Showing posts with label architecture. Show all posts
Showing posts with label architecture. Show all posts

Tuesday, 6 October 2020

What is Database system ?

UK assignment helper

MITS4003 

Database Systems 


Assignment 1 


August 2020 


Objectives(s) 

This assessment item relates to the unit learning outcomes as in the unit descriptor. This assessment is designed to improve students’ skills to analyze organization database requirements, develop a data model to reflect the organization’s business rules and use data manipulation language to manage database. This assessment covers the following LOs. 

1. Synthesize user requirements/inputs and analyse the matching data processing needs, demonstrating adaptability to changing circumstances;

 2. Develop an enterprise data model that reflects the organization's fundamental business rules; refine the conceptual data model, including all entities, relationships, attributes, and business rules. 

3. Derive a physical design from the logical design taking into account application, hardware, operating system, and data communications networks requirements; 

Case Study: 

Prestige Automobile Rental (PAR) is a vehicle rental company that rents old vehicles to the public. PAR has been using manual methods for keeping track of their customers and their rentals. However, the company would now like to go online and allow customers to search the available vehicles and see their rental history. 

For the first time, when the customer rents a vehicle from PAR their details (name, address, phone number, driving license number and credit card number) are recorded. The date they become a customer is also stored. There are certain types of vehicles which are classified as heavy vehicles. It is a policy of PAR that these vehicles are only rented to customers who have no demerit points on their driving license. 

The information about the vehicle (type, registration number, year/make/model, vin number, distance travelled and current condition) are also stored. Each vehicle has a unique ID. The customer can search for their desired vehicle and can see if it is available. 

 All rentals are for 7 days. Rental charges are based on the type of vehicle (Car (C) or Heavy Duty (HD)). Rental must be paid for on collection. Customers can rent up to 2 vehicles at a time. Each rentalID is for a single vehicle for one customer. (The rentalID is an auto number). When the rental is taken out the date of checkout is recorded along with calculated due date (7 days from checkout date). When the rental is returned, the date is recorded in the returned date.

 PAR would like to store ‘demerit’ points for the renter in order to identify bad renters. These demerit points are accumulated at a rate of one point per day a rental is overdue. PAR will cancel the membership of the customers who have too many demerit points. 

Assignment Requirements and Deliverables: 

Part A - 10% (Due in week 5) 

Submitted as a MS Word Document 

• Develop an Entity Relationship Diagram 

• Relational Schema (including Primary, Foreign Keys and all attributes). 

• Supplementary Design requirements (data attribute information)

 • Discuss physical design and any assumptions made during design 



Marking Guide: 

Marking Guide:

Marking Guide: Unacceptable

Acceptable

Good

Excellent

Entities, Primary Keys, Relationship

Does not adequately have all required Entities, Primary Keys and Relationship in ER diagram

Partially have all required Entities, Primary Keys, and Relationship in ER diagram

Most of the required Entities, Primary Keys and Relationship are there in ER diagram

All Entities, Primary Keys and Relationship are there in ER diagram

Relational Schema

Does not adequately have required tables, Primary Keys and Foreign keys

Partial have required tables, Primary Keys and Foreign keys.

Most of the required tables, Primary Keys and Foreign keys are there.

All tables, Primary Keys and Foreign keys are there.

Supplementary Design Requirements

Does not adequately have required attributes.

Partially have required attributes.

Mentioned most of the required attributes.

All required attributes are there.

Discussed physical design

Adequately discussed about relationship in physical design.

Partially discussed about relationship in physical design.

Covered most of the relationship in discussion.

Covered all relationship in discussion.

 


Wednesday, 16 September 2020

IT 8100 DATABASE ARCHITECTURE AND DESIGN

UK assignment helper





 IT 8100 DATABASE ARCHITECTURE

AND DESIGN


Group Activity

3

“Student Information

System”

ERD Conceptual Model and

Structured Query Language (SQL)


Group Activity

3 “Student Information System”

3

ERD Conceptual Model

1.

