In 1981, Jim Grey introduced the ACID principle, which states that database management systems must ensure atomicity, consistency, isolation, and durability (particularly as it relates to transaction processing). This principle has guided the design of database management systems and support for transaction processing for decades. More recently, some database systems (particularly systems that are not based on the relational model and do not use SQL) have instead emphasized BASE (basically available, soft state, eventually consistent).
Discuss how each principle applies to life project. What advantages or disadvantages do you foresee when trying to apply the principles to projects? Which principle is more relevant and why?
N.B. Please add references.
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 22:23:002019-06-30 22:23:00database management systems
Describe a database for a system that you use either professionally or personally. This could be a database that you access directly or indirectly (such as the database at a store where you shop). Identify the social and ethical issues associated with that database. Are there unique privacy concerns or intellectual property concerns associated with the database? Recommend a solution to address these concerns.
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
IT 241: Case Study Two Guidelines and Rubric
Overview: This case study analysis is the second of two formative tasks that will support your understanding of the key course concepts of human behaviors that
could potentially cause a security threat. These case study analyses will inform your approach for the milestone tasks and the final project.
Prompt: Review the security policy template on the California Department of Technology website. For each of the six sections, summarize the content for the
organization you have selected for the final project.
Specifically, the following critical elements must be addressed:
Introduction: Provide a brief description of what this policy will state and why it is needed. State the security stance of your organization.
Roles and Responsibilities: Detail the specific responsibilities of each identifiable user population, including management, employees, and residual
parties.
Policy Directives: Describe the specifics of the security policy.
Enforcement, Auditing, and Reporting: State what is considered a violation and the penalties for noncompliance. The violation of a policy usually implies
an adverse action that needs to be enforced.
References: List all references mentioned in the policy, including organization standards, procedures, and government codes.
Control and Maintenance: State the author and owner of the policy. Describe the conditions and process in which the policy will be reviewed. A policy
review should be performed on at least an annual basis to ensure that the policy is current.
Guidelines for Submission: Your case study should be submitted as a three- to four-page Word document (in addition to the title page and references). Use
double spacing, 12-point Times New Roman font, one-inch margins, and APA citation format.
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information,
review these instructions.
Critical Elements Proficient (100%) Needs Improvement (75%) Not Evident (0%) Value
Introduction Accurately describes the policy Does not sufficiently describe the policy Does not describe the policy 10
Roles and Responsibilities Accurately details the specific
responsibilities
Does not sufficiently detail the specific
responsibilities
Does not provide the specific
responsibilities
20
Policy Directives Sufficiently describes the specifics of the
security policy
Does not sufficiently describe the
specifics of the security policy
Does not describe the specifics of the
security policy
20
Enforcement, Auditing,
and Reporting
Sufficiently states what is considered a
violation and the penalties for
noncompliance
Does not sufficiently state what is
considered a violation and the penalties
for noncompliance
Does not state what is considered a
violation and the penalties for
noncompliance
20
References Sufficiently lists all references Does not sufficiently list all references Does not list all references 10
Control and Maintenance Sufficiently describes the conditions and
process in which the policy will be
reviewed
Does not sufficiently describe the
conditions and process in which the
policy will be reviewed
Does not describe the conditions and
process in which the policy will be
reviewed
15
Articulation of Response Submission has no major errors related to
citations, grammar, spelling, syntax, or
organization
Submission has major errors related to
citations, grammar, spelling, syntax, or
organization that negatively impact
readability and articulation of main ideas
Submission has critical errors related to
citations, grammar, spelling, syntax, or
organization that prevent understanding
of ideas
5
Earned Total 100%
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 22:03:152019-06-30 22:03:15241: Case Study Two Guidelines and Rubric Overview:
IT 340 Milestone Two Guidelines and Rubric
The final project for this course is the creation of network recommendations for a potential new office of the Newton Ad Agency. To help you succeed in this
project, you will complete two final project milestones that provide the opportunity to draft key sections of the project. In Milestone One, you composed the
first and second sections of the project, the introduction and the section on local area network (LAN) topology. Now, in Milestone Two, you will continue your
work toward the final project by composing the next two sections of the final project. Section III focuses on the selection of an internet service provider, and
section four focuses on hardware and software recommendations, printer configurations, and bandwidth.
In this guide to Milestone Two, you will review the final project scenario involving Newton Ad Agency, review the prompt, consider the critical elements that
your work should include, and study the rubric that will be used to assess your work.
Final Project Scenario: The Newton Ad Agency is an advertising firm with offices in Austin, Texas; Minneapolis, Minnesota; and New York City, New
York. The offices in Austin include a headquarters and a satellite office located two miles away in a rural area.
