Running head: NETWORK INFRASTRUCTURE AND SECURITY
1
NETWORK INFRASTRUCTURE AND SECURITY
2
Project Deliverable 5: Network Infrastructure and Security
CIS 499 – Information Systems Capstone
November 25, 2018
Project Scope
The project will comprise of a network design to meet Acme Corporation network infrastructure requirements. The network should accommodate occasional guest users of up to 10 users. The network design will incorporate an FTP server that will use for sharing files. The project should involve separate subnet for guest and LAN networks; the guest network should be restricted to access only FTP service on the FTP server while all other access to the LAN network will be blocked. The project will also involve IP Network Design as well as identification and configuration details of the hardware utilized (Switches and Routers). Included in the network design is the implementation of a Wireless LAN (WLAN) that minimizes the management effort to configure and manage while allowing effective data transmission between the Wireless Application Protocols (WAPs).
Network design
The network will use a star topology where it provides centralized handling of the network and its’ associated security. Each of the floors of the building will have a central server which host switches that link the different rooms via ethernet cables. Each of the rooms will have a switch that is linked to the central server's router. The servers will be linked via fiber optic cables. The ethernet cables will be utilized for connecting individual devices to their associated switches. The network design will involve the utilization of both wired and wireless media. The wireless media will allow for a network connection for portable devices like tablets, cell phones, and laptops.
The switch links allow the traffic getting into the Acme’s LAN from the MAN not to be congested. As more tablets are utilized in the company, the WLAN bandwidth increases significantly to each room. This requires that the WAPs supporting the 802.11n protocol as well as faster 802.11ac standard require additional power. As a result, switches with PoE+ give the required power. These Switches utilize the existing Category-6 cable (Ethernet cables) that allow for remote administration and configuration (Karris, 2009).
Virtual LANs (VLAN) will be used to enables the network administrator to group users into shared broadcast domains irrespective of their physical position in the internetwork. For instance, computer devices utilized by employees on two different floors may be placed on the same VLAN. The staff has their VLAN while the Guest VLAN is used by guests when using wireless access points.
The company's network perimeter that detaches it from the Internet comprises of two border core routers. The border routers should then link to the Virtual Private Network (VPN) Gateway. The Routers link to the servers, wireless access points and switches as well as the LAN (internal network)..
Understanding the cloud computing stackSatish Chavan
Understanding the cloud computing stack
Introduction
Key characteristics
At Glance
Standardization, Migration &Adaptation
Service models
Deployment models
Network as a Service
Software as a Service (SaaS).
Platform as a Service (PaaS).
Infrastructure as a Service (IaaS).
Communications as a Service (CaaS)
Data as a Service - DaaS
Benefits & Challenges
Security Risks & Challenges
Cloud Vendors
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
The advent of cloud computing, data owners are motivated to outsource their complex
data management systems from local sites to commercial public cloud for great flexibility and
economic savings. But for protecting data privacy, sensitive data has to be encrypted before
outsourcing.Considering the large number of data users and documents in cloud, it is crucial for
the search service to allow multi-keyword query and provide result similarity ranking to meet the
effective data retrieval need. Related works on searchable encryption focus on single keyword
search or Boolean keyword search, and rarely differentiate the search results. We first propose a
basic MRSE scheme using secure inner product computation, and then significantly improve it to
meet different privacy requirements in two levels of threat models. The Incremental High Utility
Pattern Transaction Frequency Tree (IHUPTF-Tree) is designed according to the transaction
frequency (descending order) of items to obtain a compact tree.
By using high utility pattern the items can be arranged in an efficient manner. Tree structure
is used to sort the items. Thus the items are sorted and frequent pattern is obtained. The frequent
pattern items are retrieved from the database by using hybrid tree (H-Tree) structure. So the
execution time becomes faster. Finally, the frequent pattern item that satisfies the threshold value
is displayed.
Introduction
Cloud computing is the delivery of computing services—servers, storage, databases, networking, software, analytics and more—over the Internet (“the cloud”).
It is a paradigm that allows on-demand network access to shared computing resources. A model for managing, storing and processing data online via the internet.
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
Understanding the cloud computing stackSatish Chavan
Understanding the cloud computing stack
Introduction
Key characteristics
At Glance
Standardization, Migration &Adaptation
Service models
Deployment models
Network as a Service
Software as a Service (SaaS).
Platform as a Service (PaaS).
Infrastructure as a Service (IaaS).
Communications as a Service (CaaS)
Data as a Service - DaaS
Benefits & Challenges
Security Risks & Challenges
Cloud Vendors
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
The advent of cloud computing, data owners are motivated to outsource their complex
data management systems from local sites to commercial public cloud for great flexibility and
economic savings. But for protecting data privacy, sensitive data has to be encrypted before
outsourcing.Considering the large number of data users and documents in cloud, it is crucial for
the search service to allow multi-keyword query and provide result similarity ranking to meet the
effective data retrieval need. Related works on searchable encryption focus on single keyword
search or Boolean keyword search, and rarely differentiate the search results. We first propose a
basic MRSE scheme using secure inner product computation, and then significantly improve it to
meet different privacy requirements in two levels of threat models. The Incremental High Utility
Pattern Transaction Frequency Tree (IHUPTF-Tree) is designed according to the transaction
frequency (descending order) of items to obtain a compact tree.
By using high utility pattern the items can be arranged in an efficient manner. Tree structure
is used to sort the items. Thus the items are sorted and frequent pattern is obtained. The frequent
pattern items are retrieved from the database by using hybrid tree (H-Tree) structure. So the
execution time becomes faster. Finally, the frequent pattern item that satisfies the threshold value
is displayed.
Introduction
Cloud computing is the delivery of computing services—servers, storage, databases, networking, software, analytics and more—over the Internet (“the cloud”).
It is a paradigm that allows on-demand network access to shared computing resources. A model for managing, storing and processing data online via the internet.
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
Aes based secured framework for cloud databasesIJARIIT
A Cloud database management system is a distributed database that delivers computing as a service (Caas) instead of
a product. Improving confidentiality of information stored in a cloud database .It is a very important contribution to the cloud
database. Data encryption is the optimum solution for achieving confidentiality. In some normal methods, encrypt the whole
database through some standard encryption algorithm that does not allow in SQL database operations directly on the cloud. This
formal solution affected by workload and cost would make the cloud database service inconvenient. I propose a novel
architecture for adaptive encryption of public cloud database. Adaptive encryption allows any SQL operation over encrypted
data. The novel cloud database architecture that uses adaptive encryption technique with no intermediate servers. This scheme
provides cloud provider with the best level of confidentiality for any database workload. I can determine the encryption and
adaptive encryption cost of data confidentiality from the research point of view. Index Terms Adaptive encryption Technique, AES (Advanced encryption Standard), Metadata.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority sharing is attractive for multi-user collaborative cloud applications.
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
Cloud Computing is going to be very popular technology in IT enterprises. For any enterprise the data stored is very huge
and invaluable. Since all tasks are performed through network it has become vital to have the secured use of legitimate data. In cloud
computing the most important matter of concern are data security and privacy along with flexibility, scalability and fine grained access
control of data being the other requirements to be maintained by cloud systems Access control is one of the prominent research topics
and hence various schemes have been proposed and implemented. But most of them do not provide flexibility, scalability and fine
grained access control of the data on the cloud. In order to address the issues of flexibility, scalability and fine grained access control
of remotely stored data on cloud we have proposed the hierarchical attribute set-based encryption (HASBE) which is the extension of
attribute- set-based encryption(ASBE) with a hierarchical structure of users. The proposed scheme achieves scalability by handling the
authority to appropriate entity in the hierarchical structure, inherits flexibility by allowing easy transfer and access to the data in case
of location switch. It provides fine grained access control of data by showing only the requested and authorized details to the user thus
improving the performance of the system. In addition, it provides efficient user revocation within expiration time, request to view
extra-attributes and privacy in the intra-level hierarchy is achieved. Thus the scheme is implemented to show that is efficient in access
control of data as well as security of data stored on cloud with comprehensive experiments
Explore the symbiotic alliance of AI and Cloud Computing, delivering unparalleled computational power, cost-efficiency, and transformative applications. Unleash innovation, scalability, and efficiency with this dynamic technological fusion.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Introduction to Cloud Computing...
Cloud Computing Development Models
Cloud Service Models
Cloud Security
Want to purchase the content ? e-mail on dulith1989@gmail.com
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on
demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection
of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious
concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the
cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to
achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that
user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based
privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request
and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority
sharing is attractive for multi-user collaborative cloud applications.
Running head Multi-actor modelling system 1Multi-actor mod.docxglendar3
Running head: Multi-actor modelling system 1
Multi-actor modelling system3
Multi-actor modelling system
Yogesh Dagwale
University of the Cumberland’s
Ligtenberg, A., Wachowicz, M., Bregt, A. K., Beulens, A., & Kettenis, D. L. (2004). A design and application of a multi-agent system for simulation of multi-actor spatial planning. Journal of environmental management, 72(1-2), 43-55.
They talk about the potential and restrictions of the MAS to manufacture models that empower spatial organizers to incorporate the 'actor factor' in their examination. Their structure system contemplates actors who assume a functioning job in the spatial planning. They included actors who can watch and see a spatial domain. Using these perceptions and discernment they produce an inclination for a preferred spatial situation. Actors at that point present and discuss their inclinations amid their exchanges with different actors.
The inclinations of the actor fill in as inputs for an official choice making. Finally, ultimate conclusions are actualized in the spatial framework. They found that MAS can produce space utilization designs in light of a portrayal of a multi-actor planning process. It additionally can clear up the impacts of actors under the administration of various planning styles on the space utilization and prove how the relations between actors change amid a planning process and under different orders of coming up with decisions. Unlike the work by Parker, Manson, Janssen, Hoffman & Deadman,2003, cited below, this paper did not include the various challenges associated with the use of MAS.
Parker, D. C., Manson, S. M., Janssen, M. A., Hoffmann, M. J., & Deadman, P. (2003). Multi-agent systems for the simulation of land-use and land-cover change: a review. Annals of the association of American Geographers, 93(2), 314-337.
In this paper, they studied different models. These models, however, were not thorough enough and therefore they took into account the multi-actor system, dynamic spatial Simulation, which has two components, that is, a cellular model that speaks to biogeophysical and biological parts of a demonstrated framework and an actor-based model to speak to human conclusion making. Because of its nature and ability to model complex situations, they highlighted some of the areas that MAS can be applied where other models cannot be able to deliver. Such areas are modeling of emergent phenomena whereby MAS can model landscape plans, due to its flexibility, MAS can represent complex land use/ cover systems, and they can be used to model dynamic paths. They also outlined the various challenges to Multi-actor systems. Such challenges include an understanding of complexity, individual decision making, empirical parameterization and model validation, and communication.
