SlideShare a Scribd company logo
IT 200: Network Diagram
Below is the wired network configuration for Swagger
Distribution. Use this to create and describe a Visio diagram of
a wireless networking configuration appropriate for the
company. Describe all aspects of the network using IT
terminology.
Source:
http://www.cityinfrastructure.com/Data/PhysicalDiagram.png
Assignment #10
(10 points)
Using MySQL SELECT commands answer the questions listed
below using the Tiny Video schema used in your previous
assignment. Submit via the D2L drop box the final SQL script
for each problem. All questions are worth 2 points each.
1. Write a query to display the columns listed below. The query
should list each customer once, whether they have rented a
movie or not. Where the customer has rented a movie it should
show only the first rental date. The output should be sorted by
membership number.
2. Write a query to display the columns listed below. The query
should list each customer who has not rented a move. The
output should be sorted by membership number.
3. Write a query to display the columns listed below. The query
should list each customer where the total detail rental fee is
greater than twice the overall average detail rental fee. The
output should be sorted by membership number. (Hint: A
HAVING clause will be needed)
4. Write a query to display the columns listed below. The query
should list each customer in which the video rental is overdue.
The Days_Overdue column should calculate the number of days
overdue based upon the due date and return date. The output
should be sorted by membership number and then by the detail
due date.
5. Write a query to display the columns listed below. For each
customer the query should show the current system date, the
current day (when you do the problem the date and day will be
different), the number of characters in the member last name,
the last date the customer rented a video and how many total
videos the person rented.
1
IT 200: Program Code
Below is the code that is currently displayed on the computer
screen at Swagger Distribution every morning when employees
log on to their computers. The new owner would like you to add
a second line that tells employees, “Welcome to Swagger
Distribution!” It should go before the current date. The new
owner would also like you to change the word “Current” to
“Today’s” on the date output.
(Hint: To add a second line of output code, simply add a second
System.out.print in the statement.)
Take this code to www.ideone.com. Important: On the bottom
left of the compiler window, ensure that the toggle menu states
Java and not another programming language. (The compiler
automatically defaults to whatever language was used last.)
Enter the code into the line that states: “// your code goes here”.
When you are ready to compile and run the code, click the green
“run” button. Take a screenshot of your output. Use terminology
you learned in this module to identify three components of the
modified code.
Below is the code. Be sure to copy and paste it exactly as is so
you do not pick up any hidden characters. Make your changes in
the ideone.com compiler.
IT 200: Final Project Guidelines and Grading Guide
Overview
Successful professionals in the IT environment need to be
familiar with the fundamental IT tools and applications that are
used in everyday functions and know
how these tools and applications interrelate. The final project
for this course is a Company Consult Debrief that illustrates a
systems view of a company’s
technology infrastructure and the interrelationships between
components such as networks, data management, programming,
web technologies, and
information assurance. A detailed company scenario is
provided, with supporting databases, tables, table inventory, and
query orders.
Three formative milestones support the development of the
project. These are designed to scaffold learning and ensure
quality final submissions. These
milestones will be submitted in Modules Three, Five, and Six.
The final submission will occur in Module Seven.
This assessment will assess your mastery with respect to the
following course outcomes:
structured situations
technologies for specific professional environments
rationalizing recommendations for business environments
developing a systems view of information technology
Prompt
Scenario: A new owner has purchased Swagger Distribution
Company, a company that distributes clothing and apparel. She
does not have experience with IT-
related problem solving, so she contracting you, an IT
consultant, to help. The company has six distinct IT areas that
you will need to understand. The six areas
are described in detail in the following paragraphs. Throughout
the course you will focus on the individual areas of the
company, and then toward the end of the
course you will summarize the IT infrastructure as a whole.
1. Human–computer interface: Describe the software program
most often used by the employees and the HCI.
2. Database: Demonstrate simple additions to the tables
provided by the company.
3. Programming: Navigate a provided block of code and make
desired changes.
4. Network: Contrast wired and wireless network setups for the
company.
5. Web technologies: Examine the key components that would
be utilized with a new website.
6. Security: Recommend potential information security
adoptions by the company.
Please review the Final Project Scenario document for further
details.
Your Company Consult Debrief should address the following
prompt: The new owner of Swagger Distribution Company, a
company that distributes clothing
and apparel, does not have experience with IT-related problem
solving, so she is contracting you, an IT consultant. You will
review the company’s technology
http://snhu-
media.snhu.edu/files/course_repository/undergraduate/it/it200/it
_200_final_project_scenario.docx
infrastructure and the interrelationships between components
such as networks, data management, programming, web
technologies, and information
assurance. You will assess the current infrastructure and
programming modifications, network optimization, and
improvements to security procedures, and
provide your feedback and recommendations.
Specifically, the following critical elements must be addressed:
I. Human–Computer Interaction (HCI) Consult
a. Summary – Summarize the human–computer interactions
(HCI) problem the company is experiencing. Be sure to list all
aspects of the problem
and explain their importance to the usability of the software.
For example, you might identify components of Microsoft
Office applications such
as Word or Visio, discussing all aspects of the HCI and
explaining their importance to the usability of this software.
b. Recommendation – Suggest an enhancement to one of the
applications for improving its HCI, providing supporting
examples/research for your
suggestion.
c. Illustration – Create a one-page tutorial for Microsoft Visio,
including component screenshots, for new employees who are
familiar with
Microsoft Word but have never used Microsoft Visio. To
comprehensively address this element, you should cover at least
two basic functions
and/or menu options.
d. Identification – Use fundamental IT terminology to label
components in the tutorial and appropriately in the summary. To
comprehensively
address this element, you would label at least five components
in the tutorial.
