Purdue University Global Clou

I’m trying to learn for my Computer Science class and I’m stuck. Can you help?

PART 1

Recommend a migration strategy for a cloud based system(s).

Apply research to create original insights and/or solve real-world problems.

Demonstrate college-level communication through the composition of original materials in Standard English.

Many companies are moving their data to the cloud. To move their data, they must perform research to understand which cloud company to choose. Then they must decide how to transition the data. Your assignment is to write a detailed paper that explores methods for migrating your data to the cloud. Be sure to support your chosen methods with research, explaining why the methods identified best fit within the given scenario. Your assumptions are:

  • Your company has 30TB of data to migrate.
  • You must have this data transferred within 3 days.

Instructions:

In addition to fulfilling the specifics of the assignment, a successful paper must also meet the following criteria:       

  • Include a title page and reference page in 10- to 12-point font (Arial, Courier, and Times New Roman are acceptable).
  • Viewpoint and purpose should be clearly established and sustained.
  • Assignment should follow the conventions of Standard English (correct grammar, punctuation, etc.).
  • Writing should be well ordered, logical, and unified as well as original and insightful.
  • Your work should display superior content, organization, style, and mechanics.
  • Appropriate APA citation style should be followed. 

You should also make sure to:

  • Include introductory and concluding paragraphs and demonstrate college-level communication through the composition of original materials in Standard English.
  • Use examples to support your discussion.
  • List all sources on a separate reference page at the end of your paper and cite them within the body of your paper using APA format and citation style. For more information on APA guidelines, visit Academic Tools.

Part 2: Data Flow Diagram Creation

Outcomes addressed in this activity:
Module Outcomes:

  • Discover a variety of diagrams relating to systems analysis.
  • Describe logical process models.
  • Create Data Flow Diagrams.

Assessment Instructions

Avery has opened a gym and rehabilitation center specifically designed to provide training and recovery for service members who may have been injured while on duty. New members are provided a free fitness assessment to help determine their current fitness levels and to ascertain the extent of any injury to help onboard them into the program.

Avery has designed a basic system to help onboard these new gym members. When members are seen for the first time, they complete a simple gym membership form that asks for their name, address, phone number, and brief medical history, which are stored in the gym member file. They are also asked to schedule a Fitness Assessment.

Therapists or trainers must check the assessment calendar file for an available time. Members may also call to change their assessments. Because these assessments are scheduled in advance, Avery usually sends a reminder postcard and text message to each member one week before the appointment.

Assessment Requirements

Use Visio to Construct a Level 1 DFD based on the attached use cases. Each use case corresponds to a process in the Gym System. Use Gane and Sarson symbols. All the information can be analyzed from the Use Cases. Some of the Information is provided below. You will have to determine and label all the Data Flows in the DFD.
Entity: Gym Member

Processes:

  • Schedule (or change) a Fitness Assessment
  • Collect Membership Information
  • Send Reminder and text message

Data Files:

  • Calendar File
  • Gym Member File

    Data Flows:

  • At least 16 are needed

IT460: Module 3 Assessment Data Flow Diagrams

Use Case Name:Gym Member makes or changes a fitness assessment

ID: _1_

Importance Level:High

Primary Actor:Gym Member

Short Description:This describes how a new fitness assessment is made or an existing fitness assessment is changed.

Trigger:Gym Member calls to schedule new fitness assessment or change an existing fitness assessment.

Type: External/Temporal      

Major Inputs:

Description Source

Gym Member name                                  Gym Member

Desired fitness assessment                      Gym Member

Fitness assessment to change                 Gym Member

Available fitness assessments                  Calendar file

Existing Gym Members                             Gym Member file

Major Outputs:

Description Destination

Scheduled fitness assessment        Gym Member

Scheduled fitness assessment        Calendar file

Available fitness assessments         Gym Member

Check Gym Member name              Gym Member file

Major Steps Performed

  1. Get Gym Member’s name. Check Gym Member name with Gym Member file.
  2. If new Gym Member, get address and phone number and enter in new Gym Member file entry.
  3. If this is a fitness assessment change, find current fitness assessment in fitness assessment file, and cancel it.
  4. Get desired fitness assessment time and match with available fitness assessments in Calendar File. When a suitable time is found, enter scheduled fitness assessment in the Calendar file and confirm with Gym Member.