Faber, N. R., & Jorna, R. J. (2011, June). The use of multi-actor systems for studying social sustainability: Theoretical backgrounds and pseudo-specifications. In Com.
Running head: MY MOTHER MY HERO 1
MY MOTHER MY HERO 4
My Mother My hero
Institution Affiliation
Students’ Name
Date of Submission
My Mother My hero
Once I think of a hero, there are specific qualities that surround my imagination, being courageous, hardworking, truthful, strong, resilient, and generous have been the qualities I taught about. I also think a hero is someone protective, caring, and so concerned to change the life of the others and make them happy in their life. My Mother has all these qualities and recognizes her as my hero. Otherwise, she grew up on the support of two great parents who had a good life where she grew up and become a teacher in her life. Almost every individual has had some achievements in their life, and there must be a factor behind those achievements, especially someone who had a significant impact on their life. My mother appears to be my hero, who had a substantial impact on my life.
She is currently 54 years old. She was a teacher by profession, and she did her best as a teacher, where she influenced the lives of many students positively; up to now, some still call her and pass their appreciation to her. She was blessed and gave birth to seven kids; the first three are daughters, then a boy and a girl, and then the last two are boys. All of them have been significantly raised, everyone has something to do for a living, my big brother is a doctor, and three of my sisters are teachers, (like Mother like daughters). Our last born is an engineer interior designer and all of us are married with happy family. All these were not for granted but because of the love of God and the efforts, commitment, and great concern of our beloved parents, especially our Mother.
Even though she did not make a complete journey in her teaching profession, but up to where she stopped, she did a lot. They have been in a relationship with my father for thirty-six years of marriage, and when they had their third kid, my dad suggested that she stop teaching and remain at home to take care of the children. Throughout my entire life, my Mother had been supportive of me, a center of inspiration, and she has always been telling me to have self-confidence and believe in myself that I can make it. In case I face a problem, and I have to make a concrete decision towards it, my Mother always had behind me because I seek for her consultation before I move on to the next step.
It feels so great knowing that there is someone who will support you despite the intensity of the problem you face. It relieves much of the stress that comes along with making decisions. My Mother is beautiful inside and out, but most importantly, she has the biggest heart. She's a hard-working person and can play both parent roles. Everyon.
More Related Content
Similar to Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Aes based secured framework for cloud databasesIJARIIT
A Cloud database management system is a distributed database that delivers computing as a service (Caas) instead of
a product. Improving confidentiality of information stored in a cloud database .It is a very important contribution to the cloud
database. Data encryption is the optimum solution for achieving confidentiality. In some normal methods, encrypt the whole
database through some standard encryption algorithm that does not allow in SQL database operations directly on the cloud. This
formal solution affected by workload and cost would make the cloud database service inconvenient. I propose a novel
architecture for adaptive encryption of public cloud database. Adaptive encryption allows any SQL operation over encrypted
data. The novel cloud database architecture that uses adaptive encryption technique with no intermediate servers. This scheme
provides cloud provider with the best level of confidentiality for any database workload. I can determine the encryption and
adaptive encryption cost of data confidentiality from the research point of view. Index Terms Adaptive encryption Technique, AES (Advanced encryption Standard), Metadata.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority sharing is attractive for multi-user collaborative cloud applications.
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
Cloud Computing is going to be very popular technology in IT enterprises. For any enterprise the data stored is very huge
and invaluable. Since all tasks are performed through network it has become vital to have the secured use of legitimate data. In cloud
computing the most important matter of concern are data security and privacy along with flexibility, scalability and fine grained access
control of data being the other requirements to be maintained by cloud systems Access control is one of the prominent research topics
and hence various schemes have been proposed and implemented. But most of them do not provide flexibility, scalability and fine
grained access control of the data on the cloud. In order to address the issues of flexibility, scalability and fine grained access control
of remotely stored data on cloud we have proposed the hierarchical attribute set-based encryption (HASBE) which is the extension of
attribute- set-based encryption(ASBE) with a hierarchical structure of users. The proposed scheme achieves scalability by handling the
authority to appropriate entity in the hierarchical structure, inherits flexibility by allowing easy transfer and access to the data in case
of location switch. It provides fine grained access control of data by showing only the requested and authorized details to the user thus
improving the performance of the system. In addition, it provides efficient user revocation within expiration time, request to view
extra-attributes and privacy in the intra-level hierarchy is achieved. Thus the scheme is implemented to show that is efficient in access
control of data as well as security of data stored on cloud with comprehensive experiments
Explore the symbiotic alliance of AI and Cloud Computing, delivering unparalleled computational power, cost-efficiency, and transformative applications. Unleash innovation, scalability, and efficiency with this dynamic technological fusion.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Introduction to Cloud Computing...
Cloud Computing Development Models
Cloud Service Models
Cloud Security
Want to purchase the content ? e-mail on dulith1989@gmail.com
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on
demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection
of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious
concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the
cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to
achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that
user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based
privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request
and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority
sharing is attractive for multi-user collaborative cloud applications.
Running head Multi-actor modelling system 1Multi-actor mod.docxglendar3
Running head: Multi-actor modelling system 1
Multi-actor modelling system3
Multi-actor modelling system
Yogesh Dagwale
University of the Cumberland’s
Ligtenberg, A., Wachowicz, M., Bregt, A. K., Beulens, A., & Kettenis, D. L. (2004). A design and application of a multi-agent system for simulation of multi-actor spatial planning. Journal of environmental management, 72(1-2), 43-55.
They talk about the potential and restrictions of the MAS to manufacture models that empower spatial organizers to incorporate the 'actor factor' in their examination. Their structure system contemplates actors who assume a functioning job in the spatial planning. They included actors who can watch and see a spatial domain. Using these perceptions and discernment they produce an inclination for a preferred spatial situation. Actors at that point present and discuss their inclinations amid their exchanges with different actors.
The inclinations of the actor fill in as inputs for an official choice making. Finally, ultimate conclusions are actualized in the spatial framework. They found that MAS can produce space utilization designs in light of a portrayal of a multi-actor planning process. It additionally can clear up the impacts of actors under the administration of various planning styles on the space utilization and prove how the relations between actors change amid a planning process and under different orders of coming up with decisions. Unlike the work by Parker, Manson, Janssen, Hoffman & Deadman,2003, cited below, this paper did not include the various challenges associated with the use of MAS.
Parker, D. C., Manson, S. M., Janssen, M. A., Hoffmann, M. J., & Deadman, P. (2003). Multi-agent systems for the simulation of land-use and land-cover change: a review. Annals of the association of American Geographers, 93(2), 314-337.
In this paper, they studied different models. These models, however, were not thorough enough and therefore they took into account the multi-actor system, dynamic spatial Simulation, which has two components, that is, a cellular model that speaks to biogeophysical and biological parts of a demonstrated framework and an actor-based model to speak to human conclusion making. Because of its nature and ability to model complex situations, they highlighted some of the areas that MAS can be applied where other models cannot be able to deliver. Such areas are modeling of emergent phenomena whereby MAS can model landscape plans, due to its flexibility, MAS can represent complex land use/ cover systems, and they can be used to model dynamic paths. They also outlined the various challenges to Multi-actor systems. Such challenges include an understanding of complexity, individual decision making, empirical parameterization and model validation, and communication.
Faber, N. R., & Jorna, R. J. (2011, June). The use of multi-actor systems for studying social sustainability: Theoretical backgrounds and pseudo-specifications. In Com.
Running head: MY MOTHER MY HERO 1
MY MOTHER MY HERO 4
My Mother My hero
Institution Affiliation
Students’ Name
Date of Submission
My Mother My hero
Once I think of a hero, there are specific qualities that surround my imagination, being courageous, hardworking, truthful, strong, resilient, and generous have been the qualities I taught about. I also think a hero is someone protective, caring, and so concerned to change the life of the others and make them happy in their life. My Mother has all these qualities and recognizes her as my hero. Otherwise, she grew up on the support of two great parents who had a good life where she grew up and become a teacher in her life. Almost every individual has had some achievements in their life, and there must be a factor behind those achievements, especially someone who had a significant impact on their life. My mother appears to be my hero, who had a substantial impact on my life.
She is currently 54 years old. She was a teacher by profession, and she did her best as a teacher, where she influenced the lives of many students positively; up to now, some still call her and pass their appreciation to her. She was blessed and gave birth to seven kids; the first three are daughters, then a boy and a girl, and then the last two are boys. All of them have been significantly raised, everyone has something to do for a living, my big brother is a doctor, and three of my sisters are teachers, (like Mother like daughters). Our last born is an engineer interior designer and all of us are married with happy family. All these were not for granted but because of the love of God and the efforts, commitment, and great concern of our beloved parents, especially our Mother.
Even though she did not make a complete journey in her teaching profession, but up to where she stopped, she did a lot. They have been in a relationship with my father for thirty-six years of marriage, and when they had their third kid, my dad suggested that she stop teaching and remain at home to take care of the children. Throughout my entire life, my Mother had been supportive of me, a center of inspiration, and she has always been telling me to have self-confidence and believe in myself that I can make it. In case I face a problem, and I have to make a concrete decision towards it, my Mother always had behind me because I seek for her consultation before I move on to the next step.
It feels so great knowing that there is someone who will support you despite the intensity of the problem you face. It relieves much of the stress that comes along with making decisions. My Mother is beautiful inside and out, but most importantly, she has the biggest heart. She's a hard-working person and can play both parent roles. Everyon.
Running head PROGRAM EVALUATION PLAN1PROGRAM EVALUATION PLAN.docxglendar3
Running head: PROGRAM EVALUATION PLAN 1
PROGRAM EVALUATION PLAN 10
Program Evaluation Plan
Name:
Tanisha Hannah
Institution:
Strayer University
Professor:
Dr. Jacob
Course:
Edu 571
Date:
March 2, 2020
Program Evaluation Plan (Part 3)
Goals of Evaluation
Evaluation refers to the act of checking various things thoroughly in order to characterize their worth or value, with reference to a certain context. In the field of education, the amount of success in a person’s aims can only be determined through evaluation. Therefore, there is a very close relationship between various aims and evaluation. The main goals of evaluation in schools are as discussed below. The first goal of evaluation in the field of education is to create an educational program ("Evaluation in Teaching and Learning Process | Education", 2020). Through evaluation, evaluators and the school management can build a given program of learning among the students. This is after gathering and checking various factors in order to find what program will fit and make a positive impact in the school. This involves consulting all the stakeholders of the program and developing strategies that will ensure the development of a good program.
