Description
Use ProjectLibre or Project to create a WBS (Work Breakdown Structure)
- Read Schwalbe chapters 3-4
- Review the chapter 3-4 PowerPoint Presentations (attached)
- Review the chapter 3-4 lecture notes (attached)
Schwalbe, K. (2014). Information technology project management(7th ed.)
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Attached.
Running head: TRAINING PROGRAM FOR ABC COMPANY
Training Program for ABC Company
Institution Affiliation
Date
1
TRAINING PROGRAM FOR ABC COMPANY
WBS
1. WBS, ...
Completion Status:
100%
Review
Review
Anonymous
Great content here. Definitely a returning customer.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
University of The Cumberlands Installing MySQL Project
Summary:
To apply all acquired knowledge in the last Project Assignments to create a Database Scheme. For this project, ...
University of The Cumberlands Installing MySQL Project
Summary:
To apply all acquired knowledge in the last Project Assignments to create a Database Scheme. For this project, the ERD is provided to you.
Deliverables:
SQL Script with your name as follows: YourLastName_Project_Ph3.sql.
MS Word Document with your OUTPUT, named as follows: YourLastName_Project_Ph3_Output.doc.
ZIP file to include the two files mentioned above.
Required Software:
MySQL DBMS by Oracle. MySQL Community Server and MySQL Workbench.
Follow Step 1-3 for your Course Project Phase phase 1, to install the required software components.
Lab Steps:
Step 1: Analyze the ERD for a student information system provided below. Be alert for the specifications provided for: 1) Entities, 2) Attributes, 3) Primary Key, and 4) Relationships. You will need to have a clear understanding for these components to create your database using MySQL.
Step 2: Create a New Database in MySQL, Produce SQL File, Drop Table
Create a new Database, as you did in your Course Project Phase 1 deliverable and you already created a database using the MySQL DBMS. Reference the attached video (Course Project Ph1 Video.mp4), for a demonstration to create a new Database using MySQL. This video was initially presented to you for phase 2 of your project. Also, reference the supplemental text: Available for Free download as part of our UC Library. MySQL Database Usage & Administration. (2010). By Vaswani, Vikram. McGraw Hill. ISBN: 978-0-07-160550-2. Link to UC Library: http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=nlebk&AN=291311&site=eds-live&ebv=EB&ppid=pp_ii
Utilize the SQL dialect you learned so far in this course for MySQL. Use the file supplemental textbook: MySQL Database Usage & Administration. (2010). By Vaswani, Vikram. McGraw Hill, as supplement your knowledge of the MySQL dialect.
Create your SCRIPT file to be named: YourLastName_Project_Ph3.sql.
Step 3: Include the following commands at the tops of your scripts:
SET FOREIGN_KEY_CHECKS=0;
DROP TABLE IF EXISTS STUDENT;
DROP TABLE IF EXISTS CAMPUS;
DROP TABLE IF EXISTS ROOM;
DROP TABLE IF EXISTS COURSE;
DROP TABLE IF EXISTS INSTRUCTOR;
DROP TABLE IF EXISTS APPROVED_INSTRUCTOR;
DROP TABLE IF EXISTS CLASS;
DROP TABLE IF EXISTS STUDENT_GRADE;
SET FOREIGN_KEY_CHECKS=1;
Step 4: Create Tables in your database
Create a new Table for each of the entities provided to you in the ERD diagram in Step 1.
Add a column to represent each attribute addressed in the ERD diagram in Step 1.
Designate Primary Key, as noted in the ERD diagram in Step 1.
Designate a Foreign Key relationship between the tables, as noted in the ERD diagram in Step 1.
Enable referential integrity on the relationships, as needed.
Enable cascade updates as needed on the relationships.
Step 5: Designate Data Types. Update the data type as needed to enforce the domain constrain of the data. This needs to be completed for every column for all tables.
Dates: they should have a date data designation type.
Surrogate keys: shall be auto-numbered
Character type: shall have a character data designation type.
Step 6: Column Constraints Designation.