Information for Steps

Gym Member name

Gym Member File

Address

Phone number

New Gym Member information

Fitness assessment to change

Existing Fitness assessments

Desired fitness assessment

Available fitness assessments

Scheduled fitness assessments

Use Case Name:Collect new Gym Member information

ID: _2_

Importance Level:High

Primary Actor: New Gym Member

Short Description:This describes how new Gym Member information is collected when a new Gym Member arrives for fitness assessment.

Trigger:New Gym Member arrives for fitness assessment.

Type: External/Temporal      

Major Inputs:

Description                                           Source

New Gym Member information                   Gym Member

(Includes name, address,

Phone number

Injury History                                                   Gym Member

Major Outputs:

Description                                        Destination

Gym Member Information                       Gym Member file

Major Steps Performed

  1. When the Gym Member arrives, determine if he/she has been seen before in this gym. If they have not, have them fill out a Gym Member information form. 
  2. Use the information on the Gym Member information form to update and complete the Gym Member’s entry in the Gym Member file.

Information for Steps

Gym Member status

Gym Member name

Address

Phone number

Injury history

Use Case Name:Send fitness assessment reminder card and text message

ID: _3_

Importance Level:Medium

Primary Actor:System

Short Description:This describes how reminder cards and text message sent to Gym Members one week prior to fitness assessment.

Trigger:Time to send reminders and text message one week before scheduled fitness assessments.

Type: External/Temporal 

Major Inputs:

Description                                  Source

Current date                                          Calendar

Scheduled fitness assessments            Calendar file

Gym Member Contact Info                    Gym Member file

Major Outputs:

Description                                        Destination

Fitness assessment notification card       Gym Member

Text message                                           Gym Member

Major Steps Performed

  1. Each day find the fitness assessments in the Calendar file for the day week.

2.   Prepare fitness assessment notification card and text message to all Gym Members having fitness assessments.

Information for Steps

Current date

Scheduled fitness assessments

Name

Address

Fitness assessment

Fitness assessment notification card 

Purdue University Global Clou

I’m working on a computer science question and need support to help me learn.

Part 1

Section 1

utilize the DynamoDB AWS service to explore a database of movies.

You will need to take four screenshots during the lab.

  1. Screenshot displaying the Movies table within the AWS console dashboard.
  2. Screenshot showing the newly created Global Secondary Index.
  3. Screenshot displaying the new item values successfully added to the table.
  4. Screenshot that displays a change in capacity.

The
screenshots you create while completing the lab should be added to a
Microsoft Word document. Write a one-paragraph summary under each
screenshot sharing your experience completing this lab. Then, write a
final paragraph that summarizes your experience with Amazon Web
Services.

Section 2:

Purpose

you will create a subnet group, create and configure an RDS instance,
launch a read replica, promote the replica to a primary instance, delete
the original primary, and retained snapshots, just in case! With this
information, you now have a solid basis for understanding RDS database
configuration and management.

To begin
the lab, click on the “Lab search within Linux Academy” link in this
Lab area. Type the lab name, “Create and Configure an RDS Database with
Backup Solutions”. You will click on the lab name and then select Start
Lab. You can also select the lab guide if you need a hardcopy of your
lab instructions.

You will need to take four screenshots during the lab.

  1. Screenshot displaying the VPC configuration.
  2. Screenshot showing the Linux Academy VPC was selected for the RDS subnet.
  3. Screenshot that shows your newly created snapshot.
  4. Screenshot that displays your created read replica.

The
screenshots you create while completing the lab should be added to a
Microsoft Word document. Write a one-paragraph summary under each
screenshot sharing your experience completing this lab. Then, write a
final paragraph that summarizes your experience with Amazon Web
Services.

Part 2

Section 1:

The
company you work for today has several on-premise relational databases
that range from several hundred gigabytes to several terabytes in size.
Most of the databases are considered OLTP processing systems during the
daytime and batch processing at night. The database engines are Oracle
and SQL server, both database systems are using their latest versions.

Write
a 2-page paper that discusses alternative database cloud solutions for
Oracle and SQL Server and then discuss the possible migration process
involved in moving from their local on-premise databases to their
respective database cloud solution. Would the Amazon DynamoDB be a good
fit? Why or why not?


