Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

This assignment consists of two (2) sections: a design document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label...

1 answer below »

This assignment consists of two (2) sections: a design document and a revised Gantt chart or project plan.You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

One (1) of the main functions of any business is to transform data into information. The use of relational databases has gained recognition as a standard for organizations and business transactions. A quality database design makes the flow of data seamless. The database schema is the foundation of the relational database. The schema defines the tables, fields, relationships, views, indexes, and other elements. The schema should be created by envisioning the business, processes, and workflow of the company.

Section 1: Design Document

1. Write a five to ten XXXXXXXXXXpage design document in which you:

a. Create a database schema that supports the company’s business and processes.

b. Explain and support the database schema with relevant arguments that support the rationale for the structure.Note: The minimum requirement for the schema should entail the tables, fields, relationships, views, and indexes.

c. Create database tables with appropriate field-naming conventions. Then, identify primary keys and foreign keys, and explain how referential integrity will be achieved.

d. Normalize the database tables to third normal form (3NF).

e. Create an Entity-Relationship (E-R) Diagram through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia.Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.

f. Explain your rationale behind the design of your E-R Diagram.

g. Create a Data Flow Diagram (DFD) through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia.Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.

h. Explain your rationale behind the design of your DFD.

i. Create at least two (2) sample queries that will support the organizational reporting needs.

j. Create at least two (2) screen layouts that illustrate the interface that organizational users will utilize.

Your assignment must follow these formatting requirements:

· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

· Include charts or diagrams created in MS Visio or Dia as an appendix of the design document. All references to these diagrams must be included in the body of the design document.

Section 2: Revised Gantt Chart / Project Plan

Use Microsoft Project or an open source alternative, such as Open Project, to:

2. Update the Gantt chart or project plan (summary and detail) template, with all the project tasks.

Answered Same Day Dec 24, 2021

Solution

Robert answered on Dec 24 2021
115 Votes
Section 1:
One of the most compelling areas of Cloud-related IT and business is in business analytics –
Big Data and otherwise. During (and leading up to) Saugatuck’s 2013 Cloud Business
Summit (CBS2013), we had a series of conversations with senior IT leaders in healthcare,
financial services, and NGO/philanthropy organizations to assess the realities of Cloud-
enabled analytics and Big Data. The bottom line: The need for Big Data and more advanced
analytics will certainly grow, but there are exceptional business benefits to be had with what
works right now – if we concentrate on today’s business needs rather than future potential.
This Strategic Perspective collects and presents insights from three of our CBS2013 panelists
to help frame the realities of Big Data and Cloud-based analytics.
For consumers and businesses alike, cloud computing offers cost-effective, easy-to-use
applications and services, but you need to know your personal information and files are
secure. You need to understand the opportunities of cloud computing, as well as the risks, to
make the move that’s right for you and your business.
Virtual servers are already outpacing physical ones, and Gartner predicts that in a few short
years 71% of server workloads will be virtualized. Finding the right security strategy can help
you take advantage of the amazing potential virtualization and cloud computing offer your
company including:
 Lower capital and operational costs – consolidating the number of servers used and
turning on VMs only as the business demands it
 Increased business agility – offering new services quickly and easily
 Instant scalability – turning on and off VMs as required
 Anywhere, anytime access – offering business services to your users who are in the
office, at home or on a mobile device
Ideally, a solution would be integrated with the administration of leading virtualization
suppliers and cloud providers so that appropriate security would be automatically applied
across all of your platforms – physical, virtual and cloud.
Trend Micro began its own journey to the cloud with the development of the Smart
Protection Network infrastructure more than five years ago. By providing more complete
threat intelligence, faster threat detection and blocking, and smaller pattern file updates,
Smart Protection Network has proved the efficacy of cloud-based protection. We continue to
expand the capabilities of Smart Protection Network by applying big data analytics to keep
pace with the volume, variety, and velocity of today’s threats.
While delivering security from the cloud, we've taken an active role in advancing security
technologies for the cloud. As an early adopter of virtualization and cloud computing, we
gained a clear understanding of the challenges to extending threat protection into emerging
cloud environments, resulting in product innovations that lead the industry and continue to
evolve.
Our Cloud and Data Center solution protects physical, virtual and cloud servers, as well as
virtual desktops, with automated, comprehensive security.
Unlike other vendors, we enable you to cost-effectively centralize policy control and monitor
security across your physical, virtual and cloud environments with a single platform. Our
solution is integrated with VMware vCenter and vCloud, and Amazon Web Services to
automate security policy enforcement, and includes multi-tenancy management for
usinesses and service providers who need overall control with segregated administration for
departments or other organizations.
http:
cloudsecurity.trendmicro.com/us/enterprise/challenges/cloud-virtualization/index.html
http:
cloudsecurity.trendmicro.com/us/technology-innovation/our-technology/smart-protection-network/index.html
http:
cloudsecurity.trendmicro.com/us/technology-innovation/our-technology/smart-protection-network/index.html
http:
cloudsecurity.trendmicro.com/us
usiness/cloud-data/index.html
http:
cloudsecurity.trendmicro.com/us
usiness/strategic-alliances/index.html#vmware
http:
cloudsecurity.trendmicro.com/us
usiness/strategic-alliances/index.html#aws
http:
cloudsecurity.trendmicro.com/us/service-providers/cloud-service-providers/index.html
As the market leader in cloud security, virtualization security, and server security, our
solution is the only true cloud security platform optimized for today’s virtualization and
cloud environments.
A three-step approach to navigating compliance complexities
Though the risks – from malicious hacks to insider threats – can seem high, a holistic
approach to cloud information protection can help companies reduce the risks of adopting the
cloud.
First is the discovery stage. Before you can protect information in the cloud, you need to
know where it is and who has access to it:
• Who should have access to certain information and who should not?
• What content is sensitive, proprietary, or regulated and how can it be identified?
• Where will this data reside in the cloud and what range of regional privacy, disclosure and
other laws might apply?
Then, you need to protect the information using the co
ect tools:
• Encrypt: as a baseline, un
eakable code – like military grade 256-bit AES – can scramble
sensitive information into undecipherable gi
erish to protect it from unauthorised viewers.
Installing a cloud information protection platform at the network's edge ensures any data
moving to the cloud is fully protected before it leaves the organisation.
• Retain keys: keep the keys that...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here