Free Essay

Lab 2 Unit 2

In: Computers and Technology

Submitted By A1grumpy
Words 342
Pages 2
Lab 2.1 1. What are the Regulatory requirements? 2. What are medical rules or laws of private information that we need to know to set up this Database with the customer information (Data privacy)? 3. Please give me any specific requirements that are necessary?
Business rules 1. Appointments 2. Social security 3. Medical record 4. Driver license

1. Middle initial 2. Are you a Jr. or Sr.

Patient Entity | Patient Visit entity | 1. Medical record number | 1. Group number, appointment | 2. Social security number, Driver license | 2. Allergies | 3. Taking any medications | 4. Taking any medications | Composite key | Composite keys are the most common. |

Make sure patient fills out all the whole application.

Lab 2.2
Data Requirements 1. Allow Software Management Team and IT Staff to view, add, edit, and delete the types of software to be tracked. This includes type of software, licensing dates, status, and location. 2. Allow Software Management Team to enter, edit, and delete New Software Requests. 3. Allow Software Management Team to view the different licensing agreements and types. This includes viewing the pricing per agreement. 4. Allow Software Management Team to sign out software to users with administrative privileges. 5. Allow Software Management Team and IT Staff to update the status of software licenses. 6. Allow users, assigned IT users, Staff, and Software Management Team to submit requests for new software.
Reporting requirements 1. Allow Software Management Team and IT Staff to view and generate software licensing status reports.
Access and security requirements 1. Cardwell –RM 214 – CCS Number 3214

2. Larson – RM 212 – CCS Number 3114 3. Johnson – CCS Number 2123 – Software Camtasia
List of nouns related to the requirement 1. Cardwell/ RM 214 2. Larson/RM 212 3. Johnson
Entities
1. Cardwell/ Vista Business, Ms Office, PhotoShop, DreamWeaver. 2. Larson/ Vista Business, MsOffice, Visual Studio Pro, DreamWeaver. 3. Johnson/ Camtasia
Identifying attributes 1. Assigned User/ Cardwell-CCS Number 3214 2. Assigned User/ Larson-CCS Number 3114 3. Assigned User/ Johnson-CCS Number 2123
Candidate Key 1. License Type 2. User 3. Requests

Similar Documents

Premium Essay

Unit 2 Lab

...Unit 2 Lab The five characteristics of cloud computing as defined by the NIST is as follows, on demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. On demand self-service is defined as a service provided by cloud computing vendors that enables the provision of cloud resources on demand whenever they’re required. Broad network access is defined as a private cloud network operated within a company’s firewall that are available for access from a wide range of devices such as tablets, PC’s, Mac’s and smartphones. These resources are accessible from a wide range of locations that offer online access. Resource pooling is defined as a situation in which providers serve multiple clients, and customers with provisional and scalable services. These services can be adjusted to suit each client’s needs without any changes being apparent to the client or end user. Rapid elasticity is defined as the ability to provide scalable services. Measured service is defined as aspects of cloud service that are controlled and monitored by the cloud provider. Rackspace offers many options for cloud computing. You can build your own account which you would manage or you can get one for a flat fee an account that Rackspace will manage for you. Services offered by Rackspace are cloud servers, cloud backup, cloud files, cloud load balancers, could database, cloud monitoring, cloud block storage, and cloud bandwidth. Rackspace also offers services...

Words: 260 - Pages: 2

Premium Essay

Unit 2 Lab

...Name: Patricia Sellers Date: November 22, 2013 Instructor’s Name: Trena Woolridge Assignment: SCIE211 Phase 2 Lab Report Title: Speciation Instructions: You will need to write a 1-page lab report using the scientific method to answer the following question: • What would happen if a species within a population were suddenly split into 2 groups by an earthquake that creates a physical barrier like a canyon? When your lab report is complete, post it in Submitted Assignment files. Part I: Use the animated time progression of speciation to help you write up your lab report. Part II: Write a 1-page lab report using the following scientific method sections: • Purpose • What would happen if a species within a population were to suddenly split in two groups by an earthquake that creates a physical barrier like a canyon? • Introduction • Reproduction is a natural and normal thing in our day to day lives. Animals and humans reproduce offspring, all year round. Separation is usually the furthest thing from our minds. But, mother natural can always turn anyone’s world upside down. For Example, What if a really bad earthquake hit, and caused the ground to split and drift far away from one another? Many species would be isolated from their families and environments. • Hypothesis/Predicted Outcome • A species is defined as a group of organisms that are able to interbreed to produce fertile and viable offspring under natural conditions. (Audesirk, (2008)...

