CIS 515 entire course Flashcards
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-all-assignments
For more classes visit
http://www.uopassignments.com
STRAYER CIS 515 All Assignments (2 Set) NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-all-assignments
For more classes visit
http://www.uopassignments.com
This Tutorial contains 2 Set of Papers for each Assignment
CIS 515 Week 1 Assignment 1 Accessing Oracle (2 Papers) NEW
CIS 515 Week 2 Assignment 2 Database Systems And Database Models (2 Papers) NEW
CIS 515 Week 3 Assignment 3 University Database (2 Papers) NEW
CIS 515 Week 4 Assignment 4 Database Modeling And Normalization (2 Papers) NEW
CIS 515 Week 6 Assignment 5 Tour Operator Agency Database (2 Papers) NEW
CIS 515 Week 7 Assignment 6 Sql Concepts And Database Design (2 Papers) NEW
CIS 515 Week 8 Case Study Database Development (2 Papers) NEW
CIS 515 Week 10 Technical Paper Database Administrator For Department Store (2 Papers) NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-517-strayer/cis-517-week-9-assignment-6-voip-part-4-recent
For more classes visit
http://www.uopassignments.com/
STRAYER CIS 517 Week 9 Assignment 6 Voip Part 4 (2 Paper) NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-517-strayer/cis-517-week-9-assignment-6-voip-part-4-recent
For more classes visit
http://www.uopassignments.com/
This Tutorial contains 2 Papers
Utilizing the Delphi technique, your team constructed the following risks register the VoIP project containing the risk, the likelihood of its occurrence on a scale of 1 (least likely) to 5 (most likely), and the potential negative impact on the project on the same scale. In addition, they recommended the appropriate response and identified its type for one of the risks identified.
Write a three to five (3-5) page paper in which you:
- Explain risk management and its associated activities and defend the need for a risk management plan.
- Describe the Delphi technique used to identify risks and infer on types of projects where this technique is most accurate.
- Examine the four (4) types of risk response (i.e., avoidance, acceptance, transference, and mitigation) and determine the appropriate situation where each should be used.
- Complete the table with the risk response type (i.e., avoidance, acceptance, transference, and mitigation) and a description of the response.
- Create a decision tree with the software of your choice to address risk number 6. Assume that when you check the schedule on day 60 of the project, it becomes evident that two (2) additional engineers are needed to ensure on-time completion of the project. The engineers cost $25,000 each and a fee of $120,000 is issued by the legacy provider. The probability of completing the project on time is as follows: With the current personnel – 60%; With one (1) engineer – 80%; With both engineers – 98%.
- Explain the methodology utilized to create a decision tree and recommend the appropriate action to take based on your decision tree from criterion 5.
- Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
• Include the decision tree created in your chosen software. The completed decision tree must be imported into the Word document before the paper is submitted.
The specific course learning outcomes associated with this assignment are:
• Examine the human resource factors that can impact project management.
• Summarize how the PMBOK® process groups and knowledge areas are involved throughout the project life cycle.
• Compare and contrast the sources and mitigating factors of project risk.
• Use project management and graphic software to plan and manage a project throughout the project life cycle.
• Use technology and information resources to research issues in IT project management.
• Write clearly and concisely about issues in IT project management using proper writing mechanics and technical style conventions
Click here to view the grading rubric for this assignment.
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-11-discussion-questions-2-database-trends-recent
For more classes visit
http://www.uopassignments.com
STRAYER CIS 515 Week 11 Discussion Questions 2 Database Trends NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-11-discussion-questions-2-database-trends-recent
For more classes visit
http://www.uopassignments.com
“Database Trends” Please respond to the following:
Identify at least two industries that are currently using common data exchange and data management trends. Rank the success of each implementation based on the ease of implementation, ease of use, and costs. Speculate the data exchange and data management trends that may take place in the next five to 10 years. Justify your response.
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-11-discussion-questions-1-practical-database-management-recent
For more classes visit
http://www.uopassignments.com
STRAYER CIS 515 Week 11 Discussion Questions 1 Practical Database Management NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-11-discussion-questions-1-practical-database-management-recent
For more classes visit
http://www.uopassignments.com
“Practical Database Management” Please respond to the following:
Imagine that you have been hired to optimize and secure an existing database installation. Select at least three considerations that would enable the organization to extend database functionality and reliability, and enhance data transaction performance. Support your answer with technical considerations that could be implemented to leverage data services. Classify professional and technical skills that could enable you to be successful in this scenario.