Section 2:

Your
work for a company that keeps up with product sales from thousands of
convenience stores throughout the United States. Hourly sales analysis
is critical for understanding customer trends and buying habits. This
data is also needed for its distributors to understand how to stock low
inventory levels in a cost effective and efficient manner. The problem
is that the data is lagging behind due to latency issues and most of the
systems are becoming out dated.

Write a 2-page paper that discusses the following:

  1. What type of Amazon RDS database instance could help solve their problem? Why?
  2. How would Amazon Read Replicas reduce Internet latency issues?
  3. Outside of Amazon, what other cloud solutions could help alleviate some of their current issues? Explain.

Section 3:

Write a college-level research paper that includes the following:

Your
reading this week covers a cloud migration strategy. This Assignment is
going to expand your knowledge of cloud migration. Your Assignment is
to discuss the six parts of the migration strategy (Analysis;
Application Migration; Networking; Data Migration; Optimization and
Testing; and Operation and Management) and how your company will
successfully accomplish your migration to the cloud with the strategy
you propose. You can choose to write about a fictitious company or a
company you have knowledge of. Write a 2-page paper that follows the
requirements above.

Purdue University Global Clou

SECTION 1

Create a 2- to 3-page outline of identified cloud computing security issues and possible solutions. This can be construed as a project definition/project charter (outline). This outline is the result of your preliminary work. New things and priorities may be discovered and should be included as you progress. Project development is an iterative process.

The result of this assignment will be used to complete your cloud security practice improvement paper due in Unit 9. The more work you do here, with this assignment, the less will be required in Unit 9. A rough guideline is that when you have properly completed this outline, you may be 30–40% of the way to completing the major paper due in Unit 9.

Identify the cloud security policies, systems, and practices at your internship location that could be improved upon. Discuss options with your supervisor. What would be a desired security improvement for the client? A policy upgrade? Updated cloud security practices? A disaster recovery plan? An incident response plan? An intrusion detection scheme? User training? Use of a security framework?

What topics could you research to benefit the company and provide a set of suggestions by end of term? See the partial topic list you might consider (some or all) below:

Include as complete an evaluation/explanation as possible of the four bullet points below. See the enhanced explanation of each below the list of topics.

  • Identify the following cloud security improvement focus at place of internship.
  • Identify the data or system(s) that would be protected from the security improvement.
  • Identify three to five key milestones necessary to adopt the practice improvement.
  • Describe strategies to achieve results.

Evaluation and validation of new system:

Topic List:

Utilize the following topic list to identify possible/probable areas for your work, evaluation, and solution recommendations. Address, as a priority list based on your client’s current situation, some of the following topics:

  1. What the weakest link in the information security chain is and why.
  2. What different types of users there are.
  3. How to govern different types of users with policies.
  4. What the acceptable use policies (AUPs) are.
  5. What the significance of a privileged-level access agreement (PAA) is.
  6. What security awareness policies (SAPs) are.
  7. What the best practices for user domain policies are.
  8. What the difference between least access privileges and best fit access privileges is.
  9. What some case studies and examples of user domain policies are.
  10. What the basic anatomy of a cloud infrastructure policy is.
  11. What the common remote access domain policies are.
  12. What the common system/application domain policies are.
  13. What the common telecommunications policies are related to the IT infrastructure.
  14. What some cloud infrastructure security policy best practices are.
  15. What some cloud computing case studies and examples of IT infrastructure security policies are.
  16. What the common data classification policies are.
  17. What the common data handling policies are.
  18. What the common business risks related to information systems are.
  19. What a risk and control self-assessment (RCSA) is and why it is important.
  20. What the common risk assessment policies are.
  21. What the methods of quality assurance (QA) and quality control (QC) are.
  22. What the common best practices for risk management policies are.
  23. What some case studies and examples of cloud risk management policies are.

Guidelines:

Use the following guidelines to help structure your paper for maximum clarity and impact. Review the detailed grading rubric for this assignment to understand all the detailed requirements of this paper.

