Problem 1- Planning the Project

1.Everyone has been involved in projects. What is the largest project you have been involved in? (You do not have to have been the project manager, but could have played another role.)

  1. Write one sentence that describes the objective of the project.
  2. Describe specifically how this project meets the definition of a project used in this textbook. (How is it unique? What were the time constraints? If it is over, how did you know it was over? If it is ongoing, how will you know when it is over?
  3. What was your role? Were you the project manager, a volunteer, some other role? If you were not the project manager, who was?
  4. Was the project part of a larger portfolio or program of projects?
  5. Who else was involved?
  6. What was the budget?
  7. Did you anticipate any risks at the outset? Did the project experience any outside forces that caused a change in either the objectives or the approach to achieving those objectives?

2. Go online and search for project life cycle models. Identify at least two that are different from the PMI model, and compare and contrast the phases. Be sure to cite your sources.

Text-

Title: Project Management 

Subtitle: https://opentextbc.ca/projectmanagement/ 

ISBN: 978-1-77420-013-1 

Authors: Adrienne Watt 

Publisher: BCcampus 

Publication Date: August 14, 2014 

Edition: 2nd Edition

Website Review

Refer to Textbook: Interaction Design by Helen Sharp, Jennifer Preece, and Yvonne Rogers 

Publisher: Wiley Evaluation of Best Buy E-Commerce Website. Including images is highly encouraged to demonstrate the usability issues within site. Use the following points as guidelines when writing the Website Review:

  • Metrics: As much as possible, use measurable criteria as you’ve read in the Preece text. Identify those methods you’ve applied in your review of the Website.
  • Application: Using the Nielsen 10 heuristics for usability design, explain how each task can be improved.

 The assignment should be between 3 – 4 pages. Follow APA 7 guidelines for references and in-text citations.

Database Design & Management Project using MySQL

MySQL

MySQL is a database management system that allows you to manage relational databases. It is open source software backed by Oracle. It means you can use MySQL without paying a dime. Also, if you want, you can change its source code to suit your needs.

Even though MySQL is open source software, you can buy a commercial license version from Oracle to get premium support services.

MySQL is pretty easy to master in comparison with other database software like Oracle Database, or Microsoft SQL Server.

MySQL can run on various platforms UNIX, Linux, Windows, etc. You can install it on a server or even in a desktop. Besides, MySQL is reliable, scalable, and fast.

ABOUT THE MySQL FINAL

Use screen captures to document each step of the project. 

1.  Describe the requirements for a database that will support a small online business. Makeup a small business scenario or use a real-life scenario familiar to you.  In this section you should also try to formulate the queries that you that you want to write for the database.  

2.  Design the conceptual database behind the described requirements. This is the ER Diagram for the small database. 

3.  Convert the conceptual design to a physical design. This is translating the ER Diagram into the relational schema and metadata describing the tables, attributes and relationships. 

4.  Implement the Physical Database from the physical design. This is transposing the relational schema and metadata into the a series of CREATE TABLE statements with the appropriate CONSTRAINT modifiers. 

Here are some helpful hints to get started with your design 

You need to describe at least the following aspects of the Database:

1.  What products and/or services will the database hold, the categories of products/services, approximate number of product titles in each category, what (approximately) is the product information that the customers will be able to access 

2.  What information is need from the database

1.  Create the ER diagram from the information gathered in parts 1

2.  Write out the schema and metadata of the database, including: a.  All the database tables. 

The Metadata

For each table column please specify: the name and the type of the column, whether the value can be null or not, and whether the values are required to be unique.  

For each table please specify which column (or columns) forms its primary key.  

In the ER Diagram, show all relations between columns, specify the type of the relations (one-­‐to-­‐one or one-­‐to-­‐many), and what is the foreign key by which the tables are related.  You can do this in the diagram by placing an FK suffix at the end of the attribute that is a foreign key.  

A few things to keep in mind when creating and finalizing the design 

1.  Don’t try to be, too ambitious in planning your database.  As much as you would want to have a lot of features in your database, you have to keep in mind that they will be implemented later in the project! So please try to create a minimum design that will be easy to implement and test. 

You may need to reduce the scope of the project to get a working version completed.  In IT, if you cannot deliver a list of features within a given schedule, you have two choices. You can either reduce the features in order to deliver on time, or you can extend the time of the project. We are at the end of the semester, so we cannot extend the time, we can only reduce the activity in the project. In a Database Project, reducing the scope means removing tables, data, and queries from the project.  

1.  Create the database Container

2.  Create Entity Tables

3.  Create Relationship Tables

4.  Insert Test Data 

Designing the ER Diagram, creating the Relational Schema, creating the Metadata and inserting the Test Data is part of the group assignment. Once the database structure is created and the test data has been inserted, the projects turns into individual assignments.  Individually the group members of a group are to write queries to test separate segments of the database 

Project Overview 

As you create a Database to support sometime of business activities, create the ER 

Diagram, Relational Schema, Metadata and Test Data for the Database you have chosen.  Create the physical database in MySQL using the appropriate Create Database and Create Table DDL statements to create the database container and create the tables for the database.  Finally, insert the initial test data representing a current state of the test organization.  

