Description
You are an administrator at the Contoso
Corporation. You have multiple sites within your corporation. Most of
the servers for your company are at the main office. The secondary site
is a data recovery site if there is a major problem at the primary site.
The primary servers are VMs on Server01 that need to run all the time. What do you need to do to have a backup copy at the secondary site?”
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Great! 10/10 would recommend using Studypool to help you study.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Strayer Univeristy Wk 4 University Database Design Analysis
Week 4 Assignment - University Database
Overview
A prestigious university has recently implemented a consolidation strateg ...
Strayer Univeristy Wk 4 University Database Design Analysis
Week 4 Assignment - University Database
Overview
A prestigious university has recently implemented a consolidation strategy that will require it to centralize their student records. In order to move forward, the local university will need to develop a data model that will retain student records and perform various data extract transform and load (ETL) processes. Imagine that you have been hired as a database consultant to assist in the development of a data design strategy for the student records.
You met with various university subject matter experts and have determined the following after performing various business analysis processes:
Faculty groups are divided by core competencies that the university offers. For example, there are groups such as the art faculty, computer technology faculty, language faculty, and science faculty. Each faculty member has an assigned dean and is designated to teach at one particular campus and school. They are able to teach as many courses as required.
Courses are categorized by course code and title. Certain courses have prerequisites and the university has asked for this to be cataloged as well.
There are various schools within each campus. For example, the Los Angeles campus holds the following schools: School of Science, School of Law, and School of Computer Technology. Additionally, each school offers different professional study programs, such as Forensic Computer Science, Marine Biology, Business Management, and Civil Engineering, to name a few.
The study path for students requires that they be enrolled in a specific professional study program. The professional study program requires the students to complete a specific set of core courses. The university also requires that an online grade book be available. The online grade book should show grades awarded to students for specific courses and the term they completed the course.
The university identifies each student by their name, date of birth, social, and professional study program.
Instructions
Using these findings, write a 3–4 page paper in which you:
Analyze the university's requirements and provide a proposal to organize all the required data elements. The proposal should include the following:
Provide an entity relationship model (ERM) that will describe the data structure that will store all data elements. Note: The graphically depicted solution is not included in the required page length.
Describe any assumptions or limitations for each relationship. For example, professors are able to teach more than one course, or students can only be enrolled in one program.
Create the primary key and foreign keys using a UML class diagram for each table.
Suggest at least four types of business intelligence reports that could help the university in course management, student enrollment, or historical tracking. Support your answer by providing specific business functions that these reports could be used for to assist executives of the university.
Consider outsourcing the functions above as an alternative for development of the database. Research the Internet and other media sources for vendors who develop registrar and school management database systems.
Suggest three vendors that developed and are employing efficient registrar and school management database systems and support your reasons to choose from one of these three vendors.
Compare and contrast the key aspects that each system offers. Examples of system aspects include but are not limited to cloud based, pricing model, open source, et cetera.
I need your help
Scenario It is your first day at the job in the information security department, and you are called for a meeting. In the ...
I need your help
Scenario It is your first day at the job in the information security department, and you are called for a meeting. In the meeting the need for strengthening the information security for the University is discussed, and everyone agrees that the first step in this direction is to identify the top five threats that are a potential risk to Marymount University. The Universities administrative staff and faculty run the latest version of Microsoft Windows on their primary workstations, whereas students’ laptops may run Windows or macOS. The college’s web servers run on Linux; however, all other servers are Windows Server-based. Student, staff, and faculty mobile devices, such as tablets and smartphones, run on iOS or Android; all mobile devices can connect to the campus network. Tasks You have been given the responsibility to determine the top five threats that Marymount University faces. You asked your supervisor for support in this task and he gave you the following resources that might be useful in your research and analysis: Microsoft Security Advisories and Bulletins (https://docs.microsoft.com/en-us/security-updates/) Common Vulnerabilities and Exposure (CVE) database search (http://cve.mitre.org/find/index.html) Security organizations, such as Secunia (http://secunia.com/) Your supervisor has also asked you to consider the following questions as you shortlist the threats: What threats are new this year, and which have become more prevalent? Why are these threats more common and why are they important? What threats remain constant from year to year? Why? What threats do you believe will become more critical in the next 12 months? WhyWhat is the likelihood of an exploit affecting Marymount University, and which operating system(s) does it target? With these considerations in mind, write a summary report of the top five threats to Marymount University's New President Dr. Irma Becerra. Briefly explain why you have selected them and what effect they might have on the institution or its students, employees, graduates, or other communities on campus. Submission Requirements Format: Microsoft Word (or compatible) Font: Times New Roman, size 12, double-space Citation Style: APALength: 2 to 4 pages
4 pages
How The Proposed Solution Will Improve The M3 S It Infrastructure.1
How the proposed solution will improve the M3 IT infrastructure. How the proposed solution will improve the M3 IT infrastr ...
How The Proposed Solution Will Improve The M3 S It Infrastructure.1
How the proposed solution will improve the M3 IT infrastructure. How the proposed solution will improve the M3 IT infrastructure.
