Free Essay

Lab 2 Unit 2

In: Computers and Technology

Submitted By A1grumpy
Words 342
Pages 2
Lab 2.1 1. What are the Regulatory requirements? 2. What are medical rules or laws of private information that we need to know to set up this Database with the customer information (Data privacy)? 3. Please give me any specific requirements that are necessary?
Business rules 1. Appointments 2. Social security 3. Medical record 4. Driver license

1. Middle initial 2. Are you a Jr. or Sr.

Patient Entity | Patient Visit entity | 1. Medical record number | 1. Group number, appointment | 2. Social security number, Driver license | 2. Allergies | 3. Taking any medications | 4. Taking any medications | Composite key | Composite keys are the most common. |

Make sure patient fills out all the whole application.

Lab 2.2
Data Requirements 1. Allow Software Management Team and IT Staff to view, add, edit, and delete the types of software to be tracked. This includes type of software, licensing dates, status, and location. 2. Allow Software Management Team to enter, edit, and delete New Software Requests. 3. Allow Software Management Team to view the different licensing agreements and types. This includes viewing the pricing per agreement. 4. Allow Software Management Team to sign out software to users with administrative privileges. 5. Allow Software Management Team and IT Staff to update the status of software licenses. 6. Allow users, assigned IT users, Staff, and Software Management Team to submit requests for new software.
Reporting requirements 1. Allow Software Management Team and IT Staff to view and generate software licensing status reports.
Access and security requirements 1. Cardwell –RM 214 – CCS Number 3214

2. Larson – RM 212 – CCS Number 3114 3. Johnson – CCS Number 2123 – Software Camtasia
List of nouns related to the requirement 1. Cardwell/ RM 214 2. Larson/RM 212 3. Johnson
Entities
1. Cardwell/ Vista Business, Ms Office, PhotoShop, DreamWeaver. 2. Larson/ Vista Business, MsOffice, Visual Studio Pro, DreamWeaver. 3. Johnson/ Camtasia
Identifying attributes 1. Assigned User/ Cardwell-CCS Number 3214 2. Assigned User/ Larson-CCS Number 3114 3. Assigned User/ Johnson-CCS Number 2123
Candidate Key 1. License Type 2. User 3. Requests

Similar Documents

Premium Essay

Unit 2 Lab

...Unit 2 Lab The five characteristics of cloud computing as defined by the NIST is as follows, on demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. On demand self-service is defined as a service provided by cloud computing vendors that enables the provision of cloud resources on demand whenever they’re required. Broad network access is defined as a private cloud network operated within a company’s firewall that are available for access from a wide range of devices such as tablets, PC’s, Mac’s and smartphones. These resources are accessible from a wide range of locations that offer online access. Resource pooling is defined as a situation in which providers serve multiple clients, and customers with provisional and scalable services. These services can be adjusted to suit each client’s needs without any changes being apparent to the client or end user. Rapid elasticity is defined as the ability to provide scalable services. Measured service is defined as aspects of cloud service that are controlled and monitored by the cloud provider. Rackspace offers many options for cloud computing. You can build your own account which you would manage or you can get one for a flat fee an account that Rackspace will manage for you. Services offered by Rackspace are cloud servers, cloud backup, cloud files, cloud load balancers, could database, cloud monitoring, cloud block storage, and cloud bandwidth. Rackspace also offers services...