II. Information Management/Database (IMD) Consult
a. Summary – Summarize the information management/database
(IMD) items of the distribution company, listing all tables and
all queries,
summarizing what the tables contain and what the queries do.
b. Edit – Based on the information provided, add a new data
type to the table, enter the data, and describe your actions.
III. Programming Consult
a. Modification – Based on the request provided by the new
owner, change the display message of the provided code that is
currently used to a
new display message.
b. Illustration – Include the key components of the line of code
provided, highlight what needs to be modified, and provide the
revised code.
c. Identification – Use fundamental IT terminology to label
components of the code provided.
IV. Networking Consult
a. Summary – Summarize the wired networking configuration
from the diagram provided and use this to create and describe a
Visio diagram to
represent a wireless networking configuration appropriate for
the company.
b. Identification – Use fundamental IT terminology to label all
aspects of the network components in the visual representation.
V. Web Technologies Consult
a. Summary – Summarize key components of a potential website
that would effectively address the company’s needs. In order to
comprehensively
address this element, you should include at least 10 components
in your summary.
b. Recommendation – Provide practical suggestions on aspects
that would ensure the quality of the website in meeting the
company’s needs,
explaining your rationale behind the proposed suggestions.
c. Illustration – Provide a visual representation of these
components as deployed in an existing website or websites that
will support the
functionality you address in your recommendations. For
example, this is where you might supply screenshots of aspects
of the website that
would support the functionality your suggestions offer.
VI. Information Security Consult
a. Summary – Summarize the information security issues facing
the company and discuss information security practices,
providing real examples of
information security assurance failures that can be used in
helping the client to understand the risk.
b. Recommendation – Recommend information security
practices that will address these issues. Provide supporting
examples/research/justification for your recommendations.
VII. Summary of IT Systems Consultations
a. Interrelationships – Explain how network, database, web
technology, computers, programming, and security systems
interrelate using the
distribution company as an example.
b. Conclusion – Provide a clear rationale to illustrate the
importance for this company to understand IT technologies and
to stay informed of
changes and new risks to its IT system.
Milestones
Milestone One: HCI, IMD, and Programming Consult
Summaries
In Module Three, you will submit a document summarizing the
HCI, IMD, and programming components of the distribution
company, including your
suggestions for changes. A visual representation will be
submitted for each summary using appropriate IT terminology.
This milestone is graded with the
Milestone One Rubric.
Milestone Two: Network and Web Consult Summaries
In Module Five, you will submit a document summarizing the
wired and a potential wireless network configuration and a
summary of suggested web
technologies for the website for the distribution company using
appropriate IT terminology. A labeled, visual representation of
the wireless network
configuration will be submitted. This milestone is graded with
the Milestone Two Rubric.
Milestone Three: Information Security Consult Summary
In Module Six, you will submit a document summarizing
information security needs and recommended practices of the
distribution company. A visual
representation of the information security system will be
submitted, labeled using appropriate IT terminology. This
milestone is graded with the Milestone Three
Rubric.
Final Product: Company Consult Debrief—Overall System
Summary
In Module Seven, you will submit a final document that builds
upon all of the previously completed milestone summaries to
provide an overall summary of the
distribution company’s IT system as a whole, illustrating how
each individual system/component (network, database, web
technology, computers,
programming, and security systems) interrelates with others.
Provide a clear rationale to illustrate the importance for this
company to understand IT technologies
and to stay informed of changes and new risks to its IT system.
It should be a complete, polished artifact containing all the
critical elements of the final product. It
should reflect the incorporation of feedback gained throughout
the course. It will be graded using the Final Product Rubric.
Deliverables
Milestone Deliverables Module Due Grading
1 HCI, IMD, and Programming Consult
Summaries
Three Graded separately; Milestone One Rubric
2 Network and Web Consult Summaries Five Graded separately;
Milestone Two Rubric
3 Information Security Consult Summary Six Graded separately;
Milestone Three Rubric
Final Product: Company Consult Debrief
- Overall System Summary
Seven Graded separately; Final Product Rubric
Final Product Rubric
Requirements of Submission: Written components of projects
must follow these formatting guidelines when applicable:
double spacing, 12-point Times New
Roman font, and one-inch margins. The paper should be five to
seven pages in length, not including cover page and resources,
and written in paragraph form.
Tables should be prepared in Microsoft Access. Diagrams
should be prepared using Visio.
Instructor Feedback: This activity uses an integrated rubric in
Blackboard. Students can view instructor feedback in the Grade
Center. For more information,
review these instructions.