Words: 450 - Pages: 2

Premium Essay

Gs1145 Unit 2 Lab 2

...In his article, “Exploring the 3-D printing opportunity” J.Bird touched on several interesting facts about 3-D printing of which I was not aware, including the fact that 3-D printing has been around since the 1980’s. 3-D printing is not a “new” technology, but rather one that is being explored and exploited more now because of patents that have since expired. There are several ways of printing objects in three dimensions including fusing powdered material such as titanium with a laser, dispensing melted plastic through a nozzle, and photo curing plastic resin. 3-D printing is much more environmentally friendly than traditional manufacturing techniques, because traditional cutting and grinding produces more waste. 3-D printing has exciting applications in the medical field: last year surgeons created a replacement jaw for an 83-year old woman in titanium that took 33 layers to form each 1mm of thickness. 3-D printing makes creating one-off objects much more economically viable since there is no need to create specialized tooling, no need to create molds, and it eliminates hours of machining to take the cast item from the mold stage to the finished product. Since there is no need for specialized tooling, product development times can be reduced from months to just weeks. Products can be developed and designed one day and printed overnight for use the next day. The future seems to be limitless for this technology. 3-D printed clothing could be customized to the individual’s physiology...

Words: 489 - Pages: 2

Premium Essay

Nt1310 Unit 2 Lab 2

...Overview: Lab 2 The purpose of Lab 2 was to examine the role and nature of restriction enzymes as well to take the first steps in producing a recombinant DNA molecule. Plasmids are circular DNA pieces found in bacterial cells. Plasmids are used in genetic engineering to expedite gene cloning and gene expression (through protein production) in bacteria. Through cloning, antibiotic resistance genes have been placed inside of plasmids and the antibiotic resistance genes function as selectable markers – genes that allow scientists to select between bacteria that do and do not have the plasmid. If a bacterium does in fact possess a plasmid that has an antibiotic resistance gene then that particular bacterium will be able to reproduce in an environment with that specific antibiotic present. Bacteria that do not possess a plasmid with an antibiotic resistance gene will not be able to grow. Therefore, antibiotics can be used to pin point bacteria that are resistant and presumably contain a plasmid with the resistance gene from those that are not resistant...

Words: 1327 - Pages: 6

Premium Essay

Unit 2 Lab 2: Self - Control

...Jaime H. Cabigtnig Unit 2 Lab 2: Self - Control TEMPTATION |WHAT WILL I DO IF I YIELD TO TEMPTATION?|WHAT WILL I DO IF I BEHAVE HOW I WANT MYSELF TO BEHAVE?| Leaving work earlier|I will not make the money that Is owed to me|Know that the extra money will benefit my family| Cursing|Donate $2 to charity|Reward myself with a positive word for today| Lying|Defame my character to my boss or co-workers|I will develop a good reputation of dependability with my co-workers | Quick to anger|Alienate people and their ideas and possible resolutions|I will encourage an atmosphere of understanding and cohesion which is a good quality when trying to move up the ladder professionally| Eating fast food|Waste money and gain weight|Keep money in pocket and not gain weight| Driving poorly (Fast, recklessly, etc.)|Get a bad driving record putting in danger potential jobs and possibly our license|People will not be mad at you in traffic jams. Employers will not have any problems hiring you. You will save money in cars and tickets.| Judging Co-Workers|Alienate myself from open discussions about problems we encounter and are trying to solve as a team|Develop a reputation of a team player and a problem solver who can work with others and rationally discuss solutions| Procrastination|Not finish projects and jobs I am put in charge of and miss opportunities to bigger projects that come with promotions and raises|Finish by jobs well within the time constraints and attract upper managements’ attention...

Words: 352 - Pages: 2

Free Essay

Unit 6 Lab 2

...Unit 6 Lab 6.2 1. What are the available Password Policy options that could be enforced to improve security in a Group Policy? * Enforce password history: * Maximum password age * Minimum password age * Minimum password length * Passwords should always meet complexity requirements 2. How could you se security permissions and user access rights on a home computer using Windows XP Professional or similar that is not a member of the domain? Security permissions and user access can still be managed locally on the computer with local groups and applying the proper permissions to local users on the computer. Local group policies can also be managed. 3. Why is the use of different password policy options available and why is it important to implement complexity and length requirements? There are different policy options to have different options for companies to use, if it were all the same then hackers would know exactly what to look for, in this case it can be vary. It is important implement complexity and length requirements to secure and assure the company that proper passwords are being used to prevent easy hacking access for hackers. 4. Microsoft defines user rights in two types of categories: Logon rights and privileges. Explain the difference of the two from an access control perspective. Log on rights manage and control who can log in to a specific computer. Privileges determine what the user can access one they log in, they go hand and hand. ...