Words: 260 - Pages: 2

Premium Essay

Unit 2 Lab

...Name: Patricia Sellers Date: November 22, 2013 Instructor’s Name: Trena Woolridge Assignment: SCIE211 Phase 2 Lab Report Title: Speciation Instructions: You will need to write a 1-page lab report using the scientific method to answer the following question: • What would happen if a species within a population were suddenly split into 2 groups by an earthquake that creates a physical barrier like a canyon? When your lab report is complete, post it in Submitted Assignment files. Part I: Use the animated time progression of speciation to help you write up your lab report. Part II: Write a 1-page lab report using the following scientific method sections: • Purpose • What would happen if a species within a population were to suddenly split in two groups by an earthquake that creates a physical barrier like a canyon? • Introduction • Reproduction is a natural and normal thing in our day to day lives. Animals and humans reproduce offspring, all year round. Separation is usually the furthest thing from our minds. But, mother natural can always turn anyone’s world upside down. For Example, What if a really bad earthquake hit, and caused the ground to split and drift far away from one another? Many species would be isolated from their families and environments. • Hypothesis/Predicted Outcome • A species is defined as a group of organisms that are able to interbreed to produce fertile and viable offspring under natural conditions. (Audesirk,......

Words: 450 - Pages: 2

Premium Essay

Gs1145 Unit 2 Lab 2

...In his article, “Exploring the 3-D printing opportunity” J.Bird touched on several interesting facts about 3-D printing of which I was not aware, including the fact that 3-D printing has been around since the 1980’s. 3-D printing is not a “new” technology, but rather one that is being explored and exploited more now because of patents that have since expired. There are several ways of printing objects in three dimensions including fusing powdered material such as titanium with a laser, dispensing melted plastic through a nozzle, and photo curing plastic resin. 3-D printing is much more environmentally friendly than traditional manufacturing techniques, because traditional cutting and grinding produces more waste. 3-D printing has exciting applications in the medical field: last year surgeons created a replacement jaw for an 83-year old woman in titanium that took 33 layers to form each 1mm of thickness. 3-D printing makes creating one-off objects much more economically viable since there is no need to create specialized tooling, no need to create molds, and it eliminates hours of machining to take the cast item from the mold stage to the finished product. Since there is no need for specialized tooling, product development times can be reduced from months to just weeks. Products can be developed and designed one day and printed overnight for use the next day. The future seems to be limitless for this technology. 3-D printed clothing could be customized to the individual’s......

Words: 489 - Pages: 2

Free Essay

Unit 6 Lab 2

...Unit 6 Lab 6.2 1. What are the available Password Policy options that could be enforced to improve security in a Group Policy? * Enforce password history: * Maximum password age * Minimum password age * Minimum password length * Passwords should always meet complexity requirements 2. How could you se security permissions and user access rights on a home computer using Windows XP Professional or similar that is not a member of the domain? Security permissions and user access can still be managed locally on the computer with local groups and applying the proper permissions to local users on the computer. Local group policies can also be managed. 3. Why is the use of different password policy options available and why is it important to implement complexity and length requirements? There are different policy options to have different options for companies to use, if it were all the same then hackers would know exactly what to look for, in this case it can be vary. It is important implement complexity and length requirements to secure and assure the company that proper passwords are being used to prevent easy hacking access for hackers. 4. Microsoft defines user rights in two types of categories: Logon rights and privileges. Explain the difference of the two from an access control perspective. Log on rights manage and control who can log in to a specific computer. Privileges determine what the user can access one they log in, they go hand and hand. ...

Words: 657 - Pages: 3

Premium Essay

Unit 2 Lab 2: Self - Control

...Jaime H. Cabigtnig Unit 2 Lab 2: Self - Control TEMPTATION |WHAT WILL I DO IF I YIELD TO TEMPTATION?|WHAT WILL I DO IF I BEHAVE HOW I WANT MYSELF TO BEHAVE?| Leaving work earlier|I will not make the money that Is owed to me|Know that the extra money will benefit my family| Cursing|Donate $2 to charity|Reward myself with a positive word for today| Lying|Defame my character to my boss or co-workers|I will develop a good reputation of dependability with my co-workers | Quick to anger|Alienate people and their ideas and possible resolutions|I will encourage an atmosphere of understanding and cohesion which is a good quality when trying to move up the ladder professionally| Eating fast food|Waste money and gain weight|Keep money in pocket and not gain weight| Driving poorly (Fast, recklessly, etc.)|Get a bad driving record putting in danger potential jobs and possibly our license|People will not be mad at you in traffic jams. Employers will not have any problems hiring you. You will save money in cars and tickets.| Judging Co-Workers|Alienate myself from open discussions about problems we encounter and are trying to solve as a team|Develop a reputation of a team player and a problem solver who can work with others and rationally discuss solutions| Procrastination|Not finish projects and jobs I am put in charge of and miss opportunities to bigger projects that come with promotions and raises|Finish by jobs well within the time constraints and attract upper managements’......