The second goal of evaluation is assessing the effectiveness of the program. Evaluation ensures that the developed program is up to standards and serves the purpose that it was intended to. It helps the evaluators to check if the teaching strategies and techniques are being applied properly. The third goal of evaluation is to ensure improvement of the program. Through evaluation, evaluators can gauge the impact of the program on the school and learners. They can also identify various things that can make the program more effective. It acts as an in-built monitor in the program in order to review the progress of the program from time to time. It also gives feedback regarding the design and the implementation of a given program. Through such assessments, the school management can know where to work on, and what they need in order to enhance effective programs in teaching and learning.
For instance, in our case, evaluators can comfortably tell whether or not the program is helping girls become more superior in math. If not they can suggest better or other strategies that will make positive impact.
Cultural Issues Affecting the Program
Culture can influence how different people view things. An individual’s culture and upbringing can affect their way of processing information. Among the cultural issues that might be faced in the evaluation plan include cultural stereotypes. Some students believe that they cannot perform as expected in school or in a particular subject due to lack of preparation from their home environment. This makes them believe they do not have enough potential to do well in a given subject when they get to school. For instance, some students may not have calculat.
Running head Project 21Project 22Projec.docxglendar3
Running head: Project 2 1
Project 2 2
Project 2: Historical Context and Introduction
Your Name
Southern New Hampshire University
Research Plan
Research Question: [Revised research question from Topic Exploration Worksheet.]
Introduction
[Three- to five-sentence discussion of background information about your historical event to capture the interest of your audience.] [Two- to three-sentence thesis statement based on your research question that addresses your historical event and explains how your event has been influenced by historical context.] [Two- to three-sentence explanation of how you will use the primary and secondary sources you listed in the Research Plan in your hypothetical research paper.]
Historical Context: [Three- to five-sentence explanation of your event’s historical context, citing sources one and two.]
Impact of Historical Context: [Three- to five-sentence discussion of how historical context impacted your event, citing sources one and two.]
Resources
HIS 100 Project 2: Historical Context and Introduction Guidelines and Rubric
Overview
“If you want to understand today, you have to search yesterday.”
—Pearl Buck
Your second project in this course is to complete a historical context and introduction project. The work you did on the Topic Exploration Worksheet in Theme 1
will directly support your work on this project as well as your third longer term project—the multimedia presentation—due in Theme 4.
One of the prime benefits of studying history is that it allows us to learn about who we are and where we came from. The people and events of the past can
often shed light on the conditions and social norms of the present. Having historical awareness can inform various aspects of your life as well as future
aspirations. Learning from past failures and successes can shape ideals and values for years to come.
This is your second longer-term project designed to help you understand the fundamental processes and value of studying history. In the first project, you
completed the Topic Exploration Worksheet on one of the topics or themes from the library guide. You investigated the types of research you might need to do
to learn more about the topic and developed research questions. In Project 2, you will use your completed Topic Exploration Worksheet to explore the
historical context and develop an introduction. You will choose one of your research questions and do some secondary source research, speculate on primary
source needs, and use the information to write the introduction and thesis statement for a possible research paper. (You will not write the entire paper—
only the introduction.) In the third project, you will create a multimedia presentation that explores both major developments in historical inquiry and the value
of examining history.
This research plan and introduction assignment will assess the following course outcome, which you focused on throughou.
Running head: MILESTONE ONE 2
2
Milestone One Final Project
John Doe
Southern New Hampshire University
I. Executive Summary
In this section, you should accurately highlight the essential elements of the intelligence report for quick reference by the agency receiving the report. You should include the name of referring agent (your name), the name of the agency that you are imagining you work for, the current date, dates of the activities being covered in the intelligence report, and a brief summary (two to three sentences) on the adversary, scope, and nature of the potential threat. Although this is the opening section of the report, you may wish to complete it last in order to accurately capture the analysis of the body of your report. (This section is the summary so be sure this section is brief. Additional relevant details should be written in their respective sections of the report.)
II. Adversary, Motivation, and Jurisdiction
Summary
Accurately summarize the intelligence collected from the SARs to date, focusing on the “who, what, when, where, why, and how” of the threat situation. Information should be annotated with dates and times from relevant SARs, and information from each date should be provided in a separate paragraph, from inception to most recent. Your summary should focus on connecting the dots, with as much detail as needed to present all the relevant intelligence. It should highlight information that would be of particular relevance for the law enforcement agency doing follow-up in understanding the potential threat. (If it makes it easier, you can format your first section as follows:
A. Who
B. What
C. When
D. Where
E. Why
F. How
Adversary
Determine who the adversary is for this potential threat. It may be an individual or a group. You should identify the names of suspects (if known) and also the type of adversary. For example, is the adversary an international terrorist group, a domestic terrorist group, an organized crime, a local or international gang, drug traffickers, an extremist or militia group, a hacker, or a white-collar criminal? Support your answer using relevant information from the SARs.
Range
Analyze the range of the adversary’s operations. Are their activities focused within one city or state or across multiple states? Support your answer with relevant information from the SARs.
Motivation
Analyze what is known about the adversary’s motivation and how that might affect their choice of target (individual or location). Might it affect whether they choose one target or many, the type of target they select, or the location of the attack? Support your answer with relevant information from the SARs.
Jurisdiction
Based on your analyses in Parts A–C above, determine which agency has jurisdiction in following up on the potential threat. For example, should local or state law enforcement follow up? Should federa.
Running Head PROJECT 31DISCUSSION5Project 3.docxglendar3
Running Head: PROJECT 3 1
DISCUSSION 5
Project 3
Problem statement:
The specific problem to be addressed is how McDonald's is going to deal with a decrease in demand in the wake of COVID-19 pandemic. The general problem to be addressed is how fast-food chains and food outlets are changing their operations during the pandemic of Corona Virus in the world, especially in the United States (Daniel, 2016).
You must always list your general problem statement first. Provide context for that statement. Then present your specific problem statement and provide context for that statement. Per the assignment instructions you should list your research questions following your problem statements.
The method selected for research:
To conduct research on the above-stated problem stated, the right methodThe research method that will be adopted in conducting the proposed research will be the mixed method approach a combination approach withwhich includes both quantitative and qualitative methodologies. A quantitative approach will help understand the insights into what is triggering a certain behavior in participants. While on the other hand, quantitative study is important to figure out the proportion of customers who is are not availing their previous interest in fast food and epically McDonald's (Apuke, 2017). But dueDue to the lockdown and social distancing, going in the market and conducting research is out of option. The suitable technique is to develop a flexible approach where both primary and secondary sources are sued. For secondary resources, the reports by McDonald's' Company and other institutions regarding the change in the food industry will be a suitable option. For primary data collection, developing an online survey is the safest option. For the qualitative study, online interviews can be scheduled. Both structured and unstructured interviews can be planned. Similarly, panel discussion over video calls is also a safe option. Through a mixed approach data for both quantitative and qualitative questions can be gathered (Yoshikawa & Kalil, 2008). Comment by Terrance Woods: What does this mean? Poor word choice. Consider rephrasing Comment by Terrance Woods: Word choice
Per the assignment instructions you were required to “include the justification as to why other methods would not be appropriate”. You failed to do that here.
Research question
Qualitative Research Question:
1. How the fast-food business of McDonald's in the United States is getting affected by the pandemic of COVID-19? Comment by Terrance Woods: I provided you with feedback in your Project 2 submission regarding this research question. My exact feedback was - This questions is not well-articulated. Reword for clarity. You failed to address the feedback received and merely presented the same question in this submission.
Quantitative research question:
2. How many Americans have stopped buying McDonald's because of coronavirus threat in the United States? Comment by.
Running head: PROBLEM STATEMENT 1
PROBLEM STATEMENT 3
Problem statement
Name:
Institution:
Date:
There is a critical need for a good instructional design because it is a multipurpose learning tools that not only serves instructional designers but also learners of all ages. According to Clark (2016), e-learning courses need to be integrated with instructional methods which align with high-quality research.” The implication is that the process of designing instructional designs should involve careful planning, preparing and researching in order to achieve high quality learning outcomes. In this regard, those responsible for designing must identify their strategic purpose as it predetermines the goals, objectives, expected outcomes, and resource allocation of the entire instruction model.
The main approach involves studying the critical elements in the design phases of an instructional model which enhances the learning experience of learners based on evidence-based literature. This is because humans apply appropriate cognitive processes to learn and thus instruction must adopt similar cognitive processing (Clark, 2016).The main purpose is therefore to emphasize the importance of good instructional design in enhancing the quality of education among instructors and learners. The objective involves highlighting the goals of an instructional program, the instructional objectives, relevant instructional materials and design assessment which rationalize the need for a good instructional design with the goal of engaging both learners and instructors. After all, learning is a process that requires the active participation of the learners (Reigeluth, 1987). This research study seeks to identify answers to two questions: a) What are the critical elements that build up a strong foundation for a good instructional design and b) what value do these elements offer to the learners and instructor who are the main consumers of learning instructional designs.
References
Clark, R.C. (2016). E-learning and the science of instruction: proven guideline for consumers and designers of multimedia. Walden University Library.
Regeiluth, C.M. (1987). Instructional Theories in Action: Lessons Illustrating Selected Theories and Models. Walden University Library.
Running head: PROBLEM STATEMENT 1
PROBLEM STATEMENT 6
Need working title
Problem statement
Tangela Jones
Walden University
11/10/18
Need section heading
There is a critical need for a good instructional design because it is a multipurpose learning tools that not only serves instructional designers but also learners of.
Running head MUSIC AND GENDER WOMEN PORTRAYAL IN RAP 1.docxglendar3
Running head: MUSIC AND GENDER: WOMEN PORTRAYAL IN RAP 1
MUSIC AND GENDER: WOMEN PORTRAYAL IN RAP 15
Music and Gender: Women Portrayal in Rap Music
Student’s Name:
Course:
Music and Gender: Women Portrayal in Rap Music
The introduction of rap music in the 1980s was welcomed with a lot positivity. However, this genre of music has on many occasions been considered as being controversial. Rap music has been accused of advancing messages and themes that deal with sexism, violence, gender stereotyping and materialism. Previous studies on rap music have indicated the content found in rap music promotes negative behavior. Moreover, research has shown that rap music videos generally differ in their portrayals of men and women in music videos. Males are often cast in positive light compared to females who are depicted in positions that portray them as a submissive gender to males.
