Data Collection and Analysis

Details:  you will perform a rudimentary analysis of an existing system (more specifically, the system you plan to redesign) using the System Usability Scale (SUS). This blog will challenge you to recruit participants for your analysis, implement the SUS and interpret the data results.

Requirements:

1. Clearly identify (i.e. explain and discuss) the system you are analyzing. The system should be the system you plan to redesign, or a similar system. 

2. Recruit a minimum of five individuals to participate in a simple user experience questionnaire using the SUS instrument found here: SUS-Instrument.pdf

. While individuals need not be familiar with the exact system you are redesigning, they should be familar with the general category of system. Include all results in your write-up.

3. Perform a rudimentary analysis of the data. Review the instructions on how to interpret SUS here: SUS-Details.pdf

4. Interpret the results. What are the strengths and weaknesses of the system. How might this analysis contribute to the redesign of your own system.

Discussion Cybersecurity

 

Chapter 2 discussed the three dimensions of the cybersecurity sorcery cube. The central responsibility of a cybersecurity specialist is to protect an organization’s systems and data. In your initial post, explain how each of the three dimensions discussed in this chapter contributes to that effort. Provide an example (from your personal or work experience or from further reading) to illustrate your point.

Initial posts are due by Wednesday at 11:59 PM CT. Your two peer responses are due by Sunday at 11:59 PM CT.

In 200 words

DATA BASE DESIGN project

  

Project

Can be any business other than a bicycle shop (sales/repair)

1 Person 20 Tables

(Average 5 Columns per table) Important note: I need 100 attributes in total in 20 20 tables(it may be either 5-6 attributes 1 table or 3-4 attributes in another table)

Should be normalized to 3rd Normal Form

1 (per person) instance where 1st, 2nd, or 3rd normal form is violated, give a detailed explanation as to why you designed this violation (you can have more than one, but it must be explained)

Create Select/Insert/Update/Delete statements for each table (other than  many-to-many tables)

Create at least 12 business rules, 10 should be built into the design (Per person)

Naming convention – explain the naming convention you used.

Data Dictionary(need in excel)

10 rows of dummy data in each table (where possible)(neeed in excel)

DDL Scripts for each table, PK, and FK

Using https://app.diagrams.net/ create the ERD using Crow’s Foot Notation (No other Notation will be accepted)

If you are working as a team, make sure it is obvious who created which pieces. Color code the ERD, showing who did what.

One person should submit the project for the team.

Lab

Lab # 7 part 2 – DATABASE AUDITING (lab)

This lab has been tested in Oracle 10g express.  You may copy and paste directly from this file. Note that if you need to edit this file, it is better to do so in NOTEPAD (copy & paste it to notepad),  word sometimes puts in characters that Oracle will not recognize it.  Also, note that as you copy & paste the stored procedures and triggers, you may need to copy & paste everything except for the slash and then paste the slash. Your job is to create an audit table in MS-SQL Server. Then create a trigger that puts data into the table. Then issue the command that will activate the trigger. You can translate some of the triggers in this assignment, copy and paste triggers from the web-site or create your own trigger. Regardless, your deliverable should be: a small text in English explaining what the trigger is doing and why is it useful, the Audit table, the Trigger, the command that execute the trigger.

Part  0 – only if you are doing it on a newly installed version

— Open an SQL window. Create a user & grant the user dba privileges. Example:

CREATE  USER  cit540 IDENTIFIED BY  c; 

GRANT  DBA   TO  cit540;  — In SQL Server, you grant all privileges to this user through login/security

— Create another user and grant this user create session privileges. Example:

CREATE  USER   smith  IDENTIFIED  BY  s;

GRANT    CREATE  SESSION   TO  smith;

Part  1 – audit login and logout

— Login as the user CIT540 with dba privileges 

CONNECT  cit540/c;

— Create a table to keep track of user login and logoff  

CREATE TABLE  login_logoff

(

      USERIDVARCHAR2(30),

      SESSIONIDNUMBER(8),

      HOSTVARCHAR2(30),

      LOGIN_DAYDATE,

      LOGIN_TIME            VARCHAR2(10),

      LOGOUT_DAYDATE,

     LOGOUT_TIME         VARCHAR2(10)

);

/

— Create a trigger that will insert a row in the login_logoff table every time user logs in

CREATE OR REPLACE TRIGGER

     audit_login

AFTER  LOGON  ON  DATABASE

BEGIN

INSERT  INTO  login_logoff  values (

         USER,

         sys_context (‘USERENV’,’SESSIONID’),          

​  sys_context (‘USERENV’,’HOST’),

                          sysdate,

                          to_char(sysdate, ‘hh24:mi:ss’),

                          null,

                          null  );

                 COMMIT;

                 END;          

/

— Create a trigger that will insert data in a row in the login_logoff table every time user logs out

CREATE OR REPLACE TRIGGER

    audit_logoff

BEFORE  LOGOFF ON DATABASE

BEGIN

  UPDATE  login_logoff

  SET

    logout_day = sysdate, logout_time=to_char(sysdate,’hh24:mi:ss’)

WHERE

  sys_context(‘USERENV’,’SESSIONID’)=sessionid;

END;

/

–Do not close your  SQL session. Open another SQL window and login as the user that does — not have dba privilege.

connect  smith/s; 

— leave the SQL session

Exit;

— connect as administrator (in this example, cit540

Connect  cit540/c;

— From the user CIT540 session that does have DBA privileges, verify the login

SELECT USERID, SESSIONID, HOST, LOGIN_DAY, LOGIN_TIME FROM LOGIN_LOGOFF;

Display. Your results.  Howe many rows did you see ?