Critical Element Exemplary (100%) Proficient (85%) Needs
Improvement (55%) Not Evident (0%) Value
HCI Consult:
Summary
Meets “Proficient” criteria and
uses industry-specific language
to establish expertise
Comprehensively lists aspects
of the human–computer
interactions (HCI) problem and
explains their importance to
the usability of the software
Lists aspects of the human–
computer interactions (HCI)
problem, but does not explain
their importance to the
usability of the software, or
description lacks detail or is not
accurate
Does not list aspects of the
human–computer interactions
(HCI) problem
6
HCI Consult:
Recommendation
Meets “Proficient” criteria and
suggestion is well-informed and
integrates relevant theories and
research
Suggests enhancement for
improving HCI and justifies
suggestion with examples or
research
Suggests enhancement for
improving HCI, but does not
justify suggestion with
examples or research, or
suggestion is not appropriate
Does not suggest enhancement
for improving HCI
6
HCI Consult:
Illustration
Meets “Proficient” criteria and
provides comprehensive details
for understanding of Microsoft
Visio
Creates a Microsoft Visio
tutorial, including screenshots,
covering basic functions for
new employees who are
familiar with Microsoft Word
Creates a Microsoft Visio
tutorial for new employees who
are familiar with Microsoft
Word, but does not include
screenshots, or tutorial is
unclear or lacks detail
Does not create a Microsoft
Visio tutorial
5
HCI Consult:
Identification
Meets “Proficient” criteria and
establishes expertise using
specific industry language
Accurately labels components
of the tutorial and summary
using fundamental IT
terminology
Labels components of the
tutorial and summary using
fundamental IT terminology,
but labels are not accurate
Does not label components of
the tutorial and summary
4
IMD Consult:
Summary
Meets “Proficient” criteria and
uses industry-specific language
to establish expertise
Comprehensively summarizes
the information
management/database items
Summarizes the information
management/database items,
but summary lacks detail or is
not accurate
Does not summarize the
information
management/database items
6
IMD Consult: Edit Meets “Proficient” criteria and
description is comprehensive
Accurately adds new data type
to table, enters data, and
describes actions
Adds new data type to table
but does not enter data or new
data type is not accurate
Does not add new data type
and data to table
4
http://snhu-
media.snhu.edu/files/production_documentation/formatting/rubr
ic_feedback_instructions_student.pdf
Programming
Consult: Modification
Meets “Proficient” criteria and
modification is described using
industry-specific language
Accurately changes the display
message of the code as
requested
Changes the display message of
the code, but change is not
accurate or does not comply
with request
Does not change the display
message of the code
4
Programming
Consult: Illustration
Meets “Proficient” criteria and
identifies key components
demonstrating expertise in
using code
Includes the key components of
the line of code provided,
highlights what needs to be
modified, and provides the
revised code
Includes the key components of
the line of code provided, but
does not highlight what needs
to be modified or does not
provide the revised code
Does not include the key
components of the line of code
provided
6
Programming
Consult:
Identification
Meets “Proficient” criteria and
uses professional language
Accurately labels components
of the code provided using
fundamental IT terminology
Labels components of the code
provided using fundamental IT
terminology, but labels are not
accurate
Does not label components of
the code provided
4
Networking Consult:
Summary
Meets “Proficient” criteria and
the proposed wireless
configuration is logical and
appropriate for the business
needs
Comprehensively summarizes
the wired network
configuration for the company,
creates and describes a visual
representation of a wireless
configuration for the company
Summarizes the wired network,
attempts to create and describe
a visual representation of a
wireless configuration for the
company, but key aspects of
the configurations are missing
or not correctly identified
Does not summarize the
network configuration for the
company, or does not create
and describe a visual
representation of a wireless
configuration
6
Networking Consult:
Identification
Meets “Proficient” criteria and
uses professional language
demonstrating an advanced
understanding of networking
concepts
Accurately labels components
of the network in the visual
representation using
fundamental IT terminology
Labels components of the
network in the visual
representation of the wireless
configuration using
fundamental IT terminology,
but labels are not accurate
Does not label components of
the network in the visual
representation
4
Web Technologies
Consult: Summary
Meets “Proficient” criteria and
explanation demonstrates an
advanced understanding of web
technology options
Comprehensively summarizes
key components of a website
that would effectively address
the company’s needs
Summarizes key components of
a website, but summary lacks
detail or does not address the
company’s needs
Does not summarize key
components of a website that
would effectively address the
company’s needs
6
Web Technologies
Consult:
Recommendation
Meets “Proficient” criteria and
makes suggestions for optimal
performance
Provides practical suggestions
on aspects that would ensure
the quality of the website in
meeting the company’s needs
and explains the rationale
behind proposed suggestions
Provides practical suggestions
on aspects that would ensure
the quality of the website in
meeting the company’s needs,
but does not explain the
rationale behind proposed
suggestions
Does not provide practical
suggestions on aspects that
would ensure the quality of the
website in meeting the
company’s needs
6
Web Technologies
Consult: Illustration
Meets “Proficient” criteria and
demonstrates the applicability
of the recommended web
technologies to the company
through choice of highly
relevant examples for this
professional environment
Provides an accurate visual
representation of aspects as
deployed in an existing website
or websites that supports
functionality addressed in
recommendations
Provides a visual representation
of aspects as deployed in
existing website or websites but
representation does not
support functionality addressed
in recommendations or is not
accurate
Does not provide a visual
representation of aspects as
deployed in existing website or
websites
6
Information Security
Consult: Summary
Meets “Proficient” criteria and
examples of information
security assurance failures are
relevant to the company in the
scenario
Comprehensively summarizes
the information security issues
facing the company and
discusses information security
practices, and provides real
examples of information
security assurance failures
Summarizes the information
security issues facing the
company but does not discuss
information security practices
or does not provide real
examples of information
security assurance failures
Does not summarize the
information security issues
facing the company
6
Information Security
Consult:
Recommendation
Meets “Proficient” criteria and
recommendations are well
supported with relevant
examples and/or research
Recommends appropriate
information security practices
that address issues and justifies
recommendations with
examples and/or research
Recommends information
security practices but
recommendations are not
appropriate or are not justified
with examples and/or research
Does not recommend
information security practices
6
Summary:
Interrelationships
Meets “Proficient” criteria and
illustrates expertise
demonstrating a systems view
of IT
Describes the interrelationships
among network, database, web
technology, computers,
programming, and security
systems using the company as
an example
Identifies the interrelationships
but description lacks detail in
how the components are
connected with one another
within this company
Does not describe
interrelationships
6
Summary: Conclusion Meets “Proficient” criteria and
provides specific examples from
similar organizations
encountered during research
Comprehensively justifies the
importance for this company to
understand IT technologies and
to stay informed of changes and
new risks to its IT system
Explains the importance for this
company to understand IT
technologies and to stay
informed of changes and new
risks to its IT system but
rationale lacks detail or key
considerations for this company
Does not explain the
importance for this company to
understand IT technologies and
to stay informed of changes and
new risks to its IT system
6
Articulation of
Response
Submission is free of errors
related to citations, grammar,
spelling, syntax, and
organization, and is presented
in a professional and easy-to-
read format
Submission has no major errors
related to citations, grammar,
spelling, syntax, or organization
Submission has major errors
related to citations, grammar,
spelling, syntax, or organization
that negatively impact
readability and articulation of
main ideas
Submission has critical errors
related to citations, grammar,
spelling, syntax, or organization
that prevent understanding of
ideas
3
Earned Total 100%
[Type text]
IT 200: Final Project Scenario
A new owner has purchased Swagger Distribution Company, a
company that distributes clothing and apparel. She does not
have experience with IT-related problem solving, so she is
contracting you, an IT consultant, to help. The company has six
distinct IT areas that you will need to understand. The six areas
are described in detail in the following paragraphs. Throughout
the course you will focus on the six distinct IT areas for the
company and then at the end of the course you will expand upon
this work and summarize the IT infrastructure as a whole.