Create the Entity Relationship

Diagram ERD)

Create the Entity Relationship

Diagram ERD) for the following

tables:

Student

Course

Offering

Faculty

Enrollment




2. Convert the Entity ER

Diagram to Relational

Schemas

Convert the Entity ER

Diagram to Relational

Schemas.

Create the appropriate

Relationships, Cardinality

1 1, 1 N, N 1, M N ), and

Key Fields


Use these attributes for your tables:

Student

stdSSN

stdFirstName

stdLastName

stdCity

stdState

stdZip

stdMajor

stdClass

stdGPA

Course

CourseNo

crsDesc

CrsUnits

O ffering

OfferNo

CourseNo

OffTerm

OffYear

OffLocation

OffTime

FacSSN

OffDays

Faculty

FacSSN

FacFirstName

FacLastName

FacCity

FacState

FacZipCode

FacRank

FacHireDate

FacSalary

FacSupervisor

FacDept

Enrollment

OfferNo

StdSSN

EnrGrade


3

. Write the Structured Query

Language (SQL ) for the Relational

Schemas

Write the Structured Query

Language (SQL) for

the Relational Schemas

Declare the appropriate

column names, data types,

lengths and constraints


4. Write Structured

Query

Language (SQL ) Commands

Write and enter the SQL commands to add records into your

Student Information System tables (at least 5 records in each table).

Write the SQL commands to produce four different reports,

Including joins between tables.

Queries using l ogical, arithmetic, and comparison operators.

Sort the reports by different tables.

Tuesday, 15 September 2020

DATABASE ARCHITECTURE AND DESIGN

UK assignment helper


 




IT 8100 DATABASE ARCHITECTURE AND DESIGN


“Contract-Supplier System”

ERD Conceptual Model

Group Activity 2 “Contract-Supplier System”

3

• A company negotiates contracts with suppliers to provide certain amount of items at a fixed price

 • Orders are placed against any of the already  negotiated contracts 

• A contract could provide items to any number of  orders.

 • An order may include any number of items negotiated in the contract

 • Orders should not exceed the maximum amount of items quoted in the contract 

• All items in an order must be provided as part of a single contract and a single project ERD Conceptual Model

Group Activity 2 “Contract-Supplier System”


Create the Entity Relationship Diagram (ERD) Conceptual Design 

Monday, 14 September 2020

Short Paper Guidelines and Rubric

UK assignment helper





 IT 415 Short Paper Guidelines and Rubric

Short papers offer additional opportunities for analysis of the system design process. In the first short paper, you will discuss a sample system design

document, and in the second short paper, you will summarize each document that will be included in your detailed design.

You are required to write two short papers.

Guidelines for Submission: Submit assignment as a Word document with double spacing, 12-point Times New Roman font, and one-inch margins.

Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value

Content Demonstrates strong or Demonstrates knowledge with Demonstrates knowledge but Fails to demonstrate knowledge 20

adequate knowledge of the some errors or omissions with major errors or omissions of the materials

materials

Critical Analysis Provides a strong critical analysis Provides analysis and Provides analysis and Fails to provide critical analysis 20

and interpretation of the design interpretation of design interpretation of design and interpretation of the design

document document with some errors or document but with major errors document

omissions or omissions

Sources/Examples Sources or examples meet Sources or examples meet Sources or examples meet Source or example selection and 20

required criteria and are well required criteria but are less required criteria but are poorly integration of knowledge from

chosen to provide substance than adequately chosen to chosen to provide substance the course is clearly deficient

and perspectives on the issue provide substance and and perspectives on the issue

under examination perspectives on the issue under under examination

examination

Writing (Mechanics) Paper is clearly organized, well Paper is fairly well organized and Paper is poorly organized with Paper is not organized or well 20

written, and in proper format written, and is in proper format inconsistent and inadequate written; work is of poor quality

with strong sentence and with reasonably good sentence sentence and paragraph and unacceptable in terms of

paragraph structure and few and paragraph structure, but development, and numerous grammar and spelling

errors in grammar and spelling significant number of errors in errors in grammar and spelling

grammar and spelling

Writing (APA) Paper contains proper APA Paper contains few errors in APA Paper contains significant errors Paper contains more than five 20

formatting with no more than formatting in APA formatting significant errors in APA

one significant error formatting

Earned Total 100%

Thursday, 10 September 2020

Case Study Analysis Guidelines and Rubric

UK assignment helper

  




IT 380 Module Three Case Study Analysis Guidelines and Rubric

Overview: This case study analysis will help you analyze a cybersecurity scenario and identify which principles were violated. Each skill in this paper is an essential part of the final project and accompanying milestones in this course.