Perform the following types of queries using tables of the segment of the database that you are testing in your database project. Practice Union, Intersection and Difference operations on one entity table in the database. For this part of the assignment, choose a single table from the entity tables of your database project to work with.  Merge two databases, a number of tests have to be performed on similar data sets from both databases.  Create a duplicate table to mirror the entity table you are testing. Insert a few rows from the test data of your entity table into the duplicate table mirroring it. You should then insert one or two unique rows into the duplicate table mirroring your entity table. Once you get this type of environment setup in your database for this assignment, you will be able to perform varying relational algebra operations. You will be able to perform an intersection finding common records in both tables. You will be able to perform a difference operation from both directions. You will be able to perform a Union combining both tables into one result set. That is exactly what you are to do:

Write a query that performs an intersection on you main table and your duplicate mirroring table 

Write a query that performs an Difference on you main table and your duplicate mirroring table 

Write a query that performs an Union on you main table and your duplicate mirroring table 

For the union, difference and intersect query, the other database table is a table structure made from the table that you have chosen to work with in your project.  It represents the data from another company merging with the data in your company.  

You are to write a query using your table and a table that it has a relationship with

Remember a relationship is established when two table share a common attribute. One is the primary key table the other is the foreign key table.  For the multi-­‐table select query, use the entity table as the one side of a 1-­‐M relationship.  Use one of the relationship tables created earlier as the many side of a 1-­‐M relationship.  

Create a query that will alter the structure of your entity table: 

Normally when integrating systems, there are a few data type compatibility issues and data alignment issues that need resolution.  To prepare for handling such problems, create an Alter Table command to demonstrate that you can handle these types of situations should they arise 

Write a query that will update a row in your entity table

To demonstrate that you have an understanding of update queries, create an update process to update one or more existing records in your chosen table.  This could be accomplished by populating the new attributes added to the table. The final project 

submission MUST inclue the following documents: 

1.  Copy of the ER Diagram and Schema that was used to develop the table 

2.  The Metadata for the database 

3.  The SQL script file to create the database, tables and insert the data 

4.  The SQL script file containing your individual queries

For help with installing, connecting and using MySQL, see the attached documents or click the following links:

https://www.mysqltutorial.org/install-mysql/
https://www.mysqltutorial.org/mysql-sample-database.aspx
https://www.mysqltutorial.org/how-to-load-sample-database-into-mysql-database-server.aspx

Discussion

 

Wk 11 Discussion

Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.

Your post should be at least 350 words

 

Week 11 Discussion

What are some of the characteristics and operations of some of the malicious software that exists today?

Your post should be at least 350 words.

Legal and Ethical Aspects of Cyber Operations

Introduction

The “Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations” (1) is one of the most comprehensive studies on the applicability of international law to cyberspace conflict, and thus cyber operations. In this study, multiple legal experts derived 154 rules from existing law. Several opinions on these rules were divided, so interpretation of the rules remains open for discussion.In this assignment, you will examine two of these rules, consider the ethical and legal aspects of these rules, and offer your perspective on each.The specific course learning outcome associated with this assignment is:

  • Review the legal and ethical aspects of cyber operations.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

Instructions

Write a 3- to 5-page paper in which you evaluate Rules 4 and 9.

Rule 4

Rule 4 states that, according to international law, a state must not conduct cyberspace operations that violate the sovereignty of another state. A large part of cyber operations includes performing the collection of detailed intelligence on another state. This reconnaissance and access is often done “without causing physical damage or loss in functionality” at the targeted state. (1)

  • Describe the laws and rules that govern sovereignty, citing specific, credible sources that support your assertions and conclusions.
  • Explain why a state would want to collect intelligence, why it might be required ethically, and whether cyber operations that collect detailed intelligence on another state violate its sovereignty. 
    • Provide a thorough, researched rationale for your perspective.
Rule 9

Rule 9 states that a state may exercise territorial jurisdiction over cyberspace infrastructure and persons engaged in cyberspace activities within its territory; cyberspace activities originating in, or completed within, its territory; or cyberspace activities having a substantial effect within its territory. A large part of cyber operations includes transmitting data—usually encrypted—which, because of network routing, may transit through the territorial cyberspace architecture of another state. (1)

  • Describe the laws and rules that govern territorial jurisdiction, citing specific, credible sources.
  • Explain whether cyber operations that collect detailed intelligence on another state may exercise jurisdiction over data that traverses its territory, citing specific, credible sources that support your assertions and conclusions. 
    • Provide a thorough, researched rationale for your perspective.
Source Citations and Writing
  • Support your main points, assertions, arguments, or conclusions with at least three specific and credible academic references synthesized into a coherent analysis of the evidence. 
    • Cite each source listed on your references page at least one time within your assignment.
    • For help with research, writing, and citation, access the library or review library guides.
  • Write clearly and concisely in a manner that is well-organized, grammatically correct, and free of spelling, typographical, formatting, and/or punctuation errors. 
    • Use section headers in your paper to clearly delineate your main topics.