1. Human–Computer Interface (HCI)
On a daily basis Swagger Distribution’s employees log in to the
company’s network and utilize many different types of software
and the internet. They use Microsoft Word and Microsoft Visio
on a daily basis. Summarize the human–computer interface
(HCI) of these two software applications. Be sure to note any
commonalities among the applications and note any metaphors
that are utilized. Suggest one enhancement to one of the two
applications that would improve HCI, supported by at least one
example for the suggestion. Use this information to create a
one-page tutorial for new employees who are familiar with
Microsoft Word but have never used Microsoft Visio. This
tutorial only needs to introduce two basic functions and/or menu
options. Incorporate connections to human intuition and
similarities to MS Word when possible.
2. Databases
Swagger Distribution’s partners/customers include a variety of
clothing companies. Swagger Distribution utilizes a database to
store information on the partner companies and the orders that
are received. You will review the provided database for
Swagger Distribution and summarize what the tables contain
and what the queries do. Be sure to apply key terms that you
have learned such as “metadata.” Based on information
provided, you will change one data type in one of the tables.
3. Programming
Every day when an employee of Swagger Distribution signs on
to her computer, a pop-up window opens and gives a greeting to
the employee. The new owner would like to continue to have the
pop-up window but now would like to change the greeting. You
will open up the current code and identify the key components
of the code that need to be changed and make those changes.
Submit the modified code and identify the various components
of that code.
4. Networking
There are two possible configurations for Swagger
Distribution’s network, a wired version and a wireless version
and use this to create and describe a Visio diagram to represent
a wireless networking configuration appropriate for the
company. Provide a screenshot of the Visio diagram of the
wireless configuration to accompany the description. Use IT
terminology learned during the networking module.
5. Web Technologies
Swagger Distribution is in the process of designing a new
website using HTML5 (HyperText Markup Language).
Summarize at least 10 key components of a potential website.
You will not need to write any code, but ensure that you use the
terminology discussed during the web technologies module.
Include as much detail as possible. You will provide two
practical suggestions for a quality website. Identify an example
of a website that demonstrates the two features you are
recommending (you can provide two websites if you cannot find
one that has both). Provide a visual representation with
screenshots showing the two features.
6. Information Security
There is no current information security standard at Swagger
Distribution. You know that one needs to be implemented.
Summarize two key information security practices you
recommend the company implement. Provide supporting
examples/research/justification for your two recommended
information security practices. Use appropriate terminology
learned from the security module. Additionally, describe a real-
world example of an information security and assurance failure
that can be used to help the client understand why information
security is important.

More Related Content

DOCX
Achievement summary during 2017 start with intro about IT depart.docx
PPTX
Library management system project
DOCX
CIS 210 Entire Course NEW
DOC
Database project
PDF
IT 505 Final Submission Operating System Upgrade Implementation Brief
DOCX
Write a 1-page summary for each topic listed below1. Scripting.docx
DOCX
Design Document – Week 1 – ProposalCourse ID IT 491 CAPSTONE .docx
DOCX
Capstone Project OverviewThe purpose of this capstone project is.docx
Achievement summary during 2017 start with intro about IT depart.docx
Library management system project
CIS 210 Entire Course NEW
Database project
IT 505 Final Submission Operating System Upgrade Implementation Brief
Write a 1-page summary for each topic listed below1. Scripting.docx
Design Document – Week 1 – ProposalCourse ID IT 491 CAPSTONE .docx
Capstone Project OverviewThe purpose of this capstone project is.docx

Similar to IT 200 Network DiagramBelow is the wired network configurat.docx (20)

DOCX
CIS 499 – Faculty Notes(Prerequisite To be taken last or ne.docx
PDF
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
DOC
Project report format
PPTX
MIS.pptx
PDF
Graphical Password Authenticationimp.docx2
PPT
It Consulting Slides
PDF
ASSIGNMENT BOOKLET 2018 DIPLOMA IN IT 3 YEARS 1ST YEAR
DOC
Database project edi
PDF
Course journal-week-5- renuka ramakrishnan
PPTX
English Computers in the Office -Information System
DOCX
Assignment details the project involves studying the it inf
DOCX
426769701-Pet-Shop-Management-System.docx
PDF
Cis 498 Education Organization-snaptutorial.com
PDF
Software Design Document
DOCX
Kranthi_Updated_Resume
DOC
Sample Report Format
DOCX
Assignment Select a company for which you have a working knowledg.docx
PDF
Cosmetic shop management system project report.pdf
PPTX
System analysis and design mobile inventory
DOCX
Mobile shopping
CIS 499 – Faculty Notes(Prerequisite To be taken last or ne.docx
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
Project report format
MIS.pptx
Graphical Password Authenticationimp.docx2
It Consulting Slides
ASSIGNMENT BOOKLET 2018 DIPLOMA IN IT 3 YEARS 1ST YEAR
Database project edi
Course journal-week-5- renuka ramakrishnan
English Computers in the Office -Information System
Assignment details the project involves studying the it inf
426769701-Pet-Shop-Management-System.docx
Cis 498 Education Organization-snaptutorial.com
Software Design Document
Kranthi_Updated_Resume
Sample Report Format
Assignment Select a company for which you have a working knowledg.docx
Cosmetic shop management system project report.pdf