The Austin headquarters is home to the executive team and 750 employees. The headquarters also stores the corporate data and is the corporate
internet backbone. It hosts the IT department that centrally manages all LAN services, including the wireless LAN. The IT department also manages
the wide area network (WAN) that connects all of the offices via site-to-site virtual private network (VPN) tunnels.
The Minneapolis and New York offices host about 200 employees each. Approximately 50% of these employees are mobile (i.e., travelling more
than 80% of the time). The New York office focuses on producing and disseminating large advertising media content to clients. For this reason, the
New York office hosts the corporate media and web servers. The rural satellite office in Austin focuses on billboard ad designs and is connected to
the corporate WAN with a wireless point-to-point bridge to the Austin headquarters data center. The rural office is home to 100 employees.
To hire and retain the best talents, Newton Ad Agency allows employees to work from home. This removes the constraint that employees have to
live within commuting distance from the firm’s offices. Remote and mobile employees are provided access to the corporate network via a VPN
client. The VPN client requires employees to have access to reliable internet services to allow for effective collaboration across teams, and for
access to media content. The company provides all employees with a laptop with full disk encryption, data loss prevention (DLP), and antivirus
software. The IT department manages all corporate laptops and has the ability to log into all systems for support. This means that all laptops are
centrally managed by the one IT department.
Due to an increase in opportunities for expansion to new markets, Newton has embarked on an initiative to hire and train new college graduates to
support the company’s Vision 2020 program. Vision 2020 focuses on global expansion. The initiative is to hire graduates into the marketing,
finance, and IT departments.
You were hired as part of the Vision 2020 program and have been working at Newton for some time now. You have spent a considerable portion of your time
troubleshooting and analyzing the organization’s computer network to keep it running smoothly. Your direct supervisor and lead network administrator have
been very impressed with your skills and fast learning abilities. In order to determine if you are ready to take on more responsibility, you have been asked for
your input in regard to the new office location setup project.
Newton is considering adding a new office and is exploring potential locations in Tacoma, Washington; Rochester, New York; or Fayetteville, North
Carolina. Your task is to choose one of the possible locations and deliver a report to the team with key considerations and recommendations for the
setup of the network infrastructure at the new office. This office will be home to 50 employees, including the new executive vice president of sales
and marketing. All the possible sites have offices located on the third floor of an office building with access to fiber, cable, and T1 internet service
providers. In addition to the standard network, the site must support live video teleconferencing calls with employees based at the other sites, as
well as reliably send print jobs to billboard printers located in the satellite office in Austin.
Prompt: Here is the prompt for the final project as a whole:
How would you approach setting up the network at the location you have selected? What considerations are key in informing the systems and resources
necessary to meet the organization’s needs and support the business goals and objectives?
Keep in mind, however, that your work in Milestone Two involves only Sections III and IV of the final project. Therefore, for Milestone Two, the modified prompt is
as follows: Explain key considerations for identifying an internet service provider for the new location and recommend the appropriate provider to match the
business case. Then, address considerations and make recommendations regarding hardware and software selection, printer configurations, and bandwidth that
address business needs.
Specifically, the following critical elements must be addressed:
I. Internet Service Provider (Note: This section is based on research into actual providers at the office location that you select)
A. Explain key considerations for identifying an internet service provider for the new location.
B. Compare at least two internet providers available in the location you have chosen in regard to speed, security, and reliability. Be sure to address
how these specifics would impact business goals and objectives.
C. Based on your analysis, determine the appropriate internet provider for this location to meet the business goals and objectives. Be sure to explain
your reasoning.
II. Additional Configurations: In this section, you will address the accompanying considerations for the network based on the needs of the new office location.
A. Make appropriate hardware and software recommendations to meet the needs of the new office location. Be sure to explain your reasoning.
B. Make appropriate printer configuration recommendations to meet the distance printing needs of the new office location. Be sure to explain your
reasoning.
In Milestone One, you selected an office location. Now, in Milestone Two, you will need to research internet service providers at that location. This will
involve internet research. Be sure to cite your research in APA style.
C. Make appropriate bandwidth and device recommendations to meet the teleconferencing needs of the new office location. Be sure to explain your
reasoning.
Rubric
Guidelines for Submission: Your work must be submitted as a 1- to 2-page Microsoft Word document with double spacing, 12-point Times New Roman font,
one-inch margins, and APA formatting.
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information,
review these instructions.