Threat Modeling Essay Questions
Answer the following Essay Questions:Your answers should be written in essay form with a clear intro, body, and conclusion ...
Threat Modeling Essay Questions
Answer the following Essay Questions:Your answers should be written in essay form with a clear intro, body, and conclusion. Use examples as applicable. There is no minimum length but you should clearly answer the question. Your answers should be in your own words. Short quotes can be used as needed. Cite any references used, in APA format. #Q1. You are a security analyst at an organization that runs several web applications. Your CIO is interested in using threat modeling as part of the software development lifecycle. Provide her an overview of threat modeling and the value it would provide to your company - you need to choose between an asset/risk-based or threat/security-based approach. As part of your overview include a detailed explanation of the appropriate threat model for your approach (e.g., PASTA or STRIDE), which should address the different objectives the model attempts to achieve, and provide two potential mitigations for each threat/attack scenario. [75 points] You can make any assumptions you want about the web application, just make sure you explain them. Avoid any examples that might be in the textbook.#Q2. Describe an attack tree and what it is used for. Provide an example attack tree on how you would cheat on this Midterm exam. (Do not cheat on this exam or test your attack tree. This is a thought exercise only). [25 points]Your answers should be submitted in a single Word document (for both questions) and name the file as: 602_lastname_midterm-essay.docxClick on the "Midterm Exam – Part 2 (Essay Questions)" link above to submit your assignment.
Saudi Electronic University Relational and Object Oriented DBMS Discussion
A database management system (DBMS) is a general-purpose software system that allows users to create and maint ...
Saudi Electronic University Relational and Object Oriented DBMS Discussion
A database management system (DBMS) is a general-purpose software system that allows users to create and maintain a database by facilitating the processes of defining, constructing, manipulating, and sharing databases among various users and applications.
Discuss the difference between Relational DBMS and Object-Oriented DBMS.
Similar Content
DSRT 736 University of the Cumberlands Framework SQL Modification & Analysis Paper
Discuss the annotated bibliography of two different research articles for your topic._____________________________________...
University of Central Florida Assembly Language Specify the Output Questions
I’m working on Assembly Language questions and need guidance to help me learn....
University of the Cumberlands Computer Science Discussion
For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGL...
University of the Cumberlands Employment Challenge in The Digital Era Paper
Chapter 11 in Information Technology and Organizational Learning Questions
Review the employment challenge in the digital ...
CSIA 310 UMGC Cybersecurity Processes and Technology Incident Report
CSIA 310: Cybersecurity Processes & Technologies
Project #1: Incident Response Report
Your Task
You have been assigned to...
Discuss some recovery site options.?
Hi,Hope you are doing well,I need answere In approximately 300 words, answer the questions below. Follow APA guidelines. 2...
20191117195834oranizational Behaviour
Mexican official's daughter tries to shut down restaurant after row over table. (2017, December 1). Retrieved from ......
Blockchain3
Total quality management is a very essential aspect of any organization wherein all the members in an organization, rangin...
Corrected
Despite predictions in the early 2000s that online retail sales would die out rapidly, they continue to increase steadily,...
Related Tags
Book Guides
Freakonomics
by Stephen J. Dubner and Steven D. Levitt
Broke Millennial: Stop Scraping by and Get Your Financial Life Together
by Erin Lowry
Silas Marner
by George Eliot
The Fault in Our Stars
by John Green
Sense And Sensibility
by Jane Austen
The Odyssey
by Homer
Oliver Twist
by Charles Dickens
Shutter Island
by Dennis Lehane
A Portrait of the Artist as a Young Man
by James Joyce
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Strayer Univeristy Wk 4 University Database Design Analysis
Week 4 Assignment - University Database
Overview
A prestigious university has recently implemented a consolidation strateg ...
Strayer Univeristy Wk 4 University Database Design Analysis
Week 4 Assignment - University Database
Overview
A prestigious university has recently implemented a consolidation strategy that will require it to centralize their student records. In order to move forward, the local university will need to develop a data model that will retain student records and perform various data extract transform and load (ETL) processes. Imagine that you have been hired as a database consultant to assist in the development of a data design strategy for the student records.
You met with various university subject matter experts and have determined the following after performing various business analysis processes:
Faculty groups are divided by core competencies that the university offers. For example, there are groups such as the art faculty, computer technology faculty, language faculty, and science faculty. Each faculty member has an assigned dean and is designated to teach at one particular campus and school. They are able to teach as many courses as required.
Courses are categorized by course code and title. Certain courses have prerequisites and the university has asked for this to be cataloged as well.
There are various schools within each campus. For example, the Los Angeles campus holds the following schools: School of Science, School of Law, and School of Computer Technology. Additionally, each school offers different professional study programs, such as Forensic Computer Science, Marine Biology, Business Management, and Civil Engineering, to name a few.
The study path for students requires that they be enrolled in a specific professional study program. The professional study program requires the students to complete a specific set of core courses. The university also requires that an online grade book be available. The online grade book should show grades awarded to students for specific courses and the term they completed the course.
The university identifies each student by their name, date of birth, social, and professional study program.
