The Portfolio Project is due at the end of Week 8, the last week, and in Module 8, the final module of the course. This assignment is designed to allow you to display your mastery of the material and to provide you with a creative and realistic way to apply the knowledge and experience you gained from ITS405.
Create a detailed, organized, and unified technical solution given the scenario described below. Your solution should draw on the content presented in the course. The outline below lists points/topics to cover. You are free to provide additional, related information. Provide technical and justification reasons for each choice, citing resources as appropriate.
Option #2: You work in the IT department for a software development firm. The firm is interested in setting up a server lab environment that requires a Windows Active Directory infrastructure.
This lab will require centralized management of user identity, resources, and data. The firm is interested in using this lab environment to create and test software that they develop for clients. The lab should also allow them to test other technical scenarios that concern the firm.
The firm is very interested in the new Container feature offered in Windows Server 2016. This will require the ability to use Containers to develop and test applications and software that the firm is working on.
The firm is also concerned about its ability to recover and continue business operations in the event of a major disaster. Therefore, the lab will be used to perform and test high availability and disaster recovery scenarios without having a major impact on software development and testing activities currently taking place in the lab.
Address each of the following topics in your plan:
Deployment and Server Editions
How many total servers are needed? Which roles will be combined?
What edition of Windows will be used for each server (e.g., Standard, Datacenter)?
Will Server Core be used on any servers?
Where are each of the servers located (which of the two sites)?
This environment should replicate a real production Active Directory environment.
Number of AD domains? Keep in mind that this is a test lab where a variety of scenarios will require testing. Make sure you discuss domain name design.
Will there be any Read-Only Domain Controllers? Explain why or why not.
How will AD organizational units be organized (considering how group policy will be used and users will be organized?
Discuss requirements for deploying Active Directory.
Discuss the role that containers play and how they can benefit the firm.
How will clustering be utilized?
What role will load balancing play?
Discuss the role of Hyper-V and benefits.
How will Hyper-V high availability be achieved?
What role will Windows Backup Server play?
Discuss backup strategies.
Is a third-party backup and recovery solution required?
How will Windows Server Update Services be utilized?
Discuss a plan to keep Servers updated and patched with minimal interruption to servers and services. Keep in mind, Microsoft issues patch and updates to its operating systems and software the second Tuesday
(Links to an external site.)
of each month. Your plan should be based on this schedule.
Discuss the importance of system monitoring.
Describe tools available for monitoring Windows Servers.
Include one Windows Server 2016 tool that is not included in the readings or text. This may require additional research.
Your paper should be 6-8 pages in length (not including diagrams) and conform to the standards in the CSU Global Writing Center
(Links to an external site.)
. Include at least one diagram illustrating your chosen Active Director design with DNS namespace hierarchy. Include no fewer than three scholarly references in addition to the course textbook, readings, and media. The CSU Global Library is a good place to find these refere
It is important to assure the continuous and proper operation of
information systems in business continuity planning and information
recovery in disaster recovery.
For details on issues to consider in Business Impact Analysis, refer to Contingency planning guide for federal systems NIST 800-34.
Use this non-graded activity to test your knowledge.
In this project, you will set recovery objectives for a web-based
e-mail and customer applications used by a private organization. The
recovery objectives to be set are Recovery Point Objective (RPO),
Recovery Time Objective (RTO), Recovery Consistency Objective (RCO), and
Recovery Capacity Objective (RCapO).
You need to justify the recovery targets you set. You should employ
reasonableness for the organization and not go “overboard” and suggest
an elaborate scheme that few organizations would find economically
An e-mail application was chosen as the context, as this should be a
clearly understood application upon which to apply the concepts of
After reviewing the above materials, write a 3- to 5-page paper:
Address the following issues in your paper:
Recovery standards for a web-based email system used by private
organization for communication with customers and internally: Recovery
Point Objective (RPO), Recovery Time Objective (RTO), Recovery
Consistency Objective (RCO), and Recovery Capacity Objective (RCapO).
Week 5 Assignment – Case Study: Transforming the Organization
Use the Week 5 Case Study Template [DOCX] to complete this assignment.
