Description
Read and reflect upon the “Top Ten – Considerations for Evolving into the Role of a Consultant” in Chapter 5 of Roberts’ text. Propose three (3) actions that IT professionals should undertake in order to successfully achieve the Top Ten.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Thank you for the opportunity to help you with your question!
The first scientific institution to use the term was the Department of
Datalogy at the University of Copenhagen, founded in 1969, with Peter
Naur being the first professor in datalogy.
Completion Status:
100%
Review
Review
Anonymous
Really helped me to better understand my coursework. Super recommended.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Strayer University Week 6 E Commerce Start Up Company Development Project
This is the third in a series of five sequential assignments (the course project) in which you continue to act as the ...
Strayer University Week 6 E Commerce Start Up Company Development Project
This is the third in a series of five sequential assignments (the course project) in which you continue to act as the Chief Technology Officer (CTO) of a hypothetical e-commerce start-up company of your design.You have been working on delivering an information technology project plan in anticipation of the company relocating to a new facility.
In the first course project deliverable, you created a project plan inception document and supporting Gantt chart.
In the second course project deliverable, you developed the business requirements to be incorporated into the information systems design you are creating. You also updated your original supporting Gantt chart based on major and minor tasks identified in the business requirements document.
In this third course project deliverable, you will create an infrastructure design that considers the key elements of software, hardware, security, and business process flow for your e-commerce startup company. You will also use graphical tools to create a supporting data flow diagram (DFD) for your infrastructure design. The infrastructure design provides an opportunity to visualize the key elements and how they are connected for maximum effectiveness.This assignment consists of two-parts:Part 1: Infrastructure Design
You will create an 8–10-page infrastructure design document to include key technical elements for your hypothetical e-commerce company’s information systems infrastructure.Part 2: Updated Gantt Chart
You will use Microsoft Project to again update the supporting project Gantt chart begun in your first course project deliverable:
You are not creating a new Gantt chart, only updating the one you created in the previous assignment with the major and minor tasks uncovered while creating the infrastructure design document.
Note:
You are to create or assume all necessary assumptions to successfully complete this assignment.
You must submit both parts as separate files to the assignment area. Label each file name according to the appropriate part.
Instructions
Part 1: Infrastructure Design
Create an 8–10-page infrastructure design document in which you:
Identify the major hardware and software components of your hypothetical e-commerce company's information systems infrastructure.
Design your e-commerce company's hardware (database and proxy servers, network equipment) and software (analytics, big data, API, content management) from a size, scale, type, and interoperability standards perspective.
Document the potential security vulnerabilities and a security design for your e-commerce company.
Use graphical tools to create a data flow diagram (DFD) for your e-commerce company.
Use three sources to support your writing.
Choose sources that are credible, relevant, and appropriate.
Cite each source listed on your source page at least one time within your assignment.
Access the library or review library guides for help with research, writing, and citation.
Part 2: Updated Gantt Chart
Use Microsoft Project to update the previously created Gantt chart with the major and minor tasks identified in the infrastructure design document.Formatting
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:
The preferred method is for the infrastructure design portion of your assignment to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
Include a cover page containing the assignment title, your name, your professor's name, the course title, and the date. The cover page is not included in the required page length.
Include a source list page. Citations and references must follow SWS format. The source list page is not included in the required page length.
Learning Outcomes
The specific course learning outcome associated with this assignment is:
Propose a design to address hardware, software, and security aspects of an entity’s information systems infrastructure.
7 pages
Incident Response Paper
An incident response plan has several roles and responsibilities to an organization. Its roles can be defined by the dutie ...
Incident Response Paper
An incident response plan has several roles and responsibilities to an organization. Its roles can be defined by the duties of the different parties ...
6 pages
J292 Relational Database
Relational database is a mean of storing information in a way that it is easy to retrieve. Relational database stores info ...
J292 Relational Database
Relational database is a mean of storing information in a way that it is easy to retrieve. Relational database stores information in tables which have ...
Investigative Process in Digital Forensic Project Report
For the final assignment, you will combine the results of the previous three steps into a single planning document—an In ...