Words: 352 - Pages: 2

Premium Essay

Unit 4 Lab 2

...Security and Web Applications Unit 4 Vlab 2 Assessment 1. Injection, Broken Authentication and Session Management, XSS, Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Function Level Access Control, Cross-Site Request Forgery, Using Components with Known Vulnerabilities, Unvalidated Redirects and Forwards. 2. A Brute force attack in an attack that uses force instead of vulnerabilities to make its way into a site. Usually trying to crack username and password combinations. The risks of these attacks can be mitigated by strengthening password requirements, introducing lockouts when let’s say 3 attempts are made. That would unmotivated and attacker. 3. A user has established a level of privilege with Amazon. AN attacker uses CSRF to exploit the trust of that user. The attacker is posing as the user and is performing actions to get the latest porn film sent to his house. Boom, free porn. 4. SQL Injection, Brute Force, CSRF. 5. Hackers will use web applications with uploading options to upload files that are malicious. 6. A successful SQL injection exploit can read sensitive data from the database, modify database data execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. (https://www.owasp.org/index.php/SQL_Injection) 7. That user information pertaining to...

Words: 285 - Pages: 2

Premium Essay

Nt1430 Unit 2 Lab Procedure

...Unit 2 Lab Procedure ***IMPORTANT: Read the lab procedure completely before beginning. Reading for Next Week Chapter 11 and 12 in Practical Guide to Red Hat Linux Exercise 1: Virtual Library research Search and explore the ITT Tech Virtual Library for resources on bash. Use the following keywords and phrases to help you locate appropriate resources: * bash scripts * bash history * the bourne shell * bourne again shell * commands in Linux Required Resources Access to the Internet Access to ITT Tech Virtual Library Submission Requirements * Students bring to class the following: * one printed copy of one pertinent resource found through the ITT Tech Virtual Library * one printed copy of one pertinent resource found through the Internet * Students should be prepared to share and discuss one or two critical points from each resource with classmates. * After small group discussion, students will hand in the printed copies of resources for a pass/fail grade. (print an extra copy for yourself to take notes on and keep.) The resources must pertain to the given topic to receive a passing grade. * Note: If the resource shared is a full website or tutorial, you can just print the lead page that gives key information about the content of the resource. (cont’d) Exercise 2: Accessing the man Pages 1. Start the primary system and log in as the regular none-privilege user 2. Read...

Words: 1532 - Pages: 7

Premium Essay

Nt1310 Unit 2 Lab 1

...Amazon With amazon services you choose a service plan based upon a completely virtual environment. Using a preconfigured AMI (amazon machine image) or creating your own with its own set of network permissions and protocols. This also chooses instance types you may want. Multiple services using AMI and with that utilize static endpoints or attach persistent block storage to said instances. The resources you use is what you will pay for out of the total plan you have chosen based upon time or data transfer. Amazon also has an elastic block store based service with offers persistent storage for amazon EC2 instances. EC2 is a program which you decide a system to boot into it so it can be stopped and restarted with the whim of the client. With this the EBS volumes can be measured and observed by the client. EC2 also provides multiple locations. This is based mainly open regions and available zones. Elastic or dynamic IP addresses are available for wireless and mobile devices that will use these cloud services. Virtual private could is a thing all its own that will create logically isolated sections of the amazon web services which you can launch within your AWS resources to create a virtual network which you can also select your own section of IP addresses, subnets, and configuration of your route tables, networks and gateways. Within these services a Virtual private network (VPN). Amazon cloud watch is a service that monitors your data. This gives stats, graphs, and alarms......

