File

Own work easy work no plagiarism

Attached Files:

Summary:Produce an ER Model for the following scenario (presented in Step 1 below) and business need, for the Pythagoras Math Academy.  Reference the attached video (Course Project Ph2 Video.mp4), for a full introduction and demonstration and expectations for this project.Deliverables:

  • ER Model for the scenario presented. 
  • You have the option to use MS Visio (if you have the software) to produce your ER Model.  
  • Alternatively, if you do not have MS Visio, you can use the ERD PLUS (Open source ER Modeling Software) and produce your ER Model. 

***The submission is a Word document with the ER Model diagram copied.  Do not send any type of image.  The submission must be the image copied into a Word document.  Please include a cover sheet with your full name, the class and  the university spelled correctly.  Please include any details necessary to describe the results. 
Required Software:

  • MS Visio by Microsoft OR
  • ERD PLUS, Open Source Offering. This offering is cloud-based, and you do not need to download any clients. You will need to create an account (username and password), link to this offering follows: https://erdplus.com 

Lab Steps:Step 1: Read and understand the Scenario and Business needs presented below. Define and document the ENTITIES, and RELATIONSHIPS, required to address the business needs. The nouns in the scenario below will give the ENTITIES that you will need. Finally, the verbs will describe the RELATIONSHIPS.Scenario and Business Need The Pythagoras Math Academy is in need to develop a database to keep track and control of his students, teachers, and classes offered. Teachers are able to teach multiple courses. But they are required to be certified on the course they are teaching. For example, only a group of teachers are certified to teach Algebra, and other Geometry. Students can take multiple courses. Courses are taught by teachers with the proper certification and have multiple certs as needed.  Courses are taught in one of the classrooms at one of the School’s several sites.Each classroom is optimized to serve the needs for a course (for example some courses might require computer labs and whiteboards). The school needs to keep track of the math courses delivered in each of the sites.Step 2: For this project, you are required to use MS Visio or ERD PLUS to produce the deliverables.If you are using MS Visio follow the steps below:

  • Reference the Course Project Ph2 VIDEO.mp4, for a short demonstration and tutorial of this tool, and project overview/ expectations.
  • Open MS Visio
  • Click on the Software Database Template in the main window
  • Select the Database Model Diagram Template to open a new file.
  • Save the File and ensure to have in your file name PROJECT2_LastName_FistInitial.

If you are using ERD PLUS.

  • Watch the recorded short tutorial for this tool. Reference the attached video as follows: Course Project Ph2 VIDEO.mp4.
  • From the ERP PLUS main interface, select DOCUMENTS –> NEW DIAGRAM (NAME YOUR DIAGRAM) –>ER DIAGRAM –> CREATE
  • Reference demonstration video for how to navigate tool, how to create entities, add attributes, relationships, and Cordiality. Demonstration video attached as follows: Course Project Ph2 VIDEO.mp4

Step 3: Define and Database ENTITIES

  • Add an entity for each Table you identified in the Scenario and Business Need.
  • You will use the MS Visio tool, or the ERD PLUS open source offering to complete this step.

Step 4: ADD the required ENTITY ATTRIBUTES  

  • Add the required Attributes for each Entity that you feel would help to define each Entity as needed.
  • Select one of the attributes to be PRIMARY KEY (PK)

Step 5: Define RELATIONSHIPS

  • Use the Crow’s Feet Notation.
  • Reference recorded demonstrations on how to use these notations, for MS Visio and ERD PLUS. Reference attached video as follows: Course Project Ph2 VIDEO.mp4
  • Drag and drop (draw) relationships between the entities you defined.
  • Connect the ends to the two entities for each relation.
  • Defined the Primary Key for the parent entity.

Step 6: Define CARDINALITY RELATIONSHIPSet the cardinality for each of your relationships defined in Step 5.  For MS Visio: select a relationship line in the drawing area that is connecting two entities. In the Database Properties window, select the miscellaneous category. Select the cardinality for the selected relationship.Step 7: Upload your Work 

  • Save the File and ensure to have in your file name PROJECT2_LastName_FistInitial. 

***The submission is a Word document with the ER Model diagram copied.  Do not send any type of image.  The submission must be the image copied into a Word document.  Please include a cover sheet with your full name, the class and  the university spelled correctly.  Please include any details necessary to describe the results. Rubric:

  • 10 points: ER Model (MS Visio OR ERD PLUS)
  • 10 points: Entities: Minimum of Three entities are represented
  • 10 points: Attributes: Minimum of Two attributes for each Entity. Most would require more than two attributes, and I am only requiring two per entity.
  • 10 points: Relationships: Minimum Three relationships are presented.
  • 10 points: Cardinality is defined and specific for each relationship with Crow’s foot notation.

