Using Access, create a NEW database, including creating tables, queries, forms, reports, and advanced formatting tools.

Project 2

This is a request for an access database, not a usual paper. Not sure how many pages it would be classified as.

PROJECT 2: ACCESS

Over the past two weeks, you have studied some of the advanced features of MS Access. The exercises in this project will help you to reinforce some of the concepts learned.

PROJECT DESCRIPTION

Using Access, you will create a NEW database, including creating tables, queries, forms, reports, and advanced formatting tools.

Some sample Access ideas include (1) inventory of technology at work, (2) inventory of your home/possessions for insurance purposes, (3) a list of all contact information you have on others.

PROJECT REQUIREMENTS

Our project MUST include the following:

1. Three tables that are linked (a minimum of 10 records per table).
2. Two types of queries.
3. Two types of forms.
4. Two types of reports.
5. Advanced formatting tools.
6. Organized, formatted, and professionally presented Access file, including grammar items (correct spelling, etc.).

Are there any opportunities that cloud computing enables the organization to take advantage of? What are the threats that an organization considering adopting cloud computing needs to consider?

Cloud computing

Demonstrate your critical-thinking abilities by identifying the strengths, weaknesses, opportunities, and threats of adopting cloud computing.

First, articulate each of these areas for the SWOT analysis:

  1. Identify the key strengths (advantages) of adopting cloud computing.
  2. Identify the major weaknesses (disadvantages) of adopting cloud computing.
  3. Are there any opportunities that cloud computing enables the organization to take advantage of?
  4. What are the threats that an organization considering adopting cloud computing needs to consider?

Next, evaluate how to achieve the following outcomes to add to the SWOT analysis:

  1. How can you use strengths to take advantage of opportunities?
  2. How can you overcome weaknesses to take advantage of opportunities?
  3. How can you use strengths to avoid threats?
  4. How can you minimize weaknesses and avoid threats?

 

Share how they found you, why they chose you, what solution they chose, and how it was implemented. Describe the results and the benefits, as well as any bonus benefits that came of it. Include quotes.

Case study

Your first task is to select a case study (from real-world or using internet). It can be related to enterprise systems or related to an organization/store or on any relevant topic. After selecting the case study describe it in your own words using following points.

  • Clear headline: It should give the most important information.
  • Snapshot: Provide the main points, including the client’s name/industry, the product/service used, and quick result stats.
  • Client introduction: One or two sentences describing the customer and a highlight about them.
  • Problem: State the problem/goal, consequences, and any hesitations the customer had. Include quotes.
  • Solution: Share how they found you, why they chose you, what solution they chose, and how it was implemented. Include quotes.
  • Results: Describe the results and the benefits, as well as any bonus benefits that came of it. Include quotes.
  • Conclusion: Share additional praise from the customer and words of advice they have for other people/businesses like them.

Question Two
Model (As-Is) process using BPMN 2.0 using any tool such as Visio. Then analyze As-Is process from at least two perspectives. For example, if quality and time perspectives are taken then mention at least 1 issue related to quality and 1 issue related to time in the process

Question Three
Propose at least three (3) ideas for improving the process of your selected case study from any three (3) perspectives: for example
a) Equipment prespective,
b) Employees prespective,
c) IT & IS technologies prespective, etc. Lastly, propose the To-Be process model using BPMN 2.0 by utilizing any tools?

 

Analysis of how Agile Development functions, its strengths and weakness compared to other development approaches. How does the Agile approach work? How has the introduction of Agile Development changed how systems are designed?

Evaluation of Agile Development Methods

Analysis of how Agile Development functions, its strengths and weakness compared to other development approaches.
How does the Agile approach work?
How has the introduction of Agile Development changed how systems are designed?
What applications are best and worst suited for the use of Agile principles?
What are the challenges in using this approach that Systems Analysts and Project Managers need to be aware of?
Draw out your own process charts to communicate their ideas. Overview of Agile and a summary of the information that you find in your research.

Explain What is Arduino. Discuss Different types of Arduino boards. Explain How does the Arduino Uno board work and why it’s so popular. Explain What is a microcontroller.

Arduino boards

Explain What is Arduino.

Discuss Different types of Arduino boards.

Explain How does the Arduino Uno board work and why it’s so popular.

Explain What is a microcontroller.

State How to use the Arduino IDE (Integrated Development Environment).

 

What type of Cloud Deployment will you use? Will you be using a web hosting, what type? Will you be using any bare metal hosting? What cloud platform will you be using?

NIST framework

1) Imagine you’re starting your own Cloud COmputing business. What are the potential challenges and issues you’ll face while starting a new business?