Prompt: Use the articles from the Module Three required resources to analyze the cyber security occurrence, determine which principles were violated, and recommend appropriate policies to prevent recurrence.

Scenario: In February 2015, as many as 80 million customers of the nation’s second‐largest health insurance company, Anthem Inc., had their account information stolen. This compromise affected customers in at least 14 different states where Anthem provided services.

The hackers gained access to Anthem’s computer system and got information including names, birthdays, medical IDs, Social Security numbers, street addresses, email addresses, and employment information including income data. Both current and former customers were exposed during this breach.

So, while this was an attack against a medical provider and it resulted in a massive data breach, regulatory requirements were not sufficient to help prevent this breach. Because no actual medical information appears to have been stolen, the breach would not come under Health Insurance Portability and Accountability Act (HIPAA) rules, which govern the confidentiality and security of medical information.

Based on the Test Out sections from this module and the additional module resources you have reviewed, your paper should address the following critical elements:

 Identification of cyber security principles that were violated and rationale of cause

 Analysis of cryptography that would have helped prevent this breach

 Recommendation of additional policies that would have been useful to mitigate the breach or even prevent the breach


Rubric

Guidelines for Submission: Your paper should be submitted as a 2‐ to 3‐page (in addition to the cover and reference pages) Microsoft Word document with double spacing, 12‐point Times New Roman font, and one‐inch margins. All sources must be cited in APA format.

Critical Elements

Exemplary (100%)

Proficient (90%)

Needs Improvement (70%)

Not Evident (0%)

Value

Identification of Cybersecurity Principles That Were Violated

Meets “Proficient” criteria and correctly identifies which principles were violated with empirical supporting examples

Correctly identifies which principles were violated with supporting examples

Identifies which principles were violated but supporting examples have gaps

Does not identify a single principle

30

Analysis of Cryptography and Prevention

Meets “Proficient” criteria and analysis demonstrates keen insight of cryptography and prevention methods

Analysis demonstrates accurate knowledge of cryptography and prevention methods

Analysis demonstrates knowledge of cryptography but needs additional information to support prevention ideas

Does not analyze the cryptography and prevention methods

30

Policy Recommendation

Meets “Proficient” criteria and recommendation demonstrates understanding of policies that would remedy the situation appropriately

Recommends policies to ensure proper resolution of scenario

Recommends a single policy to remedy situation but recommendation has gaps in strategic implementation

Does not recommend any policies

30

Proper Use of Writing, Mechanics, and Grammar

Paper is free of errors in organization and grammar with applicable sources cited

Paper is mostly free of errors of organization and grammar; errors are marginal and rarely interrupt the flow; cites applicable sources

Paper contains errors of organization and grammar but errors are limited enough so that assignments can be understood; cites applicable sources

Paper contains errors of organization and grammar making the content difficult to understand

10

Total

100%

Wednesday, 9 September 2020

Ethical Case Study

UK assignment helper

 





Ethical Case Study Project Guidelines

Overview

You write a case study based on your own experience related to an ethical issue within an organization; or you may choose to write about an emerging ethical issue within your current or planned industry. The case study can be fully anonymous to protect those within your organization, and you may choose to identify your role in the case study or not. Your case study will be submitted for a grade in parts throughout the term with the entire final document as the last deliverable. Please review these general tips and guidelines. How to approach writing your case:

• Assume you are one of the leaders in the organization. Write with clarity and confidence on the topic based on what you have learned prior to and during this course.

