A+ Work




This assessment addresses the following course outcomes: 
•  Assess common hardware and software issues by logically applying fundamental IT tools and methods 
•  Determine basic hardware and software options that meet general technology needs for organizations 
•  Illustrate appropriate network and multi-user operating system methods that support key business objectives 
•  Identify information security procedures that reflect best practices for managing access and reducing risk to digital information stores 
Scenario: You have been hired as an IT consultant by an entrepreneur starting a small advertising company called MilleniAds. As a start-up, your client’s company is relatively small and has a limited budget. There are only 10 employees, including a few creative directors, graphic designers, sales staff, a financial accountant, and an office administrator, with the entrepreneur acting as CEO. The current IT budget cannot exceed $25,000 and ideally should come in as far under that number as possible. MilleniAds will produce customized sales flyers, brochures, and other branded items, such as letterhead and business cards, that apply a youthful, fresh perspective targeting millennial demographics. Therefore, the company needs the ability to store and manipulate digital images and to produce physical copies of their products for their clients. The CEO wants to keep track of inventory, sales, and expenses digitally, but she does not anticipate having very complex records for the first year. She projects having only a dozen or so accounts but hopes to scale up in the coming years. It would be ideal to have a simple and user-friendly system for sharing information and files between employees. Many of the employees are millennials themselves who have indicated that their current desktop PCs are limiting their capabilities and that they prefer using their phones and other mobile devices for their professional and personal responsibilities. Two of the ten employees will operate primarily outside of the office, soliciting business from regional firms, and they will need to access company information while on the road, in their home offices, and at customer sites. 
Beyond the specific information given above, you have the ability to fill in the gaps with assumptions or additional details that will make your final project unique and meaningful to you. If you have any questions, reach out to your instructor for guidance, and use the milestone assignments to ensure that you are completing your project within reasonable parameters for the course. 
Prompt 
Given the scenario above, what are the best hardware, software, networking, and information security options for addressing your client’s business needs? 
Specifically, the following critical elements must be addressed: 
I. Business Needs: In this section, list and describe all of the business needs that you have been able to determine given the information in the provided scenario and your own choices for filling in the gaps. Be sure that you provide enough detail to fully support the rest of your report. 
II. Hardware Components 
a. Examine the business’s issues to determine specific hardware requirements. Based on these issues, what are the major categories and components of hardware that should be considered? Identify each of the applicable requirements (hard drive storage, video cards, etc.), being sure to cite specific examples wherever appropriate. 
b. Then, compare and contrast the various options for meeting the requirements. Be sure to cite specific evidence from the component specification fact sheets to support your evaluation. What are their functional strengths and weaknesses? How do they compare in terms of cost and maintainability? 
c. Compose a final list detailing all of your specific hardware recommendations for your client. Be sure to logically justify your proposal as the best possible choice for meeting the business requirements. 
III. Software Applications 
a. Examine the business’s issues to determine specific software requirements. What are the types of software applications that should be considered? Identify multiple possible options within each category, being sure to cite specific examples wherever appropriate. 
b. Then, compare and contrast the options you have listed. Be sure to cite specific evidence that supports your evaluation. What are their functional strengths and weaknesses? How do they compare in terms of cost, vendor credibility, multi-user access, technical support, and integration? 
c. Compose a final list detailing all of your specific software recommendations for your client. Be sure to logically justify your proposal as the best possible choice for meeting the business requirements. 
IV. Networking Options 
a. Examine the business’s issues to determine network requirements. Illustrate your response with specific examples. For example, to what extent should there be access inside the business for mobile devices and remote personnel? 
b. Then, compare and contrast the options for meeting the requirements. Be sure to cite specific evidence that supports your conclusions. How would you ensure security of information over the network? Which type of network connection is preferable? 
c. Make final recommendations for network solutions based on your evaluation of the options. Be sure to logically justify your proposal as the best possible choice for meeting the business requirements.  V. Maintenance and Security 
a. Interpret the business’s needs to determine specific information regarding security requirements. Illustrate your response with specific examples. To what extent should unauthorized individuals be prevented from making changes, copying, or deleting files or data on the system?
Is there sensitive data for which access must be controlled? What sort of information should be backed up? 
b. Then, compare and contrast the options for managing user access to company information. Evaluate each option for its strengths and weaknesses, citing specific evidence that supports your conclusions. Is there a need to have password setups for files? What type of naming conventions should the client use for files and directories? Should individual computer accounts be created? Should everyone have read access
to all files? 
c. Finally, compare and contrast the options for backing up and storing information, including how often to back up information, storage location, and who should have access to backing up the data. Evaluate each option for its strengths and weaknesses, citing specific evidence that supports your evaluation. 


