SlideShare a Scribd company logo
1 of 45
Strategic Plan  Goals and Plans For My Careers Choice By Daniel Sarpe ITP 251-200 Professor Anita Sutton
Network Security Specialist Network and Internet Security Specialists can look forward to lucrative careers in some of the following areas: network security and network design, sales, marketing, system administration, Internet security, and basic programming The average salary for a security specialist or security manager in 2008, was between $85,000 and $112,000 A student in a Network and Internet Security program can expect to encounter include: Introduction to LANs Introduction to WANs Network and Internet Security Programming Voice and Data Networks
Network Security Specialist(Cont) For attaining this career I planned to get first an AAS in Network Security from Germanna Community College which is transferable to University of Mary Washington My plan for the near future is to be admitted to Mary Washington and get a Bachelor Degree in Information Assurance For doing this I need to achieve some qualifications and certificates from CISCO   One of the requirements was to make ITP-251 which will teach me about systems analysis and design In ITP251 class I learned about systems planning, systems analysis, systems design and systems implementation.
Systems Analysis and Design ,[object Object],Chapter 1 , Chapter 2, Chapter 3 ,[object Object],Chapter 4, Chapter 5, Chapter 6, Chapter 7 ,[object Object],Chapter 8, Chapter 9, Chapter 10 ,[object Object],Chapter 11
Systems Planning An Information System has five main components: People Hardware Software Data Processes In the right side we have a specification of Information Systems People are the stakeholders, the hardware consists of servers, workstations, computers, scanners, optic cables, etcetera. The data is the raw material that an information system transform into useful information.
Software refers to the programs that control the hardware and produce the desired information. A process describe the tasks and business functions that users, managers and IT staff members perform to achieve specific results. In chapter 1 I also learned about Object Oriented analysis which combines data and processes that act on the data into things called objects. An object is a member of a class, which is a collection of similar objects.  I implemented this objects in my project in MDD activity Bellow I will show you an example of relationships between objects and object model diagram that we used in our project of Inspiring a Smile Today , and their attributes and methods.
Object Model Elements
Chapter 2 In chapter 2 I have learned how to do a Preliminary Investigation Report for our project and about operational, technical, economical and schedule feasibility. Operational feasibility means that if a proposed system can be used effectively after it was developed. Technical feasibility refers to the technical resources needed to develop or operate a system Economic feasibility means that the projects need to create some benefits after all the maintenance costs, acquisition, people, users, hardware, etcetera. Schedule feasibility means that a project can be implemented in an acceptable frame time.
Project Feasibility Operational Feasibility Enlisting the support of both Germanna Student Services and the Security Office No formal training is required Technical Feasibility Labor intensive, but no training required Graphics are easily created Economic Feasibility Very low cost ($0.05 per flyer) Donated labor Donated printing Schedule Feasibility Kickoff day – Oct 5, 2010 4 days prior to Germanna Fest on Oct 9, 2010
Chapter 3 In chapter three I learned about project scheduling, Gantt and PERT/CPM charts A Gantt chart is a horizontal bar chart that represents a series of tasks.  A PERT/CPM chart is used for very complex projects and is called a bottom-up technique. I used in my class project the Gant chart to show the overview of the project status.
Phase II – Systems Analysis Systems Analysis starts in Chapter 4 where I learned about Agile methods and Data Flow Diagrams I used in my project DFDs (Data Flow Diagrams) to show how the system stores, process and transform data. An Agile method develops a system incrementally, by building a series of prototypes that are send to the users for feedback after removing all the risks involved in the development
Example of Data Flow DiagramDFD used in my project Inspire A Smile Today Work Orders Closed Work Orders Cost Summary Work Data Costs 1 3 2 Work Summary Produce Reports Manage Work Manage Costs Current Vehicle Data Completed Work Report Completed Work Orders Maintenance Task List Work Orders Weekly Work Schedule Cost Data Supervisor Employees Manual Accounting
Program Design Map
I also learned about  Scalability and TCO (Total Cost of Ownership) which represents costs in addition to the direct costs involved in a system development and is extremely important in the development team. Scalability refers to a system ability to handle the volume of the business and the transactions from the future. Bellow I will attach a TCO table which shows our total cost for the class project.
Initial and Total Cost of Ownership
Relationships between Objects and Classes Relationships enable objects to communicate and interact as they perform business functions and transactions required by the system After we identify an object, classes, and relationships between them we are ready to prepare a diagram that shows the relationships among them This diagram shows the relationship among the objects and classes that we identified during our investigation report in our project class. The strongest relationship is called inheritance which enables an object called a child to derive one or more of its attributes from another object, called a parent.
Object Relationship Diagram
Later in the chapter 7 I learned how to perform Cost Benefit analysis, Outsourcing Fees and In House financing  Instead of outsourcing which means that you have to buy from external resources, you can opt out for In-House financing which means that you can create your own source of income to invest in the development  For the project class I had to make an analyze of the Cost-Benefit with In-House financing option.  Bellow I am going to show you how for this particular project, we analyzed the Cost-Benefits and differences between Outsource financing and In-House financing