Classification of Computers

  • What is the difference between Harvard architecture and Von Neumann Architecture?
  • What two examples of Harvard architecture? 
  • What are two examples of Von Neumann Architecture?
  • Why is Harvard architecture used instead of Von Neumann?

Discussion 7- Planning Project

Chapter 15: Communication PlanningChapter 16: Risk Management PlanningInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. What are some of the common challenges encountered when communicating with project stakeholders?
  2. What are common risk-response strategies for both threats and opportunities throughout a project?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text-

Title: Project Management 

Subtitle: https://opentextbc.ca/projectmanagement/ 

ISBN: 978-1-77420-013-1 

Authors: Adrienne Watt 

Publisher: BCcampus 

Publication Date: August 14, 2014 

Edition: 2nd Edition

Se493 week 2

Apa format citations amd number them question proper pleaseWeek 2 

Question 1

Discussion Topic

Please read chapter 3 of your  textbook and reputable resources and in your own word discuss what is Plan driven Software Development and What is Agile Development.

Discuss at least one application where you will use plan driven development and one application where you will prefer to use agile development.

Question 2

Assignment Description

Read chapter 4 and reputable resources. Using your knowledge of how an ATM is used, develop a set of requirements that could serve as a basis for  understanding an ATM system.

Please list at least one reference.

Private Sector Case Study:

  

By reading below case study describe the risk that was exploited. Also, tell how you think that exploit could be avoided using proper technology and security policies

Private Sector Case Study:

A franchisee of a national hamburger chain in the southern United States was notified by Visa U.S.A, Inc. and the U.S. Secret Service of the theft of credit card information in August 2008. The franchisee has a chain of eight stores with annual revenue of $2 million. The chain focused on the technology of its point-of-sale (POS) system. A leading vendor that allowed for centralized financial and operating reporting provided the POS system. It used a secure high-speed Internet connection for credit card processing. The company determined that neither the POS nor credit card authorization connection was the source of the breach. Although the POS was infected, the source of the breach was the network. Each of the franchisee’s stores provided an Internet hotspot to its customers. It was determined that this Wi-Fi hotspot was the source of the breach. Although considerable care was given to the POS and credit card authorization process, the Wi-Fi hotspot allowed access to these systems. It was determined the probable cause of the breach was malware installed on the POS system through the Wi-Fi hotspot. The malware collected the 232credit card information, which was later retrieved by the thief. This was a PCI DSS framework violation. The PCI DSS framework consists of over 200 requirements that outline the proper handling of credit card information. It was clear that insufficient attention was given to the network to ensure it met PCI DSS requirements. For discussion purposes, the focus is on the network. The PCI DSS outlines other standards that may have been violated related to the hardening of the POS server itself. The following four PCI DSS network requirements appear to have been violated: • Network segregation • Penetration testing • Monitoring • Virus scanning PCI requires network segments that handle credit cards be segmented. It was unclear whether there was a complete absence of segmentation or if weak segmentation had been breached. PCI DSS outlines the standards to ensure segmentation is effective. If the networks had been segmented, this breach would not have occurred. PCI requires that all public-facing networks be penetration tested. This type of testing would have provided a second opportunity to prevent the breach. This test would have uncovered such weaknesses within a Wi-Fi hotspot that allowed the public to access back-end networks. PCI also requires a certain level of monitoring. Given the size of the organization, monitoring might have been in the form of alerts or logs reviewed at the end of the day. Monitoring could include both network and host-based intrusion detection. Monitoring may have detected the network breach. Monitoring may also have detected the malware on the POS system. Both types of monitoring would have provided opportunities to prevent the breach. PCI requires virus protection. It was unclear if this type of scanning was on the POS system. If it was not, that would have been a PCI DSS violation. Such scanning provides one more opportunity to detect the malware. Early detection would have prevented the breach. The PCI DSS requirements are specific and adopt many of the best practices from other frameworks such as ISO. The approach is to prevent a breach from occurring. Early detection of a breach can prevents or minimize card losses. For example, early detection of the malware in this case study would have prevented card information from being stolen. Some malware takes time to collect the card information, which must then be retrieved. Quick reaction to a breach is an opportunity to remove the malware before any data can be retrieved.