• Pretend that the audience reading this case study knows nothing about the situation or ethical philosophy, decision-making, etc. Provide enough detail to give readers enough information to draw conclusions, but remain succinct.

• Explain, as needed, the context, evaluate the evidence, and make a decision concerning the appropriate course of action, and support your conclusion through arguments and counter-arguments.

• Take a clear and decisive position – What would you do in this case? What ethical decision-making framework did you use? What most influenced your decision?

Formatting Requirements

The formatting of this document should be as follows:

• Use consistent formatting throughout (12 pt font, Times New Roman, single-spaced).

• Do review your paper thoroughly for grammatical issues and typographical errors!

• Use cover page and references

• Cite your sources (do not use Wikipedia or Blog, etc.) and list them in a reference page per APA style.

• At minimum 5 resources that are published no more than five years ago. Choose scholarly resources (i.e., peer-reviewed journal, sources from your industry/organization, and (sparingly) the textbook.

• 9-12 body pages (single-spaced, not including cover page and references).

Project Timeline

• Week 3: Choose an ethical issue and a topic. See the assignment for details.

• Week 4: Part 1 and Outline of Case

• Week 5: Part 2

• Week 6: Part 3

• Week 7: Final Document

• Week 8: Final Presentation

Ethical Case Outline

Part 1: Describe the case (3-4 pages):

• Identify the parties involved, their rights, their responsibilities

• Identify the salient ethical and/or legal issues of the case

• Identify the relevant factual issues, conceptual issues, social constraints, and any additional information necessary for an accurate understanding of the case.

• If needed, conduct research about the issue from multiple perspectives and include relevant ethical theory, legal requirements, and technical details about the case to ensure that the case can be solved.

• See OWL Sample Outlines for formatting information.

Part 2: Critically analyze the case (3-4 pages):

• Identify the primary “ethical dilemma (or question)” in the case.

• Formulate possible courses of action.

• Discuss any role that information technology or context played in creating the special circumstances of the case.

• Evaluate the strengths and weaknesses of those actions.

• Analyze different courses of action, are they based on a consequential or non-consequential approach? Are these courses of action ethical?

• Weigh the pros and cons of each action.

Part 3: Solve the case (3-4 pages):

• Indicate which course of action you would choose, and why. If you were personally involved in the scenario, you can detail what you DID do compared to what you WOULD do given what you have learned in this course.

• Provide your own opinions: do not rephrase the opinions of others, create your own, unique viewpoint based on your ethical philosophy, ethical decision-making framework, and the context and scenario of the case.

• Clearly demonstrate and explain how the pros of your solution outweigh the cons.

• Use the facts of the case and supporting resources to convince your readers of the soundness of your ethical point of view

Final Document

• All parts due as one cohesive document.

• Be sure to have addressed any issues or concerns that were brought to your attention from each individual part.

Final Presentation

• Create a 8-10 minute narrated presentation that is limited to 10 slides

Tuesday, 8 September 2020

Computer network design, implementation and testing.

UK assignment helper

 





 

Southampton Solent University

Coursework Assessment Brief

Assessment Details

 

Unit Title:

Networks

Unit Code:

COM712

Unit Leader:

Warren Earle

Level:

7

Assessment Title:

Report referral

Assessment Number:

AE3

Assessment Type:

Report

Restrictions on Time/Word Count:

3000

Consequence of not meeting time/word count limit:

 

There is no penalty for submitting below the word/count limit, but students should be aware that there is a risk they may not maximise their potential mark.

 

Assignments should be presented appropriately in line with the restrictions stated above; if an assignment exceeds the time/word count this will be taken in account in the marks given using the assessment criteria shown.

 

Individual/Group:

Individual

Assessment Weighting:

50%

Issue Date:

July 6th 2020

Hand In Date:

4th September 2020

Planned Feedback Date:

4th September 2020

Mode of Submission:

on-line

Number of copies to be submitted:

Where on-line submission via ‘Solent Online Learning’ is used, students are not required to submit a hard copy.