Investigative Process in Digital Forensic Project Report
For the final assignment, you will combine the results of the previous three steps into a single planning document—an Investigation Project Plan—with a title page, a table of contents, and a distinct section for each of the three steps. The plan should include:Forms documenting key people, meeting agenda, key activities and reporting, key words, investigation timeline narrative, visual graphic timeline chart, authorization confirmation (e.g., ownership, jurisdiction), and related investigations. Designation of the legal forms required for criminal investigations should also be included. (Step 1)Resource checklist for equipment, human resources and labor expenses (Step 2)Management plan (Step 3)Search and seizure form(s)Chain of custody form
University of the Cumberlands Operating Static Budget Analysis Discussion
Write an analytical summary of your learning outcomes from chapters 9 and 10. In addition to your analytical summary, addr ...
University of the Cumberlands Operating Static Budget Analysis Discussion
Write an analytical summary of your learning outcomes from chapters 9 and 10. In addition to your analytical summary, address the following:1. As a manager, discuss how you would use or have used the concepts presented in chapters 9 and 10.2. Why might managers find a flexible-budget analysis more informative than static-budget analysis?3. How might a manager gain insight into the causes of flexible-budget variances for direct materials, labor, and overhead? Provide at least one numerical example to support your thoughts.Be sure to support your work with specific citations using APA formatMinimum of 3 APA referencesplagarism checkchapters links:Chapter 9 link: Analysis of Operating Budgets:https://saylordotorg.github.io/text_managerial-acc...Chapter 10 link: https://saylordotorg.github.io/text_managerial-acc...
Similar Content
University of Potomac Firewall Technologies Cyber Security Discussion Question
Research various firewall companies and open source firewall technology. Create a proposal for using open source firewall ...
UMGC Cyber Security Paper
...
HST 116 Quinsigamond Community College Industrial Supremacy Discussion
Questions1) Who were some of the business and industrial titans of the late nineteenth century, and what did they contribu...
Your Certification Goals, computer science homework help
"Your Certification Goals" Please respond to the following:Security is something we all need to think about. Not only do ...
UMGC Technology Concepts to Business Professionals Presentation
Congratulations! This week, your internship rotation takes you to the company's IT Department where you've been aske...
University of the Cumberlands Cloud Computing Technologies Discussion
For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitab...
Legal And Policy Issues In It.edited
Legal and policy in IT are regulatory measures and legislation aimed at protecting innovators from issues such as copyrigh...
Netflix
✓ Netflix is by far the most prominent entertainment service in the world, with over 193 digital subscribers throughout ...
Interview Question For Phd Level
File name: Interview_Question_for_PHD_level.docx (26.33K)...
Related Tags
Book Guides
The 48 Laws of Power
by Robert Greene
Fear - Trump in the White House
by Bob Woodward
The Aftermath
by Rhidian Brook
Fast Food Nation
by Eric Schlosser
White Fang
by Jack London
The House of the Seven Gables
by Nathaniel Hawthorne
Dandelion Wine
by Ray Bradbury
Pachinko
by Min Jin Lee
Steppenwolf
by Hermann Hesse
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Strayer University Week 6 E Commerce Start Up Company Development Project
This is the third in a series of five sequential assignments (the course project) in which you continue to act as the ...
Strayer University Week 6 E Commerce Start Up Company Development Project
This is the third in a series of five sequential assignments (the course project) in which you continue to act as the Chief Technology Officer (CTO) of a hypothetical e-commerce start-up company of your design.You have been working on delivering an information technology project plan in anticipation of the company relocating to a new facility.
In the first course project deliverable, you created a project plan inception document and supporting Gantt chart.
In the second course project deliverable, you developed the business requirements to be incorporated into the information systems design you are creating. You also updated your original supporting Gantt chart based on major and minor tasks identified in the business requirements document.
