Description
Unformatted Attachment Preview
1. Use MS Excel to connect to the Ch02_InsureCo MS Access database and retrieve all of the AGENTs. Put results on its own sheet
called Agent. Copy (ALT-PRTSC) and paste results.
AGENT_CODE
AGENT_LNAME
AGENT_FNAME
AGENT_INITIAL
AGENT_AREACODE
AGENT_PHONE
501 Alby
Alex
B
713
228-1249
502 Hahn
Leah
F
615
882-1244
503
John
T
615
123-5589
Okon
2. Use MS Excel to connect to the Ch02_InsureCo MS Access database and retrieve all of the CUSTOMERs. Put results on its own
sheet called Customer. Copy (ALT-PRTSC) and paste results.
CUS_CO CUS_LNA CUS_FNA CUS_INITI CUS_AREAC
CUS_PHO CUS_INSURE_T CUS_INSURE_
CUS_RENEW_D AGENT_CO
DE
ME
ME
AL
ODE
NE
YPE
AMT
ATE
DE
10010 Ramas
Alfred
A
615
844-2573 T1
100
4/5/2012
502
10011 Dunne
Leona
K
713
894-1238 T1
250
6/16/2012
501
10012 Smith
Kathy
W
615
894-2285 S2
150
1/29/2013
502
10013 Olowski
Paul
F
615
894-2180 S1
300
10/14/2012
502
10014 Orlando
Myron
615
222-1672 T1
100
12/28/2013
501
10015 O'Brian
Amy
B
713
442-3381 T2
850
9/22/2012
503
10016 Brown
James
G
615
297-1228 S1
120
3/25/2013
502
10017 Williams
George
615
290-2556 S1
250
7/17/2012
503
10018 Farriss
Anne
G
713
382-7185 T2
100
12/3/2012
501
10019 Smith
Olette
K
615
297-3809 S2
500
3/14/2013
503
3. Use MS Excel to connect to the Ch02_InsureCo MS Access database and retrieve all of the Customers with Agent Data (use
qryCustomerAgentView) for Agent 502. Put results on its own sheet called CustomerAgentView. Copy (ALT-PRTSC) and paste
results.
CUS
_CO
DE
100
10
100
12
100
13
100
16
CUS_
LNA
ME
Rama
s
Smit
h
Olow
ski
Brow
n
CUS_
FNA
ME
Alfre
d
CUS_
INITI
AL
CUS_A
REACO
DE
A
615
Kathy W
615
Paul
Jame
s
F
615
G
615
CUS_
PHO
NE
8442573
8942285
8942180
2971228
CUS_IN
SURE_T
YPE
CUS_IN
SURE_A
MT
T1
100
S2
150
S1
300
S1
120
CUS_RE CUSTOME
AGENT.A
NEW_D R.AGENT_ GENT_C
ATE
CODE
ODE
4/5/201
2
502
502
1/29/20
13
502
502
10/14/2
012
502
502
3/25/20
13
502
502
AGEN
T_LNA
ME
AGEN
T_FNA
ME
AGEN
T_INIT
IAL
AGENT_
AREACO
DE
Hahn
Leah
F
615
Hahn
Leah
F
615
Hahn
Leah
F
615
Hahn
Leah
F
615
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Really helped me to better understand my coursework. Super recommended.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
ISSC 680 Central Texas College Security Threats & Vulnerabilities Essay
Submit an 3 page concept/idea paper IAW APA format on an approved topic (see pre-approved topics in the syllabus). Paper o ...
ISSC 680 Central Texas College Security Threats & Vulnerabilities Essay
Submit an 3 page concept/idea paper IAW APA format on an approved topic (see pre-approved topics in the syllabus). Paper organization will include (use as headings):Introduction.Problem Statement.Relevance and Significance.References (at least five).2. Pre-approved research topics:� Authentication/Digital signatures� Data collections tools (hardware & software)� E-business/e-commerce security� End user security issues.� Government vs. commercial organization security issues.� HIPAA� Identity Theft� ID&IH Management and Legal Issues� Instant Messaging security.� Intrusion detection.� Sarbannes Oxley� Security Threats & Vulnerabilities� Wireless technology securityThe concept/idea paper "sets the stage" for your research paper - which will be on the same topic, assuming your paper receives a passing grade.Rubric: Introduction = 10% Problem Statement = 20% Relevance and Significance = 20% References (at least five) = 20% Headings, name, class = 30% Total = 100%
VSU Project Plan Inception Question
Overview
This is the first of a series of five sequential assignments (the course project) in which you will act as the Ch ...