Grade designation must be of one of these values as follows: A, B, C, D, E, F, W, E (E=enrolled, and W = withdrawn).
Student's first and last names are not to be designated as NULL.
Course Credit hours shall be BETWEEN one and four.
The instructor first and last name must NOT be NULL
Course name designation has to be UNIQUE and must not be NULL type.
Step 7: Data Table Addition
Use the INSERT operator to add minimum 2-3 rows of data per each database.
You are free to use any values you might like for each of the columns.
NOTE/ Reminder: you are required to add data to the parent table prior to adding any data to child tables, as referential integrity is enabled.
Step 8: Executing your SCRIPT
Must incorporate the COMMIT command at the end of your Script
Must incorporate the SHOW TABLES command, to display the table you created. At the end of the script created.
Must incorporate the SELECT statement to show data allocated for each table. This would be added at the end of the script.
EXECUTE your SCRIPT.
Copy and paste your OUTPUT into your MS Word file as follows: YourLastName_Project_Ph3_Output.doc
Step 9: Upload your work
Upload ZIP file to include the two files as follows: 1) SQL Script with your name as follows: YourLastName_Project_Ph3.sql, and 2) MS Word Document with your OUTPUT, named as follows: YourLastName_Project_Ph3_Output.doc.
American Military University Southside Surf Shop Presentation and Excel
The scenario:Gerry Henry surfing, one of the owners of Southside Surf Shop, wants to commission an artist to create new bo ...
American Military University Southside Surf Shop Presentation and Excel
The scenario:Gerry Henry surfing, one of the owners of Southside Surf Shop, wants to commission an artist to create new board logos for the company. Mr. Henry has created an Excel workbook that lists the artists and their commission prices. He has also narrowed the field down to four logos and placed them in a PowerPoint presentation. He has asked you to complete both files.For this assignment, you will need the following files: Board_Logos Logos_PresentationYou will save your files as: Lastname_Firstname_Board_Logos Lastname_Firstname_Logos_PresentationOpen the file Board Logos.Save as Lastname_Firstname_Logos_Board_LogosAdjust the column widths so that all data displays and apply a cell style to the title.Create a chart to display the Last Name and Commission on a new sheet with an applicable name.Format the chart using a chart layout and a chart style.Insert at least two comments on the Artists worksheet.Rename the data sheet with a descriptive name.Insert the your name in the footer of all worksheets.Save the file as Lastname_Firstname_Board_LogosOpen the file Logos_Presentation.Save the presentation as Lastname_Firstname_Logos_Presentation.Insert the file name in the handouts footer.In the presentation, apply a design theme.Add titles containing the names of artists to the slides; select any names from the Excel workbook.For each logo, adjust the size or add an effect.Insert a new slide at the end of the presentation, and then Paste link the Excel chart, and resize it as necessary.Insert the your name in the footer.
CS449 University of Missouri Acceptance Criteria and Test Programming Paper
Hello,I need someone that can help me with this assignment due tonight at 11:20 pm. (Central Time - US).Thank you.
CS449 University of Missouri Acceptance Criteria and Test Programming Paper
Hello,I need someone that can help me with this assignment due tonight at 11:20 pm. (Central Time - US).Thank you.
Linear algebra homework
You will use Matlab as a tool to solve linear algebrea math question. However, you do not need to submit the code, just ma ...
Linear algebra homework
You will use Matlab as a tool to solve linear algebrea math question. However, you do not need to submit the code, just make sure you answer the question correct. Finish the homework.
Report for ABC, Inc. continued
you will continue with the report for ABC, Inc. that you started in Week 1 Project and continued in Week 2 Project. Remem ...