Anonymous Marking

 

This assessment:

Will be marked anonymously

 

Assessment Task

The assessment task is to rework a report on a computer network design, implementation and testing.

Please see enclosed details

Networking Report – please read very carefully

 

         

XYZ are a company in the South of England. They have an office in Southampton with staff in three departments, Sales, Marketing and Admin. A new network is proposed. Each department will have its own router. The router in the Admin department will have a connection to an Internet Service Provider router to provide Internet connectivity for all departments. The business network must use an interior gateway routing protocol.

 

 


The tasks are as follows:

1)           Design an IPv4 and IPv6 addressing scheme for the network (including the interfaces on the ISP routers connected to the company office).

Use 192.168.0.0/24 network address subnetted into three networks for Sales, Marketing and Admin each with 62 possible usable addresses.

Use 198.51.100.0/30 as the network address for the ISP

Use the following IPv6 network addresses do not subnet them.

2001:db8:cafe:1::/64

2001:db8:cafe:2::/64

2001:db8:cafe:3::/64

  Design, implement and test a network with routers and switches and essential additional services including DHCP, DNS and a webserver to provide network services and business network applications.

2)           Run tests to demonstrate that you have formulated a correct solution to the problem and full network connectivity is possible using ipv4 and ipv6.

3)           Recommend and demonstrate configuration of device security policies  for routers and switches on the network.

Write up your work in the form of a report that discusses and analyses the design of the network and the addressing scheme. Also discuss and analyse the configuration and commands that you used to configure the addresses, routing protocols and authentication. Discuss and analyse the results of the tests that you made on the network.  Formulate conclusions and recommendations from your work and the results. The report should address all points raised in the marking scheme below.

 

 

 

Assessment criteria

Evidence of knowledge, problem solving, implementation and professional skills will be required. See enclosed details.

 

Learning Outcomes

This assessment will enable students to demonstrate in full or in part the learning outcomes identified in the unit

T1      Present information and evaluation on an independently researched topic descriptors.

C1      Design an addressing scheme to fulfil given requirements in IPv4 and IPv6 networks.

P1      Demonstrate a sound justification for the approach adopted in designing an Ethernet network using routers and switches.

 

This assessment will enable students to demonstrate in full or in part the learning outcomes identified in the unit descriptors.

Late Submissions

 

Students are reminded that:

 

i.         If this assessment is submitted late i.e. within 5 working days of the submission deadline, the mark will be capped at 40% if a pass mark is achieved;

ii.        If this assessment is submitted later than 5 working days after the submission deadline, the work will be regarded as a non-submission and will be awarded a zero;

iii.      If this assessment is being submitted as a referred piece of work (second or third attempt) then it must be submitted by the deadline date; any Refer assessment submitted late will be regarded as a non-submission and will be awarded a zero.

 

http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-2/2o-assessment-policy-annex-1-assessment-regulations.pdf?t=1411116004479

 

Extenuating Circumstances

The University’s Extenuating Circumstances procedure is in place if there are genuine circumstances that may prevent a student submitting an assessment. If students are not 'fit to study’, they can either request an extension to the submission deadline of 5 working days or they can request to submit the assessment at the next opportunity (Defer).  In both instances students must submit an EC application with relevant evidence.   If accepted by the EC Panel there will be no academic penalty for late submission or non-submission dependent on what is requested.  Students are reminded that EC covers only short term issues (20 working days) and that if they experience longer term matters that impact on learning then they must contact a Student Achievement Officer for advice.

 

A summary of guidance notes for students is given below:

 

http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-4/4p-extenuating-circumstances-procedures-for-students.pdf?t=1472716668952

 

 

Academic Misconduct

Any submission must be students’ own work and, where facts or ideas have been used from other sources, these sources must be appropriately referenced. The University’s Academic Handbook includes the definitions of all practices that will be deemed to constitute academic misconduct.  Students should check this link before submitting their work.