500 words and APA format with references needed.

Unit 7 Lab

I just need this rephrased so it shows less than 10% match on turnitin.com please provide me the report.

Question

Question 1 

Which of the following would NOT be part of a GUI? 

icon 

menu 

button 

typing a command 

Question 2 

Which of the following data sets is NOT stored in sequential order? 

employees sorted by last name 

cars sorted by color 

tax records sorted by year 

customer records entered by two typists who split the list in half alphabetically 

Question 3 

What is the name of the array in the below housekeeping module?

score 

inScore 

while 

Question 4 

A use case variation that shows functionality outside the base case is a(n) ____. 

generalization 

specification 

extend 

scenario 

Question 5 

Assume a customer record contains the fields: 

custId

custName

custPhoneNum

custNextCustAddress

You could conclude this is part of a(n) ____. 

index 

linked list 

insertion sort 

swap 

Question 6 

In object-oriented programming, data fields are called ____. 

methods 

attributes 

modules 

details 

Question 7 

A basic query is: ____ custId, lastName FROM tblCustomer WHERE state = “WI” 

SELECT 

GRAB 

GROUP 

INSERT 

Question 8 

In a(n) ____ program the user could type either a letter or a number to select the same menu-option. 

default 

batch 

elegant 

user-friendly 

Question 9 

Usually a program that process an array uses a ____. 

decision 

 black box 

batch 

loop 

Question 10 

Collections of classes that serve a related purpose are stored in ____. 

modules 

libraries 

objects 

instances 

Question 11 

When updating a master file with a transaction file, you encounter a situation in which the master record key is larger than the transaction record key. What type of operation would be valid at this point? 

update 

addition 

deletion 

merge 

Question 12 

When you merge records from two or more files, the records (almost) always contain ____. 

the same data 

the same fields in the same order 

related information 

unrelated information 

Question 13 

A(n) ____ is an occurrence that sends a message to an object. 

event 

command 

prompt 

GUI 

Question 14 

When all of the code in a module accomplishes one task, it has ____. 

pathological coupling 

normal cohesion 

 functional cohesion 

normal coupling 

Question 15 

Assume an array has the following values: 90, 85, 65, 95, 75. What are the values in the array after the first operation in the bubble sort? 

85, 90, 95, 75, 65 

85, 90, 65, 95, 75 

65, 85, 90, 95, 75 

65, 75, 85, 90, 95 

Question 16 

A(n) ____ is unique among all records in a file. 

flag 

logical order 

key field 

index 

Question 17 

After the below code has executed, the ____ variable will hold the number of elements in the array.

inScore 

numberOfEls 

score 

files 

Question 18 

What type of variable controls the main loop of a file merging program? 

 temporary 

file 

flag 

character 

Question 19 

In an object-oriented program, one object can ____ another. 

define 

interpret 

inherit from 

own 

**********************************************************

Many programming languages provide the ability to generate ____ numbers. 

complete 

random 

long 

hidden 

When merging two files, what condition terminates the main loop of the program? 

when the first file reaches eof 

when the second file reaches eof 

when both files reach eof 

when 100 records have been processed 

What happens during a merging program when both input files contain the same value? 

an error occurs 

the program exits 

two identical records will appear in the merged file 

only one record will appear in the merged file 

The acronym ____ is used by computer professionals to mean that if you enter invalid input data into an application, the output results will be worthless. 

FIFO 

GIGO 

MIMO 

NIMP 

When using a case structure to process a menu selection, a program with four menu options will require ____ cases. 

Which of the following would be the best numeric high value? 

-999 

99 

 99999999999 

What is the purpose of the flag variable in a bubble sort? 

to eliminate unnecessary swaps 

to eliminate unnecessary comparisons 

to stop as soon as the list is sorted 

to sort an array of unknown size 

When merging, a ____ is used to determine which file the next record comes from. 

comparison 

loop 

sequence 

flag 

What step is present in coding an event-driven program but not part of creating a procedural program? 

Understand the problem. 

Code the program. 

Translate the program into machine language. 

Create storyboards. 

The questions that cause the database software to extract the appropriate records from a table and specify the fields to be viewed are called ____. 

reports 

queries 

keys 

indexes 

Assume an array has the following values: 90, 85, 65, 95, 75. What are the values in the array after the first complete pass through the list of the bubble sort? 