VSU Project Plan Inception Question
Overview
This is the first of a series of five sequential assignments (the course project) in which you will act as the Chief Technology Officer (CTO) of a hypothetical, e-commerce start-up company of your design. A venture capital group has funded this innovative start-up.
The CEO has given you 90 days to deliver an information technology project plan in anticipation of the company relocating to a new facility. Since this is a start-up company, currently no building or technology infrastructure exists to support the business. All information technology (hardware and software) must be implemented in a hosted solution, an on-site solution, or a hybrid model. The CEO expects you to integrate different technologies from a variety of partners and incorporate industry best practices to develop the company’s technological systems.
Additional background on the hypothetical company
Company Information
Current Status
Growth Projections (over next two years)
Facility Type
New facility is a two-story standalone building
--
Number of Employees
10
30
Revenue
$5 million
$30 million
This assignment consists of two parts:
Part 1: Project Plan Inception
You will write a 5–7 page document outlining the project specifics, such as company background information, company business, and an overview of the company’s information systems infrastructure.
Part 2: Supporting Gantt Chart
You will use Microsoft Project to create a Gantt chart for your e-commerce company project.
Note:
You are to create or assume all necessary assumptions to successfully complete this assignment.
You must submit both parts as separate files to the assignment area. Label each file name according to the appropriate part.
Instructions
Part 1: Project Plan Inception
Write a 5-7 page business requirements document for their hypothetical e-commerce company in which you:
Develop your hypothetical e-commerce company's background information. (Refer to this article, Top 10 Largest Ecommerce Companies in the US in 2020, https://www.valuewalk.com/2020/04/top-10-largest-ecommerce-companies-us/ when developing your company’s background information, which outlines the major types of e-commerce companies in existence. Use this as a guide when deciding what background information to include about your hypothetical e-commerce company in your project plan inception document.)
Document your chosen e-commerce company's business type, customers, and demographic information.
Describe the key elements of your chosen e-commerce company's information systems infrastructure.
Develop a high-level block diagram of your e-commerce company's information systems infrastructure.
Use three sources to support your writing. (Choose sources that are credible, relevant, and appropriate. Cite each source listed on your source page at least one time within your assignment. Access the library or review library guides for help with research, writing, and citation.)
Part 2: Supporting Gantt Chart
Use Microsoft Project to create a Gantt chart in which you:
Identify the major and minor tasks, illustrating dependency relationships between activities.
CS 305 Southern New Hampshire Software Security Dependency Check
In this assignment you will conduct a dependency check, which is a type of static testing that detects vulnerabilities ass ...
CS 305 Southern New Hampshire Software Security Dependency Check
In this assignment you will conduct a dependency check, which is a type of static testing that detects vulnerabilities associated with library dependencies needed for the application. Static testing allows you to identify vulnerabilities in the code without actually executing the code. In this assignment, you will do the following:Identify software security vulnerabilities by running code through a static tester.Identify potential mitigation techniques that have been used to mitigate against vulnerabilities associated with known exploits.ScenarioYou are a senior software developer within a team of software developers that are responsible for a large web application that uses the Spring framework.The software development team has addressed the vulnerabilities in the code base from your manual code review and plans to mitigate against the vulnerabilities. In addition to making these changes, they are now supporting a new functionality that requires the addition of a new library. As a best practice for ensuring secure code, it is essential to check the refactored code base as well as the additional library through a dependency check.Fortunately, just as your compiler, interpreter, and integrated development environment help with syntax checking your code, there are tools to help with dependency checks. You will integrate a dependency check tool into your vulnerability assessment workflow.PromptTo begin, open the code base in Eclipse. Refer to the Uploading Files to Eclipse Desktop Version Tutorial for testing the code base in Eclipse. Then integrate the Maven Dependency Check plug-in for the code base.Please note: “Integrating the Static Testing Tool” was a non graded task that you should have completed in the previous module, so you may have already completed these steps.Follow the instructions in the Integrating the Maven Dependency Check Plug-in Tutorial to learn how to integrate and run the dependency check plug-in into Maven for conducting static testing. Use the instructions in the tutorial to identify the software security vulnerabilities. Specifically, address the following in a Static Testing Summary:Run the dependency check on the code base. Include a screenshot of the HTML report in your Static Testing Summary. Be sure the screenshot includes the scan information at the top of the dependency check report.In addition to showing that the dependency check ran effectively, document the results from the dependency check. Be sure to identify the codes and descriptions of the dependencies found by including these details for each dependency in your Static Testing Summary.Interpret the results to identify widely accepted solutions for addressing dependencies in the code base. Summarize your findings in your Static Testing Summary. You can refer to industry standard guidelines such as the Common Vulnerabilities and Exposures (CVE) and the National Vulnerability Database (NVD). Consider why false positives should be filtered from the dependency check tool and discuss in your Static Testing Summary.To learn about the dependencies and interpret the results from the report, click on each dependency listed as shown below:Information regarding the dependency description, its severity, and potential solutions will also be available from the NVD. Access this information by clicking on the corresponding Common Platform Enumeration (CPE), then select the Vulnerability ID.Guidelines for SubmissionSubmit the completed Static Testing Summary using the template provided. Be sure to include a screenshot of the HTML output from the dependency check and summarize the dependency check results and potential solutions. Your completed summary should be 1–2 pages in length.