Report for ABC, Inc. continued
you will continue with the report for ABC, Inc. that you started in Week 1 Project and continued in Week 2 Project. Remember to review the scenario document for the company profile and overall security objectives. Modify and correct the plan you created for Week 2 Project to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week. Use Track Changes or color code your changes and additions so that the changes are easy to identify. This week you will consider planning, implementing, and verifying a protected database for the organization. This involves restricting user access and permissions. You will also consider the mobile computers for the marketing department and how they should be secured for use.Using the South University Online Library or the Internet, research about the following:Planning and implementing security for mobile computers and mobile devicesPlanning and implementing a secure databaseVerification testing for security mechanisms that are in placeUsing the project report from W2 Assignment 2, complete the following tasks by adding 3- to 4-pages to your existing report:
Modify the report from W2 Assignment 2 to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week. Color code your changes to the report so that they are easy to identify.Provide recommendations to secure the computers in the Marketing department of this organization. These computers travel outside of the network, so you need to consider how they will connect to the home server, and what should be done to protect them. You should consider the level of access they have to the network and the consequence if they are stolen or used by someone outside of the organization.Provide recommendations for securing network traffic between the workstations within the building and the server. Identify trust boundaries for the organization and recommend security measures for each trust boundary. Characterize which trust boundaries represent the highest level of trust and those that represent the lowest; what is the distinction between these levels?Recommend measures to harden the server OS to prevent outsiders from accessing the networked computers. Identify the services for your recommended OS that will aid in the security effort. Explain the policy that should be used for patches and updated on both the server and the workstation OSs. Why is this an important consideration?Secure the database of the organization and assign the required permissions to the users. You should create a chart of groups and permissions for this portion of the assignment (you do not need to identify specific tables, just information groups).Describe the implementation process and timeline for your recommendations. Try to give as reasonable a timeline as possible and explain the timeframe you choose.Expand the section of your report for verifying the implementation of the previously suggested security recommendations from Week 1 and 2. Identify what is being tested for each verification activity and what is proven by each activity. This should include testing activities to make sure the security system is working properly. An example of this would be using an intentionally incorrect password to make sure the system does not allow the login.Be sure to include your references and citations for the measures and activities you suggest. You should have gathered this from the research in the library or on the Internet.
Similar Content
submit your strategic analysis of your project, programming homework help
submit your strategic analysis of your project.·Prepare a list of recommended troubleshooting steps for the users of your...
Loops and Case Logic
You own a consulting firm and a client has engaged you to write a console program. In general, this program must prompt th...
Developers Selection for Group Python Statistics Questions
A software company has 22 developers. The manager employs a certain number of them in a given project. Many developers hav...
Week 8 SQL Programming Assignment
Build on your .SQL script: answer 5 EASY(ish) questions about YOUR data, and 5 EASY(ish) questions about the test data. Yo...
CIS 1250 Distance Between Two Geographical Points Worksheet
write a program that calculates the distance between two geographical points by asking user input ...
Essay for Strategic Information Systems for Business Management
Write a short essay on a particular application of data mining in a business field (or a company). Addressing its applicat...
Docs
Once a user registers they receive an Email in the email they provided so that they can complete the I used the Mail dev p...
Assignment2
Describes the requirement and steps to enable a student pay for Every Student must provide their student ID at the point o...
Image Processing
Image processing is a technique for applying operations on any image to improve it or to extract any relevant information ...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
University of The Cumberlands Installing MySQL Project
Summary:
To apply all acquired knowledge in the last Project Assignments to create a Database Scheme. For this project, ...
University of The Cumberlands Installing MySQL Project
Summary:
To apply all acquired knowledge in the last Project Assignments to create a Database Scheme. For this project, the ERD is provided to you.
Deliverables:
SQL Script with your name as follows: YourLastName_Project_Ph3.sql.
MS Word Document with your OUTPUT, named as follows: YourLastName_Project_Ph3_Output.doc.
ZIP file to include the two files mentioned above.
Required Software:
MySQL DBMS by Oracle. MySQL Community Server and MySQL Workbench.
Follow Step 1-3 for your Course Project Phase phase 1, to install the required software components.
Lab Steps:
Step 1: Analyze the ERD for a student information system provided below. Be alert for the specifications provided for: 1) Entities, 2) Attributes, 3) Primary Key, and 4) Relationships. You will need to have a clear understanding for these components to create your database using MySQL.