85, 65, 90, 75, 95 

85, 90, 65, 75, 95 

65, 85, 90, 75, 95 

65, 75, 85, 90, 95 

Which of the following is responsible for the initiation of a method in an event-driven program? 

a loop 

a conditional statement 

a sequential statement 

a mouse click 

You need to understand a subroutine’s ____ in order to use it. 

internal structure 

local variables 

programming style 

interface 

The numbers 1 3 5 6 7 10 15 are stored in ____ order. 

descending 

random 

ascending 

physical 

A diagram that shows which screen leads to another is called a(n) ____. 

storyboard 

object dictionary 

interactivity diagram 

flowchart 

What are signs of amateur design in a GUI? 

menus placed on the top of the screen 

icons that represent real-world objects 

fancy fonts and weird color combinations 

allowing the user to customize the background color 

What is the largest unit in a data hierarchy? 

character  

field 

record 

file 

Which of the following is an example of an interactive program? 

payroll processing system 

billing system 

inventory system 

library catalog 

A(n) ____ use case is indicated with an open-headed dashed arrow. 

extend 

include 

generalization 

modification 

In an object-oriented program, ____ are passed to ____. 

methods, classes 

messages, objects 

modules, actions 

objects, methods 

****************************************************

A(n) ____ sort works by finding an element that is “out of order”. 

bubble 

selection 

insertion 

swap 

Which of the following is NOT a UML diagram? 

Use case 

Activity diagram 

Implementation diagram 

Component diagram 

What is the loosest style of coupling? 

data 

external 

data-shared 

control 

Methods in object-oriented programs have ____ access. 

private 

public 

derived 

overloaded 

When writing a module containing statements that repeat but may contain different variable values, you can use a(n) ____ to create a more elegant solution. 

decision statement 

stub 

array 

batch 

What action does a merging program take after it writes a record from file 1? 

writes the next entry from file 1 

writes the next entry from file 2 

reads the next entry from file 2 

reads the next entry from file 1 

A ____ file can be used to update a master file. 

merge 

data 

transaction 

detail 

____ columns can hold any type of charactersletters or digits. 

Text 

Character 

String 

Number 

Creating a many-to-many relationship in the database involves ____. 

creating a link table 

placing the foreign key in the related table 

placing the foreign key in the base table 

ensuring each table should have a foreign key to the other 

What is the mean value for the following numbers?

1 2 20 30 40 50 100 

30 

34.71 

50 

100 

A class diagram illustrating a single class contains a rectangle divided into three sections: the top section contains the ____, the middle section contains the ____, and the bottom section contains the ____. 

name of the class, names of the attributes, names of the methods 

name of the class, names of the methods, names of the attributes 

class header, names of the methods, names of the attributes 

name of the class, names of the exceptions, names of the subclasses 

What is the most common table relationship? 

one-to-one 

one-to-some 

one-to-many 

many-to-many 

Data records are stored in ____ order. 

sequential 

shared 

default 

grouped 

Another name for data coupling is ____ coupling. 

normal 

data-structure 

external 

internal 

In a batch program records are always ____. 

saved and processed at one time 

processed as they come in 

typed in by a user and processed 

loaded from a database 

********************************************************

A(n) ____ diagram consists of a rectangle divided into three sections. 

object 

entity 

class 

attribute 

A third-level menu is also called a ____. 

batch 

main menu 

submenu 

console 

Which UML diagram shows the system from the perspective of users? 

use case 

statechart 

activity diagram 

collaboration diagram 

What UML diagram has the closest resemblance to a conventional flowchart? 

sequence 

class 

statechart 

activity 

In a database, files are called ____. 

characters 

rows 

columns 

 tables 

The ____ menu of a program contains the quit option. 

main 

submenu 

exit 

default 

In a(n) ____ sort all of the array elements are moved to make room for the newly sorted element. 

swap 

selection 

bubble 

insertion 

Module statements that are “invisible” to the rest of the program are said to be in a(n) ____. 

function 

black box 

orange triangle 

loop 

How many loops are there in a bubble sort? 

A(n) ____ is an example of a random-access storage device. 

linked list 

disk 

index 

physical memory 

Which of the following sorting methods is least efficient? 

insertion 

selection 

basic bubble sort 

optimized bubble sort 

Frequently, records are stored in order of their ____ field. 

primary 

unique 

key 

numeric 

The ____ clause of a database query allows you to retrieve rows that match specified criteria. 