Payback Analysis
Return On Investment
Cost and Benefits
Outsourced Vs In-House Financing
Phase III – Systems Design In this phase of the course we learned about the design of a system using inputs and outputs or user interface design. I learned how to use the inputs that I identified in the planning and investigation process, to create an output so the recipients can give us a positive feedback for our system output The outputs can be internet-based information delivery, blogs, instant messaging, wireless devices, images, videos. I learned for this phase how to create the output for my project which was a printed report that contains three zones that are easy to read and understand and follows the security and privacy rules of GCC
Input Data Data entry is the process of manually entering data into the information system, usually in the form of keystrokes or mouse clicks Batch inputs (data usually entered on a specified time schedule), online inputs (immediate availability of data) To avoid unnecessary costs the volume of data needs to be reduced, so the number of errors will be reduced For input errors we have to check the validity of the data, the type of data so we can improve input quality by testing the data and rejecting any entry that fails to meet specified conditions.
Input Design Section 1 Section 2 Section 3
Output Design
Data Design To construct the physical model of the information system, a system analyst can select a design approach and begin to construct the system The model can be a web-based database design using HTML for creating a web page In this chapter I have learned about Entity Relationships Diagrams The relationships among the entities in a system can be one-to-one, one-to-many, many-to-many. Next slide it is going to show an example of a entity relationships diagram that I used in my class project and it shows the relationships between the objects and external entities specific  to my project
Entity Relationship Diagrams
Normalization Normalization – is the process of creating table designs but assigning specific fields or attributes to each table in the database. Include four stages: Unnormalized design, first normal form, second normal form and third normal form The next slides will going to show you the first, the second, and the third normal form that represented the best design for my class project
1NF Data Structure Combination Primary Key
2NF Data Structure
3NF Data Structure
System Architecture System architecture translates the logical design of an information system into a physical blueprint, or architecture Initial Cost and TCO – for the final design we have to choose between in-house financing or outsource financing In this chapter I learned how to implement an initial and total cost of ownership for my particular project and I will show you a table with initial costs and TCO
Initial and Total Cost of Ownership
Return Of Investment
In chapter 10 I learned about the network models, TCP/IP and the network protocols, routers, servers and the topology of a network The OSI model (Open Systems Interconnection) describes how data moves from an application on one computer to an application on another networked computer. The OSI model contains seven layers : Application layer Presentation Session Transport Network Data Link Physical layer
Phase IV – Systems Implementation In this chapter that describes the systems implementation phase of the SDLC, I learned about the application development, installation and evaluation For this particular case I studied the Agile method and XP (Extreme Programming) method The Agile method is about establishing a interconnection an communication between the IT teams and the users or customers. Agile methods use a variety of models including the Spiral Model which responds much quicker to clients and provides repetition in development  Risksare explicitly assessed and resolved throughout the process.
Example of a Spiral Model A agile method that represents a series of revisions based on user feedback.
Extreme Programming  is based on the feedback from the users and iteration of the processes. The user tells stories that goes than to the planning and goes back and front into a repetitive cycle, until all the risks are eliminated so the final application gets the approval from the customers. System developers use also multipurpose tools for development such as entity relationships diagrams, flowcharts, pseudocode, decision tables and decision trees.
Extreme Programming (XP)Started in 1990s when Kent Black tried to find a better way of doing software development when he was handling a project at DaimlerChrysler. A deliberate and disciplined approach to software development Extreme Programming works by bringing the whole team together Difficulty coordinating larger teams Can result in a never-ending project if not managed properly Tendency to not document thoroughly
Extreme Programming (XP) One of the newest agile methods that emphasizes team work. http://www.extremeprogramming.org/rules/userstories.html
Multipurpose Tools Pseudocode – a technique for representing program logic, actually translates a text into a logic program that can be used with C++, C#, or HTML codes The next slide it’s going to show an example of pseudocode
Multipurpose (cont.)Pseudocode – A technique for representing program logic. Germanna students that earn a minimum of 60 of credits are entitled to get an Associates Degree. Germanna students that do not earn a minimum of 60 credits do not receive their Associates Degree but may be eligible for Career Studies Certificate. If student is enrolled at Germanna, and 	If students earns a minimum of 60 credits then 		Eligible to receive Associates Degree. 	ELSE 		Student will not receive Associates Degree ELSE 	Student may be eligible for Career Studies Certificate
Strategic Plan By Daniel Sarpe ITP 251-200