System analysis and design mobile inventory
Mobile shopping
Ad

More from priestmanmable (20)

DOCX
9©iStockphotoThinkstockPlanning for Material and Reso.docx
DOCX
a 12 page paper on how individuals of color would be a more dominant.docx
DOCX
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx
DOCX
92 Academic Journal Article Critique  Help with Journal Ar.docx
DOCX
A ) Society perspective90 year old female, Mrs. Ruth, from h.docx
DOCX
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx
DOCX
9 AssignmentAssignment Typologies of Sexual AssaultsT.docx
DOCX
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx
DOCX
900 BritishJournalofNursing,2013,Vol22,No15©2.docx
DOCX
9 Augustine Confessions (selections) Augustine of Hi.docx
DOCX
8.3 Intercultural CommunicationLearning Objectives1. Define in.docx
DOCX
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx
DOCX
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx
DOCX
800 Words 42-year-old man presents to ED with 2-day history .docx
DOCX
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx
DOCX
8.0 RESEARCH METHODS These guidelines address postgr.docx
DOCX
95People of AppalachianHeritageChapter 5KATHLEEN.docx
DOCX
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx
DOCX
8-10 slide Powerpoint The example company is Tesla.Instructions.docx
DOCX
8Network Security April 2020FEATUREAre your IT staf.docx
9©iStockphotoThinkstockPlanning for Material and Reso.docx
a 12 page paper on how individuals of color would be a more dominant.docx
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx
92 Academic Journal Article Critique  Help with Journal Ar.docx
A ) Society perspective90 year old female, Mrs. Ruth, from h.docx
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx
9 AssignmentAssignment Typologies of Sexual AssaultsT.docx
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx
900 BritishJournalofNursing,2013,Vol22,No15©2.docx
9 Augustine Confessions (selections) Augustine of Hi.docx
8.3 Intercultural CommunicationLearning Objectives1. Define in.docx
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx
800 Words 42-year-old man presents to ED with 2-day history .docx
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx
8.0 RESEARCH METHODS These guidelines address postgr.docx
95People of AppalachianHeritageChapter 5KATHLEEN.docx
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx
8-10 slide Powerpoint The example company is Tesla.Instructions.docx
8Network Security April 2020FEATUREAre your IT staf.docx
Ad

Recently uploaded (20)

PDF
Insiders guide to clinical Medicine.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
01-Introduction-to-Information-Management.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Pharma ospi slides which help in ospi learning
PDF
Sports Quiz easy sports quiz sports quiz
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Computing-Curriculum for Schools in Ghana
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Institutional Correction lecture only . . .
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Supply Chain Operations Speaking Notes -ICLT Program
Insiders guide to clinical Medicine.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
01-Introduction-to-Information-Management.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Microbial disease of the cardiovascular and lymphatic systems
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Pharma ospi slides which help in ospi learning
Sports Quiz easy sports quiz sports quiz
2.FourierTransform-ShortQuestionswithAnswers.pdf
Computing-Curriculum for Schools in Ghana
PPH.pptx obstetrics and gynecology in nursing
Institutional Correction lecture only . . .
Final Presentation General Medicine 03-08-2024.pptx
Cell Structure & Organelles in detailed.
Abdominal Access Techniques with Prof. Dr. R K Mishra
Supply Chain Operations Speaking Notes -ICLT Program

IT 200 Network DiagramBelow is the wired network configurat.docx

  • 1. IT 200: Network Diagram Below is the wired network configuration for Swagger Distribution. Use this to create and describe a Visio diagram of a wireless networking configuration appropriate for the company. Describe all aspects of the network using IT terminology. Source: http://www.cityinfrastructure.com/Data/PhysicalDiagram.png Assignment #10 (10 points) Using MySQL SELECT commands answer the questions listed below using the Tiny Video schema used in your previous assignment. Submit via the D2L drop box the final SQL script for each problem. All questions are worth 2 points each. 1. Write a query to display the columns listed below. The query should list each customer once, whether they have rented a movie or not. Where the customer has rented a movie it should show only the first rental date. The output should be sorted by
  • 2. membership number. 2. Write a query to display the columns listed below. The query should list each customer who has not rented a move. The output should be sorted by membership number. 3. Write a query to display the columns listed below. The query should list each customer where the total detail rental fee is greater than twice the overall average detail rental fee. The output should be sorted by membership number. (Hint: A HAVING clause will be needed) 4. Write a query to display the columns listed below. The query should list each customer in which the video rental is overdue. The Days_Overdue column should calculate the number of days overdue based upon the due date and return date. The output should be sorted by membership number and then by the detail due date. 5. Write a query to display the columns listed below. For each customer the query should show the current system date, the current day (when you do the problem the date and day will be different), the number of characters in the member last name, the last date the customer rented a video and how many total videos the person rented. 1