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-10-technical-paper-database-administrator-for-department-store-2-papers-recent
For more classes visit
http://www.uopassignments.com
STRAYER CIS 515 Week 10 Technical Paper Database Administrator For Department Store (2 Papers) NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-10-technical-paper-database-administrator-for-department-store-2-papers-recent
For more classes visit
http://www.uopassignments.com
This Tutorial contains 2 Papers
CIS 515 WEEK 10 TECHNICAL PAPER DATABASE ADMINISTRATOR FOR DEPARTMENT STORE
Technical Paper: Database Administrator for Department Store
The Strayer Oracle Server may be used to test and compile the SQL Queries developed for this assignment. Your instructor will provide you with login credentials to a Strayer University maintained Oracle server.
Imagine that you have been hired as the database administrator for a local department store. The department store has recently expanded by opening five (5) stores within your local region. They have also launched a series of marketing campaigns to attract new customers and increase sales. For your hired role, you will be responsible for creating and maintaining an enterprise-wide database system that will hold the sales and inventory data for the organization. The designed database will help operations in supporting its new business marketing strategy. Using the concepts presented throughout the course, you will develop a plan to create this database and establish a design that aligns with the product sales initiatives of the organization.
Write a twelve to fifteen (12-15) page paper in which you:
- Identify the potential sales and department store transactions that can be stored within the database.
- Design a database solution and the potential business rules that could be used to house the sales transactions of the department store.
- Evaluate all relationships of each entity within your database solution using the Crow’s Foot notation. Include all data elements, entities, relationships (such as 1:M, 1:1, M:N), and cardinalities for the department store database in your diagram. Note: The graphically depicted solution is not included in the required page length.
- Research the Internet for best practices of how retail stores use databases for retaining customers and increasing sales and complete the following:
a. Justify how Big Data tools could be used for forecasting sales and inventory of the department store.
b. Propose two (2) SQL Stored Procedures that use SQL functions to help sales associates perform explanatory or predictive analytics.
c. Give your opinion on which of the two (2) ways you proposed in Question four (4) b provide greater value to expanding their business within the region.
d. Provide a copy of your working SQL code as part of the paper. - Research the Internet for database vendors that provide cloud computing services and complete the following:
a. Estimate the types of costs involved or the pricing structure required when implementing a cloud-hosted solution for a database.
b. Analyze security considerations and pricing of the different cloud implementation types.
c. Rank the cloud services options of Software as a Service, Platform as a Service and Infrastructure as a Service in terms of functionality, mobility, and ability to provide distributed transaction concurrency. Compare how these cloud-based services fit within an environment where users are mobile. Determine the technical provisions that would be required to ensure data integrity. - Evaluate whether the use of a distributed DBMS structure is appropriate and identify the optimization techniques that should be factored in to enhance the operations of the database in your design.
- Provide at least two (2) examples of how lost updates and uncommitted data may occur, keeping in mind that five (5) stores will be generating transactions.
- Determine the concurrency control factors that can be used to ensure valid execution of transactions within the current multiuser environment.
- Research the Internet for backup and restoration recovery solutions and database security threats that could be applicable to the department store. Upon your research, complete the following:
a. Suggest at least two (2) options that could be made available to provide disaster management functions for the database system within the retail environment.
b. Assess the types of security threats that may exist when managing the department store database and suggest measure(s) that can be performed to minimize these threats that are particular to retail. - Use at least six (6) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
• Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and Open Office. The completed diagrams / charts must be imported into the Word document before the paper is submitted
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-10-discussion-questions-2-database-security-recent
For more classes visit
http://www.uopassignments.com
STRAYER CIS 515 Week 10 Discussion Questions 2 Database Security NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-10-discussion-questions-2-database-security-recent
For more classes visit
http://www.uopassignments.com
“Database Security” Please respond to the following:
Confidentiality, integrity, and availability are the three common security goals. Select at least three security vulnerabilities that could jeopardize and compromise a database. Classify each vulnerability with being technical, managerial, cultural, or procedural. Provide your rationale.
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-10-discussion-questions-1-database-administrators-role-recent
For more classes visit
http://www.uopassignments.com
STRAYER CIS 515 Week 10 Discussion Questions 1 Database Administrators Role NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-10-discussion-questions-1-database-administrators-role-recent
For more classes visit
http://www.uopassignments.com
“Database Administrator’s Role” Please respond to the following:
Information professionals with adequate skills are required to maintain the business continuity of database services in an organization. Identify and assess at least three professional skills that would be required to be successful database administrators.
