System Analysis and Design 5th Edition Chapter 5 page 219 – Excercise F

Draw a level 0 data flow diagram (DFD) for the health club system in Exercise G, Chapter 4.

Important: Use Visio to create the DFD.

Note: This paper will be used and stored as part of the SafeAssign™ services in accordance with the University. 

Exercise G. health club system

——————————— 

Create a set of use cases for the following health club membership system: When members join the

health club, they pay a fee for a certain length of time.  Most memberships are for one year, but memberships as short as two months are available. Throughout the year, the health club offers a variety of discounts on  its regular membership prices (e.g.,two memberships for the price of one for Valentine’s Day).  It is common for members to pay different amounts for the same length of membership. 

The club wants to mail out reminder letters to members asking them to renew their memberships one month before their memberships expire. Some members have become angry when asked to renew at a much higher rate than their original membership contract, so that the club wants to track the price paid so that the manager can override the regular prices with special prices when members are asked to renew. The system must track these new prices so that renewals can be processed accurately. One of the problems in the health club industry is the high turnover rate of members. While some members remain active for many years, about half of the members do not renew their memberships. This is a major problem because the health club spends a lot in advertising to attract each new member. The manager wants the system to track each time a member comes into the club. The system will then identify the heavy users and generate a report so that the manager can ask them to renew their memberships early, perhaps offering them a reduced rate for early renewal. Likewise, the system should identify members who have not visited the club in more than a month so that the manager can call them and attempt to reinterest them in the club.

Allocating Resources

A company’s strategic priorities must drive how capital allocations are made and the size of each unit’s operating budget. Using the NEC Danforth’s library resources search for recent (most recent five years) articles that discusses how a company has revised its pattern of resource allocation and divisional budgets to support new strategic initiatives. How do the revisions fit within the context of the material we have covered in our coursework (Thompson text and other material) from this week? Submission Details: 

  • Your analysis must be driven by facts, research, and data.
  • Your analysis should be between 1000 and 1500 words.
  • Incorporate a minimum of at least our course text and one non-course scholarly/peer reviewed source in your paper. All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, and proper in-text citations using APA guidelines.

References:

Discuss the globalization and some security issues of IT and/or computing industry

  

  • Find one article that discusses the globalization of the IT and/or computing industry and one article that discusses some aspects of security issues in the IT and/or computing industry.
  • Prepare a 2 pages paper/report of the articles (double spaced, 12 point Times New Roman font) summarizing the articles.

Keep in mind the following questions as you search the literature and if possible try to address as many of them as you can in your report, based on information on your sources:

  • What is globalization? What is security?

Do they represent a problem or an opportunity?

  • Winners and losers in a global IT economy with respect to globalization and security.
  • Which type of jobs are affected by globalization (i.e., outsourced), which type of jobs are not. 
  • Are there any new jobs being created by globalization and or security concerns, if so what type?
  • As a future professional in the computing field, how can you position yourself better to avoid suffering from being displaced by globalization or take advantage of security concerns in your company?
  • Impact of globalization and security issues on academia. Do universities need to adjust their CS/CIS curriculum and if so how?
  • What ethical, political, cultural, or legal issues need to be addressed because of globalization and security issues?
  • Conclusion
  • References

wk art

This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

  1. How do geographically dispersed teams collaborate effectively?
  2. Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team.  Please note the pros and cons of each tool. 
  3. Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why.

Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

Article: (2016). Empowering Leadership and Effective Collaboration in Geographically Dispersed Teams. Personnel Psychology, 69(1), 159–198. https://doi.org/10.1111/peps.12108

Week 4

  

Discussion :

Create a discussion thread (with your name) and answer the following question:

Discussion (Chapter 4): What are the privacy issues with data mining? Do you think they are substantiated?

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.

Your response should be 250-300 words. Respond to two postings provided by your classmates.

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Please check attachment page 194 for chapter 4. 

Question and Answers:

1.Define data mining. Why are there many names and definitions for data mining?

2. What are the main reasons for the recent popularity of data mining?

3. Discuss what an organization should consider before making a decision to purchase data mining software.

4. Distinguish data mining from other analytical tools and techniques.

5. Discuss the main data mining methods. What are the fundamental differences among them?

Exercise Question:

Visit teradatauniversitynetwork.com. Identify case

studies and white papers about data mining. Describe

recent developments in the field of data mining and

predictive modeling.

Fundamentals of Security

You have tasked the IT department with developing an incident response plan to address risks to the information system. 

Based on your research for Unit 5:

Explain some of the key elements of an incident response plan. 

Identify some incidents that should be included in the PCS plan. 

Discuss the relationship between this plan and other related planning such as disaster recovery and business continuity.

Wk 4 – Apply: Security Threats Presentation

Assignment Content

  1. The school and your employer were so pleased with your outline and handout for the high school career fair that you have been asked back to present on security threats, security measures, and hacking countermeasures to the entire student body and staff of the school. 

    Create a 10- to 12-slide media-rich presentation including detailed speaker notes about a variety of security threats and security measures and hacking countermeasures to combat the threat. 

    In your presentation, you should:

    • Identify 1 threat and 1 security measure or hacking countermeasure for wireless networks. 
    • Identify 1 threat and 1 security measure or hacking countermeasure for mobile networks. 
    • Identify 1 threat and 1 security measure or hacking countermeasure for OT or IoT.
    • Identify 1 threat and 1 security measure or hacking countermeasure for cloud-based platforms.
    • Summarize the threats, security measures, and hacking countermeasures you identified. 
    • Recommend practical methods the staff and students at the school to use to secure their data and devices on the wireless and mobile networks and cloud platforms they may use.
    • Format your references according to APA guidelines.

Using the Day class of Worked Example 2.1, write a program that generates a Day object representing February 28 of this year, and three more such objects that

 

Using the Day class of Worked  Example 2.1, write a program that generates a Day object representing  February 28 of this year, and three more such objects that represent  February 28 of the next three years. Advance each object by one day, and  print each object. Also print the expected values

Example 2.1: 

public class DaysAlivePrinter

{

 public static void main(String[] args)

 {

  Day jamesGoslingBirthday = new Day(1955, 5, 9);

  Day today = new Day();

  System.out.print(“Today:”);

  System.out.println(today.toString());

  int daysAlive = today.daysFrom(jamesGoslingBirthday);

  System.out.print(“Day alive: “);

  System.out.println(daysAlive);

  }

 }

program cycle and concept of

  

Using program cycle and concept of top- down modular approach and pseudocode to design a suitable, write program using loops, conditionals, and file processing concept for Eversoft Eraser Company has a list of its customers’ names(not necessarily in alphabetical order) and telephone numbers in a file named customer with records of the following form: last name, first name, phone number
a. Allow the user to input a last name; then search the file and display all names and phone numbers corresponding to that last name.
b. Load the file into parallel arrays and display the list of customers’ names and phone numbers in alphabetical order.(Raptor can be used for part b of this program)