  • 3. IT 200: Program Code Below is the code that is currently displayed on the computer screen at Swagger Distribution every morning when employees log on to their computers. The new owner would like you to add a second line that tells employees, “Welcome to Swagger Distribution!” It should go before the current date. The new owner would also like you to change the word “Current” to “Today’s” on the date output. (Hint: To add a second line of output code, simply add a second System.out.print in the statement.) Take this code to www.ideone.com. Important: On the bottom left of the compiler window, ensure that the toggle menu states Java and not another programming language. (The compiler automatically defaults to whatever language was used last.) Enter the code into the line that states: “// your code goes here”. When you are ready to compile and run the code, click the green “run” button. Take a screenshot of your output. Use terminology you learned in this module to identify three components of the modified code. Below is the code. Be sure to copy and paste it exactly as is so you do not pick up any hidden characters. Make your changes in the ideone.com compiler. IT 200: Final Project Guidelines and Grading Guide
  • 4. Overview Successful professionals in the IT environment need to be familiar with the fundamental IT tools and applications that are used in everyday functions and know how these tools and applications interrelate. The final project for this course is a Company Consult Debrief that illustrates a systems view of a company’s technology infrastructure and the interrelationships between components such as networks, data management, programming, web technologies, and information assurance. A detailed company scenario is provided, with supporting databases, tables, table inventory, and query orders. Three formative milestones support the development of the project. These are designed to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Three, Five, and Six. The final submission will occur in Module Seven. This assessment will assess your mastery with respect to the following course outcomes: structured situations technologies for specific professional environments rationalizing recommendations for business environments
  • 5. developing a systems view of information technology Prompt Scenario: A new owner has purchased Swagger Distribution Company, a company that distributes clothing and apparel. She does not have experience with IT- related problem solving, so she contracting you, an IT consultant, to help. The company has six distinct IT areas that you will need to understand. The six areas are described in detail in the following paragraphs. Throughout the course you will focus on the individual areas of the company, and then toward the end of the course you will summarize the IT infrastructure as a whole. 1. Human–computer interface: Describe the software program most often used by the employees and the HCI. 2. Database: Demonstrate simple additions to the tables provided by the company. 3. Programming: Navigate a provided block of code and make desired changes. 4. Network: Contrast wired and wireless network setups for the company. 5. Web technologies: Examine the key components that would be utilized with a new website. 6. Security: Recommend potential information security adoptions by the company. Please review the Final Project Scenario document for further details. Your Company Consult Debrief should address the following prompt: The new owner of Swagger Distribution Company, a
  • 6. company that distributes clothing and apparel, does not have experience with IT-related problem solving, so she is contracting you, an IT consultant. You will review the company’s technology http://snhu- media.snhu.edu/files/course_repository/undergraduate/it/it200/it _200_final_project_scenario.docx infrastructure and the interrelationships between components such as networks, data management, programming, web technologies, and information assurance. You will assess the current infrastructure and programming modifications, network optimization, and improvements to security procedures, and provide your feedback and recommendations. Specifically, the following critical elements must be addressed: I. Human–Computer Interaction (HCI) Consult a. Summary – Summarize the human–computer interactions (HCI) problem the company is experiencing. Be sure to list all aspects of the problem and explain their importance to the usability of the software. For example, you might identify components of Microsoft Office applications such as Word or Visio, discussing all aspects of the HCI and explaining their importance to the usability of this software. b. Recommendation – Suggest an enhancement to one of the applications for improving its HCI, providing supporting examples/research for your
  • 7. suggestion. c. Illustration – Create a one-page tutorial for Microsoft Visio, including component screenshots, for new employees who are familiar with Microsoft Word but have never used Microsoft Visio. To comprehensively address this element, you should cover at least two basic functions and/or menu options. d. Identification – Use fundamental IT terminology to label components in the tutorial and appropriately in the summary. To comprehensively address this element, you would label at least five components in the tutorial. II. Information Management/Database (IMD) Consult a. Summary – Summarize the information management/database (IMD) items of the distribution company, listing all tables and all queries, summarizing what the tables contain and what the queries do. b. Edit – Based on the information provided, add a new data type to the table, enter the data, and describe your actions. III. Programming Consult a. Modification – Based on the request provided by the new owner, change the display message of the provided code that is currently used to a new display message. b. Illustration – Include the key components of the line of code provided, highlight what needs to be modified, and provide the revised code. c. Identification – Use fundamental IT terminology to label components of the code provided.