SELECT 

WHERE 

FROM 

EQUAL 

Which of the following is a static UML diagram? 

class 

statechart 

activity 

collaboration 

To create a new object of a class, you must ____ it. 

 instantiate 

derive 

inherit 

enable 

How many passes through an optimized bubble sort would be required to sort values 10, 20, 30, 40, 50, 60? 

 5 

What type of variable is used to help move array elements in a selection sort? 

swap 

flag 

temporary 

array 

There are two types of relationships shown in class diagrams: ____. 

association and is-a 

generalization and includes 

association and aggregation 

aggregation and integration 

When a large amount of data needs to be sorted, it is more efficient to store the logical order and the physical address in a(n) ____ than to sort the data. 

index 

array 

memory address 

linked list 

The last task that any menu-driven program should perform is ____. 

accept another response 

displaying nothing 

reading the user response 

performing a module based on user selection 

******************************************

Like programming languages, ____ contain built-in functions. 

spreadsheets 

menus 

GUIs 

Web browsers 

Assume an array has the following values: 90, 85, 65, 95, 75. What are the values in the array after the bubble sort has finished? 

85, 65, 90, 75, 95 

85, 90, 65, 75, 95 

65, 85, 90, 75, 95 

65, 75, 85, 90, 95 

What is another name for command line? 

GUI 

command window 

command prompt 

command menu 

Where is the best place to put a menu bar? 

top of screen 

left side of screen 

right side of screen 

bottom of screen 

A rectangular area that displays text is a(n) ____. 

option button 

button 

label 

text field 

GUI components are often referred to as ____. 

widgets 

gadgets 

icons 

buttons 

____ values can be both letters and numbers. 

Numeric 

Boolean 

Character 

Black box 

A method ____ describes how to use the method. 

stamp 

black box 

 signature 

argument list 

After the final pass in a selection sort the values 95, 80, 75, 65, 90 will be ordered as ____. 

65, 80, 75, 95, 90 

65, 75, 80, 90, 95 

65, 75, 95, 80, 90 

65, 80, 75, 90, 95 

When matching records between files, they must be ____. 

sorted in the same order 

the same length 

backed-up 

printed 

When ____ coupling is used an entire record is passed from one module to another. 

 data 

data-structured 

control 

external 

A college maintains a master file of all students and a transaction file for each course registration is an example of a ____ relationship. 

master-transaction 

equal 

parent-child 

master-detail 

A class that inherits attributes and methods is a(n) ____ class. 

child 

parent 

object 

overlord 

The tables with the following definitions are related with a ____ relationship. tblCustomers(customerNumber, customerName) tblOrders(orderNumber, customerNumber, orderQuantity, orderItem, orderDate) 

one-to-one 

one-to-some 

one-to-many 

many-to-many 

What is the most common database query language? 

SQL 

MML 

C++ 

Java 

The variable’s ____ in no way affects how the method is called from another module. 

local name 

data type 

size 

definition 

What is the first step in writing an event driven program? 

Test the program. 

Define the connections between the screens the user will see. 

Understand the problem. 

Define the objects. 

After you choose a primary key from among candidate keys, the remaining candidate keys become ____ keys. 

compound 

foreign 

alternate 

discarded 

A housekeeping routine exhibits ____ cohesion. 

functional 

temporal 

procedural 

logical 

When a database program includes counts or totals at the end of each sorted group, its creation is a(n) ____ report. 

query 

primary key 

grouped 

control break 

*********************************************************

Question 80 

____ are used to organize files. 

Characters 

Records 

Fields 

Databases

Question 81 

Which of the following is NOT another name for a module? 

subroutine 

function 

procedure 

loop

Question 82

A control break program that calculates totals for each category and a grand total has four modules: startUp, bookListLoop, categoryChange, closeDown. In which module would you expect to see the category total incremented? 

startUp 

bookListLoop 

categoryChange 

closeDown

Question 83

In a flowchart depicting a module, what shape does the return statement have?

circle

oval

rectangle

diamond

Question 85

In order to have the most efficient program, which question should be asked first when working with an AND decision? 

the one that is less likely to be true 

the one that is more likely to be true 

the one that involves fewer comparisons 

the one with the lower value

Question 86

Which of the following would NOT be a valid comparison to control a while loop? 

rep < 65

rep > 1

rep > true

rep * 3 > 100

Question 88

When creating a printed report, you need to clarify whether the user wants a specific number of ____ lines per page, including headings, or a specific number of ____ lines per page following the headings.

detail, total

total, detail

heading, total

heading, detail

Question 100

In which programming language could the starting subscript be 13?

Java 

VisualBasic  

COBOL