Please read the document attached and answer the questions in the word document

Description

Please read the document attached and answer the questions in the Word document. please don’t use chatGPT and or any AI tool to answer the questions, these tools can only be used to help answer the question and not to copy the answers

Don't use plagiarized sources. Get Your Custom Assignment on
Please read the document attached and answer the questions in the word document
From as Little as $13/Page

Unformatted Attachment Preview

ISEM 500 – HOMEWORK-02
HU ISEM 500
Homework 2 (Individual) 100-Points
This an individual assignment. You are responsible for completing the sections discussed below.



Part A: Adult Learning Center Database Design
Part B: Security Model
Part C: Lecture Review Questions
Note: Artifact submitted will be a single M.S. Word Document with combined responses for
both Part A, Part B, and Part C of the homework assignment and then uploaded into Canvas
using the designated course assignment link. Be sure to properly site your references.
Part A: Adult Learning Center Database Design – 60 Points Total
Review lecture notes and chapter readings regarding databases, networks, Internet, and security
Chapters 7, 8, and 9)
Create a database for an adult learning center. This is a adult learning center with 5
departments, 25 staff members (instructors and support staff), and offers 15 courses in 4
categories (i.e., business, technology, arts/crafts, & Wellness). Apply the concepts learned and
complete following:
• Outline the core business requirements (Provide a list of the core functional requirements and
nonfunctional requirements for the database).
• Create a conceptual model for adult education center the relational database
• Design and provide a logical data model of a relational database that will be used in this
center. Provide an illustration of your Entity-Relationship Diagram -ERD aligned to your
conceptual model and requirements outlined earlier. The logical data model represents the
overall structure of data required to support the business requirements independent of any
software or data storage structure. You should outline at least 6 major database tables and
their respective details (e.g., table names, list of fields, designate primary and foreign key
fields), cardinalities, and interrelationships.
• List 10 database queries that the company will use most commonly with these databases.
Describe intent of SQL statement in English and then provide a corresponding SQL
statement that aligns with your database architecture (ERD).
Part B: Security Model – 30 Points Total
Review lecture notes and chapter readings regarding databases, networks, Internet, and security
Chapters 7, 8, 9, 12) and answer the following questions:

What type of requirements drive a security solution?
ISEM 500 – HOMEWORK-02



What are the main management issues in developing a sound security system?
What is cryptography and what are the key differences between the symmetric and
asymmetric key cryptography?
What security approaches/considerations and technologies should be used for the Adult
Education Center (introduced in Problem 1) to protect corporate assets (i.e., Outline layered
approach addressing: applications, database, data/information, and network using table
below)
Domain
Education Security Model
Considerations/Approaches
Technologies
Network
Data/Information
Database
Applications
Part C: Review Course Lecture Notes and answer the following questions (10Points):
1. What is SQL and how is it used in a database?
2. What administrative functions does the database management system (DBMS) provide?
3. What are conceptual, logical, and physical database models?
4. Explain the difference between a centralized and distributed database architectures?
5. List and explain the five IT Services Lifecycle phases?
6. What is the primary protocol used for in packet switched networks?
7. What is the difference between a LAN, WAN, and MAN?
8. List and explain two network topologies?
9. What are the three primary cloud computing models and four deployment methods?
10. What is the significance of the OSI reference model?
11. What are the three primary controls used in security management to protect corporate
assets?
Adult Learning Center Requirements
1. Ability to create, maintain records of adult learners
2. Ability to schedule courses for adult learners
ISEM 500 – HOMEWORK-02
3.
4.
5.
6.
Ability to create induvial course schedules and reports
Ability to create and maintain records of course instructors
Ability to create and maintain records of courses by category
Ability to create and maintain records of all the adult learning center training
departments (i.e., Technology, Arts & Crafts, Music, Personal Finance, Gardening, Health
& Wellness, etc.)
7. Ability to assign course instructors to their respective adult learning center departments
8. Ability to create and maintain various course categories
9. Ability to create, update, and delete courses in each category
10. Ability to create reports (must align to DB Tables and associated SQL statements):
a. Listing of all adult learners (current and past) and address of record and contact
information.
b. Listing of all instructors (current and past) and address of record and contact
information.
c. Listing of all instructors by their assigned departments
d. Listing of all course offerings by course category
e. Listing of all course categories
f. Listing of all adult learners enrolled in a course offering
g. Listing of all the adult learning center departments

Purchase answer to see full
attachment