The scope of this research narrows down on rap music produced from the years 2016 to 2018.The songs selected for this research are songs with lyrics that have misogynistic themes on women. Rap songs are observed in normalizing, objectifying, glorifying, victimizing and even exploiting women. Moreover, the rap songs are observed in defaming women through using innuendos and stereotypical language which portray misogynistic and sexist perspectives. The main area of focus for this paper is on the kind of nouns that are used in rap music to refer to the concept of woman and ways in which these nouns depict women. It is critical for this project to investigate the lyrics and its representations, as rap music has in the past years been under criticism for increasingly presenting a negative and controversial image of women in the society. A theological perspective on these issues is undertaken at understanding and criticizing the misogynistic and sexist culture of rap music generally.
Men in rap music have a higher probability of perpetuating violence on women. A review done on the common rap images found out that women were more likely to be dressed in images which portrayed them in provocative ways, especially in videos that had sexual content. Research has suggested that the perpetuation of gender in the media is a theme which has been occurring for eons of time[footnoteRef:1]. Specifically, music and gender and the portrayal of women in rap music has not been extensively studied previously. It is essential to consider the differences of gender in rap music and the portrayal of women in this genre of music. [1: Ronald Weitzer and Charis E Kubrin, “Articles Misogyny in Rap Music A Content Analysis of Prevalence and Meanings,” accessed October 23, 2018, https://doi.org/10.1177/1097184X08327696.]
Although scholars have attempted examining the interactions between rap music and religion, there has been a gap in regard to how artists frame religious messages within their lyrics. However, this lack of sufficient research does not reflect on the continued .
Running head Museum Focus1Museum Focus.docxglendar3
Running head: Museum Focus
1
Museum Focus
4
Museum Focus
Linda Dotson
Walden University
Interdisciplinary Experience: Sustaining Quality of Life in the City
Professor Paige Parker
September 15, 2018
Question 1
Brief introduction of Ohio City
Ohio is a great city named after the Ohio River in the 18th century. The area was disputed by the France and Great Britain. After the dispute, it established its own territories. This territory included the land where west of Pennsylvania in United States and the northwest of the Ohio River. The area covered more than 260,000 square miles (Turner, & Bogue 2010).
The History of Ohio City that has led to construction of Museums.
The area remained as a hunting ground by the Iroquois after the dispute. Later, some American groups began to migrate to the area. Later there was a seven years war between the Europeans, British and France. They all wanted to colonize the area. Unfortunately, the British worn and after the win, they ordered French settlers to leave the area. It is evident that the war brought about the breakdown of ethnicities.
How museum focus has been of great importance to the citizens of the city
The area is known for its landscape, mountains, rivers and minerals. This makes Ohio City to be a great city suitable for great museums. It is evident that, Ohio City creates the best environment for a museum with the theme of History and Natural History to be built. For instance, Miami River is known to be a great river. Many people admire visiting the area just to see the river. This creates the best conditions to build a museum. People within the city can also visit the museum and get to enjoy the benefits of the museums.
How people from outside the city benefit from the construction of the museums.
People outside Ohio City can also visit the museums. These museums will offer the history of the river to its visitors. They will also address an increasing array of issues in the dynamic environment (Edson, 2017).
Question 2
Permanent Exhibition.
Modern museum are designed to have a permanent exhibit, in this case the museum must have enough collections and classification of a field of knowledge for research and for display purposes. This will enlighten the visits about the history of Ohio City. The history stored in this museum will also be of great use to students as they will learn a lot in these museums,
References
Edson, G. (2017). Museum management. In Encyclopedia of Library and Information Sciences(pp. 3185-3198). CRC Press.
Turner, F. J., & Bogue, A. G. (2010). The frontier in American history. Courier Corporation.
If you can do it send confirmation at [email protected]
If you can do it send confirmation at [email protected]
Assessment Details and Submission Guidelines
Trimester
T2 2018
Unit Code
MN603
Unit Title
Wireless Networks and Security
Assessment
Individual
Type
Assessment
Design and implementation of secure enterprise wireless network
Tit.
Running head: MODULE 3 - SLP 1
MODULE 3 – SLP 2
Module 3 – SLP
Elizabeth Davis
Trident International University
Dr. Sharlene Gozalians
13 May 2019
Module 3 – SLP
In a bid to control the prevalence of diabetes among the African Americans, it is important to examine a number of attributes of culture that can empower a person towards changing a behavior. The factors may be positive, existential, and negative. Existential factors may be not harmful but need to be acknowledged. The importance of a family cannot be ignored especially because of the support they provide to diabetic patients. Family is therefore a positive cultural value which will assist in managing diabetes disease. This paper therefore seeks to address how each of the PEN-3 model’s three factors within the dimension of cultural empowerment applies to the African American group.
It is important to explore by identifying several cultural beliefs and practices that are positive, existential and negative. Positive factors are likely to lead to an improvement by reducing the prevalence of diabetes among the African Americans. Existential factors are existing cultural values and beliefs that may have no harmful health consequences. Cultural practices that may act as barriers in controlling the prevalence of diabetes among the African Americans are the negative factors. Example of these negative practices includes poor nutrition leading to obesity.
Positive Factors
The positive factors which will influence management and control of diabetes among the African Americans include spirituality and family. For example, talking about a family affair with diabetes will make a great impact in controlling diabetes among the African Americans. This is because it will create awareness of how to handle and deal with diabetes. Spirituality will have a positive impact in controlling the prevalence of diabetes among the African Americans. African Americans who have spiritual faith are likely to engage in activities which will reduce the prevalence of the disease.
Existential Factors
Existential factors include faith healing. A belief in faith healing is a factor which is likely to reduction in prevalence of diabetes among the African Americans. Individuals who are religious are likely to visit religious leaders to seek healing and intervention. Many individuals confess that they got healed after being prayed for by the Pastors and other religious leaders. This is attributed to believing in faith healing.
Negative Factors
Consumption of “comfort foods” is common in the diet of the African Americans. These foods contain high fat, sugar, and calorie contents. Example of negative cultural factors includes unhealthy traditional foods. Poor nutrition among the African Americans is more l.
Running Head PROGRAM EVALUATION PLAN1PROGRAM EVALUATION.docxglendar3
Running Head: PROGRAM EVALUATION PLAN 1
PROGRAM EVALUATION PLAN 2
PROGRAM EVALUATION PLAN
Name:
Tanisha Hannah
Institution:
Strayer University
Class:
EDU 571 Evaluating School Programs
Professor:
Antony Jacob
Date of Submission:
February 19, 2020
Program evaluation plan (part 2)
In order to ensure that the “gender equity for girls in math” education program which applies to master’s level students is efficient in fulfilling the outlaid goals, the goal based approach of evaluation should be applied in evaluating the effectiveness of the program. The major objective of this education program is to empower the girl child and to ensure that there are increase female students taking courses in mathematics at higher education levels (Markovits & Forgasz, 2017). In this case therefore, the evaluators has to establish if the establishment of this program will promote the positivity and capability of girls to take courses in Mathematics and to increasingly love the subject even in the lower classes so as to portray an increased number in the number of girls pursing this course in the masters level.
The goal based approach of evaluation will help the school evaluator to be able to determine how they can ensure that all the institutions are able to empower the girl child and encourage them to increasingly perfect their skills in mathematics in order to see a reflection of changes in the higher education levels (Sarouphim & Chartouny, 2017). This evaluation technique will help the education program creators to determine if the program is efficient in attaining the set objects through checking the outcomes of the implementation of the program over certain period of time.
The gender equality for girls in Math is a program that is anticipated to help the girl children be able to resolve their issues that result from fear and insecurities which cause them to undermine their power and be left behind by the boy child in regard to prosperity in Mathematics (Ganley.et.al, 2018). Therefore, the evaluators will have a role of determining the broader impacts of this approach as well as investigate what greater good is served as a result of this program. This will include identify the consequences that the program will have on other courses which most female students major in and how the male students will be affected by the program. The goals based evaluation method will help establish the objectives which can be added in the program to make it have optimal results to both girls and boys as well as ensure that other courses that are male dominated portray gender equality (Stoehr.et.al, 2017).
The major areas where the evaluators will assess include; the goals of the program, the outcomes of the program as well as the consequences. The main questions concerning these areas will be; what are the objectives of the program? How will the program be able to meet these goals? How do the goals of the program align with the activities involved.
Running head: PROGRAM EVALUATION 1
PROGRAM EVALUATION 5
Program Evaluation
Student’s Name
Institution
Program Evaluation
Application of Social Cognitive Theory in Information Science and Education
Social cognitive theory first started as a social learning theory by Albert Bandura for application in psychology. Jenkins, Hall, and Raeside (2018) asserted that, regarding the deployment of social cognitive theory in understanding information seeking behavior and use, the social cognitive theory had been used to explore significant areas. Such areas like consumption of social media content, information retrieval skills in the academic field, information retrieval skills at the workplace, information literacy in the educational field and day to day life information seeking. For instance, Kim (2010) used the theory to explore expectation differences in students of different genders when using university library website resources. With regards to knowledge sharing, Jenkins et al. (2018) found that social cognitive theory has been used to explore various fields like blogging and knowledge management systems.
In the field of education, Erlich and Russ-Eft (2011) reviewed the application of social cognitive theory to academic advising for assessment of student learning. Specifically, the researchers applied the social cognitive theory concepts of self-regulated learning as well as self-efficacy for the study. This medium is because these concepts have been successfully applied to education. The idea that learners should be able to recognize, create as well as choose their career plans for successful navigation through their college life contains the elements of self-efficacy concept and self-regulated learning. For instance, Erlich and Russ-Eft (2011) indicated that the confidence in achieving academic plans at a given level could be an indication of a student’s ability to perform academic planning activities at a complex level, which is a demonstration of increased efficacy. Learner’s self-regulated learning skills may help in understanding the learning mechanisms by which a learner acquired the strategies and tactics for performing academic planning activities with independence and sophistication.
Program Timeline
Project Goal
Related Objective
Activity
Duration
To promote awareness about breast cancer prevention
By 2020, increase to 75% proportion of African American women who understand the importance of annual clinical breast exams
Identify the population who underutilize clinical breast exams
January 1, 2020-January 31, 2020
Develop a media campaign to educate African American women about the benefits of early breast cancer detection
February 1,2020-March 30, 2020
Train faith-based organization members on how to educate their congregations about the.
Running Head MUNCHAUSEN SYNDROMEMunchausen SyndromeKr.docxglendar3
Running Head: MUNCHAUSEN SYNDROME
Munchausen Syndrome
Krystina Joseph
Columbia College
Munchausen Syndrome Article Review
Introduction
The Munchausen Syndrome Article explains about the Munchausen Syndrome, which is a rare fictitious disorder which involves the frequent hospitalization together with an intentional display of signs of sickness and pathological lying. In this regards, the management needs the security history taking with collaboration with the sound clinical processes which entails organicity exclusion in addressing the psychological problems. It is worth noting that a case which is presented having unusual symptoms of same dimensions are as well discussed. The case in this regards brings the finer nuances in the assessment of the entity (Prakash., et al 2014).