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-9-discussion-questions-2-extensible-markup-language-xml-recent
For more classes visit
http://www.uopassignments.com
STRAYER CIS 515 Week 9 Discussion Questions 2 Extensible Markup Language (XML) NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-9-discussion-questions-2-extensible-markup-language-xml-recent
For more classes visit
http://www.uopassignments.com
“Extensible Markup Language (XML)” Please respond to the following:
XML provides a method for data to be transferred between systems. Specify at least three components of an XML document. Analyze how each component ensures data reliability and validation
tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-9-discussion-questions-1-database-connectivity-methods-recent
For more classes visit
http://www.uopassignments.com
STRAYER CIS 515 Week 9 Discussion Questions 1 Database Connectivity Methods NEW
tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-9-discussion-questions-1-database-connectivity-methods-recent
For more classes visit
http://www.uopassignments.com
“Database Connectivity Methods” Please respond to the following:
Database solutions today must be able to adapt and integrate among various computing applications. Determine at least three forms of database connectivity methods that can be used as an interface between applications. For each method, you have chosen, create an example that demonstrates how each could facilitate data exchange functionality in a cloud service environment.
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-8-discussion-question-1-logical-and-physical-design-recent
For more classes visit
http://www.uopassignments.com
STRAYER CIS 515 Week 8 Discussion Question 1 Logical and Physical Design NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-8-discussion-question-1-logical-and-physical-design-recent
For more classes visit
http://www.uopassignments.com
“Logical and Physical Design” Please respond to the following:
In order to ensure optimal database performance, the logical and physical design should consider the user requirements thoroughly. Suppose you have been hired to transform a conceptual model into a logical model for a sales database. Describe the specific steps that you must perform in order to appropriately construct the database model. For each step mentioned, speculate the risks that would take place and how you would avoid or mitigate those risks.
Suggest at least three activities that are required in the physical design process of a database to ensure adequate physical storage and data access. Analyze why user, security groups, and role definitions are essential to maintain the integrity of the database.
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-8-case-study-database-development-2-papers-recent
For more classes visit
http://www.uopassignments.com
STRAYER CIS 515 Week 8 Case Study Database Development (2 Papers) NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-8-case-study-database-development-2-papers-recent
For more classes visit
http://www.uopassignments.com
This Tutorial contains 2 Papers
Due Week 8 and worth 90 points Read the following articles available in the ACM Digital Library:
Dual Assessment of Data Quality in Customer Databases, Journal of Data and Information Quality (JDIQ), Volume 1 Issue 3, December 2009, Adir Even, G. Shankaranarayanan.
Process-centered review of object oriented software development methodologies, ACM Computing Surveys (CSUR), Volume 40 Issue 1, February 2008, Raman Ramsin, and Richard F. Paige.
Please follow the steps below to access ACM Digital Library:
1.Login to iCampus at https://icampus.strayer.edu/login
2.From iCampus:
Click STUDENT SERVICES»_space; Learning Resources Center»_space; Databases
Scroll down to “Information Systems/Computing”
The ACM Digital Library is located below the heading “Information Systems/Computing”.
Write a two to three (2-3) page paper in which you:
Recommend at least three (3) specific tasks that could be performed to improve the quality of datasets, using the Software Development Life Cycle (SDLC) methodology. Include a thorough description of each activity per each phase.
Recommend the actions that should be performed in order to optimize record selections and to improve database performance from a quantitative data quality assessment.
Suggest three (3) maintenance plans and three (3) activities that could be performed in order to improve data quality.
From the software development methodologies described in the article titled, “Process-centered Review of Object Oriented Software Development Methodologies,” complete the following.
Evaluate which method would be efficient for planning proactive concurrency control methods and lock granularities. Assess how your selected method can be used to minimize the database security risks that may occur within a multiuser environment.
Analyze how the verify method can be used to plan out system effectively and ensure that the number of transactions do not produce record-level locking while the database is in operation.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-7-discussion-questions-2-optimization-for-transactional-processing-recent
For more classes visit
http://www.uopassignments.com
STRAYER CIS 515 Week 7 Discussion Questions 2 Optimization for Transactional Processing NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-7-discussion-questions-2-optimization-for-transactional-processing-recent
For more classes visit
http://www.uopassignments.com
“Optimization for Transactional Processing” Please respond to the following:
Databases can grow in data structure and data capacity throughout time. At certain times, it is necessary to perform optimization techniques in order to ensure optimal performance of the database.
