Term Paper 10-15 pages

Term Paper: Mobile Computing and Social Networks
Due Week 10 and worth 200 points
There are thousands of iPhone Apps, iPad Apps, and Android Apps that have been developed to perform a myriad of tasks and processes. Initially, most of these applications were games intended to be played on mobile devices. The popularity of these applications led businesses to ponder whether some of their business process applications that run on desktop platforms and the Web could be redesigned to run on mobile devices. The answer was a resounding yes! For example, Nationwide developed the Nationwide® Mobile, a free iPhone App that allows its insurance policyholders to file a claim on the spot when an accident occurs. The application can snap pictures of the accident and attach them to the claim data and upload the claim information to a server. This reduces the length of time to process a claim filed this way. Nationwide competitors have followed suit and developed iPhone, iPad, and Android applications of their own. Policyholders can receive messages via Facebook or Twitter. Other business processes that have been reengineered as a result of mobile computing include Quick Response (QR) codes which have replaced one-dimensional bar codes. They are read using mobile devices, accepting credit card payments from an iPhone, iPad or Android device, depositing checks using an iPhone without visiting a bank, and many more. Write a ten to fifteen (10-15) page term paper in which you:

  • Assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system.
  • Evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications.
  • Examine the challenges of developing applications that run on mobile devices because of the small screen size.
  • Describe the methods that can be used to decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android.
  • Mobile applications require high availability because end users need to have continuous access to IT and IS systems.
  • Discuss ways of providing high availability.
  • Mobile devices are subjected to hacking at a higher rate than non-mobile devices. Discuss methods of making mobile devices more secure.
  • Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Explain how the components of an information technology system interrelate in an organizational context.
  • Describe the use of network management, Web, wireless, and mobility technologies.
  • Describe and identify the uses of business process management and systems development.
  • Use technology and information resources to research issues in information systems and technology.
  • Write clearly and concisely about topics related to information systems for decision making using proper writing mechanics and technical style conventions.

ISFM-300 Case Study, Stage 2: Business Process Analysis and Functional Requirements

Overview of Business Process Analysis and Functional Requirements for UMUC Haircuts

For your Case Study Stage 1 assignment, you performed a Five Forces Analysis and justified Myra’s chosen strategy for competitive advantage and the business process that she would like to improve through the application of technology.

In the Stage 2 assignment, you will identify the inputs, processing, and outputs of Myra’s selected business process.  Those inputs, processing, and outputs form the functional (business) requirements for an IT system to improve the process. 

The first step in identifying the functional or business requirements for an information system is to develop the high level requirements that establish the scope of the system.  Myra has selected the Customer and Employee Scheduling Process for improvement using an IT solution, and together you have identified the following high level requirements.  The system must:

·         Allow employees to enter their availability and desired days/times to work

·         Allow Myra to review the employee requests and develop a schedule

·         Make the schedule available to employees to review their final work schedule

·         Make the employee schedule available for staff to enter customer appointments

·         Allow Myra and the staff to enter customer appointments

·         Keep track of customer appointments, including stylist and service performed

·         Accommodate changes in the employee schedules and customer appointments, and update the schedule accordingly

·         Accommodate changes in the customer information stored in the system

·         Provide management reports to Myra showing employee workload, customers served, customer contact information, busy times/days, etc.

For this assignment, you will focus on the customer appointment portion of the overall process. The high level requirements are not detailed enough to be used as the functional or business requirements.  More detailed requirements are developed using a variety of tools and methods.  One such tool is a process model.  The process model shows the steps in the customer appointment process.  In a process model, rectangles are used to illustrate process steps and diamonds are used where decisions, or choices, are made.  You need to be aware that there are other aspects of the process to be considered, as shown in the high level requirements above.  The points at which these additional steps intersect with the customer appointment process are shown in the process model with a circle.

Customer Appointment Process Model:  The Customer Appointment Process model is separately provided as an Excel file, labeled “Stage 2 Customer Appointment Process Model.”

Assignment: UMUC Haircuts Stage 2:  Using the Customer Appointment Process Model, create a document that includes:

I.            Introduction

At the top of your paper, show the strategy for competitive advantage that Myra selected and the business process she has chosen to improve, using the following format (no additional explanation is required):

Generic Strategy for Competitive Advantage:    xxxxxxx (just name the strategy)

Business Process to Be Improved:    xxxxxxxxx (just name the process)

II.          Table of Functional (Business) Requirements

Copy the table below into your paper.  Using the Customer Appointment Process Model provided complete the table of requirements for an IT system, for each of the numbered process steps, that includes:

·         the inputs to the process – include specific items of information or data elements (for example, customer name) entered into the system as part of the process step

·         processing or actions that the system takes (for example, check calendar to let person know if UMUC Haircuts is open at the specified time)

·         outputs of the process – include specific items of information or data elements (for example, appointment date) that the system will display or print out for the user to see

Note:  This is not about what the employee or customer is doing but specifically about data into the system (input), the system does something with that data (process) to deliver the end result (output)

There are 7 numbered steps in the Appointment Process itself.  In addition, there are two other processes that are needed (numbered 8 and 9), but are beyond the scope of the appointment process:  a process for entering the time needed and costs for the various styling services – here you’re building a database or table for reference in future transactions; and the payment process that collects customer payments and updates the database accordingly.  For these two processes, you should also identify the input needed for the system, what the system is to do with that input (process) and what output the system will need to create or display either immediately or later.