Swagger Distribution Company




IT 200 Milestone One Guidelines and Rubric
Scenario: A new owner has purchased Swagger Distribution Company, a company that distributes clothing and apparel. She does not have experience with IT related problem solving, so she is contracting you, as an IT consultant, to help.

For Milestone One, you will submit a document summarizing the human-computer interface (HCI) and information management/database (IMD) using appropriate IT terminology. Take a moment to read the Final Project Guidelines and Rubric to see how the following information applies to the final project, and then proceed to do the following for Milestone One:
Human-Computer Interface (HCI): On a daily basis, Swagger Distribution’s employees log in to the company’s network and utilize many different types of software and the internet. They use Microsoft Word and Microsoft Visio daily.

For this area of the assignment:
 Summarize the human-computer interface (HCI) of these two software applications. Explain the importance of HCI and usability of the software.
 Be sure to note any commonalities between the applications and note any metaphors that are utilized.
 Suggest one enhancement to one of the two applications that would improve HCI, supported by at least two examples for the suggestion.
 Create a one-page tutorial for Microsoft Visio, including component screenshots, for new employees who are familiar with Microsoft Word but have never used Microsoft Visio. Cover at least two basic functions and/or menu options.
 Using circles or arrows and text to label them, point out five different components within Visio within an additional screenshot and briefly describe these components.


Databases: Swagger Distribution’s partners/customers include a variety of clothing companies. Swagger Distribution utilizes a database to store information on the partner companies and the orders that are received. You will review the provided database for Swagger Distribution and summarize what the tables contain and what the queries do. Be sure to apply key terms that you have learned such as “metadata.” Based on information provided, you will change one data type in one of the tables.
For this area of the assignment:
Open up each table in the database to look at the data and examine its formatting. Be sure to open each table in regular view and design view. Describe each table, the information it stores, and any data types present other than text.

Open up the table “Clothing Products” in design view. Change the data type of the “Retail Price” field from “text” to “Currency.” Now reopen the table “Clothing Products” in design view and notice the change. Provide a description of your actions and the results.
Run the query “Retail Purchases” by double-clicking on the query. Make note that it is an empty query and you will see no results. Open up the query in design view. Make note of the actions it is taking and how the tables are linked. Why does the query provide no results? Describe how the tables are linked together and what the query is doing.

 Open up the table “Retail Stores.” Make selections for each retailer in the “Clothing Item” field. Now close the table. Re-run the query “Retail Purchases.” Describe what these results represent. Add a screenshot of your results to your final submission for this milestone (Note: This screenshot should also reflect the changes you made when changing the “text“ data type to “currency”).

CSIA 485




CSIA 485 Project #1 Detailed Assignment Description
Read the Case Study posted for this assignment. Determine the information technology/security gaps and develop a security strategy that includes issues relating to confidentiality, integrity, and availability (CIA), and that includes the key elements relative to People, Process, and Technology.
Step 1: Describe the key issues/challenges/risks from this case study.
Step 2: Based on the information provided in the case study, describe and document the recommended security strategy to mitigate the issues/challenges identified.
Step 3: Describe the proposed security solutions and relationship to the case study.
Step 4: Document a detailed, proposed timeline for addressing each element of the strategy that you identify. Provide estimates for implementing recommended strategies, with rationale. Include what resources are necessary for completing each task in the timeline.
Step 5: Provide a high-level recommendation regarding the next steps to take in mitigating risks identified. 
The deliverable for this case study assignment will be a minimum 5 page, double-spaced paper using Times New Roman 12 font and APA style formatting for citations and references. It will also include a minimum of 5 references. The Title/Cover page, illustrations (tables/charts/graphs), or references are not part of the page count but are required for the assignment. The grading rubric provides additional details as to what should be included in the paper. Your instructor may provide an APA style template to use for this paper.