Instructions
Using these findings, write a 3–4 page paper in which you:
Analyze the university's requirements and provide a proposal to organize all the required data elements. The proposal should include the following:
Provide an entity relationship model (ERM) that will describe the data structure that will store all data elements. Note: The graphically depicted solution is not included in the required page length.
Describe any assumptions or limitations for each relationship. For example, professors are able to teach more than one course, or students can only be enrolled in one program.
Create the primary key and foreign keys using a UML class diagram for each table.
Suggest at least four types of business intelligence reports that could help the university in course management, student enrollment, or historical tracking. Support your answer by providing specific business functions that these reports could be used for to assist executives of the university.
Consider outsourcing the functions above as an alternative for development of the database. Research the Internet and other media sources for vendors who develop registrar and school management database systems.
Suggest three vendors that developed and are employing efficient registrar and school management database systems and support your reasons to choose from one of these three vendors.
Compare and contrast the key aspects that each system offers. Examples of system aspects include but are not limited to cloud based, pricing model, open source, et cetera.
I need your help
Scenario It is your first day at the job in the information security department, and you are called for a meeting. In the ...
I need your help
Scenario It is your first day at the job in the information security department, and you are called for a meeting. In the meeting the need for strengthening the information security for the University is discussed, and everyone agrees that the first step in this direction is to identify the top five threats that are a potential risk to Marymount University. The Universities administrative staff and faculty run the latest version of Microsoft Windows on their primary workstations, whereas students’ laptops may run Windows or macOS. The college’s web servers run on Linux; however, all other servers are Windows Server-based. Student, staff, and faculty mobile devices, such as tablets and smartphones, run on iOS or Android; all mobile devices can connect to the campus network. Tasks You have been given the responsibility to determine the top five threats that Marymount University faces. You asked your supervisor for support in this task and he gave you the following resources that might be useful in your research and analysis: Microsoft Security Advisories and Bulletins (https://docs.microsoft.com/en-us/security-updates/) Common Vulnerabilities and Exposure (CVE) database search (http://cve.mitre.org/find/index.html) Security organizations, such as Secunia (http://secunia.com/) Your supervisor has also asked you to consider the following questions as you shortlist the threats: What threats are new this year, and which have become more prevalent? Why are these threats more common and why are they important? What threats remain constant from year to year? Why? What threats do you believe will become more critical in the next 12 months? WhyWhat is the likelihood of an exploit affecting Marymount University, and which operating system(s) does it target? With these considerations in mind, write a summary report of the top five threats to Marymount University's New President Dr. Irma Becerra. Briefly explain why you have selected them and what effect they might have on the institution or its students, employees, graduates, or other communities on campus. Submission Requirements Format: Microsoft Word (or compatible) Font: Times New Roman, size 12, double-space Citation Style: APALength: 2 to 4 pages
4 pages
How The Proposed Solution Will Improve The M3 S It Infrastructure.1
How the proposed solution will improve the M3 IT infrastructure. How the proposed solution will improve the M3 IT infrastr ...
How The Proposed Solution Will Improve The M3 S It Infrastructure.1
How the proposed solution will improve the M3 IT infrastructure. How the proposed solution will improve the M3 IT infrastructure.
Threat Modeling Essay Questions
Answer the following Essay Questions:Your answers should be written in essay form with a clear intro, body, and conclusion ...
Threat Modeling Essay Questions
Answer the following Essay Questions:Your answers should be written in essay form with a clear intro, body, and conclusion. Use examples as applicable. There is no minimum length but you should clearly answer the question. Your answers should be in your own words. Short quotes can be used as needed. Cite any references used, in APA format. #Q1. You are a security analyst at an organization that runs several web applications. Your CIO is interested in using threat modeling as part of the software development lifecycle. Provide her an overview of threat modeling and the value it would provide to your company - you need to choose between an asset/risk-based or threat/security-based approach. As part of your overview include a detailed explanation of the appropriate threat model for your approach (e.g., PASTA or STRIDE), which should address the different objectives the model attempts to achieve, and provide two potential mitigations for each threat/attack scenario. [75 points] You can make any assumptions you want about the web application, just make sure you explain them. Avoid any examples that might be in the textbook.#Q2. Describe an attack tree and what it is used for. Provide an example attack tree on how you would cheat on this Midterm exam. (Do not cheat on this exam or test your attack tree. This is a thought exercise only). [25 points]Your answers should be submitted in a single Word document (for both questions) and name the file as: 602_lastname_midterm-essay.docxClick on the "Midterm Exam – Part 2 (Essay Questions)" link above to submit your assignment.
Saudi Electronic University Relational and Object Oriented DBMS Discussion
A database management system (DBMS) is a general-purpose software system that allows users to create and maint ...
Saudi Electronic University Relational and Object Oriented DBMS Discussion
A database management system (DBMS) is a general-purpose software system that allows users to create and maintain a database by facilitating the processes of defining, constructing, manipulating, and sharing databases among various users and applications.
Discuss the difference between Relational DBMS and Object-Oriented DBMS.
Earn money selling
your Study Documents