Congratulations! The executives are taking your information system proposal seriously. In fact, they think it has the potential to transform the way the organization works.
The CIO asked you to read Too Much of a Good Thing to think about what resources you will need to get your new information system up and running. Please also view the video How Tech Companies Are Revamping the Remote-Work Experience so you can recommend a change management pattern for your company to follow.
Write a memo to the CIO that describes how to implement your information system into the organization. Please focus on these topics:
How much of the implementation work can you handle? What additional resources (people, information, time, money, et cetera) will expedite the process so you don’t end up like Susie Jeffer?
What is your change management strategy? Provide an outline. Consider:
What new equipment and software are necessary?
What training and support will the staff need?
How will the staff complete their work during the transition period?
Do you anticipate other areas of resistance?
The CIO is very skeptical, so provide evidence that your assessment is accurate and complete. It can be difficult to admit to personal limitations!
Your memo should be 3–5 pages long.
If you use sources to support your writing for this assignment, choose sources that are credible, relevant, and appropriate. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.
The specific course learning outcome associated with this assignment is:
Develop an information systems solution to address an organizational problem.
This is the reading and video to assist with this case study assignment
1.1.3: Present ideas in a clear, logical order appropriate to the task.
2.1.3: Explain the significance of the issue or problem.
4.1.2: Engage in regular and consistent communication and meetings with team members and external project stakeholders.
4.2.4: Prepare a finished teamwork product.
10.1.1: Identify the problem to be solved.
12.9.1: Describe organizational compliance with government legislation that impacts technology.
12.9.2: Explain organizational compliance with industry regulations.
12.9.3: Explain compliance with organizational policies.
13.1.2: Describe the various processes that affect policies, processes, and procedures.
14.1.1: Explain how ethical principles used in the information technology industry apply to the welfare and safety of stakeholders and society.
Week 5 Assignment: Transaction Requirements. SQL Queries Assignment Content For this assignment, you need to submit your code (SQL script or document), including structure from the Data Definition Language (DDL) and the Data Manipulation Language (DML). Use these SQL Statements as a starting point for your script. The data manipulation language (DML) is used to create, read, update, and delete data from a table. The data definition language (DDL) is used to create and alter the structure of the database itself, like creating a table, its columns, define and modify the primary and foreign keys, stored procedures, delete columns, tables, and even the entire database. Your SQL statements should require a variety of SQL capabilities, such as various kinds of join, aggregate functions, etc. (This presupposes a good initial domain choice.) Remember you must turn in code (or documentation) of the results of these tests indicating that the SQL statements for your requirements worked correctly and that your constraints correctly allowed good data and caught bad data. Your document must include comments (handwritten or entered as SQL comments in a text file) that indicate what each test is testing – i.e. a specific requirement (if “good” data) or a specific problem you were catching (if testing a constraint on “bad” data). Follow these steps to complete your assignment: Populate your database with sample data to allow testing of the schema and the various transactions. Each table should have a minimum of ten rows. After you’ve entered data, create some sample queries to see if the output is what you expected. Create some sample reports to make sure these also produce similar results. Make any necessary corrections to the database design during this stage and before you enter all of your personal records. If you find any problems, correct the design. Enter all of your personal records. Write your SQL Script. Submit your code (SQL script or document), including structure from the Data Definition Language (DDL) and the Data Manipulation Language (DML). Please follow the rubric attach to this project.