Alumni donations are an important source of revenue for colleges and universities




Alumni donations are an important source of revenue for colleges and universities. If admin- isffators could determine the factors that could lead to increases in the percentage of alumni who make a donation, they might be able to implement policies that could lead to increased revenues. Research shows that students who are more satisfied with their contact with teachers are more Likely to graduate. As a result, one might suspect that smaller class sizes and lower stu- dent/faculty ratios-might lead to a higher percentage of satisfied graduates, which in tum might lead to incieases in the percentage of alumni who make a donation. The following table shows
data for 4g national universities. The Graduation Rate column is the percentage of students who initially enrolled at the university and graduated. The % of Classes Under 20 column shows the p"r""rrug", of classes offered with fewer than 20 students. The Student/Faculty Ratio column L the number of students enrolled divided by the total number of faculty' Finally, the Alumni Giving Rate column is the percentage of alumni who made a donation to the universify'
Based on the data provided please complete the following:

1. Use methods of descriptive statistics to summarize the data.



2. Develop an estimated simple linear regression model that can be used to predict the alumni giving rate , given the graduation rate. Discuss your findings.



3. Develop an estimated multiple linear regression model that could be used to predict the alumni giving rate using the graduation rate , % of classes under 20 and student/ faculty ratio as independent variables . Discuss your findings
4.Based on the results in part 2 and 3 , do you believe another regression model maybe more appropriate ? Estimate this model and discuss your results
5. What conclusions and recommendations can you derive from your analysis?What universities are achieving a substantially higher alumni giving rate than would be expected ,given their graduation rate , % of classes under 20 , and student/faculty ratio ? What universities are achieving a substantially lower alumni giving rate than would be expected ,given their graduation rate , % of class under 20, and student/faculty ratio?What other independent variables could be included in the model ?

The vintage restaurant, on CaptivaIsland near Fort Myers




The vintage restaurant, on CaptivaIsland near Fort Myers, Florida, is owned and operated by Karen Payne. The restaurant just completed its third year of operation. During that time, Karen sought to establish a reputation for the restaurant as a high-quality dining establishment that specializes in fresh seafood. Through the efforts of Karen and her staff, her restaurant has become one of the best and fastest-growing restaurants on the island. To better plan for future growth of the restaurant, Karen needs to develop a system that will enable her to forecast food and beverage sales by month for up to one year in advance.
Table 15.17 shows the value of food and beverage sales ($1000s) for the first three years of operation. managerial report Perform an analysis of the sales data for the vintage restaurant.
VINTAGE RESTAURANT CASE






Sales (in $1000s)
MONTH
First Year
Second Year
Third Year
January
242
263
282
February
235
238
255
March
232
247
265
April
178
193
205
May
184
193
210
June
140
149
160
July
145
157
166
August
152
161
174
September
110
122
126
October
130
130
148
November
152
167
173
December
206
230
235
Prepare a report for Karen that summarizes your findings, forecasts, and recommendations. Include the following: 1. a time series plot. Comment on the underlying pattern in the time series. 2. Using the dummy variable approach, forecast sales for January through December of the fourth year. Assume that January sales for the fourth year turn out to be $295,000. What was your forecast error? If this error is large, Karen may be puzzled about the difference between your forecast and the actual sales value. What can you do to resolve her uncertainty in the forecasting procedure?

ACG 4253 WRITING PROJECT AND PRESENTATION




ACG 4253 WRITING PROJECT AND PRESENTATION

PROJECT INFORMATION:

Select one of the 5 foreign countries we have studied this term: China, Germany, Japan, Mexico or the UnitedKingdom, and provide a country profile discussing the topics outlined below. In addition, using EDGAR (http://www.sec.gov/edgar.shtml), find the non-U.S. GAAP financial statements for a company from that country.