More Related Content

What's hot

RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...
ijcsit
 
Modelling System Requirements: Events & Things
Modelling System Requirements: Events & ThingsModelling System Requirements: Events & Things
Modelling System Requirements: Events & Things
wmomoni
 

What's hot (19)

System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
 
Development of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersDevelopment of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job Seekers
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
 
Ch07-Moving into Design
Ch07-Moving into DesignCh07-Moving into Design
Ch07-Moving into Design
 
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMSDEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
 
IT6701-Information Management Unit 1
IT6701-Information Management Unit 1IT6701-Information Management Unit 1
IT6701-Information Management Unit 1
 
Unit 2
Unit 2Unit 2
Unit 2
 
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...
 
Mathematical models and algorithms challenges
Mathematical models and algorithms challengesMathematical models and algorithms challenges
Mathematical models and algorithms challenges
 
Software design i (2) (1)
Software design   i (2) (1)Software design   i (2) (1)
Software design i (2) (1)
 
SE chapters 6-7
SE chapters 6-7SE chapters 6-7
SE chapters 6-7
 
Modeling System Requirements
Modeling System RequirementsModeling System Requirements
Modeling System Requirements
 
Lq3620002008
Lq3620002008Lq3620002008
Lq3620002008
 
Useanalysis
UseanalysisUseanalysis
Useanalysis
 
Modelling System Requirements: Events & Things
Modelling System Requirements: Events & ThingsModelling System Requirements: Events & Things
Modelling System Requirements: Events & Things
 
Object oriented analysis and design unit- ii
Object oriented analysis and design unit- iiObject oriented analysis and design unit- ii
Object oriented analysis and design unit- ii
 
Analysis and implementation of the impact of change: application to heterogen...
Analysis and implementation of the impact of change: application to heterogen...Analysis and implementation of the impact of change: application to heterogen...
Analysis and implementation of the impact of change: application to heterogen...
 
Single object detection to support requirements modeling using faster R-CNN
Single object detection to support requirements modeling using faster R-CNNSingle object detection to support requirements modeling using faster R-CNN
Single object detection to support requirements modeling using faster R-CNN
 

Viewers also liked (7)

Inspire a smile today presentation
Inspire a smile today presentationInspire a smile today presentation
Inspire a smile today presentation
 
Smile presentation
Smile presentationSmile presentation
Smile presentation
 
The Value Of A Smile
The Value Of A SmileThe Value Of A Smile
The Value Of A Smile
 
Smile
SmileSmile
Smile
 
Smile powerpoint
Smile powerpointSmile powerpoint
Smile powerpoint
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Similar to Strategic plan

Pmw2 k3ni 1-1a
Pmw2 k3ni 1-1aPmw2 k3ni 1-1a
Pmw2 k3ni 1-1a
hariclant1
 
Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern Hardware
Winstina Kennedy
 
CHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docx
CHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docxCHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docx
CHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docx
cravennichole326
 
Creating a Use Case
Creating a Use Case                                               Creating a Use Case
Creating a Use Case
CruzIbarra161
 
Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirements
hapy
 
ITP251 Final Assignment
ITP251 Final AssignmentITP251 Final Assignment
ITP251 Final Assignment
NEVEK50495
 