Step 2: Create a New Database in MySQL, Produce SQL File, Drop Table
Create a new Database, as you did in your Course Project Phase 1 deliverable and you already created a database using the MySQL DBMS. Reference the attached video (Course Project Ph1 Video.mp4), for a demonstration to create a new Database using MySQL. This video was initially presented to you for phase 2 of your project. Also, reference the supplemental text: Available for Free download as part of our UC Library. MySQL Database Usage & Administration. (2010). By Vaswani, Vikram. McGraw Hill. ISBN: 978-0-07-160550-2. Link to UC Library: http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=nlebk&AN=291311&site=eds-live&ebv=EB&ppid=pp_ii
Utilize the SQL dialect you learned so far in this course for MySQL. Use the file supplemental textbook: MySQL Database Usage & Administration. (2010). By Vaswani, Vikram. McGraw Hill, as supplement your knowledge of the MySQL dialect.
Create your SCRIPT file to be named: YourLastName_Project_Ph3.sql.
Step 3: Include the following commands at the tops of your scripts:
SET FOREIGN_KEY_CHECKS=0;
DROP TABLE IF EXISTS STUDENT;
DROP TABLE IF EXISTS CAMPUS;
DROP TABLE IF EXISTS ROOM;
DROP TABLE IF EXISTS COURSE;
DROP TABLE IF EXISTS INSTRUCTOR;
DROP TABLE IF EXISTS APPROVED_INSTRUCTOR;
DROP TABLE IF EXISTS CLASS;
DROP TABLE IF EXISTS STUDENT_GRADE;
SET FOREIGN_KEY_CHECKS=1;
Step 4: Create Tables in your database
Create a new Table for each of the entities provided to you in the ERD diagram in Step 1.
Add a column to represent each attribute addressed in the ERD diagram in Step 1.
Designate Primary Key, as noted in the ERD diagram in Step 1.
Designate a Foreign Key relationship between the tables, as noted in the ERD diagram in Step 1.
Enable referential integrity on the relationships, as needed.
Enable cascade updates as needed on the relationships.
Step 5: Designate Data Types. Update the data type as needed to enforce the domain constrain of the data. This needs to be completed for every column for all tables.
Dates: they should have a date data designation type.
Surrogate keys: shall be auto-numbered
Character type: shall have a character data designation type.
Step 6: Column Constraints Designation.
Grade designation must be of one of these values as follows: A, B, C, D, E, F, W, E (E=enrolled, and W = withdrawn).
Student's first and last names are not to be designated as NULL.
Course Credit hours shall be BETWEEN one and four.
The instructor first and last name must NOT be NULL
Course name designation has to be UNIQUE and must not be NULL type.
Step 7: Data Table Addition
Use the INSERT operator to add minimum 2-3 rows of data per each database.
You are free to use any values you might like for each of the columns.
NOTE/ Reminder: you are required to add data to the parent table prior to adding any data to child tables, as referential integrity is enabled.
Step 8: Executing your SCRIPT
Must incorporate the COMMIT command at the end of your Script
Must incorporate the SHOW TABLES command, to display the table you created. At the end of the script created.
Must incorporate the SELECT statement to show data allocated for each table. This would be added at the end of the script.
EXECUTE your SCRIPT.
Copy and paste your OUTPUT into your MS Word file as follows: YourLastName_Project_Ph3_Output.doc
Step 9: Upload your work
Upload ZIP file to include the two files as follows: 1) SQL Script with your name as follows: YourLastName_Project_Ph3.sql, and 2) MS Word Document with your OUTPUT, named as follows: YourLastName_Project_Ph3_Output.doc.
American Military University Southside Surf Shop Presentation and Excel
The scenario:Gerry Henry surfing, one of the owners of Southside Surf Shop, wants to commission an artist to create new bo ...