Research Question
Based on the abstract of the article, it can be denoted that the research question of the article is the need to understand more on the Munchausen Syndrome as well as the symptoms and therefore the need to ensure that such issues are solved by having a sound clinical process to handle the problem. The problem for the case as well was to find out what caused the 19-year-old housewife to vomit pink substance.
Findings
The findings depict that the 19-year-old housewife was suffering from a factitious disorder, also termed as the Munchausen syndrome. The psychometry performed also showed that there is an elevation of scales of anxiety together with hysteria. Consequently, being managed in an empathetic as well as non-confrontational manner, the psychotherapy was intended to improve the positive coping abilities while at the same time improving the interpersonal relationships which had been imparted (Prakash., et al 2014).
Research Methods Used
The methods used involved observations and clinical assessments. Observations were done by checking regularly the presence of the bloodstained vomits as well as the asthenia and any forms of skin allergy. This was carried out to ensure that the patient had no issues. The observations, as well as little conversation, showed that there were no cases of psychiatric illnesses for the patient in the past. Further, the assessment entails involves the systematic examinations which were performed within the normal limit. The psychiatric evaluation was performed together with ward observations which were intended at revealing the comfortability of the patient while in the hospital (Prakash., et al 2014).
The credibility of the Source of Information
To know the credibility of sources, the authors are scrutinized where their qualifications and their areas of experience assessed to understand whether the information provided is related to the topic at hand. For this article, it can be denoted that all the information provided is credible. This is because all the four authors who contributed to the article have sufficient skills and knowledge pertaining to health-related disorders, and thus, their pieces of information.
Running head PROGRAM EVALUATION 6PROGRAM EVALUATIONPr.docxglendar3
Running head: PROGRAM EVALUATION
6
PROGRAM EVALUATION
Program Evaluation
Insert Your First & Last Name
Capella University
COUN 5280 – Introduction to School Counseling
Professor: Dr. Erin Berry
Month, Year
Setting up the format for an APA style paper
· Begin by setting your cursor at the first, beginning space of the first page of your paper and creating all of your margins at 1”. You do this by going to File>Page Set Up>Margin Tab and set at 1 inch for all 4 sides, Top, Bottom, Right, and Left.
· To set spacing to true Double: First, highlight the entire document text, or choose Select All. Then go to Format>Paragraph>Indents and Spacing Tab and in the box that says Line Spacing: select Double from the pull down menu. Make sure the ‘before’ and ‘after’ boxes are set at 0 pt, and not at Auto. Double Spacethroughout the document and see rules in APA Publication Manual, 6th Edition. APA is about saving space… no gaps or quadruple spacing, so the document is consistent and easy to read.
· The font is Times New Roman, 12 pt. Use the same size and typeface throughout, including the paging and Running heads.
(REMOVE THIS INSTRUCTION PAGE WHEN SUBMITTING PAPER)
Start your introduction here. APA 6th edition does not use a heading title for the introduction because its position in the paper identifies it as the introduction. Open your paper with a nice foreword to introduce your response to the unit 7 discussion. You also want to set the reader up about the four general topic areas you will present . At this point, you may respond to the assignment in an outline fashion or take a narrative approach. An example of an outline form is provided. Please review the rubric carefully! There is still an expectation to support your ideas with the literature.
I. School specific needs
In this section you will examine your understanding of identified gaps or specific needs for Model Middle School.
· Included in this section should be an analysis that addresses academic career, personal-social and developmental needs. A strong analysis is demonstrated when the ideas presented in this section are supported by specific examples and scholarly literature.
· A strong program analysis takes into consideration the ways in which student development is fostered through stakeholder collaboration (e.g., school, family and community). Additionally, the measures used to demonstrate accountability are reviewed. Be sure these two ideas clearly addressed in your outline.
II. Program outline
Strong action plans demonstrate critical thinking through the discussion of reasonable assumptions, drawing inferences or making predictions while exploring the potential risks and benefits of the plan. Make sure specific examples are provided! For example, the plan may include group counseling for an academic issues because intervention is supported in the literature.
· In this section, you will describe the specific program of services you plan to provide to .
Running head PROGRAM DESIGN 1PROGRAM DESIGN 2.docxglendar3
Running head: PROGRAM DESIGN 1
PROGRAM DESIGN 2
Program Design to Promote Social Goals in American K12 Schools
January 15th,2018
Program Design to Promote Social Goals in American K12 Schools
Explanation of Each Initiative
The three main initiatives of promoting social goals in school will include: promoting moral and character education, improving children’s health and nutrition, and creating school communities through extracurricular activities, after school programs, and school spirits (Rissanen et al. 2018). Comment by Evelyn Young: The 3 initiatives are clearly stated. Although did Rissanen et al. propose these 3 initiatives to promote social goals in schools? If these are your arguments, take credit for them. No need to give credit to Rissanen et al. for formulating the thesis for your paper.
I think that your paper could have used an introduction followed by the thesis statement.
Explanation of Each Initiative
Moral education is meant to promote good conduct among school-going children, not just within their immediate social relationships, but also in their dealings with their fellow citizens. This initiative is premised on the need for students to possess clear ideals and judgments on what action are right and what are wrong, including the determination of students’ conduct through a constant reference to those ideals. Moral education will be offered as a social goal to enlighten students on a system of rules and norms that regulate the social interactions of people on concepts of welfare, such as harm, trust, justice, and rights. For some students, issues related to values, personal feelings, and societal norms are constructs for discussions and are as such viewed as being influenced by the manner in which morality taught or experienced in schools, churches, and social institution settings. Moral education will be meant to reduce criminal and deviant behaviors among students. Moral character is required in schools because many parents do not teach their children morality issues.
The health and nutrition initiative is meant to improve the physical and mental well being of students. This initiative has the potential to improve the quality of students’ urban life, strengthen the ability of poor children to excel in their studies, and to compensate them for the substandard home and school environments spawned by competitive, inequitable social order. Health and nutritional initiatives will be strengthened through planning and introducing curriculum on nutrition with educational activities. These will include physical activities, which are combined with the farm to school programs that motivate students to consume healthy diets. Indeed, the hybrid school-based nutritional programs have major influence on attitudes, beliefs, and behaviors associated with fruits and vegetable consumption diffused throughout a bigger urban community (Dudley Cotton & Peralta, 2015). This hybrid intervention includes combining district stra.
Running head PROFICIENCY LEVEL ANALYSIS1PROFICIENCY LEVEL AN.docxglendar3
Running head: PROFICIENCY LEVEL ANALYSIS 1
PROFICIENCY LEVEL ANALYSIS 4
Proficiency Level Analysis
ESL-433
6/16/19
Proficiency Level Analysis
Grouping Strategy for Ms. Jensen
The arrangement of the student in the class should be based on their proficiency level while factoring the different capabilities of each student. The teacher should ensure that the both fast learners and slow learners are catered in terms of understanding how to handle their comprehension capabilities. The class has three categories of student, basic, intermediate and proficient.
Cooperative Learning
Cooperative grouping is based on the differences among the children in terms of their learning abilities. Li & Lam (2013) states that cooperative grouping is best suited for situations where students have learning abilities which are differing. The grouping technique is implemented following the analysis of the heterogeneous factors such that students should be grouped depending gender, economic background, culture, race and ethnicities. The ranking of students should follow the descending order starting with the highest to the lowest. To make a ranking legend, the teacher should use L for low achiever, M for medium achievers and H for highest achievers. The grouping should include at least one student from each category for the purposes of achieving diversity. The grouping system should however be done without involving the students as such could encourage discrimination. The issues of gender should be defined effectively to avoid the majority of gender in any of the group.
Rationale for Placement
The strategy is important and useful for the given case because students have different abilities and proficiency. The grouping strategy also promotes involvement of all students since the group is designed in manner which facilitates individual contribution. Tsay & Brady (2012) states that the cooperative grouping is important since it allows for the development of critical thinking skills and communication skills.
Conclusion
Ms. Jensen’s class has students with different abilities and varying English proficiency. Cooperative grouping is effective for 7th grade children since it allow them to exchange information amongst themselves while encouraging collaborative learning. Students are more likely to improve their self-esteem and moralization to study English tasks since group composition allows individual contribution and peer discussions.
References
Li, M. P., & Lam, B. H. (2013). Cooperative learning. 2015-01-20]. http://www. ied. edu. hk/aclass/l'heories/cooperative learning course writing_LBH% 2024June, pdf.
Tsay, M., & Brady, M. (2012). A case study of cooperative learning and communication pedagogy: Does working in teams make a difference?. Journal of the Scholarship of Teaching and Learning, 10(2), 78-89.
Ms. Jensen's 7th Grade Class AZELLA Scores
Student Name
Reading Label
Writing Label
Listening Label
Speaking Label
Aryanna
P.
Running head PROFESSIONAL CAPSTONE AND PRACTICUM1PROFESSIONA.docxglendar3
Running head: PROFESSIONAL CAPSTONE AND PRACTICUM 1
PROFESSIONAL CAPSTONE AND PRACTICUM 5
Falls and Related Injuries
Nanah Kamara Comment by Nelson, Emily Jeanette: Please see my comments in your previous assignment about how to format your title page.
GCU
Falls and Related Injuries
Nurses, being the initial contacts for patients in any most health facilities and the fact they interact or engage with patients more when compared to other providers of care constitute a critical component of the healthcare system. Consequently, nurses play a much huge role in making sure that the healthcare system provides not only safe care but also and care of high standard or quality (Sato, Hase, Osaka, Sairyo & Katoh, 2018). However one of the major healthcare or nursing issue over the years is the fall and associated injuries which have proved not only difficult for healthcare providers and facility to manage. The purpose of this essay is to… Comment by Nelson, Emily Jeanette: Reference needed
For instance, and according to DuPree, Fritz-Campiz & Musheno, (2014), Unintentional falls constitute the highest cause of non-fatal injuries among people over 65 years in the US. Moreover, one in every three individuals above 65 years falls at least one time in a given year. In addition, injuries from falls cause the highest number of accidental deaths among people 65-year-old and above (Tricco, Thomas, Veroniki, Hamid, Cogo, Strifler & Riva, 2017). Such statistics coupled with the extent of the costs associated with fall call for proper intervention to reduce falls and their associated injuries. For instance, the government spends billions of dollars on fall and their associated injuries on treating falls. The prevention of fall would provide increased funds for investment in other social programs aimed at improving both healthcare and addressing social or communal problems (Zakrajsek, Schuster, Wells, Williams & Silverchanz, 2018).