Critical Elements Attempted With Minimal or No
Functional Issue (100%)
Attempted With Significant Functional
Issues (75%) Was Not Evident in Submission (0%) Value
Internet Service Provider:
Key Considerations
Explains key considerations for
identifying an internet service provider
for the new location
Explains considerations for identifying an
internet service provider for the new
location, but explanation is cursory,
illogical, or contains inaccuracies
Does not explain key considerations for
identifying an internet service provider
for the new location
15
Internet Service Provider:
Speed, Security, and
Reliability
Compares at least two internet providers
available in the location chosen in regard
to speed, security, and reliability,
addressing the impact on business goals
and objectives
Compares at least two internet
providers, but comparison is cursory,
illogical, or contains inaccuracies
Does not compare at least two internet
providers
15
Internet Service Provider:
Business Goals and
Objectives
Determines appropriate internet
provider for the location to meet the
business goals and objectives, explaining
reasoning
Determines internet provider for the
location, but provider is not appropriate
or explanation contains gaps in logic or
accuracy
Does not determine internet provider for
the location
15
Additional Considerations:
Hardware and Software
Makes appropriate hardware and
software recommendations to meet the
needs of the new office location,
explaining reasoning
Makes hardware and software
recommendations, but hardware and
software is not appropriate or
explanation contains gaps in logic or
accuracy
Does not make hardware and software
recommendations
15
Additional Considerations:
Printer Configuration
Makes appropriate printer configuration
recommendations to meet the distance
printing needs of the new office location,
explaining reasoning
Makes a printer configuration
recommendations, but printer
configuration is not appropriate or
explanation contains gaps in logic or
accuracy
Does not make a printer configuration
recommendations
15
Additional Considerations:
Bandwidth
Makes appropriate bandwidth and
device recommendations to meet the
teleconferencing needs of the new office
location, explaining reasoning
Makes bandwidth and device
recommendations, but bandwidth or
devices are not appropriate or
explanation contains gaps in logic or
accuracy
Does not make bandwidth and device
recommendations
15
Articulation of Response Submission has no major errors related
to grammar, citations, spelling, syntax, or
organization
Submission has major errors related to
grammar, citations, spelling, syntax, or
organization that negatively impact
readability and articulation of main ideas
Submission has critical errors related to
grammar, citations, spelling, syntax, or
organization that prevent understanding
of ideas
10
Total 100%
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 22:02:022019-06-30 22:02:02340 Milestone Two Guidelines and Rubric
Review this TED video about the rise of human-computer cooperation. What aspect of cooperation discussed in the video was of most surprise to you?
Describe some of the opportunities and benefits this capability provides to society, and also any potential risks you see in the use of this technology. Provide examples of the concept that you may interact with today
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 22:00:472019-06-30 22:00:47TED video
submit the legal and ethical considerations relative to the database and include a security plan that addresses the legal and ethical considerations. Articulate the relevant legal and ethical standards that need to be considered in your solution design and in future implementation. Determine the best practices in design, data use, and storage to ensure legal compliance. The regulations in place and the best practices for aligning operations will likely change depending on the type of industry in which your company resides. Support your conclusions with research support. Determine best practices in design,data use, and storage to ensure ethical operation of your company. These best practices will likely change depending on the industry in which your company resides. Support your conclusions with research support. In consideration of the type of organization you selected, the data used, and your consideration of legal and ethical standards, discuss the security needs of your DBMS solution.
N.B.
DBMS created is a sales and purchase inventory for a pawn shop.
Resources:
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
Overview: Describe the company that you will discuss in your final
project. The company must be a real
organization. It can be an organization other than a business, such as a
nonprofit organization, a higher education institute, a government agency, or a
hospital. In addition to the company name, include the following information:
A summary of the organization’s main
purpose, including the industry, the
products or services, the primary customers, the size (annual revenue/budget),
and the outlook for thefuture
Guidelines for Submission: Your submission should be no longer than
two pages and should use double spacing, 12-point Times New Roman font, and
one-inch margins. Use at least two sources, and follow APA citation style.
THE COMPANY I CHOOSE IS AMAZON
Critical Elements
Proficient (100%)
Needs Improvement (75%)
Not Evident (0%)
Value
Main Purpose
Provides a summary of the
organization’s main purpose
Main purpose summary is
lacking in detail or is missing key components
Does not provide a summary
20
Main
Functions
Provides a representation of the main
functions
Representation of main functions is lacking
in detail or is missing key components
Does not provide a representation of main
functions
20
Number of Employees and Extent of Contractor Use
Indicates the number of employees and the extent
of contractor use
Indicates the number of
employees and the extent of contractor use, but there is a lack of detail, or
key components are missing
Does not indicate the number of employees
or the extent of contractor use
20
Number and Location of Sites
Provides the number and location of sites
as related to function
Provides the number and location of sites
as related to function, but there is a lack of detail, or key components are
missing
Does not provide the number and location of
sites as related to function
20
Titles
Provides the full titles of all the people
who will be invited to the presentation
Provides titles of people who will be invited to the
presentation, but there is a lack of detail, or key components are missing
Does not provide the titles of the people
who will be invited to the presentation
10
Articulation of Response
Submission has no major errors related to
citations, grammar, spelling, syntax, or organization
Submission has major errors related to
citations, grammar, spelling, syntax, or organization that negatively impact
readability and articulation of main ideas
Submission has critical errors related to
citations, grammar, spelling, syntax, or organization that prevent
understanding of ideas
10
Earned Total
100%
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
Overview: Describe the company that you will discuss in your final
project. The company must be a real
organization. It can be an organization other than a business, such as a
nonprofit organization, a higher education institute, a government agency, or a
hospital. In addition to the company name, include the following information:
A summary of the organization’s main
purpose, including the industry, the
products or services, the primary customers, the size (annual revenue/budget),
and the outlook for thefuture
Guidelines for Submission: Your submission should be no longer than
two pages and should use double spacing, 12-point Times New Roman font, and
one-inch margins. Use at least two sources, and follow APA citation style.