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docxRunning head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
jeanettehully
 
IT 510 Final Project Guidelines and Rubric Overview .docx
IT 510 Final Project Guidelines and Rubric  Overview .docxIT 510 Final Project Guidelines and Rubric  Overview .docx
IT 510 Final Project Guidelines and Rubric Overview .docx
priestmanmable
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
bradburgess22840
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
deanmtaylor1545
 
Cis 519 Week 3 Individual Assignment
Cis 519 Week 3 Individual AssignmentCis 519 Week 3 Individual Assignment
Cis 519 Week 3 Individual Assignment
April Dillard
 
IT 510 Final Project Guidelines and Rubric Overview .docx
IT 510 Final Project Guidelines and Rubric  Overview .docxIT 510 Final Project Guidelines and Rubric  Overview .docx
IT 510 Final Project Guidelines and Rubric Overview .docx
vrickens
 

Similar to Strategic plan (20)

Final
FinalFinal
Final
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
Pmw2 k3ni 1-1a
Pmw2 k3ni 1-1aPmw2 k3ni 1-1a
Pmw2 k3ni 1-1a
 
Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern Hardware
 
CHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docx
CHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docxCHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docx
CHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docx
 
Creating a Use Case
Creating a Use Case                                               Creating a Use Case
Creating a Use Case
 
Print report
Print reportPrint report
Print report
 
Digital Twin: A Complete Knowledge Guide
Digital Twin: A Complete Knowledge GuideDigital Twin: A Complete Knowledge Guide
Digital Twin: A Complete Knowledge Guide
 
WELCOME TO AI PROJECT shidhant mittaal.pptx
WELCOME TO AI PROJECT shidhant mittaal.pptxWELCOME TO AI PROJECT shidhant mittaal.pptx
WELCOME TO AI PROJECT shidhant mittaal.pptx
 
Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirements
 
ITP251 Final Assignment
ITP251 Final AssignmentITP251 Final Assignment
ITP251 Final Assignment
 
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docxRunning head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
 
AIRPORT MANAGEMENT USING FACE RECOGNITION BASE SYSTEM
AIRPORT MANAGEMENT USING FACE RECOGNITION BASE SYSTEMAIRPORT MANAGEMENT USING FACE RECOGNITION BASE SYSTEM
AIRPORT MANAGEMENT USING FACE RECOGNITION BASE SYSTEM
 
IT 510 Final Project Guidelines and Rubric Overview .docx
IT 510 Final Project Guidelines and Rubric  Overview .docxIT 510 Final Project Guidelines and Rubric  Overview .docx
IT 510 Final Project Guidelines and Rubric Overview .docx
 
Enterprise architecture
Enterprise architecture Enterprise architecture
Enterprise architecture
 
Building an Information System
Building an Information SystemBuilding an Information System
Building an Information System
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
Cis 519 Week 3 Individual Assignment
Cis 519 Week 3 Individual AssignmentCis 519 Week 3 Individual Assignment
Cis 519 Week 3 Individual Assignment
 
IT 510 Final Project Guidelines and Rubric Overview .docx
IT 510 Final Project Guidelines and Rubric  Overview .docxIT 510 Final Project Guidelines and Rubric  Overview .docx
IT 510 Final Project Guidelines and Rubric Overview .docx
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 

Recently uploaded (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Strategic plan