CMGT410 UOPX Methodology Selection and Rationale Project Plan
A project plan is a document created at the beginning of the project lifecycle that gives stakeholders and everyone else i ...
CMGT410 UOPX Methodology Selection and Rationale Project Plan
A project plan is a document created at the beginning of the project lifecycle that gives stakeholders and everyone else involved in a project a clear idea of what a project will entail in terms of effort, time, cost, and anticipated results. One of the things that must be identified before the project plan can be created is the methodology, or approach, the project manager plans to use to manage the project. Choosing a methodology is important because a methodology provides the framework—that is, an overall process and suggested documents and deliverables—that will guide project development from beginning to end. Some project methodologies are more appropriate for some types of projects than for others. For this assignment, you will: Choose a project methodology for two different projects based on project requirements, and explain why you chose each methodology for each project.Brainstorm your own project and create a draft simplified project plan for that project. You must indicate in your simplified project plan whether you intend to apply the Agile or waterfall methodology. You may create your simplified project plan using Microsoft® Excel® or, if you choose, another software application such as Microsoft® Project®.To complete this assignment: Read Agile Project Management and the PMBOK® Guide. Answer the Methodology Selection and Rationale questions. Brainstorm a project you would like to explore in this course. You may choose a project from your work experience, from a description of a project in your textbook or in an online reading, or a project that is brand new but that you think would improve a business process at work, at home, or at school. Read the two linked examples of project plans implemented as Microsoft® Excel® spreadsheets, Example Plan A and Example Plan B. You will be using these as guides in creating your own draft project plan. Notice especially the differences between these two examples in terms of length (overall and task length), structure of the work breakdown (iterative vs. non-iterative), and methodology. Research additional project plan examples online. Create a simplified project plan for your own brainstormed project that resembles the two linked examples. Save your simplified project plan as a Microsoft® Excel® spreadsheet document. Submit both your completed Methodology Selection and Rationale questions and your project plan draft (Microsoft® Excel® document).
Similar Content
Walden University IT Project Management Essay
Quality is an important aspect of your Group Project and requires a rigorous quality management plan. Through this Group P...
SIPA Microsoft Access Worksheet
...
CS 2122 Function Int Sub Test Switch Statements Project
int sub test(int32 t x, int32 t y)
to return ‘1’ if the calculation x - y does not overflow (see Figure 1 for an exam...
Information Technology (Cyber bulling), computer science homework help
Please no plagiarism. Please answer 100 words each question, and site all references (even if it is your personal opinion,...
Theories of crime punishment
In
order to complete Assignment #2 you will need to answer the below
questions. Please complete the questions in a Wor...
WU Information Security Compliance Analysis Uniwest Ab Company Case Study
All of the instructions about the assignment is in the attachments. The
only SR compliances I have to fulfill is (SR 4.1 ...
Table Definitions. Fdocx
...
Response
The End-Users report cyber concern issues; they are fostered to report cyber concern due to the lack of knowledge on how t...