Words: 1385 - Pages: 6

Premium Essay

Nt1310 Unit 2 Lab 1

...Amazon With amazon services you choose a service plan based upon a completely virtual environment. Using a preconfigured AMI (amazon machine image) or creating your own with its own set of network permissions and protocols. This also chooses instance types you may want. Multiple services using AMI and with that utilize static endpoints or attach persistent block storage to said instances. The resources you use is what you will pay for out of the total plan you have chosen based upon time or data transfer. Amazon also has an elastic block store based service with offers persistent storage for amazon EC2 instances. EC2 is a program which you decide a system to boot into it so it can be stopped and restarted with the whim of the client. With this the EBS volumes can be measured and observed by the client. EC2 also provides multiple locations. This is based mainly open regions and available zones. Elastic or dynamic IP addresses are available for wireless and mobile devices that will use these cloud services. Virtual private could is a thing all its own that will create logically isolated sections of the amazon web services which you can launch within your AWS resources to create a virtual network which you can also select your own section of IP addresses, subnets, and configuration of your route tables, networks and gateways. Within these services a Virtual private network (VPN). Amazon cloud watch is a service that monitors your data. This gives stats, graphs, and alarms......

Words: 915 - Pages: 4

Free Essay

Unit 3 Lab 2 Integrity Matters

...for an important job or project and go to lunch; you take longer and longer breaks/lunches because no one pays attention to you. The next day you repeat the same process take a longer lunch and your project manager receives an email from the director that he’s been noticing his employee leave on break or lunch and he’s been missing in action for a while then he explains that there has been an emergency concerning the project and needs it to be fixed immediately. Your employee who’s been taking longer lunches is the lead head for the project, the first person the project manager looks for is you, but you are on a 1 hour and 30 min lunch and were noticed finally by your project manager. This lack of responsibility just cost you your job. 2. There is an important meeting at 8:00am in the morning; this meeting is to discuss some new protocols for work. You never were late every day to work, but this day you decide to come to work late and end up walking into the meeting that is being held by the GM. Bad first impression. 3. The client asked for you to work on a project that had a deadline. You noticed that you weren’t actually finished when you said you were, and now you had to hire someone else to take on the task. This mistake has cost you your contract, and messed up your reputation. 4. You are in the lunch room eating lunch, while you’re eating lunch you do not know that your boss’s daughter is actually in the lunch room visiting her dad for the day. You’re......

Words: 427 - Pages: 2

Premium Essay

Unit 2. Lab 1 - Cloud Computing Research

...Unit 2. Lab 1: Cloud Computing Research With Amazon, you get anywhere between 5GB and 1TB depending upon how much you’d like to pay for the privilege. Amazon passes on to you the financial benefits of Amazon’s scale. You pay a very low rate for the compute capacity you actually consume. To use Amazon EC2, you simply: * Select a pre-configured, templated Amazon Machine Image (AMI) to get up and running immediately. Or create an AMI containing your applications, libraries, data, and associated configuration settings. * Configure security and network access on your Amazon EC2 instance. * Choose which instance type(s) you want, then start, terminate, and monitor as many instances of your AMI as needed, using the web service APIs or the variety of management tools provided. * Determine whether you want to run in multiple locations, utilize static IP endpoints, or attach persistent block storage to your instances. * Pay only for the resources that you actually consume, like instance-hours or data transfer. With Google, it’s a little more complicated. There didn't used to be a single locker but now the Big G has taken care of that one with the launch of the Google Drive. You get 5GB of space plus 1GB of Picasa storage for free along with any space in your Docs and Gmail section. There's an apparent maximum storage space on the Google Drive itself up to 100GB but you can rent more space from Google if you have a Google Apps account up to a total of 16TB. On...

