenario involving Newton Ad Agency, review the prompt, consider the critical elements that your work should include, and study the rubric that will be used to assess your work. Final Project Scenario: The Newton Ad Agency is an advertising firm with offices in Austin, Texas; Minneapolis, Minnesota; and New York City, New York. The offices in Austin include a headquarters and a satellite office located two miles away in a rural area. The Austin headquarters is home to the executive team and 750 employees. The headquarters also stores the corporate data and is the corporate internet backbone. It hosts the IT department that centrally manages all LAN services, including the wireless LAN. The IT department also manages the wide area network (WAN) that connects all of the offices via site-to-site virtual private network (VPN) tunnels. The Minneapolis and New York offices host about 200 employees each. Approximately 50% of these employees are mobile (i.e., travelling more than 80% of the time). The New York office focuses on producing and disseminating large advertising media content to clients. For this reason, the New York office hosts the corporate media and web servers. The rural satellite office in Austin focuses on billboard ad designs and is connected to the corporate WAN with a wireless point-to-point bridge to the Austin headquarters data center. The rural office is home to 100 employees. To hire and retain the best talents, Newton Ad Agency allows employees to work from home. This removes the constraint that employees have to live within commuting distance from the firm’s offices. Remote and mobile employees are provided access to the corporate network via a VPN client. The VPN client requires employees to have access to reliable internet services to allow for effective collaboration across teams, and for access to media content. The company provides all employees with a laptop with full disk encryption, data loss prevention (DLP), and antivirus software. The IT department manages all corporate laptops and has the ability to log into all systems for support. This means that all laptops are centrally managed by the one IT department. Due to an increase in opportunities for expansion to new markets, Newton has embarked on an initiative to hire and train new college graduates to support the company’s Vision 2020 program. Vision 2020 focuses on global expansion. The initiative is to hire graduates into the marketing, finance, and IT departments. You were hired as part of the Vision 2020 program and have been working at Newton for some time now. You have spent a considerable portion of your time troubleshooting and analyzing the organization’s computer network to keep it running smoothly. Your direct supervisor and lead network administrator have been very impressed with your skills and fast learning abilities. In order to determine if you are ready to take on more responsibility, you have been asked for your input in regard to the new office location setup project. Newton is considering adding a new office and is exploring potential locations in Tacoma, Washington; Rochester, New York; or Fayetteville, North Carolina. Your task is to choose one of the possible locations and deliver a report to the team with key considerations and recommendations for the setup of the network infrastructure at the new office. This office will be home to 50 employees, including the new executive vice president of sales and marketing. All the possible sites have offices located on the third floor of an office building with access to fiber, cable, and T1 internet service providers. In addition to the standard network, the site must support live video teleconferencing calls with employees based at the other sites, as well as reliably send print jobs to billboard printers located in the satellite office in Austin. Prompt: Here is the prompt for the final project as a whole: How would you approach setting up the network at the location you have selected? What considerations are key in informing the systems and resources necessary to meet the organization’s needs and support the business goals and objectives? Keep in mind, however, that your work in Milestone Two involves only Sections III and IV of the final project. Therefore, for Milestone Two, the modified prompt is as follows: Explain key considerations for identifying an internet service provider for the new location and recommend the appropriate provider to match the business case. Then, address considerations and make recommendations regarding hardware and software selection, printer configurations, and bandwidth that address business needs. Specifically, the following critical elements must be addressed: I. Internet Service Provider (Note: This section is based on research into actual providers at the office location that you select) A. Explain key considerations for identifying an internet service provider for the new location. B. Compare at least two internet providers available in the location you have chosen in regard to speed, security, and reliability. Be sure to address how these specifics would impact business goals and objectives. C. Based on your analysis, determine the appropriate internet provider for this location to meet the business goals and objectives. Be sure to explain your reasoning. II. Additional Configurations: In this section, you will address the accompanying considerations for the network based on the needs of the new office location. A. Make appropriate hardware and software recommendations to meet the needs of the new office location. Be sure to explain your reasoning. B. Make appropriate printer configuration recommendations to meet the distance printing needs of the new office location. Be sure to explain your reasoning. In Milestone One, you selected an office location. Now, in Milestone Two, you will need to research internet service providers at that location. This will involve internet research. Be sure to cite your research in APA style. C. Make appropriate bandwidth and device recommendations to meet the teleconferencing needs of the new office location. Be sure to explain your reasoning. Rubric Guidelines for Submission: Your work must be submitted as a 1- to 2-page Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and APA formatting. Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions. Critical Elements Attempted With Minimal or No Functional Issue (100%) Attempted With Significant Functional Issues (75%) Was Not Evident in Submission (0%) Value Internet Service Provider: Key Considerations Explains key considerations for identifying an internet service provider for the new location Explains considerations for identifying an internet service provider for the new location, but explanation is cursory, illogical, or contains inaccuracies Does not explain key considerations for identifying an internet service provider for the new location 15 Internet Service Provider: Speed, Security, and Reliability Compares at least two internet providers available in the location chosen in regard to speed, security, and reliability, addressing the impact on business goals and objectives Compares at least two internet providers, but comparison is cursory, illogical, or contains inaccuracies Does not compare at least two internet providers 15 Internet Service Provider: Business Goals and Objectives Determines appropriate internet provider for the location to meet the business goals and objectives, explaining reasoning Determines internet provider for the location, but provider is not appropriate or explanation contains gaps in logic or accuracy Does not determine internet provider for the location 15 Additional Considerations: Hardware and Software Makes appropriate hardware and software recommendations to meet the needs of the new office location, explaining reasoning Makes hardware and software recommendations, but hardware and software is not appropriate or explanation contains gaps in logic or accuracy Does not make hardware and software recommendations 15 Additional Considerations: Printer Configuration Makes appropriate printer configuration recommendations to meet the distance printing needs of the new office location, explaining reasoning Makes a printer configuration recommendations, but printer configuration is not appropriate or explanation contains gaps in logic or accuracy Does not make a printer configuration recommendations 15 Additional Considerations: Bandwidth Makes appropriate bandwidth and device recommendations to meet the teleconferencing needs of the new office location, explaining reasoning Makes bandwidth and device recommendations, but bandwidth or devices are not appropriate or explanation contains gaps in logic or accuracy Does not make bandwidth and device recommendations 15 Articulation of Response Submission has no major errors related to grammar, citations, spelling, syntax, or organization Submission has major errors related to grammar, citations, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to grammar, citations, spelling, syntax, or organization that prevent understanding of ideas 10 Total 100%