American Military University Southside Surf Shop Presentation and Excel
The scenario:Gerry Henry surfing, one of the owners of Southside Surf Shop, wants to commission an artist to create new board logos for the company. Mr. Henry has created an Excel workbook that lists the artists and their commission prices. He has also narrowed the field down to four logos and placed them in a PowerPoint presentation. He has asked you to complete both files.For this assignment, you will need the following files: Board_Logos Logos_PresentationYou will save your files as: Lastname_Firstname_Board_Logos Lastname_Firstname_Logos_PresentationOpen the file Board Logos.Save as Lastname_Firstname_Logos_Board_LogosAdjust the column widths so that all data displays and apply a cell style to the title.Create a chart to display the Last Name and Commission on a new sheet with an applicable name.Format the chart using a chart layout and a chart style.Insert at least two comments on the Artists worksheet.Rename the data sheet with a descriptive name.Insert the your name in the footer of all worksheets.Save the file as Lastname_Firstname_Board_LogosOpen the file Logos_Presentation.Save the presentation as Lastname_Firstname_Logos_Presentation.Insert the file name in the handouts footer.In the presentation, apply a design theme.Add titles containing the names of artists to the slides; select any names from the Excel workbook.For each logo, adjust the size or add an effect.Insert a new slide at the end of the presentation, and then Paste link the Excel chart, and resize it as necessary.Insert the your name in the footer.
CS449 University of Missouri Acceptance Criteria and Test Programming Paper
Hello,I need someone that can help me with this assignment due tonight at 11:20 pm. (Central Time - US).Thank you.
CS449 University of Missouri Acceptance Criteria and Test Programming Paper
Hello,I need someone that can help me with this assignment due tonight at 11:20 pm. (Central Time - US).Thank you.
Linear algebra homework
You will use Matlab as a tool to solve linear algebrea math question. However, you do not need to submit the code, just ma ...
Linear algebra homework
You will use Matlab as a tool to solve linear algebrea math question. However, you do not need to submit the code, just make sure you answer the question correct. Finish the homework.
Report for ABC, Inc. continued
you will continue with the report for ABC, Inc. that you started in Week 1 Project and continued in Week 2 Project. Remem ...
Report for ABC, Inc. continued
you will continue with the report for ABC, Inc. that you started in Week 1 Project and continued in Week 2 Project. Remember to review the scenario document for the company profile and overall security objectives. Modify and correct the plan you created for Week 2 Project to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week. Use Track Changes or color code your changes and additions so that the changes are easy to identify. This week you will consider planning, implementing, and verifying a protected database for the organization. This involves restricting user access and permissions. You will also consider the mobile computers for the marketing department and how they should be secured for use.Using the South University Online Library or the Internet, research about the following:Planning and implementing security for mobile computers and mobile devicesPlanning and implementing a secure databaseVerification testing for security mechanisms that are in placeUsing the project report from W2 Assignment 2, complete the following tasks by adding 3- to 4-pages to your existing report:
Modify the report from W2 Assignment 2 to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week. Color code your changes to the report so that they are easy to identify.Provide recommendations to secure the computers in the Marketing department of this organization. These computers travel outside of the network, so you need to consider how they will connect to the home server, and what should be done to protect them. You should consider the level of access they have to the network and the consequence if they are stolen or used by someone outside of the organization.Provide recommendations for securing network traffic between the workstations within the building and the server. Identify trust boundaries for the organization and recommend security measures for each trust boundary. Characterize which trust boundaries represent the highest level of trust and those that represent the lowest; what is the distinction between these levels?Recommend measures to harden the server OS to prevent outsiders from accessing the networked computers. Identify the services for your recommended OS that will aid in the security effort. Explain the policy that should be used for patches and updated on both the server and the workstation OSs. Why is this an important consideration?Secure the database of the organization and assign the required permissions to the users. You should create a chart of groups and permissions for this portion of the assignment (you do not need to identify specific tables, just information groups).Describe the implementation process and timeline for your recommendations. Try to give as reasonable a timeline as possible and explain the timeframe you choose.Expand the section of your report for verifying the implementation of the previously suggested security recommendations from Week 1 and 2. Identify what is being tested for each verification activity and what is proven by each activity. This should include testing activities to make sure the security system is working properly. An example of this would be using an intentionally incorrect password to make sure the system does not allow the login.Be sure to include your references and citations for the measures and activities you suggest. You should have gathered this from the research in the library or on the Internet.
Earn money selling
your Study Documents