Virtual Organisation
Information health system in hospitals comprise of the system put in place to manage data in the institution. This may in...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
ISSC 680 Central Texas College Security Threats & Vulnerabilities Essay
Submit an 3 page concept/idea paper IAW APA format on an approved topic (see pre-approved topics in the syllabus). Paper o ...
ISSC 680 Central Texas College Security Threats & Vulnerabilities Essay
Submit an 3 page concept/idea paper IAW APA format on an approved topic (see pre-approved topics in the syllabus). Paper organization will include (use as headings):Introduction.Problem Statement.Relevance and Significance.References (at least five).2. Pre-approved research topics:� Authentication/Digital signatures� Data collections tools (hardware & software)� E-business/e-commerce security� End user security issues.� Government vs. commercial organization security issues.� HIPAA� Identity Theft� ID&IH Management and Legal Issues� Instant Messaging security.� Intrusion detection.� Sarbannes Oxley� Security Threats & Vulnerabilities� Wireless technology securityThe concept/idea paper "sets the stage" for your research paper - which will be on the same topic, assuming your paper receives a passing grade.Rubric: Introduction = 10% Problem Statement = 20% Relevance and Significance = 20% References (at least five) = 20% Headings, name, class = 30% Total = 100%
VSU Project Plan Inception Question
Overview
This is the first of a series of five sequential assignments (the course project) in which you will act as the Ch ...
VSU Project Plan Inception Question
Overview
This is the first of a series of five sequential assignments (the course project) in which you will act as the Chief Technology Officer (CTO) of a hypothetical, e-commerce start-up company of your design. A venture capital group has funded this innovative start-up.
The CEO has given you 90 days to deliver an information technology project plan in anticipation of the company relocating to a new facility. Since this is a start-up company, currently no building or technology infrastructure exists to support the business. All information technology (hardware and software) must be implemented in a hosted solution, an on-site solution, or a hybrid model. The CEO expects you to integrate different technologies from a variety of partners and incorporate industry best practices to develop the company’s technological systems.
Additional background on the hypothetical company
Company Information
Current Status
Growth Projections (over next two years)
Facility Type
New facility is a two-story standalone building
--
Number of Employees
10
30
Revenue
$5 million
$30 million
This assignment consists of two parts:
Part 1: Project Plan Inception
You will write a 5–7 page document outlining the project specifics, such as company background information, company business, and an overview of the company’s information systems infrastructure.
Part 2: Supporting Gantt Chart
You will use Microsoft Project to create a Gantt chart for your e-commerce company project.
Note:
You are to create or assume all necessary assumptions to successfully complete this assignment.
You must submit both parts as separate files to the assignment area. Label each file name according to the appropriate part.
Instructions
Part 1: Project Plan Inception
Write a 5-7 page business requirements document for their hypothetical e-commerce company in which you:
Develop your hypothetical e-commerce company's background information. (Refer to this article, Top 10 Largest Ecommerce Companies in the US in 2020, https://www.valuewalk.com/2020/04/top-10-largest-ecommerce-companies-us/ when developing your company’s background information, which outlines the major types of e-commerce companies in existence. Use this as a guide when deciding what background information to include about your hypothetical e-commerce company in your project plan inception document.)
Document your chosen e-commerce company's business type, customers, and demographic information.
Describe the key elements of your chosen e-commerce company's information systems infrastructure.
Develop a high-level block diagram of your e-commerce company's information systems infrastructure.
Use three sources to support your writing. (Choose sources that are credible, relevant, and appropriate. Cite each source listed on your source page at least one time within your assignment. Access the library or review library guides for help with research, writing, and citation.)
Part 2: Supporting Gantt Chart
Use Microsoft Project to create a Gantt chart in which you:
Identify the major and minor tasks, illustrating dependency relationships between activities.
CS 305 Southern New Hampshire Software Security Dependency Check
In this assignment you will conduct a dependency check, which is a type of static testing that detects vulnerabilities ass ...