TED video

Review this TED video about the rise of human-computer cooperation. What aspect of cooperation discussed in the video was of most surprise to you?

Describe some of the opportunities and benefits this capability provides to society, and also any potential risks you see in the use of this technology. Provide examples of the concept that you may interact with today

database

submit the legal and ethical considerations relative to the database and include a security plan that addresses the legal and ethical considerations. Articulate the relevant legal and ethical standards that need to be considered in your solution design and in future implementation. Determine the best practices in design, data use, and storage to ensure legal compliance. The regulations in place and the best practices for aligning operations will likely change depending on the type of industry in which your company resides. Support your conclusions with research support. Determine best practices in design,data use, and storage to ensure ethical operation of your company. These best practices will likely change depending on the industry in which your company resides. Support your conclusions with research support. In consideration of the type of organization you selected, the data used, and your consideration of legal and ethical standards, discuss the security needs of your DBMS solution.

N.B.

DBMS created is a sales and purchase inventory for a pawn shop.

Resources:

http://www.acm.org/about-acm/acm-code-of-ethics-and-professional-conduct
http://www.ieee.org/about/corporate/governance/p7-8.html
http://www.acm.org/about/se-code

final project.

Overview: Describe the company that you will discuss in your final project. The company must be a real organization. It can be an organization other than a business, such as a nonprofit organization, a higher education institute, a government agency, or a hospital. In addition to the company name, include the following information:

  • A summary of the organization’s main purpose, including the industry, the products or services, the primary customers, the size (annual revenue/budget), and the outlook for thefuture
  • Arepresentationoftheorganization’s mainfunctions(executive,sales,marketing,manufacturing,andsoon)
  • The number of employees (full- and part-time) and the extent of contractor use (on- andoff-site)
  • Thenumberandlocationofsitesasrelatedtofunction
  • Thetitlesofthepeopleyouplantoinviteto thefinalpresentationpitch

Guidelines for Submission: Your submission should be no longer than two pages and should use double spacing, 12-point Times New Roman font, and one-inch margins. Use at least two sources, and follow APA citation style.

THE COMPANY I CHOOSE IS AMAZON

Critical Elements Proficient (100%) Needs Improvement (75%) Not Evident (0%) Value
Main Purpose Provides a summary of the organization’s main purpose Main purpose summary is lacking in detail or is missing key components Does not provide a summary 20
Main Functions Provides a representation of the main functions Representation of main functions is lacking in detail or is missing key components Does not provide a representation of main functions 20
Number of Employees and Extent of Contractor Use Indicates the number of employees and the extent of contractor use Indicates the number of employees and the extent of contractor use, but there is a lack of detail, or key components are missing Does not indicate the number of employees or the extent of contractor use 20
Number and Location of Sites Provides the number and location of sites as related to function Provides the number and location of sites as related to function, but there is a lack of detail, or key components are missing Does not provide the number and location of sites as related to function 20
Titles Provides the full titles of all the people who will be invited to the presentation Provides titles of people who will be invited to the presentation, but there is a lack of detail, or key components are missing Does not provide the titles of the people who will be invited to the presentation 10
Articulation of Response Submission has no major errors related to citations, grammar, spelling, syntax, or organization Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas 10
Earned Total 100%

final project.