Words: 657 - Pages: 3

Premium Essay

Unit 4 Lab 2

...Security and Web Applications Unit 4 Vlab 2 Assessment 1. Injection, Broken Authentication and Session Management, XSS, Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Function Level Access Control, Cross-Site Request Forgery, Using Components with Known Vulnerabilities, Unvalidated Redirects and Forwards. 2. A Brute force attack in an attack that uses force instead of vulnerabilities to make its way into a site. Usually trying to crack username and password combinations. The risks of these attacks can be mitigated by strengthening password requirements, introducing lockouts when let’s say 3 attempts are made. That would unmotivated and attacker. 3. A user has established a level of privilege with Amazon. AN attacker uses CSRF to exploit the trust of that user. The attacker is posing as the user and is performing actions to get the latest porn film sent to his house. Boom, free porn. 4. SQL Injection, Brute Force, CSRF. 5. Hackers will use web applications with uploading options to upload files that are malicious. 6. A successful SQL injection exploit can read sensitive data from the database, modify database data execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. (https://www.owasp.org/index.php/SQL_Injection) 7. That user information pertaining to...

Words: 285 - Pages: 2

Premium Essay

Unit 2 Chemistry Lab

...1. Part A.2. What is the formula and the color of the gas that is evolved? The name of the brown colored gas is nitrite, and its formula is NO2 (Beran, 2014). 2. Part B.1. When the NaOH solution is added, Cu(OH)2 does not precipitate immediately. What else present in the reaction mixture from Part A reacts with the NaOH before the copper(II) ion? Explain. The other compound present within the reaction mixture that came from Part A is water, H2O, which reacts with the NaOH before the copper(II) ion (Beran, 2014). 3. Part C.1. The sample in Part B was not centrifuges. Why? Perhaps the student chemist had to be across campus for another appointment. Because of the student’s “other priorities” the percent recovery of copper will decrease. Explain why....

Words: 508 - Pages: 3

Premium Essay

Nt1310 Unit 2 Lab Report

...The objective of this lab is to become familiar with memory mapping for a HCS12 and address decoding. Results: What I found out after doing the lab is that I was able to determine what the CPU’s functions are and how the CPU handles the data. Also, I was able to determine the memory locations/address ranges as asked within our lab. Conclusions: I thought this lab was really awesome because I was able to observe, construct, and become familiarized with how memory mapping works, as well as address decoding. What I have implemented from this lab is that we can determine the memory size by converting hexadecimal to binary. Team: Sheree Elder ECET 330 Sheree Elder Name Program Signature   Observations/Measurements: IV. 1: Memory...

Words: 572 - Pages: 3

Premium Essay

Nt1430 Unit 2 Lab Procedure

...Unit 2 Lab Procedure ***IMPORTANT: Read the lab procedure completely before beginning. Reading for Next Week Chapter 11 and 12 in Practical Guide to Red Hat Linux Exercise 1: Virtual Library research Search and explore the ITT Tech Virtual Library for resources on bash. Use the following keywords and phrases to help you locate appropriate resources: * bash scripts * bash history * the bourne shell * bourne again shell * commands in Linux Required Resources Access to the Internet Access to ITT Tech Virtual Library Submission Requirements * Students bring to class the following: * one printed copy of one pertinent resource found through the ITT Tech Virtual Library * one printed copy of one pertinent resource found through the Internet * Students should be prepared to share and discuss one or two critical points from each resource with classmates. * After small group discussion, students will hand in the printed copies of resources for a pass/fail grade. (print an extra copy for yourself to take notes on and keep.) The resources must pertain to the given topic to receive a passing grade. * Note: If the resource shared is a full website or tutorial, you can just print the lead page that gives key information about the content of the resource. (cont’d) Exercise 2: Accessing the man Pages 1. Start the primary system and log in as the regular none-privilege user 2. Read...