2) Look through the NIST framework and come up with a guideline for your company based on the NIST framework.

The NIST Framework is designed to help you protect your small business from cybersecurity threats — this info can be found on week 7 ( attached pdf )

Questions ::

Identify: What Type of cloud services will your business be using? What Processes need to be protected?

What type of cloud service (unmanaged, Multiple cloud providers, Outsourced IT service providers) What level of service (IaaS, PaaS, SaaS) (Module Two-Week Two)

What type of Cloud Deployment will you use?

Will you be using a web hosting, what type? Will you be using any bare metal hosting?

What cloud platform will you be using? ( Azure, AWS, Google, IBM, Oracle, Linux or other)

Will you use any of the “recent developments in cloud computing” ?

2.Protect: What tools and processes do you need to have inplace to PREVENT a Cyber attack?

  1. Detect: What tools and process do you need to help detect a cyberattack?
  2. Respond: How will your business respond to the attack?
  3. Recover: What structures do you have in place to recover from the attack? How will you restore your processes?

Will you use any Virtual Machines?

 

Using the data points provided, develop a data model. Develop your data model using the symbols and notations found in entity-relationship diagrams.

Data model

Using the data points provided, develop a data model. Your data model should structure the data to support the business practices of a health care organization.

The data points should be grouped together under a category heading.

Each category should have a title that is descriptive.

Develop your data model using the symbols and notations found in entity-relationship diagrams.

  • Data Points
  • Consumer ID.
  • Last name.
  • First name.
  • Date of birth.
  • Sex or gender.
  • Street address.
  • City.
  • State.
  • Zip code.
  • Telephone number.
  • Social Security number.
  • Type of radiological test.
  • Date ordered.
  • Physician last name.
  • Physician first name.
  • Physician’s specialty.
  • Physician ID.
  • Physician telephone number.
  • Insurance name.
  • Insurance group number.
  • Insurance type.
  • Effective date.
  • Expiration date.
  • Diagnosis.
  • Signs and symptoms.
  • Presenting problem.
  • Time of arrival.
  • Time of discharge.

Use the service to write a personal statement for an undergraduate Computer Science and Artificial Intelligence Course at a UK university.

Personal Statement for Computer Science

Use the service to write a personal statement for an undergraduate Computer Science and Artificial Intelligence Course at a UK university.

The paper format needs to be as needed by the UCAS i.e no more than 4000 characters or 47 lines on a single side of an A4 paper.

Explain the technology in terms that the managers can understand while giving enough detail for your peers. Write a paper to present your research.

Information Technology field

You are working for a company in a small IT group. Your manager has asked you to research a technology and make a recommendation about how your group should, or should not, use the technology. You may pick any topic of current interest in the Information Technology field.

Your research will make you the expert in your group on this technology. Your job is to describe the technology to your group and support your conclusions.

Your audience includes your peers, who are technically strong, and managers who have some technical background. You must satisfy the needs of both groups.

You must explain the technology in terms that the managers can understand while giving enough detail for your peers.

Write a paper to present your research. The paper must be single-spaced with no more than three pages of text including references. Figures and diagram do not count against the paper length – no more than three pages of text excluding figures and diagrams

 

What time of day is most common for pedestrian fatalities in Kansas? How does this compare with the most common time of day for the US overall? Looking at figure 11, would you say poor atmospheric conditions have a significant impact on pedestrial fatalities?

Comparative Analysis of Fatal Pedestrian Crashes between Kansas and USA

In the last homework we learned about the FARS database, and actually USED it!

While it might seem like a nice dataset to have (and it is), researchers have been using it for years to study transportation issues in this country, with the hopes of using the outcomes of these analyses for safety policy decisions.

You will get a little more cozy with such research by reading the paper:

  1. What time of day is most common for pedestrian fatalities in Kansas (over all years)?
  2. How does this compare with the most common time of day for the US overall?
  3. Looking at figure 11, would you say poor atmospheric conditions have a significant impact on pedestrial fatalities?
  4. On page 392, the author states “For Kansas, speed limits between 30 mph and 40 mph account for 52% of total crashes (26% crashes for 30 mph and 26% for 35 mph or 40mph), …”. Why is this statement as written incorrect?
  5. The authors go on to explain the abnormally high number of fatalities at higher speeds with “… Kansas has lot of rural roads, where the speed limit is high and in rural roads, laws are not strictly enforced, all of which might lead to a larger number of fatal pedestrian crashes.”. Which of the suggested countermeasures would you think might successfully addres this issue? If you do not find anything sufficient, what might you recommend instead?