THE COMPANY I CHOOSE IS AMAZON
Critical Elements
Proficient (100%)
Needs Improvement (75%)
Not Evident (0%)
Value
Main Purpose
Provides a summary of the
organization’s main purpose
Main purpose summary is
lacking in detail or is missing key components
Does not provide a summary
20
Main
Functions
Provides a representation of the main
functions
Representation of main functions is lacking
in detail or is missing key components
Does not provide a representation of main
functions
20
Number of Employees and Extent of Contractor Use
Indicates the number of employees and the extent
of contractor use
Indicates the number of
employees and the extent of contractor use, but there is a lack of detail, or
key components are missing
Does not indicate the number of employees
or the extent of contractor use
20
Number and Location of Sites
Provides the number and location of sites
as related to function
Provides the number and location of sites
as related to function, but there is a lack of detail, or key components are
missing
Does not provide the number and location of
sites as related to function
20
Titles
Provides the full titles of all the people
who will be invited to the presentation
Provides titles of people who will be invited to the
presentation, but there is a lack of detail, or key components are missing
Does not provide the titles of the people
who will be invited to the presentation
10
Articulation of Response
Submission has no major errors related to
citations, grammar, spelling, syntax, or organization
Submission has major errors related to
citations, grammar, spelling, syntax, or organization that negatively impact
readability and articulation of main ideas
Submission has critical errors related to
citations, grammar, spelling, syntax, or organization that prevent
understanding of ideas
10
Earned Total
100%
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
You will describe the company that you will discuss in your final project. The company must be a real organization. It can be an organization other than a business, such as a nonprofit organization, a higher education institute, a government agency, or a hospital.
The company I choose is Amazon. Include citation and reference in your work.
Please review the attachment for more instruction
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
Overview: This case study analysis is
the first of two formative tasks that will support your understanding of the
key course concepts of human behaviors that could potentially cause a security
threat. These case study analyses will inform your approach for the milestone
tasks and the final project.
Prompt: Identify three current security breaches. Using
presentation software, create a slide for each of the breaches. In addition to
indicating when each breach occurred, address the following critical elements
on each slide:
Guidelines for Submission: Include a title slide. Include at least
one slide for each of the three breaches. Include all of the critical elements
for each breach. On each slide, use the commenting feature to describe each
breach in two to three paragraphs.
Instructor Feedback: This activity uses an integrated rubric in
Blackboard. Students can view instructor feedback in the Grade Center. For more
information, review these instructions.
Critical
Elements
Proficient (100%)
Needs Improvement (75%)
Not Evident
(0%)
Value
Compromised Data
Accurately describes the
data that was compromised
Does not sufficiently
describe the data that was compromised
Does not describe the data
that was compromised
15
Individuals and Organizations
Accurately and sufficiently describes the
individuals and organizations that were impacted
Does not sufficiently describe the
individuals and organizations that were impacted
Does not describe the individuals and
organizations that were impacted
20
Human Factors and Suspects
Accurately and sufficiently assesses the
human factors that impacted the breach and indicates whether the suspects
were identified
Does not sufficiently
assess the humanfactors that impacted the breach or indicate whether the
suspects wereidentified
Does not assess the human
factors that impacted the breach or indicate whether thesuspects were
identified
20
Mitigation
Efforts
Sufficiently provides concrete examples of
the efforts being undertaken to mitigate future occurrences
Does not sufficiently provide concrete
examples of the efforts being undertaken to mitigate future occurrences
Does not provide examples of the efforts being
undertaken to mitigate future occurrences
20
Damage
Control Measures
Accurately and sufficiently describes the
damage control measures
Does not sufficiently describe the damage
control measures
Does not describe the damage control
measures
15
Articulation
of Response
Submission has no major errors related to
citations, grammar, spelling, syntax, or organization
Submission has major errors related to
citations, grammar, spelling, syntax, or organization that negatively impact
readability and articulation of main ideas
Submission has critical errors related to
citations, grammar, spelling, syntax, or organization that prevent
understanding of ideas
10
Earned Total
100%
[
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 21:52:162019-06-30 21:52:16This case study analysis