The responses that you enter into the table for each requirement must be aligned to the specific business process to be improved and the data it uses, and it must be appropriate to the UMUC Haircuts business.

Note:  Processes are actions that the system will take and should include action verbs.  Inputs and outputs are not actions, but are data or information.  If you need to use action words (verbs) to describe the input or output, they should be kept to a minimum and put in parentheses.

 

 

Table of Functional (Business) Requirements

Steps in the Appointment Process

 

Process Step

Step from Customer Appointment Process Model

(insert information from numbered step

Input

Information/data item(s) entered into the system as part of this step

Process

Processing oraction the system must perform for this step

Output

Information/data item(s)/record created, or displayed, or printed out for the user in this step

1

 

 

 

 

2

 

 

 

 

3

 

 

 

 

4

 

 

 

 

5

 

 

 

 

6

 

 

 

 

7

 

 

 

 

8

 

 

 

 

9

 

 

 

 

 

EXAMPLE Using the Employee Scheduling Process

The example below demonstrates what is required for the assignment, using the Employee Scheduling Process, which is shown in a circle in the Customer Appointment Process Model.  The process model for this example is separately provided as an Excel file named “Stage 2 Example – Scheduling Process Model.”  The entries in the table correspond with the numbered process steps in the model.

Table of Functional (Business) Requirements

Steps in the Employee Scheduling Process

 

Process Step

Step from Customer Appointment Process Model

(insert information from numbered step

Input

Information/data item(s) entered into the system as part of this step

Process

Processing oraction the system must perform for this step

Output

Information/ data item(s)/record created, or displayed, or printed out for the user in this step

1

Employee logs into the System

 

User ID and password

Verify user id and password against security database

“Welcome” screen or “Invalid User ID and Password” message

2

Employee reviews customer appointments

 

Employee name, dates

Locate and present appointment dates for the employee

Appointment dates for employee

3

Employee enter dates/times available for work

 

Dates and times available for work (employee name entered in step 2)

Record dates and times employee is available for work

Confirmation that dates and times have been saved

Formatting:  

For academic writing, the writer is expected to write in the third person. In third person, the writer avoids the pronouns I, we, my, and our. The third person is used to make the writing more objective by taking the individual, the “self,” out of the writing. This method is very helpful for academic writing, a form in which facts, not opinion, drive the tone of the text. Writing in the third person allows the writer to come across as unbiased and thus more informed.

 

ISFM-300 Case Study, Stage 3 IT Requirements

Before you begin this assignment, be sure you:

1.    Have completed all previously assigned readings, particularly those assigned in Weeks 3 and 4 of the class.

2.    Re-read the “UMUC Haircuts Case Study” and the Stage 1 & 2 assignments, and review the “Walmart Example.”

3.    Review Instructor feedback from previous assignment submissions.

Text Box: Purpose of this Assignment  This assignment gives you the opportunity to apply your knowledge of the course concepts to develop IT requirements for a technology solution. This assignment specifically addresses the following course outcomes to enable you to:  • analyze internal and external business processes to identify information systems requirements  • identify and plan IT solutions that meet business objectives 

 

 

 

 

 

 

Overview of IT Requirements for a System to Improve the Process at UMUC Haircuts

For your Case Study Stage 1 assignment, you performed a Five Forces Analysis and justified Myra’s chosen strategy for competitive advantage and the business process that she would like to improve through the application of technology.

For your Stage 2 assignment, you identified the inputs, processing, and outputs of Myra’s selected business process.  Those inputs, processing, and outputs form the functional (business) requirements for an IT system to improve the process. 

In Stage 3, you will define the IT requirements by evaluating their applicability and importance in a new system to be implemented to improve the identified business process for UMUC Haircuts.  The requirements that are identified as relevant to the business process will form the IT (technical) requirements for a system.  In evaluating and selecting an IT system, both the functional (business) requirements and the IT requirements need to be considered.  The areas that need to be considered in developing the IT requirements are listed below in the Table of IT Requirements.  Depending on the specific process being improved and the data it uses, the areas listed will vary in both relevance and importance.  For example, in a system to handle applications for Social Security, security and privacy are extremely important; but for a system to list what movies are being shown, privacy is not applicable at all. Your analysis must relate to the process Myra seeks to improve.  

When both the functional (business) and technical (IT) requirements are identified, the system requirements are complete enough that you can then begin looking for a specific solution to meet the needs of UMUC Haircuts.  Researching and finding an appropriate system to improve the process at UMUC Haircuts will be done in Stage 4.

Analysis of IT Requirements:

·         IT Requirement:  The areas to be considered are listed in the table.  Be sure to research each term to ensure understanding as to whether and how it would apply to the UMUC Haircuts process being improved and the data it uses.  A table of sources of the definitions of the requirements is provided below to assist you.  Be sure you use a definition that applies to IT and this assignment, and not a generic definition of the term.

·         Rankings: High/Medium/Low Importance or Relevance or Not Applicable (N/A):  You will rank each requirement as to how important or relevant it is to the process being improved and the data it uses.  Each will be ranked as High, Medium or Low, or Not Applicable to the process and its data.