COURSE OBJECTIVES COVERED: 1-4

PROJECT REQUIREMENTS:

Based on your readings, use of technology, research of literature, and other sources make sure your project includes the following: 

Prepare a 4-5 page analysis of the country you chose discussing the following: 

The accounting profession in your selected country

The accounting standard setting process in that country

Two financial reportingstandards that differ from those of U.S. GAAP

National characteristics unique to the country that influence accounting 

For the two financial reporting standards identified in your paper, use Excel to create an applicable supporting schedule that provides an example of the adjustments that would need to be made to your foreign company’s financial statements for it to comply with U.S. GAAP. 

WRITING REQUIREMENTS:

The report should be 4-5 pages in total (not including cover page, abstract, or references)

Include the Excel spreadsheet(s) as exhibits in your paper

Include a minimum of 2 scholarly sources from EDGAR resource and FASB proposed standard.

All sources used are to be cited in APA format

TECHNOLOGY/COLLABORATIVE ACTIVITY:

You will be using Excel to create the exhibit to your paper

You will be presenting your findings from the project to the class using PowerPoint.

CMIS 330 SRS Project




CMIS 330 SRS Project
Scenario
You have been asked to lead a software development team to build a system fulfilling the Statement of Need below. Your team is employed by a small company. The customer wants a project that balances reasonable development cost, timely delivery, software quality, and functionality.
 In this project, you will perform preliminary system engineering and create an analysis model for this system. (See Module 3: Methodologies and Application Domain Issues, Figure 3.1 of the course module commentaries for an overview of the elements of an analysis model). Completing this project will require that you do the following:
 Develop initial notes of the structure/functionality of the system.
 Produce an initial system specification document for the system.
 Develop a detailed scenario based model by writing use cases and develop an activity diagram.
 Create a behavioral model that identifies events with a use case
 Produce a software requirements specification (SRS)
 Your SRS will provide the foundation for Projects 2 through 4, so it must:
 Describe the customer requirements
 Establish the basis for software design
 Be testable, flexible, and traceable.
 Statement of Need
John and Jane are starting a bed-and-breakfast (B&B) in a small New England town. They will have four bedrooms for guests. They want a system to manage the reservations and to monitor expenses and profits. When a potential customer calls for a reservation, they will check the calendar, and if there is a vacancy, they will enter the customer name, address, and phone number, dates, agreed upon price, credit card number, and room numbers. Reservations must be guaranteed by 1 day’s payment.
Reservations will be held without guarantee for an agreed upon time. If not guaranteed by that date,
the reservation will be dropped.
 SRS Template
Please use the IEEE template to develop your SRS. The IEEE Std 830-1998: IEEE recommended practice for software requirements specifications is posted in the Course Resources -> Reserved Readings section in the classroom. The entire outline for the SRS is provided in section 5, Figure 1 of the IEEE Std document.  Familiarize yourself with the type of information and diagrams to be provided in a SRS.
 You may follow either of two paths; Structured Analysis/Design (SSA/D) methodology (i.e.
organize your requirements by functional hierarchy) or Object-Oriented Analysis/Design
(OOA/D) methodology (i.e. organize your requirements by objects). The contents of your SRS
will be somewhat dependent upon this choice.
 Look at the IEEE Standard 830 - 1998 Annex A. Annex A has suggested formats for your SRS. If you are following the SSA/D methodology, use template A.7. For OOA/D, use A.4.
o Template A.4 allows you to organize your requirements by objects. For example, objects
in a patient monitoring system include patients, sensors, nurses, physicians, medicines, etc. Each object has a set of attributes and each object performs a set of functions, services, methods, or processes. Note that objects may share attributes and services that can be grouped together as classes.
o Template A.7 allows to organize your requirements into a hierarchy of functions
organized by either common inputs, common outputs, or common internal data access.
You will then use Data Flow Diagrams (DFDs) and data dictionaries to show the
relationships between and among the functions and data.
Note: Whatever your choice, you must address and write section 3 of the template (figure 1) to
successfully address the requirements for project 1. For additional context please see the SRS Outline and the Outline Explanation depicted in Annex A of the IEEE Std 1233-1998: IEEE Guide for Developing System Requirements Specification. You can use this to further inform and flesh out the development of your A.4 or A.7 template as appropriate.  
Make any reasonable assumptions based on your understanding of the problem that allow you to
address as many sections of your chosen SRS template as possible. I do not expect, or require, that you completely address all sections of the template. However, your SRS must address, and be built around, the required deliverables specified below. (You must incorporate the below requirements into the appropriate sections of your SRS).
  The assignment