Words: 469 - Pages: 2

Free Essay

Nt 1430 Unit 7 Lab 2 Chap 25

...expired, or the network connection was broken. /usr/share/system-config-firewall/fw_gui.py:2369: GtkWarning: Attempting to store changes into `/root/.local/share/recently-used.xbel', but failed: Failed to create file '/root/.local/share/recently-used.xbel.JZ4TOX': No such file or directory gtk.main() /usr/share/system-config-firewall/fw_gui.py:2369: GtkWarning: Attempting to set the permissions of `/root/.local/share/recently-used.xbel', but failed: No such file or directory gtk.main() [root@localhost nate]# [root@localhost nate]# cat/etc/sysconfig/iptables bash: cat/etc/sysconfig/iptables: No such file or directory [root@localhost nate]# iptables-L bash: iptables-L: command not found... [root@localhost nate]# Chapter 25, Unit 7, Lab 1 (NT 1430,U2,GA1) Nathaniel Hayes, Jr. Enterprise Linux-NT 1430 November 5, 2014 Professor Rahming [nate@localhost ~]$ su Password: [root@localhost nate]# system-config-firewall (system-config-firewall:2395): GVFS-RemoteVolumeMonitor-WARNING **: cannot connect to the session bus: org.freedesktop.DBus.Error.NoReply: Did not receive a reply. Possible causes include: the remote...

Words: 712 - Pages: 3

Premium Essay

Unit 2. Lab 1. Cloud Computing Research

...Comparing three cloud computing companies, Amazon, Google & Rackpace; this paper shall compare them on the following: COST STORAGE OPERATING SYSTEMS Amazon Elastic Compute Cloud: Cost: As of February 2013, Amazon charged about $.02/hour ($15/month) for the smallest "Micro Instance" (t1.micro) virtual machine running Linux or Windows. High CPU and memory instances for Compute Clusters cost as much as $4.60/hour. "Reserved" instances can go as low as $6.43/month for a three-year prepaid plan. The data transfer charge ranges from free to $0.12 per gigabyte, depending on the direction and monthly volume (inbound data transfer is free on all AWS services. Storage: An EC2 instance may be launched with a choice of two types of storage for its boot disk or "root device." The first option is a local "instance-store" disk as a root device (originally the only choice). The second option is to use an EBS volume as a root device. Instance-store volumes are temporary storage, which survive rebooting an EC2 instance, but when the instance is stopped or terminated (e.g., by an API call, or due to a failure), this store is lost. EBS volumes provide persistent storage independent of the lifetime of the EC2 instance, and act much like hard drives on a real server. More accurately, they appear as block devices to the operating system that are backed by Amazon's disk arrays. The OS is free to use the device however it wants. In the most common case, a file......

Words: 747 - Pages: 3

Premium Essay

Unit 2 Lab Align Auditing Frameworks for a Business Unit with in the Dod

... a. DITSCAP provided guidance on roles, activities and documents for performing C&A, but it did not clearly identify what requirements to use. b. DIACAP points to DoDD 8500.2, making it clear where to start identifying the IA capabilities that should be included and assessed for a particular C&A effort. c. One of the biggest complaints about DITSCAP was that it required too much documentation and took too long to perform. d. DIACAP identifies four spreadsheets that summarize important C&A information. e. A second complaint about DITSCAP was that it only accommodated individual systems. f. DIACAP addresses the need to expand C&A to account for components outside of a site’s control. 2. What is DCID 6/3, and why would you use DCID 6/3 as opposed to DIACAP for Certification and Accreditation of a system? g. It is the policy for “Protecting Sensitive Compartmented Information Within Information Systems”. This directive establishes the security policy and procedures for storing, processing, and communicating classified intelligence information in information systems (ISs). For purposes of this Directive, intelligence information refers to Sensitive Compartmented Information and special access programs for intelligence under the purview of the DCI. An information system is any telecommunications and/or computer related equipment or interconnected system or subsystems of equipment that is used in the acquisition,......

Words: 1031 - Pages: 5

Premium Essay

Unit 1 Labs

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they......

Words: 16182 - Pages: 65