  • Identify the following cloud computing security improvement focus at place of internship:

Describe the problem or system that would benefit from a new advancement, renovation, or augmentation. Include sufficient detail so that your instructor can really understand the scope of this project. It is a good idea to have your work supervisor involved in this project with you to help ensure that you clearly understand the problem.

  • Identify the data or system(s) that would be protected from the cloud computing security improvement:

It is important to understand as much as possible the full impact of the problem. By identifying all impacted systems, you will be in a better position to provide a strong solution.

  • Identify three to five key milestones necessary to adopt the practice improvement:

Describe how you will measure project accomplishment as you progress through the design, planning, and actual implementation of the project (keep in mind that you will likely only be planning the implementation). Acknowledgement: I realize I cannot actually implement the upgrade during my brief service, but I will make recommendations and propose a solution in my final report.

  • Describe strategies to achieve results:

Describe the recommended strategies to achieve the results. Will this require a new workflow, additional contractors, upgraded equipment and training, or new employee protocols? What key elements are necessary to achieve your objectives?

  • Evaluation and validation of new system:

Describe how you will evaluate and validate your security practice improvement(s). Explain how you would validate any gains resulting from the new system due to increased efficiencies, more secure data archives, complete disaster recovery plans, or increased security practice among the users in your target organization.

SECTION 2

Part 1 Instructions and Requirements

Scenario: Avery’s Gym has had some limited success providing athletic training and physical therapy…but she’s struggling a bit to expand her presence and her brand to expand her business. Avery is considering expanding her web presence and is interested in exploring what her competitors are doing. She thinks a great way to do that would be to build a website that could serve as a home for her marketing efforts. There are two parts to the assessment. First, research other similar sites to serve as a launching point for your creative efforts. Second, draft an original wireframe diagram using Visio that may serve as the starting point of a web system design project.

You can expand your research options to explore themes related to three main areas. Creativity is encouraged!

  • Gym or Physical Fitness center
  • Physical Therapy
  • Mental Health and Wellness centers

Because Avery is focused on crafting personalized training and experiences, she is looking for local inspiration. Choose a gym, physical fitness center, physical therapy site, or mental health and wellness facility that is close to you (preferably independent). Do not choose a large national business or chain as the starting point for your research.

Part A: Home Page Research
Find an appropriate corresponding website home page with the purpose of researching similar sites for inspiration for your own design. Provide the following information focusing primarily on the home page, features, and branding of the site. Think of this as a “walk through evaluation.” In addition to providing a URL and screenshot – write a brief analysis addressing some of the common elements listed below.

Provide the full URL of your inspiration.
Include a screenshot
Provide additional written documentation to accompany your research. Adding labels and annotation to the screenshot highlighting your analysis is preferred.

Paragraph 1: Organization and Design (at least 75 words)
Describe the design elements:

  • Main features and purpose
  • Navigation menu(s)
  • Layout
  • Any whitespace

Paragraph 2: Branding and Communication (at least 75 words)
Describe the key features of marketing and communication elements:

  • The use of color (combinations, locations)
  • Text (families, variety of sizes, alignment)
  • Multimedia (images, graphics, videos, etc.)
  • Social media/communications

Part B: Original Diagram
Consider what you learned about the organization of your research and develop your own proposed design for your client. Create an original wireframe and storyboard for your client’s home page. Visio is required.

  • Design your wireframe for a website homepage.
  • Include the location of the logo, navigation, main area for home page content, and other elements you feel are necessary.
  • Identify and label key elements.
  • Do not simply copy the design of the page you reviewed; create your own design.
  • Actual content is not necessary! This should be a line drawing showing where items should be placed on the screen. Placeholders could be included.
  • Your wireframe should look something like the image below, although of course with your own page organization and detail and relating to the client’s needs:

wireframe

Original Image by Paul Shryock, (CC BY-NC-ND 4.0) Image modified by cropping to focus on website wireframe example. Retrieved from https://creativecommons.org/licenses/by-nc-nd/4.0/

Provide additional written documentation to accompany your Visio wireframe. Elaborate on your design decisions, identify the key features, address important aspects of navigation, marketing, and communications.