1. Demonstrate your understanding of the customer’s statement of need by producing a
preliminary documentation of the structure/functionality of John and Jane’s B&B. (This is how
you shall include the essential components of an SS into your SRS). The basic objective here is
to address the question “What is this system supposed to do”?
 Identify, describe, and arrange in a structured manner, the features the system must have and
the functions it must perform to satisfy John and Jane’s expressed need. Identify the expected
performance and any anticipated constraints of the system. Much of this information should fit
into the introductory and system functionality/description sections of the SRS. (See sections
5.1.1 (Purpose) and 5.1.2 (Scope) of the IEEE standard 830-1998). Note that sections 5.1.1 and
5.1.2 provide guidance on how to complete sections 1.1 and 1.2 of the SRS outline shown in
figure 1.
2. Pay special attention to the following required deliverables on which the bulk of your grade will
be decided. (Please read the “project descriptions” in the project description section of the
syllabus for additional context and information on course projects).
 Produce a context-level (Level 0) Data Flow Diagram (DFD) for the B&B. The context level 0 DFD focuses on the flow of data through a system. (See Module 2: Requirements Engineering and
Modeling, Figure 2.7 of the course module commentaries for an example of a context diagram).
 Refine your DFD to level 1. (See Module 3: Methodologies and Application Domain Issues,
Figure 3.4 of the course module commentaries for an example of Level 1 and Level 2 DFDs). It
may also be necessary to include process specifications to ensure that your DFD is defined to the
lowest possible specification for design. If you prefer an object-oriented approach, you may
supplement your use cases by using an activity diagram to depict the flow of interaction within
a specific scenario.
o The level 0 and Level 1 DFDs depict the basic components of the IT system you will develop and its internal and external interfaces.
o Produce a class diagram, or an Entity Relationship Diagram (ERD) of the B&B to describe your system’s data and its interrelationships. (See Module 2: Requirements Engineering and Modeling, Figure 2.8 of the course module commentaries for an example of a class diagram).
 A class diagram models the objects that the system will manipulate and the operations that that will be applied to the data objects. You want to ensure that it properly supports your use cases and DFDs by capturing the attributes and behaviors of the objects that the system users (actors) must manipulate as they interact with the system and/or perform the operations implied by the
functions/processes in your DFDs.
 Identify the customers, users, and other stakeholders of the B&B system. (See Module 2: Requirements Engineering and Modeling, Figure 2.1 of the course module 2 commentaries for how defining the users help in eliciting requirements for a system). Produce a use case diagram for B&B (See Module 2: Requirements Engineering and Modeling, Figure 2.6 and Table 2.2 of the course module commentaries for examples of use cases and use case diagrams).
Use the module 2, Table 2.3 of the course module commentaries to develop (at least two) scenarios for the system.
 Produce a state diagram for the B&B. (See Module 3: Methodologies and Application Domain Issues, Figure 3.5 of the course module commentaries for an example state transition diagram).
3. Document is well-organized, contains minimal spelling and grammatical errors.
You should name the file yournameSRS.docx (or yournameSRS.pdf). So if my name was Julie Smith, I would name my document juliesmithSRS.docx.
Your name should be clearly listed on the first page along with the class/section, professor and due
date. 
Your document should contain page numbers at the bottom of each page. Single or double space
line formatting is acceptable. All references used for your report should be included in APA style
format. See the following APA reference guide for details on how to cite your references: 
 See Module 1(Introduction to Software Engineering), Table 1.1 of course module commentaries for some guidance on how to incorporate the above diagrams into your SRS.