discussion

 

To successfully complete this week’s discussion, you will need to use the Strayer University Library to research best practices for managing competing priorities and negotiating scope on IT projects.

IT professionals often face differing and competing priorities from business units.

Please respond to the following in a substantive post (3–4 paragraphs):

  • Suggest one strategy for negotiating an achievable project scope without damaging the relationship with business units.
  • Describe the steps you would take to implement your strategy.
  • Consider how you might use this strategy with your course project deliverable.

programming exercise 3

refer to the attached documents in the uploads for details and guidelines.

First attachment is the actual exercise and second one is the modified one. So work and program as per second one and also follow the guidelines as mentioned in first one  as well. Please read and follow both the attachments carefully.

Notes on W(5) H(1) for THREE New Research Articles and Compare & Contrast Research (p. 16a)

  1. (You do NOT need to use the “CHECK YOUR SIMILARTY HERE” submission box, as you will be cutting and pasting again for this note-taking assignment)

    You must find THREE more research articles related to your topic in exploration of your research question. 

    For this assignment, you are asked to download the Finals ‘Mission’ Packet below and SAVE it to your computer. You will be working on this document for the rest of the semester. 

    Open to p. 13a and complete Phase I and Phase II for all FOUR research articles you found. 

    Final ‘Mission’ Packet.docx

    GRADING
    EACH set of W(5) H(1) equals 25 pts 

Assignment Content

  1. At this point, you have found your research articles exploring your approved research question and you have learned how to find your 6 ‘ingredients’ during class

    You learned about the W(5) H(1) and completed Phase 2 on p. 13a of your Final ‘Mission’ Packet (Found in W. 4’s HW). This will be IMPORTANT for Week 7 so you MUST complete this before our next meeting. These notes will also help you with this assignment. See below

    1. You will open your Final ‘Mission’ Packet that is saved to your computer, and turn to p. 16a, “Activity: Analyze Your Research Articles: Compare and Contrast.” 
    2. Complete p. 16a using all 4 research articles in your workbook and them COPY and PASTE into a NEW Word document to be submitted here. 
    3. Grading: 
      Comparison = 50%
    • To earn full credit, you will have mentioned all four research articles, used correct in-text citations, used appropriate comparison, transition words, have written in full sentences, and have written FULLY in your own words. 
    • Contrast = 50% 
    • To earn full credit, you will have mentioned all four research articles, used correct in-text citations, used appropriate contrasting, transition words, have written in full sentences, and have written FULLY in your own words. 

CPT Experience Discussion

 

Have you learned concepts from your coursework that have helped you during your externship?  Discuss specific content that has been applicable to your job and how you have implemented what you are learning into your current position.

Have learning experiences during your externship been beneficial to your academic progress?  Discuss specific experiences that you have applied to your academic projects.

Discussion Assignments

1.Write at least 500 words discussing the advantages and disadvantages of each method from the article from the link below. Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list in APA format.

Link:https://rviews.rstudio.com/2019/07/17/3-big-data-strategies-for-r/

2.Write at least 500 words discussing weaknesses of sentiment analysis to improve a call center.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.

SECURE CLOUD ARCHITECTURE

BUSINESS CASE:  Airport Data Center

Airport’s currently capacity is 15 000 Passengers a day. There are 150 full time employees along with 128 part time employees.

IT system components of Airport Datacenter

– Database for Passengers

– Database for airlines / flights

– Database for Employees

– Processing / Computing: Preparing Passengers invoices, boarding passes  

Long term data storage to fulfill the regulations the airport must maintain (keep) the passenger and flight data for five years.

QUESTIONS 

QUESTION 1. There is an increased risk of accident where a huge cargo Aircraft might go out of control and damage Airport’s Datacenter. What can you do to reduce impact of this threat so Airport continues to operate?

QUESTION 2 There is an increased risk of power blackouts at the Airport’s Datacenter due to heavy storm in the region. What can you do to reduce impact of this threat so Airport continues to operate?

Consider this new case while answering the question 3,4,5 and 6.

Airport is growing fast and it is going to reach 30 000 Passengers a day. It looks like current data center would not be able to handle the influx of new passengers and new airlines. And, this is happing fast, there is no time to physically expand the Airport Datacenter.

QUESTION 3: Which components of the Airport’s Datacenter you would move the cloud to meet the demand? And which components of the Airport’s Datacenter you would keep in the datacenter of the airport. Explain your rationale (give the justification for the choice you make)

QUESTION 4:  Before moving the IT components to cloud that you have mentioned in question 3; What would be System Requirements that you look for the cloud service provider?

QUESTION 5: Assuming that; you decided to shift a great deal of day-to-day management the cloud-solution provider (agreement with the cloud service provider company). As an IT manager what you would do to monitor system performance for the Airport’s Datacenter?

QUESTION 6: How you would address following three Security issues related to long term operation of Airport’s Datacenter in partnership with the cloud service provider?

  1. Unauthorized disclosure of passengers’ data
  2. Unauthorized alternation and modification of airlines’ flight data
  3. Destruction of stored/ archived passengers’ data

redundancy discussion

Please respond with a minimum of 150 words to the peer discussion post below after reading the initial discussion first. 

Initial Discussion:

 Discuss the relationship between data redundancy and normalization. What are the consequences if databases are not normalized? What problems is normalization addressing? Why is normalization crucial for effective database design and development? 

Peer Discussion:

 Hello class,

Database normalization is described as the process of arranging a relational database’s columns (attributes) and tables (relations) to decrease data redundancy and enhance data integrity. The fundamental connection between the two is to eliminate redundancy and provide data accessibility.

It entails organizing attributes in tables based on attribute dependencies and ensuring that the relationships are appropriately enforced by database integrity requirements.

The implications of not normalizing a database are a lack of data integrity and massive data redundancy, which leads to no access to the database. The issue with normalizing addressing is that additional tables must be joined. This implies that by dividing your data into additional tables, we increase the number of tables that must be joined. Another issue is that tables contain codes rather than actual data: Instead of meaningful data, the repetitive data is kept as codes. As a result, the value must always be obtained from the lookup table. The main issue is that the data model is difficult to query upon. This indicates that the data model is designed for applications rather than ad hoc queries. Normalization is critical for database design and development since it allows for the creation of smaller databases. We will be able to lower the total size of the database by removing duplicate entries. By offering ->, it improves database speed. Narrow tables: Having more fine-tuned tables allows your tables to have fewer columns and fit more records per data page. It also results in fewer indexes per table, which means faster maintenance chores like index rebuilds. This makes the database appear nice and easy to use.

PMP

Download The Attachment and Message Me Please for Detailed Instructions