In this third course project deliverable, you will create an infrastructure design that considers the key elements of software, hardware, security, and business process flow for your e-commerce startup company. You will also use graphical tools to create a supporting data flow diagram (DFD) for your infrastructure design. The infrastructure design provides an opportunity to visualize the key elements and how they are connected for maximum effectiveness.This assignment consists of two-parts:Part 1: Infrastructure Design
You will create an 8–10-page infrastructure design document to include key technical elements for your hypothetical e-commerce company’s information systems infrastructure.Part 2: Updated Gantt Chart
You will use Microsoft Project to again update the supporting project Gantt chart begun in your first course project deliverable:
You are not creating a new Gantt chart, only updating the one you created in the previous assignment with the major and minor tasks uncovered while creating the infrastructure design document.
Note:
You are to create or assume all necessary assumptions to successfully complete this assignment.
You must submit both parts as separate files to the assignment area. Label each file name according to the appropriate part.
Instructions
Part 1: Infrastructure Design
Create an 8–10-page infrastructure design document in which you:
Identify the major hardware and software components of your hypothetical e-commerce company's information systems infrastructure.
Design your e-commerce company's hardware (database and proxy servers, network equipment) and software (analytics, big data, API, content management) from a size, scale, type, and interoperability standards perspective.
Document the potential security vulnerabilities and a security design for your e-commerce company.
Use graphical tools to create a data flow diagram (DFD) for your e-commerce company.
Use three sources to support your writing.
Choose sources that are credible, relevant, and appropriate.
Cite each source listed on your source page at least one time within your assignment.
Access the library or review library guides for help with research, writing, and citation.
Part 2: Updated Gantt Chart
Use Microsoft Project to update the previously created Gantt chart with the major and minor tasks identified in the infrastructure design document.Formatting
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:
The preferred method is for the infrastructure design portion of your assignment to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
Include a cover page containing the assignment title, your name, your professor's name, the course title, and the date. The cover page is not included in the required page length.
Include a source list page. Citations and references must follow SWS format. The source list page is not included in the required page length.
Learning Outcomes
The specific course learning outcome associated with this assignment is:
Propose a design to address hardware, software, and security aspects of an entity’s information systems infrastructure.
7 pages
Incident Response Paper
An incident response plan has several roles and responsibilities to an organization. Its roles can be defined by the dutie ...
Incident Response Paper
An incident response plan has several roles and responsibilities to an organization. Its roles can be defined by the duties of the different parties ...
6 pages
J292 Relational Database
Relational database is a mean of storing information in a way that it is easy to retrieve. Relational database stores info ...
J292 Relational Database
Relational database is a mean of storing information in a way that it is easy to retrieve. Relational database stores information in tables which have ...
Investigative Process in Digital Forensic Project Report
For the final assignment, you will combine the results of the previous three steps into a single planning document—an In ...
Investigative Process in Digital Forensic Project Report
For the final assignment, you will combine the results of the previous three steps into a single planning document—an Investigation Project Plan—with a title page, a table of contents, and a distinct section for each of the three steps. The plan should include:Forms documenting key people, meeting agenda, key activities and reporting, key words, investigation timeline narrative, visual graphic timeline chart, authorization confirmation (e.g., ownership, jurisdiction), and related investigations. Designation of the legal forms required for criminal investigations should also be included. (Step 1)Resource checklist for equipment, human resources and labor expenses (Step 2)Management plan (Step 3)Search and seizure form(s)Chain of custody form
University of the Cumberlands Operating Static Budget Analysis Discussion
Write an analytical summary of your learning outcomes from chapters 9 and 10. In addition to your analytical summary, addr ...
University of the Cumberlands Operating Static Budget Analysis Discussion
Write an analytical summary of your learning outcomes from chapters 9 and 10. In addition to your analytical summary, address the following:1. As a manager, discuss how you would use or have used the concepts presented in chapters 9 and 10.2. Why might managers find a flexible-budget analysis more informative than static-budget analysis?3. How might a manager gain insight into the causes of flexible-budget variances for direct materials, labor, and overhead? Provide at least one numerical example to support your thoughts.Be sure to support your work with specific citations using APA formatMinimum of 3 APA referencesplagarism checkchapters links:Chapter 9 link: Analysis of Operating Budgets:https://saylordotorg.github.io/text_managerial-acc...Chapter 10 link: https://saylordotorg.github.io/text_managerial-acc...
Earn money selling
your Study Documents