  • 1. Strategic Plan Goals and Plans For My Careers Choice By Daniel Sarpe ITP 251-200 Professor Anita Sutton
  • 2. Network Security Specialist Network and Internet Security Specialists can look forward to lucrative careers in some of the following areas: network security and network design, sales, marketing, system administration, Internet security, and basic programming The average salary for a security specialist or security manager in 2008, was between $85,000 and $112,000 A student in a Network and Internet Security program can expect to encounter include: Introduction to LANs Introduction to WANs Network and Internet Security Programming Voice and Data Networks
  • 3. Network Security Specialist(Cont) For attaining this career I planned to get first an AAS in Network Security from Germanna Community College which is transferable to University of Mary Washington My plan for the near future is to be admitted to Mary Washington and get a Bachelor Degree in Information Assurance For doing this I need to achieve some qualifications and certificates from CISCO One of the requirements was to make ITP-251 which will teach me about systems analysis and design In ITP251 class I learned about systems planning, systems analysis, systems design and systems implementation.
  • 4.
  • 5. Systems Planning An Information System has five main components: People Hardware Software Data Processes In the right side we have a specification of Information Systems People are the stakeholders, the hardware consists of servers, workstations, computers, scanners, optic cables, etcetera. The data is the raw material that an information system transform into useful information.
  • 6. Software refers to the programs that control the hardware and produce the desired information. A process describe the tasks and business functions that users, managers and IT staff members perform to achieve specific results. In chapter 1 I also learned about Object Oriented analysis which combines data and processes that act on the data into things called objects. An object is a member of a class, which is a collection of similar objects. I implemented this objects in my project in MDD activity Bellow I will show you an example of relationships between objects and object model diagram that we used in our project of Inspiring a Smile Today , and their attributes and methods.
  • 8. Chapter 2 In chapter 2 I have learned how to do a Preliminary Investigation Report for our project and about operational, technical, economical and schedule feasibility. Operational feasibility means that if a proposed system can be used effectively after it was developed. Technical feasibility refers to the technical resources needed to develop or operate a system Economic feasibility means that the projects need to create some benefits after all the maintenance costs, acquisition, people, users, hardware, etcetera. Schedule feasibility means that a project can be implemented in an acceptable frame time.
  • 9. Project Feasibility Operational Feasibility Enlisting the support of both Germanna Student Services and the Security Office No formal training is required Technical Feasibility Labor intensive, but no training required Graphics are easily created Economic Feasibility Very low cost ($0.05 per flyer) Donated labor Donated printing Schedule Feasibility Kickoff day – Oct 5, 2010 4 days prior to Germanna Fest on Oct 9, 2010
  • 10. Chapter 3 In chapter three I learned about project scheduling, Gantt and PERT/CPM charts A Gantt chart is a horizontal bar chart that represents a series of tasks. A PERT/CPM chart is used for very complex projects and is called a bottom-up technique. I used in my class project the Gant chart to show the overview of the project status.
  • 11.
  • 12. Phase II – Systems Analysis Systems Analysis starts in Chapter 4 where I learned about Agile methods and Data Flow Diagrams I used in my project DFDs (Data Flow Diagrams) to show how the system stores, process and transform data. An Agile method develops a system incrementally, by building a series of prototypes that are send to the users for feedback after removing all the risks involved in the development
  • 13. Example of Data Flow DiagramDFD used in my project Inspire A Smile Today Work Orders Closed Work Orders Cost Summary Work Data Costs 1 3 2 Work Summary Produce Reports Manage Work Manage Costs Current Vehicle Data Completed Work Report Completed Work Orders Maintenance Task List Work Orders Weekly Work Schedule Cost Data Supervisor Employees Manual Accounting
  • 15. I also learned about Scalability and TCO (Total Cost of Ownership) which represents costs in addition to the direct costs involved in a system development and is extremely important in the development team. Scalability refers to a system ability to handle the volume of the business and the transactions from the future. Bellow I will attach a TCO table which shows our total cost for the class project.
  • 16. Initial and Total Cost of Ownership
  • 17. Relationships between Objects and Classes Relationships enable objects to communicate and interact as they perform business functions and transactions required by the system After we identify an object, classes, and relationships between them we are ready to prepare a diagram that shows the relationships among them This diagram shows the relationship among the objects and classes that we identified during our investigation report in our project class. The strongest relationship is called inheritance which enables an object called a child to derive one or more of its attributes from another object, called a parent.
  • 19. Later in the chapter 7 I learned how to perform Cost Benefit analysis, Outsourcing Fees and In House financing Instead of outsourcing which means that you have to buy from external resources, you can opt out for In-House financing which means that you can create your own source of income to invest in the development For the project class I had to make an analyze of the Cost-Benefit with In-House financing option. Bellow I am going to show you how for this particular project, we analyzed the Cost-Benefits and differences between Outsource financing and In-House financing