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-7-discussion-questions-1-concurrency-control-recent
For more classes visit
http://www.uopassignments.com
STRAYER CIS 515 Week 7 Discussion Questions 1 Concurrency Control NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-7-discussion-questions-1-concurrency-control-recent
For more classes visit
http://www.uopassignments.com
“Concurrency Control”
There are times when a database is accessed by many users across the enterprise. Transaction logs can help maintain concurrency in a multiuser platform. Describe at least two business scenarios where COMMIT and ROLLBACK would be required. Describe how these functions would be essential for business continuity and concurrency control. Identify how these functions would enable an organization to recover from a database corruption event.
Describe how locks could be used in order to qualify data transactions and enhance concurrency control. Suggest at least two business scenarios that would benefit from implementing locking methods.
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-6-discussion-questions-2-logical-and-physical-design-recent
For more classes visit
http://www.uopassignments.com
STRAYER CIS 515 Week 6 Discussion Questions 2 Logical and Physical Design NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-6-discussion-questions-2-logical-and-physical-design-recent
For more classes visit
http://www.uopassignments.com
“Logical and Physical Design” Please respond to the following:
In order to ensure optimal database performance, the logical and physical design should consider the user requirements thoroughly. Suppose you have been hired to transform a conceptual model into a logical model for a sales database. Describe the specific steps that you must perform in order to appropriately construct the database model. For each step mentioned, speculate the risks that would take place and how you would avoid or mitigate those risks.
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-7-assignment-6-sql-concepts-and-database-design-2-papers-recent
For more classes visit
http://www.uopassignments.com
STRAYER CIS 515 Week 7 Assignment 6 Sql Concepts And Database Design (2 Papers) NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-515-strayer/cis-515-week-7-assignment-6-sql-concepts-and-database-design-2-papers-recent
For more classes visit
http://www.uopassignments.com
This Tutorial contains 2 Papers
CIS 515 WEEK 7 ASSIGNMENT 6 SQL CONCEPTS AND DATABASE DESIGN
Assignment 6: SQL Concepts and Database Design
Due Week 7 and worth 90 points
The Strayer Oracle Server may be used to test and compile the SQL Queries developed for this assignment. Your instructor will provide you with login credentials to a Strayer University maintained Oracle server.
Imagine that you work for a finance industry-based organization. Your organization is looking to submit its database design documentation to an evaluation team in order to meet Sarbanes-Oxley (SOX) compliance. You have been assigned to assist in preparing the documentation of the organization’s sales database. You are asked to propose a data dictionary that can be used to document the following:
• Employee (EmpNumber, EmpFirstName, EmpLastName, CommissionRate, YrlySalary, DepartmentID, JobID)
• Invoice (InvNumber, InvDate, EmpNumber, InvAmount, CustomerID)
• InvoiceLine (InvLineNumber, InvNumber, ProductNumber, Quantity)
• Product (ProductNumber, ProductDescription, ProductCost)
• Department (DepartmentID, DepartmentDescription)
• Job (JobID, JobDescription)
• Customer (CustomerID, CustomerName, CustomerAddress, CustomerPhone)
Write a three to four (3-4) page paper in which you:
1. Create a data dictionary that includes the following:
1. A description of the content for each field
2. The data type of each field
3. The format the data will be stored as in the field
4. The range of value for the field
5. A label, as required, if the attribute is a primary key or foreign key
Note: An example is shown in Table 7.3 in chapter 7 of the textbook.
2. Imagine that you are asked to identify the number of days that exist between the first invoice and last invoice for each month and complete the following:
1. Construct a query that will show the number of days that exist between the first invoice and last invoice, for each month, for each employee, using the DATEDIFF function. Be sure to provide the SQL script that will carry out this function.
2. Construct a query to show the expected payment date if invoices are due within 30 days of transaction.
3. Construct a query that will show distinct area codes of the customers.
3. Create a plan of the necessary activities that would be required to implement a valid database design process by including the following:
1. Steps in the conceptual design stage
2. Steps in DBMS selection stage
3. Steps in logical design stage
4. Steps in physical design stage
5. Task details of each activity within each stage