You should see something like (but with CIT540 and Smith) :

Logout and type in:

SELECT  *  FROM  LOGIN_LOGOFF;

—————————————–

Creating Audit table and Audit Trigger

You will copy and paste everything that is in green. Deliverable: Screenshots of query with results.

1) get current date and current user

select  getDate();

select  suser_sname();

2) Create an audit table

CREATE TABLE UpdateProductAudit (date_updated  date,  who  varchar(50));

3) Create a trigger that inserts a row into the AuditProductChanges every time the Products table is updated

create trigger AuditProductChanges on Products

after update

as

begin

insert into dbo.UpdateProductAudit values(getDate(), suser_sname()); 

end

go

4) udate the Products table

UPDATE Products set quantity = quantity * 1.1;

5) view the update in the audit table

SELECT * from dbo.UdateProductAudit;

6) Do the exercises in the link below. Your professor will discuss the link in class.

https://www.mssqltips.com/sqlservertip/4055/create-a-simple-sql-server-trigger-to-build-an-audit-trail/

Submit the screenshots of the results. Create the table inside your own database. Alter each table name and trigger name to have your initials.  Consequently , you also need to order each reference to the table to have your initials also.

7) Go to https://docs.microsoft.com/en-us/sql/relational-databases/security/auditing/create-a-server-audit-and-database-audit-specification?view=sql-server-2017

And create a server audit specification (either in SSMS or SQL)

Information technology

Networks have changed drastically over the last 30 years.  With the  first introduction of the 56k modem, which was about 3 typewriter pages  per second, to speeds well over 1Gbps these days, the ability to use  networks globally, has changed the way we do business.  Using research,  determine where networks will go in the next 5-10 years and how that  might impact the global economy.

225 WORDS

PLAGIARISM REPORT

APA7 REFERENCES – 2

Problem 4- Initiating Project

Please see attached file for question

Text

Title: Contemporary Project Management 

ISBN: 9781337406451 

Authors: Timothy Kloppenborg, Vittal S. Anantatmula, Kathryn Wells 

Publisher: Cengage Learning 

Publication Date: 2018-02-08 

Edition: 4th

A Guide to the Project Management Body of Knowledge (PMBOK(R) Guide-Sixth Edition / Agile Practice Guide Bundle (HINDI) 

ISBN: 9781628255393 

Authors: Project Management Institute 

Publisher: Project Management Institute 

Publication Date: 2019-08-05

Assignment READ CAREFULLLY !!!

 
        Complete the questions 1, 2, 3, below, working with personality types.  

Learn more about these personality types at ( YOU MUST OPEN AND READ THIS LINK IN ORDER TO ANSWER QUESTIONS) LINK:http://www.personalitypage.com/high-level.html (Links to an external site.)  (Links to an external site.) and complete the following: 

Question 1. WHICH TYPE ARE YOU? Briefly explain (total 5 paragraphs; 1 paragraph is = to 8 sentences)

Question 2. Briefly describe the ISTJ and ENFP personality types in the Myers-Briggs categories (1 paragraph of 8 full sentences (phrases are not sentences (a couple of you wrote phrases instead of sentences in last assignment) .

Question 3. Critical Thinking Question: There are 2 peer employees that you simply cannot get along with or you are in arguments often at meetings. Let’s call them Albert and Jennifer. Albert is a ISTJ and nothing ever bothers him. Unfortunately, he agrees to everything, even if it’s apparent that doing his method will lose your company thousands of dollars ($240,000).
List 2 sentences stating HOW YOU can get Albert to give his true feelings – communicate with the group if he believes the group plans will succeed or fail and why. (How can you make him talk?)

Jennifer is YOUR OPPOSITE personality type. What personality type is opposite you? (answer this)

Other peers have noticed that neither you or Jennifer stand down/compromise.  List 2 sentences stating HOW YOU can improve this communicate. (I know, I said “YOU” and not her. Work conflicts are difficult.)

Reflection2

  

Reflect to the course Technology that transforms.

2 pages 

1. Course Content: Describe the most important aspects of this course for you with respect to the content that was covered or activities in which you participated. Discuss the relevance and value or the practicum assignment with respect to your knowledge acquisition.

2. Application of Course Content: Describe how you applied what you learned in this course at your workplace. Discuss how this course may have impacted your specific job, techniques you used at work, or other relevant aspects that show how what you learned was linked to your job.

3. Job Experience Integration: Describe how your work experiences were used in the classroom and attributed to your performance in the course. Discuss how integrating your work experiences in class activities assisted in understanding topics discussed within the course.

Homework 4 (Individual Work) HIM 6122C: System Analysis and Design

 

Answer the following questions using Microsoft Visio or a suitable software. I use Lucid Charts

  1. Draw a neat diagram (for each model) indicating how the following software development models could be used in developing a decision support system for a clinic.

      a) Waterfall model

      b) Extreme Programming

      c) Rapid prototyping

      d) Iterative and Incremental model (general)

  1. Explain along with a diagram on how Scrum can be used in the synthesis of a medical billing system. Your answer must have at least 250 words and a neat diagram describing the use of scrum for the scenario mentioned. The answer must also identify individual sprints for the overall process.
  2. Explain the use of scenario-based testing for the above scenario. Your answer must provide the scenario and the testing strategy.