  • 24. Phase III – Systems Design In this phase of the course we learned about the design of a system using inputs and outputs or user interface design. I learned how to use the inputs that I identified in the planning and investigation process, to create an output so the recipients can give us a positive feedback for our system output The outputs can be internet-based information delivery, blogs, instant messaging, wireless devices, images, videos. I learned for this phase how to create the output for my project which was a printed report that contains three zones that are easy to read and understand and follows the security and privacy rules of GCC
  • 25. Input Data Data entry is the process of manually entering data into the information system, usually in the form of keystrokes or mouse clicks Batch inputs (data usually entered on a specified time schedule), online inputs (immediate availability of data) To avoid unnecessary costs the volume of data needs to be reduced, so the number of errors will be reduced For input errors we have to check the validity of the data, the type of data so we can improve input quality by testing the data and rejecting any entry that fails to meet specified conditions.
  • 26. Input Design Section 1 Section 2 Section 3
  • 28. Data Design To construct the physical model of the information system, a system analyst can select a design approach and begin to construct the system The model can be a web-based database design using HTML for creating a web page In this chapter I have learned about Entity Relationships Diagrams The relationships among the entities in a system can be one-to-one, one-to-many, many-to-many. Next slide it is going to show an example of a entity relationships diagram that I used in my class project and it shows the relationships between the objects and external entities specific to my project
  • 30. Normalization Normalization – is the process of creating table designs but assigning specific fields or attributes to each table in the database. Include four stages: Unnormalized design, first normal form, second normal form and third normal form The next slides will going to show you the first, the second, and the third normal form that represented the best design for my class project
  • 31. 1NF Data Structure Combination Primary Key
  • 34. System Architecture System architecture translates the logical design of an information system into a physical blueprint, or architecture Initial Cost and TCO – for the final design we have to choose between in-house financing or outsource financing In this chapter I learned how to implement an initial and total cost of ownership for my particular project and I will show you a table with initial costs and TCO
  • 35. Initial and Total Cost of Ownership
  • 37. In chapter 10 I learned about the network models, TCP/IP and the network protocols, routers, servers and the topology of a network The OSI model (Open Systems Interconnection) describes how data moves from an application on one computer to an application on another networked computer. The OSI model contains seven layers : Application layer Presentation Session Transport Network Data Link Physical layer
  • 38. Phase IV – Systems Implementation In this chapter that describes the systems implementation phase of the SDLC, I learned about the application development, installation and evaluation For this particular case I studied the Agile method and XP (Extreme Programming) method The Agile method is about establishing a interconnection an communication between the IT teams and the users or customers. Agile methods use a variety of models including the Spiral Model which responds much quicker to clients and provides repetition in development Risksare explicitly assessed and resolved throughout the process.
  • 39. Example of a Spiral Model A agile method that represents a series of revisions based on user feedback.
  • 40. Extreme Programming is based on the feedback from the users and iteration of the processes. The user tells stories that goes than to the planning and goes back and front into a repetitive cycle, until all the risks are eliminated so the final application gets the approval from the customers. System developers use also multipurpose tools for development such as entity relationships diagrams, flowcharts, pseudocode, decision tables and decision trees.
  • 41. Extreme Programming (XP)Started in 1990s when Kent Black tried to find a better way of doing software development when he was handling a project at DaimlerChrysler. A deliberate and disciplined approach to software development Extreme Programming works by bringing the whole team together Difficulty coordinating larger teams Can result in a never-ending project if not managed properly Tendency to not document thoroughly
  • 42. Extreme Programming (XP) One of the newest agile methods that emphasizes team work. http://www.extremeprogramming.org/rules/userstories.html
  • 43. Multipurpose Tools Pseudocode – a technique for representing program logic, actually translates a text into a logic program that can be used with C++, C#, or HTML codes The next slide it’s going to show an example of pseudocode
  • 44. Multipurpose (cont.)Pseudocode – A technique for representing program logic. Germanna students that earn a minimum of 60 of credits are entitled to get an Associates Degree. Germanna students that do not earn a minimum of 60 credits do not receive their Associates Degree but may be eligible for Career Studies Certificate. If student is enrolled at Germanna, and If students earns a minimum of 60 credits then Eligible to receive Associates Degree. ELSE Student will not receive Associates Degree ELSE Student may be eligible for Career Studies Certificate
  • 45. Strategic Plan By Daniel Sarpe ITP 251-200