 

Procedures relating to student academic misconduct are given below:

 

http://portal.solent.ac.uk/support/official-documents/information-for-students/complaints-conduct/student-academic-misconduct.aspx

 

 

 

Ethics Policy

The work being carried out by students must be in compliance with the Ethics Policy. Where there is an ethical issue, as specified within the Ethics Policy, then students will need an ethics release or an ethical approval prior to the start of the project.

 

The Ethics Policy is contained within Section 2S of the Academic Handbook:

http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-2/2s-university-ethics-policy.pdf

 

 

Grade marking

The University uses a letter grade scale for the marking of assessments. Unless students have been specifically informed otherwise their marked assignment will be awarded a letter grade. More detailed information on grade marking and the grade scale can be found on the portal and in the Student Handbook.

 

Policy:             http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-2/2o-assessment-policy.pdf

 

 

Guidance for online submission through Solent Online Learning (SOL)

 

http://learn.solent.ac.uk/onlinesubmission

 



Criteria

F3...........................................F1

D3..........................................D1

C3.........................................C1

B3.............................................B1

A4..................................................A1

1. Design & implementation of ipv4 and ipv6 addressing scheme & referencing (30%)

Little attempt to produce satisfactory or workable ipv4 and/or no description at how the scheme was derived, and/or no references.

Satisfactory introduction and description of how a workable ipv4 addressing scheme was derived. Some references used.

 

Good introduction and discussion of decisions made that evidence a correctly formulated ipv4 addressing scheme. Supported by a range of references.

Very good introduction and discussion of networking design requirements and discussion of decisions made that evidence a correctly formulated ipv4 addressing scheme. Supported by a good range of references.

Excellent introduction and analysis of networking design requirements and comprehensive justification of decisions made that evidence a full and correctly formulated ipv4 scheme. Analysis is supported by an excellent range of references.

2. Research and specify static routes or  routing protocols to meet defined requirements & referencing (30%)

Poor discussion of an/or evidence of a working solution with little proof of support from tests and /or no references

 

Satisfactory introduction and discussion of working solutions to the problem evidenced by description of test results. Some references used.

Good introduction and discussion and demonstration of a working solution to the problem evidenced by discussion of a sequence of test results. Supported by a range of references.

Introduces and demonstrates very good understanding of the routing design requirements and is able to discuss and prove a working solution to meet them evidenced by analysis of a sequence of test results. Supported by a good range of references.

Introduces and demonstrates excellent and professional understanding of the routing design requirements and is able to comprehensively analyse and prove a fully working solution to meet all of them evidenced by comprehensive analysis of a thorough sequence of test results. Analysis of solutions supported by an excellent range of references.

3. Design, implementation and testing  (20%)

Poor discussion of an/or evidence of a working solutions with little proof of support from tests and/or no references

 

Satisfactory introduction and discussion of working solutions for some additional services evidenced by description of test results. Some references used.

Good introduction and discussion and demonstration of a working solution for additional services evidenced by discussion of a sequence of test results. Supported by a range of references.

Introduces and Demonstrates very good understanding of the additional services required and is able to discuss and prove a working solution to meet them evidenced by analysis of a sequence of test results. Supported by a good range of references.

Introduces and Demonstrates excellent and professional understanding of the additional services required and is able to comprehensively analyse and prove a fully working solution to meet all of them evidenced by comprehensive analysis of a thorough sequence of test results. Analysis of solutions supported by an excellent range of references.

4. Conclusions and recommendations that relate to the case study & referencing P1 (20%)

Poor conclusions and recommendations. Doesn’t relate to the case study and/or no references.

Satisfactory conclusions and recommendations that relate to the case study by evaluating the effectiveness of the solution. Some references used.

Good conclusions and recommendations that relate well to the case study and evaluation of the effectiveness of the solution. Supported by a range of references.

Very good conclusions and recommendations that relate fully to the case study, fully evaluating the solution and alternatives. Supported by a good range of references.

Excellent and professional conclusions and recommendations that are fully justified and meaningful in the context of the case study, including professional evaluation of effectiveness of the solution informed by excellent references.

Report      (50% of unit mark)   Marking scheme