Assignment 5 (6 Questions) Answer the following assigned questions based on the topics from Chapter 20 from your (Health Information Management: Concepts, Principles, and Practice) book and from external sources. (You must reference both the provided textbook chapter and the external scholarly sources.) ——————— From Chapter 20: Q1. How does quasi-experimental research differ from experimental research? Q2. When would researchers choose to conduct a meta-analysis? Q3. What common mistake(s) do researchers make in data collection? ———————- Read & Research your answers from external sources only for the following last three questions below: (You may use your 2nd book as an external source, but best to use other external sources.) Q4. What is Exploratory Data Analysis (EDA)? and what is “Knowledge Discovery” Data mining (KDD)? Provide detail information. Q5. With regards to Data Mining Models, What is SEMMA? Q6. What are legal and ethical implications of data mining? ———————- Please pay attention to the Assignment Grading Rubric: Note: Assignment 5, regarding answering questions on Chapter 20, please incorporate “1 or more” external sources for every question answered for full points. (You may use your 2nd book as an external source) Minimum 500 words applies to the total minimum number of words for all the questions answered within the assignment. Not necessarily minimum 500 words per question answered within assignment. Turnitin Requirements: For each assignment, your similarity score must meet a threshold of no more than 20%. Assignments with greater than 20% similarity must be revised and resubmitted to Turnitin until the 20% threshold is achieved. For resubmissions, it may take up to 24 hours for a new similarity score. It is your responsibility to allow enough time to receive a Turnitin similarity score report. Assignments with more than 20% threshold will receive a zero. Do not copy the assignment questions into your answer file when submitting. This should help with keeping your TII below 20% threshold. Also when using information verbatim from a source please “quote” properly to keep your TII below 20% threshold.
a report on which team members developed each part.
Project things to do: Create table, add integrity, primary keys, foreign keys,
and start inserting data.
We need to
define the relationship between Orders Tables and Pizza and Nonpizza Tables
(including all sub-Tables) to ensure data flows appropriately.
Team lists of tasks
designated for each person. Please insert the data in the table assigned to
Shamyog: Pasta, Sauces, Chips, Fountain_Drinks
Yasmin: Specify the relationship between each table and make
sure Primary Keys and Foreign Keys specified based on the relationship
Ahmed: Customers, Pizza_Toppings, Sizes, Store,
Wenjian: Pizza_Toppings, Toppings,
and Employees, Cookies
Kevin: Orders, Chicken_Wings, Toppings, Cheese_Breads,
Alana: You will ensure all parts flow well when
it is submitted.
a report who developed each part of this experience.
It is time to consider how you will approach the development or acquisition of the application or system that you have designed.
For this assignment, you will develop 2 proposals for your development strategy: (1) outsourcing (buy), and (2) insourcing (make). You will present the pros and cons of each. Finally, you will make a recommendation on which is the best proposal or strategy.
In a 3-5 page paper, complete the following:
Develop a proposal for each of these approaches: insourcing, outsourcing, and a combination of the two.
Present the pros and cons or benefit analysis for each of the 3 proposals.
Recommend 1 of these proposals and your reason for selection of that proposal.
Name the document “yourname_IT425_IP4.doc.”
Individual Project Rubric
The Individual Project (IP) Grading Rubric is a scoring tool that represents the performance expectations for the IP. This Individual Project Grading Rubric is divided into components that provide a clear description of what should be included within each component of the IP. It’s the roadmap that can help you in the development of your IP.
Expectation Points Possible Points Earned Comments
Insourcing approach: students are expected to propose and insourcing approach and present the pros and cons of this approach
Outsourcing approach: students are expected to propose and Outsourcing approach and present the pros and cons of this approach
Combination approach: students are expected to propose and Combination approach and present the pros and cons of this approach
Recommendation and reasoning: students are expected to recommend 1 of these proposals and a reason for selecting of that proposal.
Organization: Assignment presents information logically and is clearly relevant to discussion topic.
Professional Language: Assignment contains accurate grammar, spelling, and/or punctuation with few or no errors. (APA formatting is required or style specified in assignment).
Key Assignment Draft
The project is going well so far, and the analysis and discussion of the vulnerabilities was well-received. You realize that when vulnerability scanning takes place, employees need to know what the expectations are for handling the findings. You want to ensure that the policies and expectations for action are in place. Discuss the following:
The purpose of a policy
Create a policy for your organization that will cover one of the following (choose just 1):
Vulnerability Assessment and Handling
Add the discussion about the definition of a policy and the sample policy to the section titled: Intrusion Detection System Policies.
the attached document with my professor’s feedback required a couple of editing and one-page “significance of the study” & hypotheses. this is for doctoral dissertation and required APA 7th edition make sure to check the attached dissertation proposal “highlighted yellow section”