CS 305 Southern New Hampshire Software Security Dependency Check
In this assignment you will conduct a dependency check, which is a type of static testing that detects vulnerabilities associated with library dependencies needed for the application. Static testing allows you to identify vulnerabilities in the code without actually executing the code. In this assignment, you will do the following:Identify software security vulnerabilities by running code through a static tester.Identify potential mitigation techniques that have been used to mitigate against vulnerabilities associated with known exploits.ScenarioYou are a senior software developer within a team of software developers that are responsible for a large web application that uses the Spring framework.The software development team has addressed the vulnerabilities in the code base from your manual code review and plans to mitigate against the vulnerabilities. In addition to making these changes, they are now supporting a new functionality that requires the addition of a new library. As a best practice for ensuring secure code, it is essential to check the refactored code base as well as the additional library through a dependency check.Fortunately, just as your compiler, interpreter, and integrated development environment help with syntax checking your code, there are tools to help with dependency checks. You will integrate a dependency check tool into your vulnerability assessment workflow.PromptTo begin, open the code base in Eclipse. Refer to the Uploading Files to Eclipse Desktop Version Tutorial for testing the code base in Eclipse. Then integrate the Maven Dependency Check plug-in for the code base.Please note: “Integrating the Static Testing Tool” was a non graded task that you should have completed in the previous module, so you may have already completed these steps.Follow the instructions in the Integrating the Maven Dependency Check Plug-in Tutorial to learn how to integrate and run the dependency check plug-in into Maven for conducting static testing. Use the instructions in the tutorial to identify the software security vulnerabilities. Specifically, address the following in a Static Testing Summary:Run the dependency check on the code base. Include a screenshot of the HTML report in your Static Testing Summary. Be sure the screenshot includes the scan information at the top of the dependency check report.In addition to showing that the dependency check ran effectively, document the results from the dependency check. Be sure to identify the codes and descriptions of the dependencies found by including these details for each dependency in your Static Testing Summary.Interpret the results to identify widely accepted solutions for addressing dependencies in the code base. Summarize your findings in your Static Testing Summary. You can refer to industry standard guidelines such as the Common Vulnerabilities and Exposures (CVE) and the National Vulnerability Database (NVD). Consider why false positives should be filtered from the dependency check tool and discuss in your Static Testing Summary.To learn about the dependencies and interpret the results from the report, click on each dependency listed as shown below:Information regarding the dependency description, its severity, and potential solutions will also be available from the NVD. Access this information by clicking on the corresponding Common Platform Enumeration (CPE), then select the Vulnerability ID.Guidelines for SubmissionSubmit the completed Static Testing Summary using the template provided. Be sure to include a screenshot of the HTML output from the dependency check and summarize the dependency check results and potential solutions. Your completed summary should be 1–2 pages in length.
CMGT410 UOPX Methodology Selection and Rationale Project Plan
A project plan is a document created at the beginning of the project lifecycle that gives stakeholders and everyone else i ...
CMGT410 UOPX Methodology Selection and Rationale Project Plan
A project plan is a document created at the beginning of the project lifecycle that gives stakeholders and everyone else involved in a project a clear idea of what a project will entail in terms of effort, time, cost, and anticipated results. One of the things that must be identified before the project plan can be created is the methodology, or approach, the project manager plans to use to manage the project. Choosing a methodology is important because a methodology provides the framework—that is, an overall process and suggested documents and deliverables—that will guide project development from beginning to end. Some project methodologies are more appropriate for some types of projects than for others. For this assignment, you will: Choose a project methodology for two different projects based on project requirements, and explain why you chose each methodology for each project.Brainstorm your own project and create a draft simplified project plan for that project. You must indicate in your simplified project plan whether you intend to apply the Agile or waterfall methodology. You may create your simplified project plan using Microsoft® Excel® or, if you choose, another software application such as Microsoft® Project®.To complete this assignment: Read Agile Project Management and the PMBOK® Guide. Answer the Methodology Selection and Rationale questions. Brainstorm a project you would like to explore in this course. You may choose a project from your work experience, from a description of a project in your textbook or in an online reading, or a project that is brand new but that you think would improve a business process at work, at home, or at school. Read the two linked examples of project plans implemented as Microsoft® Excel® spreadsheets, Example Plan A and Example Plan B. You will be using these as guides in creating your own draft project plan. Notice especially the differences between these two examples in terms of length (overall and task length), structure of the work breakdown (iterative vs. non-iterative), and methodology. Research additional project plan examples online. Create a simplified project plan for your own brainstormed project that resembles the two linked examples. Save your simplified project plan as a Microsoft® Excel® spreadsheet document. Submit both your completed Methodology Selection and Rationale questions and your project plan draft (Microsoft® Excel® document).
Earn money selling
your Study Documents