  • 8. IV. Networking Consult a. Summary – Summarize the wired networking configuration from the diagram provided and use this to create and describe a Visio diagram to represent a wireless networking configuration appropriate for the company. b. Identification – Use fundamental IT terminology to label all aspects of the network components in the visual representation. V. Web Technologies Consult a. Summary – Summarize key components of a potential website that would effectively address the company’s needs. In order to comprehensively address this element, you should include at least 10 components in your summary. b. Recommendation – Provide practical suggestions on aspects that would ensure the quality of the website in meeting the company’s needs, explaining your rationale behind the proposed suggestions. c. Illustration – Provide a visual representation of these components as deployed in an existing website or websites that will support the functionality you address in your recommendations. For example, this is where you might supply screenshots of aspects of the website that would support the functionality your suggestions offer. VI. Information Security Consult
  • 9. a. Summary – Summarize the information security issues facing the company and discuss information security practices, providing real examples of information security assurance failures that can be used in helping the client to understand the risk. b. Recommendation – Recommend information security practices that will address these issues. Provide supporting examples/research/justification for your recommendations. VII. Summary of IT Systems Consultations a. Interrelationships – Explain how network, database, web technology, computers, programming, and security systems interrelate using the distribution company as an example. b. Conclusion – Provide a clear rationale to illustrate the importance for this company to understand IT technologies and to stay informed of changes and new risks to its IT system. Milestones Milestone One: HCI, IMD, and Programming Consult Summaries In Module Three, you will submit a document summarizing the HCI, IMD, and programming components of the distribution company, including your suggestions for changes. A visual representation will be submitted for each summary using appropriate IT terminology. This milestone is graded with the Milestone One Rubric. Milestone Two: Network and Web Consult Summaries In Module Five, you will submit a document summarizing the
  • 10. wired and a potential wireless network configuration and a summary of suggested web technologies for the website for the distribution company using appropriate IT terminology. A labeled, visual representation of the wireless network configuration will be submitted. This milestone is graded with the Milestone Two Rubric. Milestone Three: Information Security Consult Summary In Module Six, you will submit a document summarizing information security needs and recommended practices of the distribution company. A visual representation of the information security system will be submitted, labeled using appropriate IT terminology. This milestone is graded with the Milestone Three Rubric. Final Product: Company Consult Debrief—Overall System Summary In Module Seven, you will submit a final document that builds upon all of the previously completed milestone summaries to provide an overall summary of the distribution company’s IT system as a whole, illustrating how each individual system/component (network, database, web technology, computers, programming, and security systems) interrelates with others. Provide a clear rationale to illustrate the importance for this company to understand IT technologies and to stay informed of changes and new risks to its IT system. It should be a complete, polished artifact containing all the critical elements of the final product. It should reflect the incorporation of feedback gained throughout
  • 11. the course. It will be graded using the Final Product Rubric. Deliverables Milestone Deliverables Module Due Grading 1 HCI, IMD, and Programming Consult Summaries Three Graded separately; Milestone One Rubric 2 Network and Web Consult Summaries Five Graded separately; Milestone Two Rubric 3 Information Security Consult Summary Six Graded separately; Milestone Three Rubric Final Product: Company Consult Debrief - Overall System Summary Seven Graded separately; Final Product Rubric Final Product Rubric Requirements of Submission: Written components of projects must follow these formatting guidelines when applicable: double spacing, 12-point Times New Roman font, and one-inch margins. The paper should be five to seven pages in length, not including cover page and resources, and written in paragraph form. Tables should be prepared in Microsoft Access. Diagrams should be prepared using Visio.
  • 12. Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions. Critical Element Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value HCI Consult: Summary Meets “Proficient” criteria and uses industry-specific language to establish expertise Comprehensively lists aspects of the human–computer interactions (HCI) problem and explains their importance to the usability of the software Lists aspects of the human– computer interactions (HCI) problem, but does not explain their importance to the usability of the software, or description lacks detail or is not accurate Does not list aspects of the human–computer interactions (HCI) problem
  • 13. 6 HCI Consult: Recommendation Meets “Proficient” criteria and suggestion is well-informed and integrates relevant theories and research Suggests enhancement for improving HCI and justifies suggestion with examples or research Suggests enhancement for improving HCI, but does not justify suggestion with examples or research, or suggestion is not appropriate Does not suggest enhancement for improving HCI 6 HCI Consult: Illustration Meets “Proficient” criteria and provides comprehensive details for understanding of Microsoft Visio Creates a Microsoft Visio
  • 14. tutorial, including screenshots, covering basic functions for new employees who are familiar with Microsoft Word Creates a Microsoft Visio tutorial for new employees who are familiar with Microsoft Word, but does not include screenshots, or tutorial is unclear or lacks detail Does not create a Microsoft Visio tutorial 5 HCI Consult: Identification Meets “Proficient” criteria and establishes expertise using specific industry language Accurately labels components of the tutorial and summary using fundamental IT terminology Labels components of the tutorial and summary using fundamental IT terminology, but labels are not accurate Does not label components of the tutorial and summary
  • 15. 4 IMD Consult: Summary Meets “Proficient” criteria and uses industry-specific language to establish expertise Comprehensively summarizes the information management/database items Summarizes the information management/database items, but summary lacks detail or is not accurate Does not summarize the information management/database items 6 IMD Consult: Edit Meets “Proficient” criteria and description is comprehensive Accurately adds new data type to table, enters data, and describes actions Adds new data type to table but does not enter data or new data type is not accurate
  • 16. Does not add new data type and data to table 4 http://snhu- media.snhu.edu/files/production_documentation/formatting/rubr ic_feedback_instructions_student.pdf Programming Consult: Modification Meets “Proficient” criteria and modification is described using industry-specific language Accurately changes the display message of the code as requested Changes the display message of the code, but change is not accurate or does not comply with request Does not change the display message of the code 4 Programming Consult: Illustration Meets “Proficient” criteria and
  • 17. identifies key components demonstrating expertise in using code Includes the key components of the line of code provided, highlights what needs to be modified, and provides the revised code Includes the key components of the line of code provided, but does not highlight what needs to be modified or does not provide the revised code Does not include the key components of the line of code provided 6 Programming Consult: Identification Meets “Proficient” criteria and uses professional language Accurately labels components of the code provided using fundamental IT terminology Labels components of the code provided using fundamental IT
  • 18. terminology, but labels are not accurate Does not label components of the code provided 4 Networking Consult: Summary Meets “Proficient” criteria and the proposed wireless configuration is logical and appropriate for the business needs Comprehensively summarizes the wired network configuration for the company, creates and describes a visual representation of a wireless configuration for the company Summarizes the wired network, attempts to create and describe a visual representation of a wireless configuration for the company, but key aspects of the configurations are missing or not correctly identified Does not summarize the network configuration for the company, or does not create and describe a visual