In addition, falls and their related injuries are responsible for almost 15% of the recorded hospitalization. This increases the burden of healthcare providers especially given the numerous stressors like staff shortage, huge workloads, leadership problems and personal factors among others. An increase in falls and associated injury, therefore, is detrimental to the provision of quality care as captured under the healthy 2020 program goal of reducing deaths that result from falls. Comment by Nelson, Emily Jeanette: Reference needed Comment by Nelson, Emily Jeanette: Reference needed
Despite this, falls are very complex and difficult to manage or prevent. Given the implications that falls bear on the patients, the healthcare providers and the healthcare system as a whole (Joseph, Henriksen & Malone, 2018), there has been increased There has been an increased research focus towards fall prevention and reduction strategies. As a result, there exist a significant amount of literature regarding the reduction and prevention of falls..
Running head PROFESSIONAL DEVELOPMENT PROPOSAL PROGRAM .docxglendar3
Running head: PROFESSIONAL DEVELOPMENT PROPOSAL PROGRAM 1
PROFESSIONAL DEVELOPMENT PROPOSAL PROGRAM 3
Professional Development Proposal Program
BUS520
Strayer University
November 9, 2018
Executive Summary
Professional Development Proposal Program
The need for organizational efficiency is driving the need for understanding the competency of individuals that generate effectiveness. The emotional intelligence capabilities help explain considerable as well as significant variances in accepting and predicting performance in capability studies. Emotional intelligence is the ability to monitor personal feelings and emotions visa vie other people’s feelings and emotions and use the information to guide personal thinking and actions. Management can rely on employees’ emotional building blocks to not only enhance their performance, but also their job satisfaction levels. The most important emotional intelligence building blocks that enhance employee performance and job satisfaction are social skills, self-awareness, self regulation, self motivation and empathy. Managers will use emotional intelligence to identify the positive and negative reinforcement of motivation to enhance employee morale within the organization. Positive reinforcement motivation tools are the rewards given to employees for exemplary performance while negative reinforcement is the penalty or punishment for poor performance.
Leaders can use the concept of emotional intelligence to enhance their social skills and decision-making skills in management. Emotional intelligence plays a critical role in helping persons requiring social skills to help them deal with social situations. Given that building strong relationship is one aspect of effective leadership, there is need for organizational leaders to build capacity in social skills for better organizational performance. Leaders can also utilize the concept of emotional intelligence to enhance their decision-making skills. Emotionally intelligent decision makers rely on self-awareness and self-management to determine their appropriate duties in decision making process. Decision makers use these skills to determine whether they have the necessary orientation to a problem.
Emotionally intelligent leaders strive for the establishment of effective teams to help realize organizational and team goals. Effective teams have clear purpose and goals, engage in consensus decision making, shared leadership and embrace open communication. To develop effective teams, departmental managers must define the team’s purpose and goals, define the roles for each group member and quickly identify and resolve conflicts. Finally, there is need to develop both extrinsic and intrinsic reward systems for employee motivation and improved performance.
Professional Development Proposal Program
Introduction
The need for organizatio.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
1. Running head: NETWORK INFRASTRUCTURE AND
SECURITY
1
NETWORK INFRASTRUCTURE AND SECURITY
2
Project Deliverable 5: Network Infrastructure and Security
CIS 499 – Information Systems Capstone
November 25, 2018
Project Scope
The project will comprise of a network design to meet Acme
Corporation network infrastructure requirements. The network
should accommodate occasional guest users of up to 10 users.
The network design will incorporate an FTP server that will use
for sharing files. The project should involve separate subnet for
guest and LAN networks; the guest network should be restricted
to access only FTP service on the FTP server while all other
access to the LAN network will be blocked. The project will
also involve IP Network Design as well as identification and
configuration details of the hardware utilized (Switches and
Routers). Included in the network design is the implementation
of a Wireless LAN (WLAN) that minimizes the management
effort to configure and manage while allowing effective data
transmission between the Wireless Application Protocols
(WAPs).
Network design
The network will use a star topology where it provides
centralized handling of the network and its’ associated security.
Each of the floors of the building will have a central server
which host switches that link the different rooms via ethernet
cables. Each of the rooms will have a switch that is linked to
the central server's router. The servers will be linked via fiber
2. optic cables. The ethernet cables will be utilized for connecting
individual devices to their associated switches. The network
design will involve the utilization of both wired and wireless
media. The wireless media will allow for a network connection
for portable devices like tablets, cell phones, and laptops.
The switch links allow the traffic getting into the Acme’s LAN
from the MAN not to be congested. As more tablets are utilized
in the company, the WLAN bandwidth increases significantly to
each room. This requires that the WAPs supporting the 802.11n
protocol as well as faster 802.11ac standard require additional
power. As a result, switches with PoE+ give the required power.
These Switches utilize the existing Category-6 cable (Ethernet
cables) that allow for remote administration and configuration
(Karris, 2009).
Virtual LANs (VLAN) will be used to enables the network
administrator to group users into shared broadcast domains
irrespective of their physical position in the internetwork. For
instance, computer devices utilized by employees on two
different floors may be placed on the same VLAN. The staff has
their VLAN while the Guest VLAN is used by guests when
using wireless access points.
The company's network perimeter that detaches it from the
Internet comprises of two border core routers. The border
routers should then link to the Virtual Private Network (VPN)
Gateway. The Routers link to the servers, wireless access points
and switches as well as the LAN (internal network). The
switches will link with other VLAN switches that separate the
different VLANs for the various departments within the
corporation (like Accounting, Customer Support, and Finance).
Also, the switches link other switchers in the data center to
provide a highly secure subnet. This highly secure subnet forms
a physically segregated subnet. Even though the network will
have physically separated subnet for the various departments,
they have a common highly secure subnet that is shared by the
3. departments (Cisco Networking Academy Program, 2014).
Most of the data processing for Acme Corporation will be
addressed by a database management system located in the data
centers. The data centers should house a web server that is
utilized by the company's internal support crew. It should
contain an application update support server that is used for
patch management. Each of the data centers should house an
internal DNS server, an e-mail server, and user support
workstations. The main data center will be situated at the
Washington D.C. site while the data center at the St. Louis site
will serve as the backup data center in the event of a security
emergency.
Network Design
A typical LAN for the Acme Corporation will comprise
numerous computer hosts linked together to form a star
topology. These devices will connect to a host device which
links to a switch. Such network configuration is flexible and
useful since it allows room for expansion where new tools may
be added thereby making it scalable. The network design is
ideal since it is easy to deploy and scalable which in turn
maximize the performance of the network.
Network security
The DMZ forms a perimeter zone between the WAN or the
Internet which is unsecured and the secure LAN. The primary
purpose of deploying a DMZ for the company is to keep the
company’s public information assets from the private ones. This
is achieved by logically and physically separating the company
network by use of two firewalls; one on the border of the
company WAN (which manages company connections), and the
other on the border of the company’s internal network.
Security policy
4. The security policy that covers Acme infrastructure includes the
installation of reliable antivirus software which acts as the final
line of defense from unwanted attacks. The antivirus program
detects and removes virus and malware as well as filter possibly
malicious downloads or emails. All employees must utilize
complex passwords in each of the computers and Web-based
applications that require key for access. Complex passwords
make it hard for hackers to crack them. The network
administrator must implement a network firewall that helps in
safeguarding all inbound and outbound network traffic (Cahn,
2008).
The security policy for the company also covers installation of
encryption software that protects data related to credit cards and
bank accounts. Strong encryption algorithms transform readable
data into unreadable codes that make altering of information
difficult to accomplish. Even when data is lost it becomes
obsolete without the keys used to encrypt the data. Also, the
security policy provides guidelines through employee training
on dos and don'ts of utilizing systems and Internet. For
example, on how to handle suspicious emails. The security
policy provides guidelines on putting limited access to critical
data, taking of regular back-ups and the securing of Wi-Fi
Networks that are highly vulnerable to attacks.
References
Cahn, R. S. (2008). Wide area network design: Concepts and
tools for optimization. San Francisco, Calif: Morgan Kaufmann
Cisco Networking Academy Program. (2014). Connecting
networks. Indianapolis, Indiana: Cisco Press.
Karris, S. T. (2009). Networks: Design and Management.
Fremont, Calif: Orchard Publications.
Bottom of Form
Running Head: CLOUD TECHNOLOGY AND ANALYTICS
5. 9
Project Deliverable 4: Analytics and Cloud Technology
CIS 499 – Information Systems Capstone
November 23, 2018
Introduction
Data analytics involves scrutinizing data sets using specialized
systems destined to draw inferences from the information
therein. Therefore, analytics entails data sources, processing
systems, data and analytic models, the power to compute as well
as storage or sharing Medias. Such services could be hosted
offline or done over the internet. For services hosted over the
internet, the term cloud computing is used to refer to them.
When technological and analytical tools are utilized to extract
information especially where large data is involved, it’s referred
to as cloud analytics. Cloud computing provides benefits such
as lower costs, scalability, flexibility and secures the future of
the organization (Power, 2014).
Reason for the use of analytics and cloud technology
Cloud technology and use of analytics are cost effective.
Though it is always costly to launch the application of cloud
6. computing services, the maintenance cost associated are
considerably low. This, therefore, generally reduces the cost of
running cloud computing and analytics services. It also saves on
the amount of power used on cooling and power. This is made
possible using virtualization where the number of servers
needed in a big company is less. Thus more space is freed in
data centers. Therefore, less power is consumed. Cloud
technology also permits the development of data centers within
the cloud features. These data centers eliminate lengthy
organizational procedures when accessing services. Easier
access to services implies that cost incurred in data management
are saved. A company like Acme using cloud computing no
longer need to invest in expensive Information Technology
infrastructure and spend on hardware and software as well as
incur maintenance cost. Instead of too much investment of
administrative tasks, cloud computing can be used in place
since it allows access too many services with fewer charges.
Only IT personnel are required to run the business while
applying this technology.
Elasticity and flexibility are provided by cloud technology and
analytics. Hybrids clouds have grown among the many available
enterprises; therefore, companies have several alternatives to
choose from. Gartner has been the most significant hybrid
installed by large companies. Cloud technology deploys public,
private and hybrid models. The private cloud delivers services
from a business’ data while public cloud involves a third-party
service provider who delivers the needed cloud services. The
third model, the hybrid cloud model, combine public and private
cloud services, and the user makes their choice. Critical
workloads are usually run on the private cloud while burst
workloads are handled on the private cloud. As a result, cloud
technology permits migration flexibility of workloads from one
cloud to another or withdraw them from the cloud. Large
companies are highly advised to move to hybrid cloud
computing since it has more flexible features than the others.
Elasticity in scaling up work and scaling it down depending on
7. demand is possible over cloud technology. Such flexibility
eradicates the need for heavy local investment which may
remain inactive.
Implementing cloud technology and analytics ensures
availability of large data. Availability of big data facilitates
accurate analysis and viable decisions. Cloud technology
enables companies to trace back their databases with customers
easily as contrary to the difficulties associated with keeping up
with the information in the past. With access to a wide range of
data, companies can develop their analytical skills. This is not
only enhanced by the availability of data, but also cloud
provides the needed computing power to sort through the large
and unstructured data (Botta et al, 2014). Structuring that data
is made easier thereby saving time and as well facilitate great
decisions based on available data resulting to businesses
achieving their goals. Also, data is well presented to end users
in a manner that is easily understood.
Upgradeability of systems has also been enhanced by cloud
technology and analytics. Maintaining several thousand users
over a single PC which has constant privacy settings and
updates is a time-consuming or rather a close to impossible task
(Avram, 2014). It would require more time of access and more
finances in updating systems that expire regularly. Cloud
computing saves companies time and cost of maintaining
systems and could be redirected into achieving business goals.
Cloud computing also provides high levels of security due to
their specialization in economies of scale. Businesses require
their operations and data involving their customers to be secure
to build trust with them. When such a reputation is reached,
upgradeability of a business becomes simpler. Since cloud
technology and analytics is flexible, it is possible to access data
frequently and continuous edit to make necessary changes. This
is particularly helpful in increasing reliability since the wrong
data can be quickly detected and fixed before going viral (Botta
et al, 2014).
Software development has been fastened using cloud computing.
8. Where large companies deploy huge numbers of software
developers’ officers in their internal operation, they usually
achieve from development and implementation of software such
as cloud computing. In such an environment, companies
standardize the use of cloud computing to advance other
software. Database services among others can be integrated into
software development platform. Cloud computing also
facilitates the firm establishment of documentation practices
(Avram, 2014). Installing, testing and deployment of virtual
machines have been made faster by cloud computing due to
proper documentation and economies of scale enjoyed.
Analytics and cloud computing have facilitated carrying out of
more than one business. These services can be utilized as
business flexibility strategies such as a risk management tool.
Companies can identify potential risk from the available data
and learn how to manage them. It also allows businesses to
increase idleness of infrastructure in all its offices. Companies
can be in the interiors when cloud computing is used since only
access to the internet is required. Features such as caching, load
balancing and storage databases can be merged from various
businesses locations thereby simplifying business infrastructure
(Botta et al, 2014). If Acme Corporation decide to utilize cloud
computing services, we can easily expand due to the availability
of flexible features and architecture that allows the addition of
extra levels of modules into the system with ease.
Cloud computing can bring a benefit of green dimension to our
business. This enables our organization to achieve our
objectives under corporate social responsibility. Cloud
providers are capable of investing in a large scale into data
centers such that less hardware is used. With this, fewer
resources are wasted. Management is also made easier. Cloud
computing allows the display of almost everything on a digital
panel thus enabling quick identification and solving of problems
(Avram, 2014).
AppendixWorkflow diagram
9. ANALYTICS AND CLOUD TECHNOLOGY
2
screen layouts
Recommendation
Cloud computing and analytics is a viable business service that
all firms should consider investing in. Currently, it is the only
way to keep your business competitive and remain relevant in
the market. This is an avenue the Acme Corporation should
pursue.
References
Avram, M. G. (2014). Advantages and challenges of adopting
cloud computing from an enterprise perspective. Procedia
Technology, 12, 529-534.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2014,
10. August). On the integration of cloud computing and internet of
things. In Future internet of things and cloud (FiCloud), 2014
international conference on (pp. 23-30). IEEE.
Power, D. J. (2014). Using ‘Big Data for analytics and decision
support. Journal of Decision Systems, 23(2), 222-228.
Sacha, D., Stoffel, A., Stoffel, F., Kwon, B. C., Ellis, G., &
Keim, D. A. (2014). Knowledge generation model for visual
analytics. IEEE transactions on visualization and computer
graphics, 20(12), 1604-1613.
DATABASE AND DATA WAREHOUSING DESIGN 1
DATABASE AND DATA WAREHOUSING DESIGN 4
Project Deliverable 3: Database and Data Warehousing Design
CIS 499 – Information Systems Capstone
November 9, 2018
Instruction:
The ACME Company has a vast database of data that generally
ranges from terabytes. A data warehouse is a federated
repository for all data collected by an enterprise’s various
operational systems and therefore, the best option for use in this
case. A data warehouse is similar to a relational database that
can be housed on an enterprise mainframe or as it is today in the
cloud (Rouse, 2018). At any moment, one visit to a website
generates thousands of rescue records. Some of the data may not
be updated, but cannot be excluded until a few months later; it
will be used for analysis. This analysis generated future
11. business prospects. And this analysis depends on how data are
collected and how it should be organized to give a clear picture
of the analysis.
As the CIO of ACME, it is my responsibility to look for a data
warehouse vendor who can increase our analytics operations.
The requirement for the storage of data:
The number of new concepts and tools which has been
developed and integrated with the new technology is called Data
Warehousing. To understand more simply, a data warehouse is a
storage space for storing a huge amount of information in an
organization (George, Kumar & Kumar, 2015). It is a relational
database designed specifically to manage queries and analysis
rather than processing transactions (Jukic, Vrbsky & Nestorov,
2016). It is a well-organized organization, management, and
reporting of data. The main features of the data warehouse
allow you to save, collect and filter data in different systems at
higher levels. It typically contains historical data derived from
transaction data, but may also contain data from other sources.
It helps the organization consolidate analysis data from multiple
sources of transactional working time separation. In addition to
that, the environment includes an ETL data warehouse, which is
the extraction, transport and upload solution, OLAP, which is
the online processing engine analysis, analysis tools and other
tools to address the process of data collection. And finally,
deliver to business users. The data stored in these stores must
be stored in a reliable, secure and easily manageable way. The
need for data storage arises when companies become more
complex and start producing and collecting a huge amount of
data that is difficult to manage traditionally.
Data integration:
ACME’s information is voluminous and complex and is
complemented by various internal and external systems. It is
also necessary to analyze the data through different location,
time and channel systems. Therefore, data integration is needed
here so that all data is organized and stored in one place. It also
reduces the time and length of the reporting process, due to the
12. number of steps involved: extracting and retrieving data from a
single source, then sorting and combining data, and then
enriching data, by running reports on this topic uprooted. Data
archiving is not only a reliable data storage platform but also a
very powerful and excellent data integration platform. The data
stored in the data warehouse is completely integrated, variable,
volatile and object-oriented. It helps companies get a 360 ° view
of the organization.
ER Diagram:
The main entities that form the basis of the company are the
independent components that facilitate the correct collection of
data and send it to the data. The customer is a recipient of the
company's service.
The user visits the page. Web data analysis detects page details.
A page can have multiple visits. Recording the information
about an unexpected error status code must be done. A status
code can have many visits to the page. The registered user
information is the backbone of the "customer return" data
source. A registered user can have more than one visit. When
the data is saved, it must also be stored in the Time Period. At
any time, there may be more visits to the system. The registered
user receives a payment for his comments.
Site URLs can be social networks, online forms, and customized
Web pages.
Data Flow Diagram:
13. Mapping data source system, data warehouse, and specified data
mart:
References
George, J., Kumar, V., & Kumar, S. (2015, July). Data
Warehouse Design Considerations for a
Healthcare Business Intelligence System. In World congress
on engineering.
Jukic, N., Vrbsky, S., & Nestorov, S. (2016). Database Systems:
Introduction to Databases and
Data Warehouses. Prospect Press.
Rouse, M. (2018, November). TechTarget.com. Data
Warehouse. Retrieve from:
https://searchdatamanagement.techtarget.com/definition/data-
warehouse
Online FormsWeb Page
Customer
Feedback
SEO
Relational Database
Extract, Transform and Load Processes
Operational Data Store (ODS)
Data WarehouseData MartData Mart
Data Mart
�
�
Online Forms
Web Page
Customer Feedback
SEO
14. Relational Database
Extract, Transform and Load Processes
Operational Data Store (ODS)
Data Warehouse
Data Mart
Data Mart
Data Mart
Client
PKclient_ID
Pages
PKpage_ID
StatusCode
PKstatusCode_ID
PagesVisit
PKpageVisit_ID
Visit
PKvisit_ID
Registered Users
PKuser_ID
ServerLog
PKlog_ID
TimePeriod
PKperiod_ID
VistFact
PKvisitFact_ID
Payment
PKpayment_ID
InteractionTypes
15. PKinteraction_ID
Ref_Calender
PKreporting_Time
1 ..*
1 ..*
1 ..*
1 ..*
1 ..*
1 ..*
1 ..*
1 ..*
1 ..*
1 ..*
* ..*
1 ..*
�
Table
Data GranualityCollection systemIntegration
ProcessOperational Data StoreStaging/Verification
DatabaseIntegrated Data Warehouse Page VisitCountOnline
logging dataData integrity
CodeREPORTINGVisitPageTimePeriodPageVisitVisitFactData
Mart
�
�
�
�
Data Granuality
Collection system
Integration Process
Operational Data Store
16. Staging/Verification Database
Integrated Data Warehouse
Page Visit
Count
Visit
Online logging data
Data integrity Code
Data Mart
R
E
P
O
R
T
I
N
G
Page
TimePeriod
PageVisit
VisitFact
Running head: PROJECT PLANNING AND MANAGEMENT
1
17. Project planning and management
4
Project Planning and Management
CIS 499 – Information Systems Capstone
November 2, 2018
Project planning and management are one of the most
fundamental aspects of any business or company, and it is,
therefore, crucial to ensure that these aspects are taken into
consideration to provide the desired result to the business or
company. It is imperative to take into consideration all the
important aspects of the project before its launch to effectively
ensure that all the deliverables that are involved such as cost,
timeline, workforce etcetera are known before launching the
project. Also, it is also critical to ensure that there is proper
management of the project to derive a balance between planning
and control and consequently ensure that it will run according
to plan. To have a better understanding of this fundamental
subject, this study will assess the following. The first analysis
will be on the definition and description of the scope of the
project. Also, the study will assess how to speculate and control
the scope.
Moreover, the study will assess the possible risks, constraints as
18. well as the assumptions. The study will further speculate on the
needs of off-shoring as well as outsourcing. The study will
culminate on an analysis of the identification of the necessary
resources that are necessary.