Paragraph 1: Organization and Design
Describe the design elements (at least 100 words):

  • Main features and purpose
  • Navigation menu(s)
  • Layout
  • Any whitespace

Paragraph 2: Branding and Communication (at least 100 words)
Describe the key features of marketing and communication elements:

  • The use of color (combinations, locations)
  • Text (families, variety of sizes, alignment)
  • Multimedia (images, graphics, videos, etc.)
  • Social media/communications

Review all instructions above and the rubric below before submitting to the Assessment Dropbox.

Reminders

  • Proofread your work for grammar, spelling, punctuation, capitalization, and formality.

Part 2: Program Design Concepts

Designing programs that perform system logic is challenging and varied. Analysts must define instructions for programs that describe how to covert the ideas depicted in logical models into actual code and programming logic. Structure charts are one technique that describes a program at a high level. This assessment asks you to explain key concepts associated with program design. Write a short essay response to each of the following questions.

Module Outcomes practiced in this assessment:

  • Revise logical data flow diagrams into physical data flow diagrams.
  • Describe features of structure charts.
  • Develop Program Specifications.

Assessment Requirements

  1. Include a title page and reference page.
  2. Written work is provided in Standard English.
  3. Provide a header for each question and answer.
  4. Each question should include at least one APA reference and inline citation.
  5. At least 3 pages in length, not counting the title page and reference page.

Questions:

  1. What is the purpose of creating a logical process model and then a physical process model? How are they different? What information is found on the physical DFD that is not included on the logical DFD?
  2. List the steps necessary transform logical models to physical models.
  3. Define a structure chart and explain the importance of sequence, selection, and iteration.
  4. Provide an example of a structure chart you have found online (citation necessary). Explain the purpose of this chart.
  5. What does a data couple depict on a structure chart? What symbols are used to depict it? What does a control couple depict on a structure chart? What symbols are used to depict it?
  6. List the seven types of coupling. Give an example of good coupling and an example of bad coupling.
  7. What is meant by the characteristics of fan-in and fan-out?
  8. Discuss three ways to improve the quality of a structure chart.

Part 3: Entity Relationship Diagram

Module Outcomes practiced in this assessment:

  • Validate data models.
  • Describe the process of normalization.
  • Create an entity relationship diagram.
    Purpose

Entity Relationship Diagrams are used to help show how information in a system is organized. This assessment will have you analyze data from a business situation, construct an ERD, and explain process of normalization and reasons when denormalization may be important.

Assessment Instructions and Requirements

Avery’s gym has partnered with a partner physical therapy business to provide treatment for some of its gym members. Gym members have the option to participate in special physical therapy sessions.

The main feature of this partnership provides gym members with the options to participate in physical therapy sessions. Each Physical Therapy Session must include a gym member, a trainer, and a therapist. Each session generates a unique Claim. Sessions also need to record the date, time and purpose of the sessions. Physical therapy sessions are billed back to insurance and claims must be filed with each physical therapy session.

You have been tasked with developing an Entity Relationship Diagram to help show this part of the larger gym system. You have also been asked to explain the importance of both normalization and denormalization of data structures.

You have been given a report as an example of some of the information generated by the system, and the file contains the following fields. Hint: unique IDs may need to be created to correctly generate the data model.

  1. Physical Therapy Session
  2. Session Date
  3. Session Time
  4. Session Details/Purpose
  5. Member Name
  6. Member Address
  7. Member Phone
  8. Member Age
  9. Member Email
  10. Insurance Number
  11. Insurance Name
  12. Insurance Address
  13. Insurance Plan details
  14. Trainer Name
  15. Trainer Phone
  16. Trainer Email
  17. Trainer Specialty
  18. Therapist Name
  19. Therapist Phone
  20. Therapist Email
  21. Therapist Specialty
  22. Insurance Claim Number
  23. Claim Cost

Complete the following tasks:

  1. Normalize the data. Organize the information into data fields appropriate for a relational database. Analyze the information provided and normalize the data to create a database model.
  2. Based on that information construct an ERD. Use Visio. Identify primary and foreign keys. For each entity, develop appropriate and thorough attributes. Use crow’s feet to show relations between entities.
  3. Explain the importance of normalization: provide a summary of the steps necessary for each 1NF, 2NF, 3NF and importance. A minimum of 120 words is expected.
  4. Explain denormalization and explain the main reasons for it. A minimum of 60 words is expected.
Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount