IT476 week 4

After you review Chapters 3 in your textbook and review all course materials in Module 4, please answer the following two questions:

1- What is the difference between a multi-valued attribute and a composite attribute? Give examples.

2- Create an ERD for the following requirements (You can use Dia diagramming tool to create your ERD):
Some Tiny College staff employees are information technology (IT) personnel. Some IT personnel provide technology support for academic programs, some provide technology infrastructure support, and some provide support for both. IT personnel are not professors; they are required to take periodic training to retain their technical expertise. Tiny College tracks all IT personnel training by date, type, and results (completed vs. not completed).

Nature of data and visualization

Chapter 3

Discussion Question 1: How do you describe the importance of data in analytics? Can we think about analytics without data? Explain.

Discussion Question 2: Considering the new and broad definition of business analytics, what are the main inputs and outputs to analytics continuum?

Discussion Question 3: Where do the data for business analytics come from? What are the sources and nature of those incoming data?

Discussion Question 4: What are the most common metrics that make for analytics-ready data?

Exercise 12:

Go to data.gov – a US government-sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to education, climate to public safety. Pick a topic that you are most passionate about. Go through the topic-specific information and explanation provided on the site. Explore the possibilities of downloading the data and use your favorite data visualization tool to create your own meaningful information and visualization. Show your visualization on your assignment submission.

Chapter 4

Discussion Question 1: Define data mining. Why are there many names and definitions for data mining?

Discussion Question 2: What are the main reasons for the recent popularity of data mining?

Discussion Question 3: Discuss what an organization should consider before making a decision to purchase data mining software.

Discussion Question 4: Distinguish data mining from other analytical tools and techniques.

Discussion Question 5: Discuss the main data mining methods. What are the fundamental differences among them?

Exercise 1: Visit https://www.teradata.com/University Identify case studies and white papers about data mining. Describe recent development in the field of data mining and predictive modeling. 

Textbook: Business Intelligence and Analytics 

ISBN: 9780135192016

Your response should be 5 pages. There must be APA formatted references (and APA in-text citation) to support the thoughts in the post.

Exp19_Access_App_CapAssessment – Transfer Student Advising 1.2

 

Exp19_Access_App_CapAssessment – Transfer Student Advising 1.2

 

Exp19_Access_App_CapAssessment – Transfer Student Advising 1.2

Project Description:

You were recently hired by your local college to help with registering all transfer students. The college?s Transfer Advising Department is a one-stop location for transfer students to come with questions. They have been working with Excel spreadsheets generated by the Information Technology department, but they are hoping to do more with an Access database. They have had a number of problems, including employees putting information in the wrong fields, putting information in the wrong format, and creating incorrect formulas. They are also hoping for more consistent ways of finding information, as well as being able to generate reports. Your tasks include importing an existing Excel worksheet as a table into your Access database; modifying the table; creating a relationship between two tables; creating queries with calculated fields, functions, and totals; creating a form for input; creating a report; and backing up the database .

1

To   start, you have been provided with a database the Information Technology   department created. The database has one table and one form. You will be   importing an Excel spreadsheet into a table and creating a primary key.
 

  Start Access. Download and open the file named aApp_Cap1_Advising.accdb. Grader has automatically added your   last name to the beginning of the filename.

2

Import   the aApp_Cap1_Transfer.xlsx Excel   workbook into a new table named Transfer Schools.   While importing the data, ensure that StudentID has a data type of Short   Text, and select StudentID as the primary key.

3

Now   that you have imported the data from the spreadsheet, you will modify the   field properties in the Transfer Schools table and demonstrate sorting.
 

  Open the Transfer Schools table in Design view. Set the StudentID field size   to 10. Remove the @ symbol from the   StudentID format property. Change the AdmittingSchool field size to 75. Change the RegistrationFee and   TuitionDue fields to have 0   decimal places.
 

  Switch to Datasheet view, saving the changes that you’ve made. Resize the   AdmittingSchool column by double-clicking on the border between   AdmittingSchool and AdmissionDate. Sort the Transfer Schools table on the   CreditsTransferred field in ascending order. Save and close the table.

4

Now   that the table is imported and modified, you will create a relationship   between the Transfer Schools and Transfer Students tables.
 

  Add the Transfer Schools and Transfer Students tables to the Relationships   window. Create a one-to-one relationship between the StudentID field in the   Transfer Students table and the StudentID field in the Transfer Schools   table. Enforce referential integrity between the two tables and cascade   updates and deletes. Save the changes and close the Relationships window.

5

   You will demonstrate changing information in a form.
 

  Open the Transfer Students Data Entry form. Locate the record for Ellen Sullivan and change her major to   History. Close the form.

6

Adam   McChesney, an adviser in the center, would like your assistance in helping   him find certain information. You will create a query for him and demonstrate   how he can change information.
 

  Create a new query using Design view. This query will access fields from both   the Transfer Schools and Transfer Students tables. From the Transfer Students   table, add the FirstName, LastName, Major, Class, and GPA fields. From the   Transfer Schools table, add the AdmissionDate, TuitionDue, CreditsEarned, and   CreditsTransferred fields.
 

  Save the query as Transfer Credits.   Set the criteria in the AdmissionDate field to 1/1/2021.   Run the query (19 records will display). Enter the TuitionDue for Bianca Bain as $2200 and the GPA for Edgar Conway as 3.65.   Save and close the query.

7

Now   that you have created the query, you will create a second query for Adam that   will calculate the number of credits students lost upon transfer, the tuition   payments for which they will be responsible (assuming four payments per   semester), and the due date of the first payment.
 

  Create a copy of the Transfer Credits query. Name the copy Transfer Calculations. Open the new query in Design view.   Remove the criteria from the AdmissionDate field. Create a calculated field   in the first empty field cell of the query named LostCredits   that subtracts CreditsTransferred from CreditsEarned. Create another   calculated field named TuitionPayments   that uses the payment function and determines tuition paid in four   installments. The student’s tuition payment and a 2.5% interest   rate should be used in the function. Use 0   for the future_value and type arguments. Ensure that the payment appears as a   positive number.
 

  Format the TuitionPayments calculated field as Currency. Create another   calculated field named FirstPayment   after the TuitionPayments field. To calculate the due date, add 30 to their AdmissionDate. Run the query   and verify that the three calculated fields have valid data. Add a total row   to the datasheet. Sum the TuitionDue column and average the TuitionPayment column.   Save and close the query.

8

   Cala Hajjar, the director of the center, needs to summarize information about   the transfer students for the 2020–2021 academic year to present to the   College’s Board of Trustees. You will create a   totals query for her to summarize the number of transfer students, average   number of credits earned and transferred, and total tuition earned by   transfer institution.
 

  Create a new query in Design view. Add the Transfer Schools table. Add the   AdmittingSchool, StudentID, CreditsEarned, CreditsTransferred, and TuitionDue   fields. Sort the query by AdmittingSchool in ascending order.
 

  Show the Total row. Group by AdmittingSchool and show the count of StudentID,   the average of CreditsEarned, the average of CreditsTransferred, and the sum   of TuitionDue. Format both average fields as Standard. Change the caption for   the StudentID field to NumStudents,   the caption for the CreditsEarned average to AvgCreditsEarned,   the caption for the CreditsTransferred average to AvgCreditsTransferred,   and the caption for the sum of TuitionDue to TotalTuition.
 

  Run the query. Save the query as Transfer Summary.   Close the query.

9

Hideo   Sasaki, the department’s administrative assistant, will handle   data entry. He has asked you to simplify the way he inputs information into   the new table. You will create a form based on the new Transfer Schools   table.
 

  Create a Split Form using the Transfer Schools table as the source. Change   the height of the AdmittingSchool field to be approximately half the current   height.Switch to design view and then remove the layout from all the labels   and fields. Shrink each field so it is approximately as large as it needs to   be.
 

  Switch to layout view and then click record 123455 in the bottom half of the split form. Make sure all fields   are still visible in the top half of the form. If not, adjust the controls so   all values are visible. Move the CreditsTransferred field so it is to the   right of the CreditsEarned field on the same row.
  Change the title of the form to Transfer Schools   Overview.   Save the form as Transfer Schools Form.   Save and close the form.

10

Cala   is hoping you can create a more print-friendly version of the query you   created earlier for her to distribute to the Board of Trustees. You will   create a report based on the Transfer Calculations query.
 

  Create a report using the Report Wizard. Add the Major, FirstName, LastName,   Class, GPA, and LostCredits fields from the Transfer Calculations query. Do   not add any grouping or sorting. Ensure that the report is in Landscape   orientation. Save the report as Transfer Students   Report   and view the report in Layout view.

11

Now   that you have included the fields Cala has asked for, you will work to format   the report to make the information more obvious.
 

  Apply the attached Wisp theme. Group the report by the Major field. Sort the   records within each group by LastName then by FirstName, both in ascending   order. Adjust the text boxes so the values for the Major field are completely   visible. Switch to Print Preview mode and verify that the report is only one   page wide (Note: it may be a number of pages long).

12

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.  

Discussion & Assignment

  

Discussion – Analyzing and Visualizing Data – 300 words (PFA)

Assignment –   Analyzing and Visualizing Data. – 2 pages (PFA)

Discussion 300 words

 

What is Ethical Hacking?

Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. Ethical hacking is also known as penetration testing, intrusion testing, or red teaming. An ethical hacker is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. By conducting penetration tests, an ethical hacker looks to answer the following four basic questions :

What information/locations/systems can an attacker gain access?
What can an attacker see on the target?
What can an attacker do with available information?
Does anyone at the target system notice the attempts?

An ethical hacker operates with the knowledge and permission of the organization for which they are trying to defend. In some cases, the organization will neglect to inform their information security team of the activities that will be carried out by an ethical hacker in an attempt to test the effectiveness of the information security team. This is referred to as a double-blind environment. In order to operate effectively and legally, an ethical hacker must be informed of the assets that should be protected, potential threat sources, and the extent to which the organization will support an ethical hacker’s efforts

Help3

 

Company Profile

Across the States Bank (ASB) takes pride in providing our customers with superior service and the ability to manage their finances 24/7 from anywhere in the world. As one of America’s largest banks, our 132,500 employees are available to address personal and business banking customer needs any time of the day or night by phone, e-mail, or through our online chat feature. Our seamless online and mobile banking and 24-hour customer support ensure that your money management needs can always be met.

Based in Metropolis, California, ASB offers over 17,000 branch offices and ATMs to service customers across the continental United States. When traveling abroad, ASB customers can easily access accounts and complete routine banking transactions in most European nations through our foreign partner, Across the EU Bank. Always looking for means of expanding our $10 billion business, we are developing additional foreign partnerships that will soon allow us to expand our services to South America and Asia to better meet our customer needs.

Products and Services

Personal Banking

As one of the nation’s leading personal banking service providers, ASB allows individuals to select from a wide range of banking services, including:

  • Savings and checking accounts
  • Debit and credit cards
  • Personal and automobile loans
  • Home loans, including first mortgages, home equity, and lines of credit
  • Insurance
  • Investment banking services
  • Wealth management and estate services

Business and Commercial Banking

To meet the diverse needs of business and commercial customers, ASB offers individually selected and bundled services, including:

  • Business savings and checking accounts
  • Business loans
  • Merchant services
  • Payroll services
  • Insurance
  • Investment banking
  • Trust services
  • Shareowner services

QUESTION

Organizations will task security administrators, human resources, the legal department, and other departments to develop appropriate security policies to enhance the control, monitoring, and protection of intellectual property. Some of this protection comes from liability from a legal perspective, privilege access from a human resource protection perspective, or simply data management from a security perspective.

This assignment will guide you through the development of a comprehensive security policy that sets guidelines for the protection of information systems from malicious activity. Review Chapter 4 of the course text, and research various templates online to identify how organizations generate clear and concise policies that are used to create the standards, guidelines, and procedures throughout the enterprise infrastructure. Using the same fictitious organization selected in Topic 1, develop a three to four-page Information Systems Security Policy that includes the following:

  1. A cover page with company logo (I will add the logo myself) 

  1. A table of contents (TOC)

  1. A revision page (policies are updated on a routine basis and require tracking for compliance)

  1. A purpose, scope, or objective statement (that aligns with the corporate profile)

  1. Identification of eight security topics such as (but not limited to): Acceptable Use Policy for End-Users, Remote Access Policy, Email Policy, Unauthorized Access, Limitations of Liability, Prohibited Uses, Logging Standards, Physical Access Control Policy, Operating System Updates, Anti-Virus Protection, Application Security, and/or Data Classification Standards.

  1. For each of the selected 8 security topics, write the security policy section of a general security policy that aligns with your corporate profile.

Each topic should be a minimum of 125 words in length.