Overview: Describe the company that you will discuss in your final project. The company must be a real organization. It can be an organization other than a business, such as a nonprofit organization, a higher education institute, a government agency, or a hospital. In addition to the company name, include the following information:

  • A summary of the organization’s main purpose, including the industry, the products or services, the primary customers, the size (annual revenue/budget), and the outlook for thefuture
  • Arepresentationoftheorganization’s mainfunctions(executive,sales,marketing,manufacturing,andsoon)
  • The number of employees (full- and part-time) and the extent of contractor use (on- andoff-site)
  • Thenumberandlocationofsitesasrelatedtofunction
  • Thetitlesofthepeopleyouplantoinviteto thefinalpresentationpitch

Guidelines for Submission: Your submission should be no longer than two pages and should use double spacing, 12-point Times New Roman font, and one-inch margins. Use at least two sources, and follow APA citation style.

THE COMPANY I CHOOSE IS AMAZON

Critical Elements Proficient (100%) Needs Improvement (75%) Not Evident (0%) Value
Main Purpose Provides a summary of the organization’s main purpose Main purpose summary is lacking in detail or is missing key components Does not provide a summary 20
Main Functions Provides a representation of the main functions Representation of main functions is lacking in detail or is missing key components Does not provide a representation of main functions 20
Number of Employees and Extent of Contractor Use Indicates the number of employees and the extent of contractor use Indicates the number of employees and the extent of contractor use, but there is a lack of detail, or key components are missing Does not indicate the number of employees or the extent of contractor use 20
Number and Location of Sites Provides the number and location of sites as related to function Provides the number and location of sites as related to function, but there is a lack of detail, or key components are missing Does not provide the number and location of sites as related to function 20
Titles Provides the full titles of all the people who will be invited to the presentation Provides titles of people who will be invited to the presentation, but there is a lack of detail, or key components are missing Does not provide the titles of the people who will be invited to the presentation 10
Articulation of Response Submission has no major errors related to citations, grammar, spelling, syntax, or organization Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas 10
Earned Total 100%

nonprofit organization

You will describe the company that you will discuss in your final project. The company must be a real organization. It can be an organization other than a business, such as a nonprofit organization, a higher education institute, a government agency, or a hospital.

The company I choose is Amazon. Include citation and reference in your work.

Please review the attachment for more instruction

This case study analysis

Overview: This case study analysis is the first of two formative tasks that will support your understanding of the key course concepts of human behaviors that could potentially cause a security threat. These case study analyses will inform your approach for the milestone tasks and the final project.

Prompt: Identify three current security breaches. Using presentation software, create a slide for each of the breaches. In addition to indicating when each breach occurred, address the following critical elements on each slide:

  • The data that wascompromised
  • Theindividualsandorganizationsthatwereimpacted
  • Thehumanfactorsthatimpactedthebreachandwhetherthesuspectswereidentified
  • What is being done to mitigate futureoccurrences
  • Whatdamagecontrolmeasurestheimpactedorganizationisprovidingregardingthebreach

Guidelines for Submission: Include a title slide. Include at least one slide for each of the three breaches. Include all of the critical elements for each breach. On each slide, use the commenting feature to describe each breach in two to three paragraphs.

Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions.

Critical Elements Proficient (100%) Needs Improvement (75%) Not Evident (0%) Value
Compromised Data Accurately describes the data that was compromised Does not sufficiently describe the data that was compromised Does not describe the data that was compromised 15
Individuals and Organizations Accurately and sufficiently describes the individuals and organizations that were impacted Does not sufficiently describe the individuals and organizations that were impacted Does not describe the individuals and organizations that were impacted 20
Human Factors and Suspects Accurately and sufficiently assesses the human factors that impacted the breach and indicates whether the suspects were identified Does not sufficiently assess the humanfactors that impacted the breach or indicate whether the suspects wereidentified Does not assess the human factors that impacted the breach or indicate whether thesuspects were identified 20
Mitigation Efforts Sufficiently provides concrete examples of the efforts being undertaken to mitigate future occurrences Does not sufficiently provide concrete examples of the efforts being undertaken to mitigate future occurrences Does not provide examples of the efforts being undertaken to mitigate future occurrences 20
Damage Control Measures Accurately and sufficiently describes the damage control measures Does not sufficiently describe the damage control measures Does not describe the damage control measures 15
Articulation of Response Submission has no major errors related to citations, grammar, spelling, syntax, or organization Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas 10
Earned Total 100%

[