Describe and define the scope of the project.
The project involves one, increasing the number of employees
in the department of information technology. Also, the company
will also aim at hosting the systems by itself. Despite the fact
that the company had initially opted to host the system in other
entities in order to reduce cost, the changing business dynamics
have led to other costs and thereby prompting the company to
rethink its current model and consequently opt to change the
technological needs and also redesign the current structure in
order to meet its current obligations (Chen & Mocker, 2010). In
so doing, the company will need to host some of its systems to
keep abreast with all the changing aspects of the business and
make it easier for the company to keep tabs on their systems.
Also, the project will also involve the development of new
designs and to train the employees or the personnel in the
workplace on how to use the new designs. All the technological
experts will be involved to ensure that they are the drivers of
the information technology needs in the organization. Also, all
the types of data will be merged to aid in the decision-making
process. The authorized devices will be plugged in, to ensure
that the user interface has become effective. Moreover, there are
also some security measures that will be incorporated to prevent
people that are not authorized from accessing the system as well
as allow for disruptions, modifications, and disclosures
(Shmueli & Koppius, 2011). A security management plan will
also be developed to establish security protocols, and further
protect all the information assets of the company. It will be
imperative for the organization to protect all the databases
before access and only authorized personnel will have access to
the system. The project will also involve the use of a hybrid
solution that will be made securely. It will also be important to
19. ensure that all the essential aspects have been taken into
consideration.
Speculate as to how to control the scope
The scope will be controlled in a way that will ensure that all
the important aspects have been considered such as the cost of
the project. In addition, the project will also involve timelines
both short term and long term in a way that will enable the
gradual and timely progress of the scope. The scope will also be
controlled by ensuring that all the details and deliverables of
the project are known before the launch of the project to ensure
that everything has been established and that all the needed
resources are known. The scope will also be controlled by
ensuring that the entire workforce and the employees that are
needed for the project are sourced and that they are assigned
effective roles and responsibilities that will enable the project
to be achieved within the set timelines. Besides, this will also
foster the effectiveness of the project by ensuring that the tasks
and responsibilities for conducting the project are assigned to
the right people and with the right responsibilities to achieve
the needed results.
Identify possible risks, constraints, and assumptions
Some of the risks that may emerge in the project include the
risk of unprecedented costs as well as the risk of failing to
complete the project on time. The major risk, however, is on
unprecedented costs since it is not clear as to the amount of cost
that will be involved throughout the project and more so after
the completion of the project. There are some costs that can
emerge in the course of achieving the project and thereby lead
to an expensive project that may be difficult to achieve. Also,
there is also the risk of unforeseen difficulties, which may also
affect the completion of the project due to limited knowledge on
the difficulties (Clemons & Kauffman, 2011). One of the
constraints that may emerge includes the constraint of time,
whereby the organization may be limited in time and thereby
making it difficult to complete certain deliverables and
consequently hamper the completion of the project.
20. The assumptions of the project include the following.
1. That the project will be achieved within the stipulated
timeline
2. That the project will be achieved within the estimated budget
and that there will be no additional costs that will be accrued or
incurred in the course of achieving the project
3. That the project will have the necessary workforce to foster
the completion of the project
Describe the relationship and integration between systems and
infrastructure. Note: Database and Data Warehousing,
Analytics, Interfaces, and Cloud Technology, and Infrastructure
and Security should be considered.
The relationship and integration between infrastructure and
system are borne out of the fact that they are both dependants
on one another. The data warehousing and analytics are related
to one another by virtual of the fact that they both contain the
cloud technology and interface that is needed for the project.
The infrastructure should also be conducted in a way that will
foster security to enhance the security of the system and
consequently lead to the attainment of the project.
Speculate on potential outsourcing or offshoring needs
Some of the outsourcing and offshoring needs that may be
required include outsourcing for technology that may be needed
for the completion of the project but may not be currently
present in the project. Also, the company may also outsource
for more employees and more particularly professionals in the
information and technology sector with advanced knowledge or
vast experience that may not be currently present in the
organization or company. The organization may also outsource
warehouses if the current ones within the organization or
company seem insufficient or if the company finds a need to
look for more to necessitate the faster completion of the project.
Identify and justify the necessary resources including staffing
that is necessary
Some of the resources that will be needed for the completion of
the project include first and foremost an efficient budget to
21. cater for the cost of the project (Chen & Mocker, 2010). The
project will also require an efficient workforce that will be
achieved through proper staffing to ensure that there is a
sufficient workforce to undertake the project. The resources
such as the data warehouses will also be resourced to ensure
that all the needed resources for making the project are there.
Finally, it will also be critical to ensure that all there is a proper
plan or blueprint that will guide the project towards its
completion (Shmueli & Koppius, 2011). All the above will have
to go together to foster the successful realization of the project
and to ensure further that the project is completed on time.
References
Chen, D. Q., & Mocker, M. (2010). Information Systems
Strategy: Reconceptualization,
Measurement, and Implications. MIS Quarterly, 34(2),
233-259.
Clemons, E. K., & Kauffman, R. J. (2011). Special Section:
Competitive Strategy, Economics,
and Information Systems. Journal of Management
Information Systems, 27(3), 7-10.
Shmueli, G., & Koppius, O. R. (2011). Predictive Analytics in
Information Systems Research.
MIS Quarterly, 35(3), 553-572.
22. Section 1: PROJECT INTRODUCTION
Section 1: PROJECT INTRODUCTION
Project Deliverable 1: Project Plan Inception
CIS 499 – Information Systems Capstone
October 14, 2018
Background
In the last two years, the ACME Company has experienced
continued growth. This growth is expected to continue in the
very near future. Specifically, the company is expected to
experience a 60% growth in the next eighteen months. This rate
of growth has presented new challenges for the company. It now
has to redesign its information systems for the larger office
space occupied. The continued growth has also highlighted the
need to set up the company to deal with more data and ensure
for safety and security for its clients. The ACME Company is
currently valued at $25 million but is expected to experience
significant growth in the future.
23. Type of Business
The ACME Company collects data using Web analytics and
combines it with operational systems data. Increasingly,
businesses have appreciated the competitive edge presented by
analyzing market data. However, the successful use of data in
decision making is a long process that has greatly influenced
the growth of information systems. Some of the major steps in
this process include collecting information and interpreting its
significance. This is intended to compare the external and
internal environments of a business and propose better practices
that would benefit as a whole.
ACME based its information technology on a hybrid model
where some of the systems are hosted and other in-house. This
method was initially done with the goal of minimizing costs.
However, a lot has changed in the business that necessitates
major changes to be made.
Skilled Information Systems Personnel
At the moment, there are only four employees in the company
dedicated to the Information Technology department. ACME
has adopted a hybrid solution to information technology where
much of the systems used by the company were hosted by other
entities. This was believed to be part of cutting costs. As the
business has continually grown, its information technology
needs have expanded and redesigned to meet its current
obligations.
The personnel at the company will need to be trained to use any
other systems introduced at the workplace. Although all the
workers are trained information technology experts, it will be
important to involve them in the development of the new design
to facilitate its effectiveness. This is primarily intended to
ensure that all the qualified personnel at the organization are
well-informed about the information technology changes
occurring at the workplace.
Types of Data
24. ACME collects web analytics and combines it with operational
systems data. Web analytics includes all the data that relates to
the performance of a website. The continued growth of e-
commerce has meant that businesses are taking their online
sales more seriously. Many companies now make more revenue
through their online sales. It has hence become essential to
remain aware of the performance of an organization on its
online platform (Clemons & Kauffman, 2011).
As stated previously, the information obtained from web
analytics combines with the data of the operational system.
Operational systems data refers to the systems used to process
information on the day-to-day activities in a work environment.
The goal is to merge these types of data to assist in internal
decision making.
Organization’s Information Systems
The company now uses a computer-based decision support
system that aims to facilitate organizational decision-making
activates. The operational system at ACME is a computer-based
system that processes and interprets data. There are various
stages and methods of obtaining, and analyzing data; especially
as a result of the existing varied marketplace. Each
organization's web analytics and operational systems are
analyzed based on the unique nature of each workplace. The
organization starts by identifying the needs of each data set, and
how it should be combined with other relevant information to
become valuable.
The company uses hosting services for its databases. The on-
site databases have limited use, and usually contains
information on recent internal activities. The use of hosting
services presents companies with some benefits. For example, it
allows for easy and flexible access to the company’s data. The
company also preferred hosted database services because it does
not have to invest in its own databases. This method was
presented as an option to cut operational costs. Hosted solutions
have been a big boost for the company in the last two years.
Analytics and Interfaces
25. The web analytics obtained by the company are categorized into
three main classifications: web structure, content, and usage
(Shmueli & Koppius, 2011). These are the three main
parameters used in web analytics to assisting in internal
decision making within organizations. The web has been
presenting revenue and other opportunities to businesses for the
last few decades. The goal is to determine what nature of web
structure, content, and usage maximizes the performance of an
organization. This is especially important in the field of e-
commerce continually grows to dominate the modern
marketplace.
The information systems at the ACME Company will be
connected across all three floors. There will be wires, plugs,
and sockets to facilitate this interconnectedness. It will be
possible to plug in authorized devices with options for simple
but effective user interfaces (Shmueli & Koppius, 2011).
Infrastructure and Security
The system at ACME will adhere to a coherent foundation that
will support responsive change, and agility in a rapidly growing
company (Chen & Mocker, 2010). The system’s design will
incorporate security measures that limit unauthorized access,
use, disclosures, disruptions, or modifications. A detailed
security management plan will be developed to define the
security controls to protects the information assets at the
company. All databases will require authorization before access.
Some information will only be accessible by some employees.
All activities that will be undertaken using the system will be
monitored by the IT department.
Since a hybrid solution will be used, the hosting choice will be
made with the issue of security in mind. The continued growth
of the business has placed more importance on responsibility
and accountability on the IT department. In this case, the level
of security provided by the hosting solution will have to meet
the company’s benchmark. There will also be other
considerations such as the ease of access, and reliable enough
for the tasks at the company.
26. References
Chen, D. Q., & Mocker, M. (2010). Information Systems
Strategy: Reconceptualization,
Measurement, and Implications. MIS Quarterly, 34(2),
233-259.
Clemons, E. K., & Kauffman, R. J. (2011). Special Section:
Competitive Strategy, Economics,
and Information Systems. Journal of Management
Information Systems, 27(3), 7-10.
Shmueli, G., & Koppius, O. R. (2011). Predictive Analytics in
Information Systems Research.
MIS Quarterly, 35(3), 553-572.
1
2