Words: 1532 - Pages: 7

Premium Essay

Nt1310 Unit 2 Lab Report

...The proteins are known as histones. The histones act as a scaffold organizing the structure of the DNA; a long string of the nucleotides. The histones are responsible for DNA folding and the overall formation of chromatin. Without the histones presence DNA itself would be extremely long in length, too long in length to fit inside the cell. The histones associate in octomers, 8 histones, to form beads on a string; Beads on a string describes the DNA wrapping around the octomer histone proteins. The term nucleoside describes the segments of DNA wrapped around histones. The Nucleosomes particles comprise of the complementary base pairings of DNA, which are wrapped around the histone proteins. The Nucleosomes are the fundamental repeating unit of a chromatin. It helps to package the large DNA genomes in the nucleus of a cell. It does this with the help of the histones, they in conjunction with one another, help from a tightly coiled structure. The Nucleosomes achieve this structure by compacting to form solenoid fibres. These fibres will fold or coil, to form complex loops, these are further condensed, which will later form...

Words: 1212 - Pages: 5

Premium Essay

Pv92 Unit 2 Lab Report

...In next week’s lab you will be determining your genotype for PV92, a human-specific Alu insertion on chromosome 16. PV92 only has two alleles: the presence (+) of the Alu insertion, or the absence (-). This means that you will have one of three PV92 genotypes (++,+-,or --). 1. Evolution: Genetic Evidence – Transposons. During or after you watch the video, answer the following questions: What is a transposon? What is a SINE? short interspers transposable elements that are usless to the gemome but can be used to be compares to other sequences of other individuals. What is a LINE? long interspers transposable elements that are usless to the genome... Where do you get your LINES and SINES? They are inherited from your parants. How did biologists use transposons to examine the evolutionary relationship between whales and hippos?...

Words: 832 - Pages: 4

Premium Essay

Nt1310 Unit 2 Lab Report

...ci3.1 BLOCK DIAGRAM Fig 3.1 block diagram of the vibration measurement system The above figure shows the block diagram of the vibration measurement system. The different blocks of the block diagram are the sensor which is used to measure the vibrations. The sensor we are using in this project is MMA8451Q accelerometer, which is able to measure the vibrations. The vibration data need to be measured from the acceleration data of the accelerometer by setting different thresholds. Then the data from the accelerometer need to be transferred to the microcontroller which is used to process the data. The microcontroller which we have selected to do the processing of the data is MKL25Z32VFM4 which is ARM® Cortex™-M0+ processor. This is best suited for the processing of the accelerometer data. There are different types of protocols that can be used to communicate with this controller. It supports SPI, I2C etc, the communication between the accelerometer and the microcontroller uses I2C protocol to transfer the data between two. For development we used MKL25Z128VLK4 controller. Even this is also ARM® Cortex™-M0+ processor. The reason for using this processor is this processor will be available on a FRDM KL25Z board from freescale and this board also has MMA8451Q accelerometer populated on the board. So till the completion of designing the PCB this board can be used for development. The processor which will be used in the final product and the processor which we are using now for development...

Words: 2136 - Pages: 9

Premium Essay

Nt1310 Unit 2 Lab Report

...organ and tissue transplant: The Major histocompatibility complexes (MHC), think of them like trackers or identifications tags that are found on almost every cell that has a nucleus. They play an important role in activating the immune response and stopping further destruction. However, if MHC is not working properly, they can become antigenic. This means that the cell will not be able to recognize or distinguish self from non-self causing destruction of the cell. Thus, MHC plays an important role in organ and tissue transplantation success as well as can give rise to autoimmune diseases. In the case of organ and tissue transplant, it is crucial to match the MHC molecules of the donors and recipients to reduce risk of rejection of transplant. 2. Understanding the difference between humoral immunity versus cell-mediated immunity:...

Words: 487 - Pages: 2

Premium Essay

Nt1310 Unit 2 Lab 1

...Amazon With amazon services you choose a service plan based upon a completely virtual environment. Using a preconfigured AMI (amazon machine image) or creating your own with its own set of network permissions and protocols. This also chooses instance types you may want. Multiple services using AMI and with that utilize static endpoints or attach persistent block storage to said instances. The resources you use is what you will pay for out of the total plan you have chosen based upon time or data transfer. Amazon also has an elastic block store based service with offers persistent storage for amazon EC2 instances. EC2 is a program which you decide a system to boot into it so it can be stopped and restarted with the whim of the client. With this the EBS volumes can be measured and observed by the client. EC2 also provides multiple locations. This is based mainly open regions and available zones. Elastic or dynamic IP addresses are available for wireless and mobile devices that will use these cloud services. Virtual private could is a thing all its own that will create logically isolated sections of the amazon web services which you can launch within your AWS resources to create a virtual network which you can also select your own section of IP addresses, subnets, and configuration of your route tables, networks and gateways. Within these services a Virtual private network (VPN). Amazon cloud watch is a service that monitors your data. This gives stats, graphs, and alarms when...

Words: 1385 - Pages: 6