  • 19. representation of a wireless configuration 6 Networking Consult: Identification Meets “Proficient” criteria and uses professional language demonstrating an advanced understanding of networking concepts Accurately labels components of the network in the visual representation using fundamental IT terminology Labels components of the network in the visual representation of the wireless configuration using fundamental IT terminology, but labels are not accurate Does not label components of the network in the visual representation 4 Web Technologies Consult: Summary Meets “Proficient” criteria and
  • 20. explanation demonstrates an advanced understanding of web technology options Comprehensively summarizes key components of a website that would effectively address the company’s needs Summarizes key components of a website, but summary lacks detail or does not address the company’s needs Does not summarize key components of a website that would effectively address the company’s needs 6 Web Technologies Consult: Recommendation Meets “Proficient” criteria and makes suggestions for optimal performance Provides practical suggestions on aspects that would ensure the quality of the website in meeting the company’s needs and explains the rationale behind proposed suggestions
  • 21. Provides practical suggestions on aspects that would ensure the quality of the website in meeting the company’s needs, but does not explain the rationale behind proposed suggestions Does not provide practical suggestions on aspects that would ensure the quality of the website in meeting the company’s needs 6 Web Technologies Consult: Illustration Meets “Proficient” criteria and demonstrates the applicability of the recommended web technologies to the company through choice of highly relevant examples for this professional environment Provides an accurate visual representation of aspects as deployed in an existing website or websites that supports
  • 22. functionality addressed in recommendations Provides a visual representation of aspects as deployed in existing website or websites but representation does not support functionality addressed in recommendations or is not accurate Does not provide a visual representation of aspects as deployed in existing website or websites 6 Information Security Consult: Summary Meets “Proficient” criteria and examples of information security assurance failures are relevant to the company in the scenario Comprehensively summarizes the information security issues facing the company and discusses information security practices, and provides real examples of information security assurance failures Summarizes the information
  • 23. security issues facing the company but does not discuss information security practices or does not provide real examples of information security assurance failures Does not summarize the information security issues facing the company 6 Information Security Consult: Recommendation Meets “Proficient” criteria and recommendations are well supported with relevant examples and/or research Recommends appropriate information security practices that address issues and justifies recommendations with examples and/or research Recommends information security practices but recommendations are not appropriate or are not justified with examples and/or research Does not recommend
  • 24. information security practices 6 Summary: Interrelationships Meets “Proficient” criteria and illustrates expertise demonstrating a systems view of IT Describes the interrelationships among network, database, web technology, computers, programming, and security systems using the company as an example Identifies the interrelationships but description lacks detail in how the components are connected with one another within this company Does not describe interrelationships 6 Summary: Conclusion Meets “Proficient” criteria and provides specific examples from similar organizations encountered during research Comprehensively justifies the
  • 25. importance for this company to understand IT technologies and to stay informed of changes and new risks to its IT system Explains the importance for this company to understand IT technologies and to stay informed of changes and new risks to its IT system but rationale lacks detail or key considerations for this company Does not explain the importance for this company to understand IT technologies and to stay informed of changes and new risks to its IT system 6 Articulation of Response Submission is free of errors related to citations, grammar, spelling, syntax, and organization, and is presented in a professional and easy-to- read format Submission has no major errors related to citations, grammar, spelling, syntax, or organization Submission has major errors
  • 26. related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas 3 Earned Total 100% [Type text] IT 200: Final Project Scenario A new owner has purchased Swagger Distribution Company, a company that distributes clothing and apparel. She does not have experience with IT-related problem solving, so she is contracting you, an IT consultant, to help. The company has six distinct IT areas that you will need to understand. The six areas are described in detail in the following paragraphs. Throughout the course you will focus on the six distinct IT areas for the company and then at the end of the course you will expand upon
  • 27. this work and summarize the IT infrastructure as a whole. 1. Human–Computer Interface (HCI) On a daily basis Swagger Distribution’s employees log in to the company’s network and utilize many different types of software and the internet. They use Microsoft Word and Microsoft Visio on a daily basis. Summarize the human–computer interface (HCI) of these two software applications. Be sure to note any commonalities among the applications and note any metaphors that are utilized. Suggest one enhancement to one of the two applications that would improve HCI, supported by at least one example for the suggestion. Use this information to create a one-page tutorial for new employees who are familiar with Microsoft Word but have never used Microsoft Visio. This tutorial only needs to introduce two basic functions and/or menu options. Incorporate connections to human intuition and similarities to MS Word when possible. 2. Databases Swagger Distribution’s partners/customers include a variety of clothing companies. Swagger Distribution utilizes a database to store information on the partner companies and the orders that are received. You will review the provided database for Swagger Distribution and summarize what the tables contain and what the queries do. Be sure to apply key terms that you have learned such as “metadata.” Based on information provided, you will change one data type in one of the tables. 3. Programming Every day when an employee of Swagger Distribution signs on to her computer, a pop-up window opens and gives a greeting to the employee. The new owner would like to continue to have the pop-up window but now would like to change the greeting. You
  • 28. will open up the current code and identify the key components of the code that need to be changed and make those changes. Submit the modified code and identify the various components of that code. 4. Networking There are two possible configurations for Swagger Distribution’s network, a wired version and a wireless version and use this to create and describe a Visio diagram to represent a wireless networking configuration appropriate for the company. Provide a screenshot of the Visio diagram of the wireless configuration to accompany the description. Use IT terminology learned during the networking module. 5. Web Technologies Swagger Distribution is in the process of designing a new website using HTML5 (HyperText Markup Language). Summarize at least 10 key components of a potential website. You will not need to write any code, but ensure that you use the terminology discussed during the web technologies module. Include as much detail as possible. You will provide two practical suggestions for a quality website. Identify an example of a website that demonstrates the two features you are recommending (you can provide two websites if you cannot find one that has both). Provide a visual representation with screenshots showing the two features. 6. Information Security There is no current information security standard at Swagger Distribution. You know that one needs to be implemented. Summarize two key information security practices you recommend the company implement. Provide supporting
  • 29. examples/research/justification for your two recommended information security practices. Use appropriate terminology learned from the security module. Additionally, describe a real- world example of an information security and assurance failure that can be used to help the client understand why information security is important.