·         Explanation of Ranking:  Using the definition of the term you researched and the ranking you selected, provide an explanation and tell how this requirement applies to the UMUC Haircuts process and the data it uses, or why it does not apply.  All requirements must be ranked and a thorough explanation that demonstrates understanding of the topic must be provided.  Please note that even N/A items require an explanation.  A minimum of three good sentences should be used for each explanation. 

The responses that you enter into the table for each requirement must be aligned to the specific business process to be improved and the data it uses, and must be appropriate to the UMUC Haircuts business.  Be sure to consider the type of data (inputs and outputs – from Stage 2) that the system will handle as you determine the applicability and importance of each consideration.  If a requirement is not relevant to the process, mark it “N/A.”  Remember to provide a thorough explanation for every item under consideration, including those marked N/A.

Do not try to create a reason if there is none, but carefully analyze each requirement and determine whether it applies and how.  Explanations must provide enough information to convey the reasoning behind the ranking and to demonstrate that you understand the requirement.  DO NOT copy definitions into the table; use your own words to explain the terms. 

 

Example:  If the process to be improved is the method for customers to use to pay for their haircuts or salon visits, then for the requirement of Usability, the following might be entered.  Note the thorough explanation of the ranking that demonstrates an understanding of usability.

Requirement

 

High/Medium/Low Importance or Relevance or Not Applicable (N/A)

Explanation for Ranking

Usability

High

Since the customers will use a system to make their payments, it must be easy to understand and easy to use.  It would be inappropriate to require any training for customers.  If it is too complicated, customers will not use it. In addition, front desk staff should be able to easily learn the system without extensive training.  That is an entry level job with frequent turnover.so having a system that is intuitive and easy to navigate is critical.

 

 

 

 

 

 

Course Resources (for Weeks 1-5)

Where to find the definitions of IT Requirements

 

Usability

System Quality Attributes  (Week3)

Maintainability

System Quality Attributes  (Week3)

Scalability 

System Quality Attributes  (Week3)

Reliability 

System Quality Attributes  (Week3)

Availability

System Quality Attributes  (Week3)

Performance

System Quality Attributes  (Week3)

Security

System Quality Attributes  (Week3)

Data Accuracy

Characteristics of Data Quality (Week 4)

Data Completeness

Characteristics of Data Quality (Week 4)

Authentication

Chapter 6 (Week 4)

Enterprise Systems (ERP, CRM, SCM) 

Chapter 3 (Week 3), various Week 5 readings

Networks

Chapter 5 (Week 3) 

Database

Chapter 4 (Week 4)

Data Warehouse

Chapter 4 (Week 4)

Data Mining

Chapter 4 (Week 4)

Business Intelligence

Chapter 4 (Week 4)

Decision Support System

Chapter 7 (Week 1)

Business-to-Business eCommerce

Various readings (Week 2)

Business-to-Consumer eCommerce

Various readings (Week 2)

 

Assignment: UMUC Haircuts Stage 3:  Create a document that includes:

I.             Introduction

At the top of your paper, show the generic strategy for competitive advantage that Myra selected and the business process she has chosen to improve (see the Stage 1 assignment), using the following format:

 

Generic Strategy for Competitive Advantage:    xxxxxxx (just name the strategy)

Business Process to Be Improved:    xxxxxxxxx (just name the process)

II.           Table of IT Requirements

·         Copy the table below into your paper.

·         Rank each requirement as High, Medium or Low in Importance/Relevance or Not Applicable (N/A) to a system to improve the process,

·         Explain each ranking, as described in the table, including explanations for N/A.

·         Definitions of the IT requirements are listed in Course Resources table above.

 

 

IT Requirement

 

Importance/
Relevance

High,
Medium,
Low, or

Not Applicable (N/A)

Explanation for Ranking

(Write a minimum of 3 good sentences for each; both the process to be improved and the case study should be mentioned in each explanation; the data used in the process should be included in the explanation where applicable.)

1

Usability

 

 

2

Maintainability

 

 

3

Scalability

 

 

4

Reliability/ Availability

 

 

5

Extensibility

 

 

6

Portability

 

 

7

Security

 

 

8

Data Accuracy

 

 

9

Data Completeness

 

 

10

Authentication

 

 

11

Enterprise Systems (ERP, CRM, SCM)

 

 

12

Networks

 

 

13

Database

 

 

14

Data Warehouse

 

 

15

Data Mining

 

 

16

Business Intelligence

 

 

17

Decision Support System

 

 

18

Business-to-Business eCommerce

 

 

19

Business-to-Consumer eCommerce

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Formatting: 

 

For academic writing, the writer is expected to write in the third person. In third person, the writer avoids the pronouns I, we, my, and our. The third person is used to make the writing more objective by taking the individual, the “self,” out of the writing. This method is very helpful for academic writing, a form in which facts, not opinion, drive the tone of the text. Writing in the third person allows the writer to come across as unbiased and thus more informed.

 

·         Submit one document that includes the Table of Requirements.

·         Table entries should be single spaced.

·         Use APA formatted citations and references for any external sources used.

·         Include a title page, and a reference page if references are included.

·         Compare your final work to the rubric to be sure you have met content and quality criteria. 

·         Submit your paper as a Word document, or a document that can be read in Word. 

·         Your submission should include your last name first  in the filename:     Lastname_firstname_Stage _3

Case Study for IST 7100

1.How effective is the partnership between IT and the business at Hefty Hardware? Identify the shortcomings of both IT and the business.

2. Create a written plan for how IT and the business can work collaboratively to deliver the Savvy Store program successfully.

Both answers to the questions should be well written and well thought out. This should be two- three well written paragraphs for each question. Please submit the aforementioned assignment as ONE document.To help keep the various reporting and relationship roles straight, I have attached the organization chart.  

[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves/> <w:TrackFormatting/> <w:PunctuationKerning/> <w:ValidateAgainstSchemas/> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF/> <w:LidThemeOther>EN-US</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables/> <w:SnapToGridInCell/> <w:WrapTextWithPunct/> <w:UseAsianBreakRules/> <w:DontGrowAutofit/> <w:SplitPgBreakAndParaMark/> <w:DontVertAlignCellWithSp/> <w:DontBreakConstrainedForcedTables/> <w:DontVertAlignInTxbx/> <w:Word11KerningPairs/> <w:CachedColBalance/> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> <m:mathPr> <m:mathFont m:val=”Cambria Math”/> <m:brkBin m:val=”before”/> <m:brkBinSub m:val=”--“/> <m:smallFrac m:val=”off”/> <m:dispDef/> <m:lMargin m:val=”0″/> <m:rMargin m:val=”0″/> <m:defJc m:val=”centerGroup”/> <m:wrapIndent m:val=”1440″/> <m:intLim m:val=”subSup”/> <m:naryLim m:val=”undOvr”/> </m:mathPr></w:WordDocument> </xml><![endif]

[if gte mso 9]><xml> <w:LatentStyles DefLockedState=”false” DefUnhideWhenUsed=”true” DefSemiHidden=”true” DefQFormat=”false” DefPriority=”99″ LatentStyleCount=”267″> <w:LsdException Locked=”false” Priority=”0″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Normal”/> <w:LsdException Locked=”false” Priority=”9″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”heading 1″/> <w:LsdException Locked=”false” Priority=”9″ QFormat=”true” Name=”heading 2″/> <w:LsdException Locked=”false” Priority=”9″ QFormat=”true” Name=”heading 3″/> <w:LsdException Locked=”false” Priority=”9″ QFormat=”true” Name=”heading 4″/> <w:LsdException Locked=”false” Priority=”9″ QFormat=”true” Name=”heading 5″/> <w:LsdException Locked=”false” Priority=”9″ QFormat=”true” Name=”heading 6″/> <w:LsdException Locked=”false” Priority=”9″ QFormat=”true” Name=”heading 7″/> <w:LsdException Locked=”false” Priority=”9″ QFormat=”true” Name=”heading 8″/> <w:LsdException Locked=”false” Priority=”9″ QFormat=”true” Name=”heading 9″/> <w:LsdException Locked=”false” Priority=”39″ Name=”toc 1″/> <w:LsdException Locked=”false” Priority=”39″ Name=”toc 2″/> <w:LsdException Locked=”false” Priority=”39″ Name=”toc 3″/> <w:LsdException Locked=”false” Priority=”39″ Name=”toc 4″/> <w:LsdException Locked=”false” Priority=”39″ Name=”toc 5″/> <w:LsdException Locked=”false” Priority=”39″ Name=”toc 6″/> <w:LsdException Locked=”false” Priority=”39″ Name=”toc 7″/> <w:LsdException Locked=”false” Priority=”39″ Name=”toc 8″/> <w:LsdException Locked=”false” Priority=”39″ Name=”toc 9″/> <w:LsdException Locked=”false” Priority=”35″ QFormat=”true” Name=”caption”/> <w:LsdException Locked=”false” Priority=”10″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Title”/> <w:LsdException Locked=”false” Priority=”1″ Name=”Default Paragraph Font”/> <w:LsdException Locked=”false” Priority=”11″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Subtitle”/> <w:LsdException Locked=”false” Priority=”22″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Strong”/> <w:LsdException Locked=”false” Priority=”20″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Emphasis”/> <w:LsdException Locked=”false” Priority=”59″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Table Grid”/> <w:LsdException Locked=”false” UnhideWhenUsed=”false” Name=”Placeholder Text”/> <w:LsdException Locked=”false” Priority=”1″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”No Spacing”/> <w:LsdException Locked=”false” Priority=”60″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Shading”/> <w:LsdException Locked=”false” Priority=”61″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light List”/> <w:LsdException Locked=”false” Priority=”62″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Grid”/> <w:LsdException Locked=”false” Priority=”63″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 1″/> <w:LsdException Locked=”false” Priority=”64″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 2″/> <w:LsdException Locked=”false” Priority=”65″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 1″/> <w:LsdException Locked=”false” Priority=”66″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 2″/> <w:LsdException Locked=”false” Priority=”67″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 1″/> <w:LsdException Locked=”false” Priority=”68″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 2″/> <w:LsdException Locked=”false” Priority=”69″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 3″/> <w:LsdException Locked=”false” Priority=”70″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Dark List”/> <w:LsdException Locked=”false” Priority=”71″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Shading”/> <w:LsdException Locked=”false” Priority=”72″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful List”/> <w:LsdException Locked=”false” Priority=”73″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Grid”/> <w:LsdException Locked=”false” Priority=”60″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Shading Accent 1″/> <w:LsdException Locked=”false” Priority=”61″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light List Accent 1″/> <w:LsdException Locked=”false” Priority=”62″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Grid Accent 1″/> <w:LsdException Locked=”false” Priority=”63″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 1 Accent 1″/> <w:LsdException Locked=”false” Priority=”64″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 2 Accent 1″/> <w:LsdException Locked=”false” Priority=”65″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 1 Accent 1″/> <w:LsdException Locked=”false” UnhideWhenUsed=”false” Name=”Revision”/> <w:LsdException Locked=”false” Priority=”34″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”List Paragraph”/> <w:LsdException Locked=”false” Priority=”29″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Quote”/> <w:LsdException Locked=”false” Priority=”30″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Intense Quote”/> <w:LsdException Locked=”false” Priority=”66″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 2 Accent 1″/> <w:LsdException Locked=”false” Priority=”67″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 1 Accent 1″/> <w:LsdException Locked=”false” Priority=”68″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 2 Accent 1″/> <w:LsdException Locked=”false” Priority=”69″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 3 Accent 1″/> <w:LsdException Locked=”false” Priority=”70″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Dark List Accent 1″/> <w:LsdException Locked=”false” Priority=”71″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Shading Accent 1″/> <w:LsdException Locked=”false” Priority=”72″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful List Accent 1″/> <w:LsdException Locked=”false” Priority=”73″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Grid Accent 1″/> <w:LsdException Locked=”false” Priority=”60″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Shading Accent 2″/> <w:LsdException Locked=”false” Priority=”61″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light List Accent 2″/> <w:LsdException Locked=”false” Priority=”62″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Grid Accent 2″/> <w:LsdException Locked=”false” Priority=”63″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 1 Accent 2″/> <w:LsdException Locked=”false” Priority=”64″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 2 Accent 2″/> <w:LsdException Locked=”false” Priority=”65″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 1 Accent 2″/> <w:LsdException Locked=”false” Priority=”66″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 2 Accent 2″/> <w:LsdException Locked=”false” Priority=”67″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 1 Accent 2″/> <w:LsdException Locked=”false” Priority=”68″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 2 Accent 2″/> <w:LsdException Locked=”false” Priority=”69″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 3 Accent 2″/> <w:LsdException Locked=”false” Priority=”70″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Dark List Accent 2″/> <w:LsdException Locked=”false” Priority=”71″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Shading Accent 2″/> <w:LsdException Locked=”false” Priority=”72″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful List Accent 2″/> <w:LsdException Locked=”false” Priority=”73″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Grid Accent 2″/> <w:LsdException Locked=”false” Priority=”60″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Shading Accent 3″/> <w:LsdException Locked=”false” Priority=”61″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light List Accent 3″/> <w:LsdException Locked=”false” Priority=”62″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Grid Accent 3″/> <w:LsdException Locked=”false” Priority=”63″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 1 Accent 3″/> <w:LsdException Locked=”false” Priority=”64″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 2 Accent 3″/> <w:LsdException Locked=”false” Priority=”65″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 1 Accent 3″/> <w:LsdException Locked=”false” Priority=”66″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 2 Accent 3″/> <w:LsdException Locked=”false” Priority=”67″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 1 Accent 3″/> <w:LsdException Locked=”false” Priority=”68″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 2 Accent 3″/> <w:LsdException Locked=”false” Priority=”69″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 3 Accent 3″/> <w:LsdException Locked=”false” Priority=”70″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Dark List Accent 3″/> <w:LsdException Locked=”false” Priority=”71″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Shading Accent 3″/> <w:LsdException Locked=”false” Priority=”72″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful List Accent 3″/> <w:LsdException Locked=”false” Priority=”73″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Grid Accent 3″/> <w:LsdException Locked=”false” Priority=”60″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Shading Accent 4″/> <w:LsdException Locked=”false” Priority=”61″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light List Accent 4″/> <w:LsdException Locked=”false” Priority=”62″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Grid Accent 4″/> <w:LsdException Locked=”false” Priority=”63″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 1 Accent 4″/> <w:LsdException Locked=”false” Priority=”64″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 2 Accent 4″/> <w:LsdException Locked=”false” Priority=”65″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 1 Accent 4″/> <w:LsdException Locked=”false” Priority=”66″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 2 Accent 4″/> <w:LsdException Locked=”false” Priority=”67″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 1 Accent 4″/> <w:LsdException Locked=”false” Priority=”68″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 2 Accent 4″/> <w:LsdException Locked=”false” Priority=”69″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 3 Accent 4″/> <w:LsdException Locked=”false” Priority=”70″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Dark List Accent 4″/> <w:LsdException Locked=”false” Priority=”71″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Shading Accent 4″/> <w:LsdException Locked=”false” Priority=”72″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful List Accent 4″/> <w:LsdException Locked=”false” Priority=”73″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Grid Accent 4″/> <w:LsdException Locked=”false” Priority=”60″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Shading Accent 5″/> <w:LsdException Locked=”false” Priority=”61″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light List Accent 5″/> <w:LsdException Locked=”false” Priority=”62″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Grid Accent 5″/> <w:LsdException Locked=”false” Priority=”63″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 1 Accent 5″/> <w:LsdException Locked=”false” Priority=”64″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 2 Accent 5″/> <w:LsdException Locked=”false” Priority=”65″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 1 Accent 5″/> <w:LsdException Locked=”false” Priority=”66″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 2 Accent 5″/> <w:LsdException Locked=”false” Priority=”67″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 1 Accent 5″/> <w:LsdException Locked=”false” Priority=”68″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 2 Accent 5″/> <w:LsdException Locked=”false” Priority=”69″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 3 Accent 5″/> <w:LsdException Locked=”false” Priority=”70″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Dark List Accent 5″/> <w:LsdException Locked=”false” Priority=”71″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Shading Accent 5″/> <w:LsdException Locked=”false” Priority=”72″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful List Accent 5″/> <w:LsdException Locked=”false” Priority=”73″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Grid Accent 5″/> <w:LsdException Locked=”false” Priority=”60″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Shading Accent 6″/> <w:LsdException Locked=”false” Priority=”61″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light List Accent 6″/> <w:LsdException Locked=”false” Priority=”62″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Grid Accent 6″/> <w:LsdException Locked=”false” Priority=”63″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 1 Accent 6″/> <w:LsdException Locked=”false” Priority=”64″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 2 Accent 6″/> <w:LsdException Locked=”false” Priority=”65″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 1 Accent 6″/> <w:LsdException Locked=”false” Priority=”66″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 2 Accent 6″/> <w:LsdException Locked=”false” Priority=”67″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 1 Accent 6″/> <w:LsdException Locked=”false” Priority=”68″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 2 Accent 6″/> <w:LsdException Locked=”false” Priority=”69″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 3 Accent 6″/> <w:LsdException Locked=”false” Priority=”70″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Dark List Accent 6″/> <w:LsdException Locked=”false” Priority=”71″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Shading Accent 6″/> <w:LsdException Locked=”false” Priority=”72″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful List Accent 6″/> <w:LsdException Locked=”false” Priority=”73″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Grid Accent 6″/> <w:LsdException Locked=”false” Priority=”19″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Subtle Emphasis”/> <w:LsdException Locked=”false” Priority=”21″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Intense Emphasis”/> <w:LsdException Locked=”false” Priority=”31″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Subtle Reference”/> <w:LsdException Locked=”false” Priority=”32″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Intense Reference”/> <w:LsdException Locked=”false” Priority=”33″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Book Title”/> <w:LsdException Locked=”false” Priority=”37″ Name=”Bibliography”/> <w:LsdException Locked=”false” Priority=”39″ QFormat=”true” Name=”TOC Heading”/> </w:LatentStyles> </xml><![endif][if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:””; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:”Calibri”,”sans-serif”; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} </style> <![endif]

Please follow this rubric for the case study.

 

Criteria to meet:

 

Organization – strive for well developed paragraphs, smooth transitions between paragraphs, ideas focused on a central theme.

 

Development – strive for Ideas focused on a central theme, all ideas are clearly presented.

 

Conventions – strive for no errors in sentence structure (capitalization, grammar, presentation and general structure.) APA Style – strive for correct cover page, in text citations, format and reference page have no errors.Please see grading rubric titled “case study” under the Rubric/ Grading Criteria. 

business case


A Business Case Definition:  Documentation detailing the requirements to move an idea from conceptualization to project initiation.

For this assignment, I want you to compare and contrast a Business Case and a Business Plan.   Include definitions and applications.   Also please explore business case templates. The above definition of a business case is mine, if you would like to offer a different definition as part of your assignment, please do so, but of course you will defend it therein. There are examples of Business Case Templates located in the readings for this course. There are also some links provided. Please review other web sites of relevance and indicate those you use.

I want you to submit to me in three weeks maximum a paper on the above and stating why the details in the business case template are there and how this represents the corpus of data that would be submitted to obtain funding and project approval to get a project started. The paper should be from 5 to 7 pages in length.  Select a business case template that you like. Tell me why you selected that business case template and how it is associated with the(technological and/or business drivers) problem that you selected for your Business Case Research paper.

I want you to reference at least three different business case templates and select the one you believe to be the best. Include the one or URL for it, with your paper. You should reference the others that you evaluated to come to your conclusion.

This is the first of two projects; the second is identified in week four assignments. Yes you can look now if you want to it should be there.

Please reference the rubric in the rubrics/criteria section for grading expectations.

Summary:

Select an industry of interest. Identify and describe some of the problems affecting the industry where business systems may be used.  

Identify the reasons (technological and / or business drivers) behind the problems. 

Select at least one problem area and research different systems solutions (3 options) or technologies currently available or under development that may help solve the problem. 

Evaluate the options in relationship to the problem and identify which option you determine would be the best fit.  (A-2, C-2)

Please do not submit research paper for the following: Electronic Health Records (HER), Radio Frequency Identification (RFID) and Transportation Tracking System.

Submit a SWOT analysis for your business case research paper. This should help you with clarifying the problem statement for your business case research paper and address priorities.

Use the link associated with this assignment to make your submissions.

The SWOT analysis can be prepared with Word or with PowerPoint. The title must identify the company and the industry.  There should be a minimum of 4 items in each area.

 

Refer to the textbook for additional information in preparing a SWOT analysis.  You may refer to this in your business case research paper, as this may be included in your appendix.

Laptop Versus Tablet: Which One to Buy?

Case Study 1: Laptop Versus Tablet: Which One to Buy?

 

Due Week 3 and worth 120 points

 

Read the case study in Chapter 2 titled “Laptop Versus Tablet: Which One to Buy.”

 

Write a two to three (2-3) page paper in which you:

 

  1. Explain the main factors that you should consider before deciding whether to buy a laptop or a tablet.
  2. Identify the key features of a laptop and a tablet. Next, discuss three (3) important characteristics of each that might influence your decision.
  3. Identify three (3) best-selling tablets on the market, and decide on the one that you would like to buy. Justify your response.
  4. Use at least two (2) quality references. Note: Wikipedia and other Websites do not quality as academic resources.

 

Your assignment must follow these formatting requirements:

 

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

The specific course learning outcomes associated with this assignment are:

 

  • Describe how and why information systems are used today.
  • Demonstrate an understanding of the technology, people, and organizational components of information systems.
  • Use technology and information resources to research issues in information systems.
  • Write clearly and concisely about management information systems using proper writing mechanics

 

Click here to view the grading rubric.

 

ITM SLP 1

ITM SLP 1

Data, Information, and Organizational Knowledge

The SLPs for Modules 1-3 will introduce you to Microsoft Excel functions for cell formatting and applying simple formulas and functions, basic pivot tables, and what-if equations. You will also explore how Excel reports are represented in data tables, charts, and graphs. Whether you are a novice or have already an understanding of Excel, these exercises will help you acquire and/or refresh Excel skills.

As most of you know, Excel is a powerful application that is used worldwide, and learning Excel skills are important to your career in Information Technology Management. Among the many tasks, Excel is used to work as a calculator and to perform higher math and statistical functions. Since you will be working on different Excel exercises each week, you will be watching the assigned videos first and then completing the exercises step by step.

For a quick introduction to Excel menus, please review the following Lynda.com video. You do not need to start a free trial, but if you want, Lynda.com offers a 10 day free-trial to review the lessons. You can always rejoin the site after that period is over.

http://www.lynda.com/Excel-tutorials/Using-menu-system/116478/125009-4.html

Excel files are called workbooks and are created each time you start a new worksheet. Multiple workbooks can be created within a single file. If you save Excel files to your local drive, you are the only one that can access them; however, if you save them to the cloud using OneDrive, you can export and share them with others. Excel is designed to enter information in cells. A cell is intersection a column and a row. For instance, column A and row 5 create a cell with an address of A5. Page layout is one of the most important features, and a good document presentation depends on correct page layout. The page orientation and margin size allow you to control your documents. Page orientation options are landscape and portrait.

SLP 1 will begin by introducing you to some Excel basic functions as follows.

·         Home – The home tab provides access to most common used commands for working with data.

·         Insert – The insert tab provides ability to insert charts, tables, Sparkline, filter, and more.

·         Page layout – The page layout tab is to change the print formatting of workbook, including margin width, page orientation,    and themes.

·         Formulas – The formulas tab gives access to useful functions and formulas, and calculate and analyze numerical data, such as average and percentage.

·         Data – The data tab is for sorting and filtering information in the workbook.

·         Review – The review tab is a powerful editing feature like inserting comments and tracking changes.

·         View – The view tab is for switching between different views of the workbook and freezing panes.

·         Contextual – Contextual tabs will appears on Ribbon when you working with tables and pictures.

Next, you will review the following link containing a series of videos to prepare you for the SLP exercises. Refer to tutorials at http://www.gcflearnfree.org/excel2013

1.     Getting Started with Excel

2.     Creating Opening Workbooks

3.     Saving and Sharing Workbooks

4.     Cell Basics

5.     Modifying Columns, Rows, and Cells

6.     Formatting Cells

7.     Worksheet basics

8.     Page Layout

9.     Printing Workbooks

 

In this module, you will be acquainted with an introduction to Excel and some of its basic functions. After watching the recommended videos, perform the following:

 

1.     Open the Excel software, you will see a blank worksheet, click on file, save as, browser to your local C: drive, type “Module1-exercise” in the file name section, and OK to save it to hard drive.

2.     Close the worksheet.

3.     Click to locate and the assignment file “Module1-excericse” and open it.

4.     Enter the following data into the worksheet, starting from A2 on the left side, and perform the functions below. Save the file again on your local drive.

 

Add these numbers in row:

 

 

A

B

C

D

E

5

9

75

51

 

 

 

 

 

 

421

700

985

854

 

 

 

 

 

 

3352

6578

99655

9876

 

13

15

17

21

 

 

Add these numbers in column:

A

  B

  C

2

1

254

23

3

7523

2

3

234

7

48

105

23

68

22

 

 

 

 

5.     Locate your file on the local drive.

6.     Use Save As to make a copy  as “Module 1- Exercise 2.” 

7.     Enter the following data and use Calibri font size 11″ and AutoFit text to column width.  

8.     Change the fonts and size to Georgia and 14″, then AutoFit to column width again. 

·         Jack Johnson

·         Rayon Robinson

·         Alex Hollywood

Change page orientation and change margin to “narrow.” Save the file. 

 

Desire margin:  Narrow.

Save your file.

 

After completing the Excel exercises, please upload the Excel file with your results to SLP 1 Dropbox.

SLP Assignment Expectations

Your assignments will be graded following these expectations:

·         The assignment file must be developed in Excel and saved as .xls file.

·         Precision: the questions asked are answered.

·         Clarity: Your answers are clear and show your good understanding of the topic.

·         Breadth and depth: The scope covered in your paper is directly related to the questions of the assignment and the learning objectives of the module.

·         Critical Thinking: It is important to read the “required readings” posted in the background material plus others you find relevant. Your paper should include important concepts from these readings and incorporate your reactions and examples that illustrate your reflective judgment and good understanding of the concepts.

 

 

Week 6 Assignment 2 SKIP TO COURSE MENU SKIP TO TOP FRAME TABS Content Week 6 Assignment 2 Submission Click the link above to submit your assignment. Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center. Instructors, t

Content

  •  

    Click the link above to submit your assignment.

    Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.

    Instructors, training on how to grade is within the Instructor Center.

    Assignment 2: Normalization

    Due Week 6 and worth 100 points

    Suppose that you are the database developer for a local college. The Chief Information Officer (CIO) has asked you to provide a summary of normalizing database tables that the IT staff will use in the upcoming training session. 

    Write a two to three (2-3) page paper in which you:

    1. Describe the steps that you would use in order to convert database tables to the First Normal Form, the Second Normal Form, and the Third Normal Form.
    2. Provide one (1) example that is relevant to a college environment that illustrates reasons for converting database tables to the First, Second, and Third Normal Forms.
    3. Explain typical situations when denormalizing a table is acceptable. Provide one (1) example of denormalizing a database table to justify your response.
    4. Explain the significant manner in which business rules impact both database normalization and the decision to denormalize database tables.
    5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

    Your assignment must follow these formatting requirements:

    • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
    • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. 

    The specific course learning outcomes associated with this assignment are:

    • Recognize the purpose and principles of normalizing a relational database structure.
    • Design a relational database so that it is at least in 3NF.
    • Use technology and information resources to research issues in database systems.
    • Write clearly and concisely about relational database management systems using proper writing mechanics and technical style conventions.

Professional Communications Assignment 7: Annotated Bibliography

This assignment allows you to explore more scholarly research; in addition, it provides the opportunity to practice writing summaries and documenting IEEE references.

 

For this assignment, locate and read seven scholarly articles on a topic of interest in Information Systems. Next, create an annotated bibliography with all of your articles. Annotated bibliographies contain an alphabetical list of your references (by author’s last name), with a summary of each article following each reference. Summaries typically include the following items:

 

1.       Explanation of main points, purpose, and methodology of the work, which demonstrates that you have read and understand the source.

2.       Verification of the authority or qualifications of the author.

3.       Usefulness of article for researchers, or statement of strengths and weaknesses.

 

Summaries should be no longer than four sentences. One single entry looks like this:

 

I. T. Ozbolat and Y. Yu, “Bioprinting toward organ fabrication: challenges and future trends,” IEEE Trans. Biomed. Eng.,vol. 60, pp. 691-699, Mar. 2013. 

 

In this article, the authors, both of whom have PhDs in Biomedical Engineering, discuss current practices in 3D organ printing and predict future trends. They surveyed 50 biomedical labs and concluded that current practices are unstable due to lack of regulation. In addition, they predict that with better regulation, printed organs could be utilized for transplants in the human body by 2020. This article is useful for recent graduates and regulatory agencies.

 

Upload your Annotated Bibliography in BB by Week 6 class time. Also bring a printed copy to class.

 

 

Component

Grading Criteria

Points Possible

Points Awarded

Research Report

Content (meets purpose of assignment as described above)

 

50

 

Quality of Research (contains credible research, documents research correctly – IEEE style)

20

 

Clarity of Writing (writing is clear and concise)

 

40

 

Quality of Writing (writing contains few mechanical or grammatical errors)

40

 

Total

 

150

 

 

 

 

Annotated Bibliographies:

 

Instructions and Sample: http://www.ee.ryerson.ca/~jasmith/courses/bme100/docs/2010/Tutorial1_annotated_bibliographies.pdf

 

 

Template: https://www.overleaf.com/latex/templates/annotated-bibliography-template/zycfqzgqyzgk#.V4Ti97grKM8

ITNA359 Network Administration – unit 5 IP

In this assignment, you will use the course materials and the Web to research host IP addressing conflicts and preventative network solutions.

Assignment Guidelines

   Research IP addressing with regard to conflicts and DHCP, and use the following questions as a guideline for your paper:

                           If two hosts in a network are assigned the same IP addresses, what will happen? Explain.

                           How can an improperly configured DHCP contribute to this type of problem?

                           In your own words, how would you describe the DHCP configuration parameter that is used to reserve IP addresses for hosts in a network?

   The content of your research paper should be written in a double-spaced Word document of 3–7 pages.

                           This does not include a title page or a list of references.

   You may use section headings and bullets to organize your research paper.

   All in-text citations and references should be in APA format.

Your submitted assignment (125 points) must include the following:

   A double-spaced research paper of 3–7 pages that addresses the 3 questions listed in the assignment guidelines with regard to IP addressing conflicts and DHCP

   A title page that includes your name, course number, and unit number

   A reference list in APA format

Grading                 

You will be graded on the accuracy of your answers, your demonstrated understanding of IP conflicts, and how well your paper adheres to the assignment guidelines listed above.

Please submit your assignment.

For assistance with your assignment, please use your text, Web resources, and all course materials.