Preview

Unit 2 Assignment Analysis

Satisfactory Essays
Open Document
Open Document
147 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Assignment Analysis
Hi Kristin, the context diagram that you have posted truly represents most of the high level external entities needed for the Scale2 project. This particular context diagram presents sensors and alarms as well as the building alarm as two separate entities or terminators. I wonder if they are redundancies that could be combined into one in order to enhance your work. The other wonder is on the health monitoring device in relationship to the information medical records database and the mobile devices and/or tables; can I consider them been an aggregate of the health monitoring device and/or you do not believe they are high level enough for the context diagram? In my context diagram I represent database health records and mobile devices as two

You May Also Find These Documents Helpful

  • Good Essays

    If you already have Java JDK installed on your system, then you need not run the above command.…

    • 1876 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    There’s always a structure to success. If there was no structure in an organisation then a lot of jobs would not be carried out at all or not carried out…

    • 3226 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Unit 2 Assignment 2

    • 676 Words
    • 3 Pages

    1. Microsoft is aware that research was published at a security conference proving a successful attack against X.509 digital certificates signed using the MD5 hashing algorithm. This attack method could allow an attacker to generate additional digital certificates with different content that have the same digital signature as an original certificate. The MD5 algorithm had previously shown a vulnerability, but a practical attack had not yet been demonstrated.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    C204 Unit 2 Assignment

    • 448 Words
    • 2 Pages

    In this paper I am going to be describing the Information Technology dress attire. I will be discussing what made the individual professional. I will also be talking about the career that I am going into and the attire that I have to wear while in that career field. I am going to be discussing what makes me a professional and what I learned from week 1.…

    • 448 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 1

    • 126 Words
    • 1 Page

    As the number of computers in a company network grows, so does the administrative overhead involved in maintaining the computer network. DNS and DHCP can keep the overhead to a background task.…

    • 126 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 299 Words
    • 1 Page

    The evolution of the Ethernet standards will have a large effect on data storage requirements. As the speeds of these connections continue to increase, users and businesses will be able to transfer larger files faster and will required larger data storage to accommodate the increased demand of resources. Thirty years ago, when the standard was only 10MB, there was nowhere near the need for the data storage capacity as there is today, with the current standard being 100 Gbit, with 1 Tbit on the way. Data storage wasn’t as high in demand before because it would take an extremely long amount of time to transfer large files, but as the speed increases, so will the demand.…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment

    • 80 Words
    • 1 Page

    In the unit 1 assignment, we defined the relations and keys for a library system. In unit 2 we learned about constraints. For your unit 2 assignment, identify and describe the constraints that would be appropriate for the relations that we have within our library system. Constraints that you should consider may include:…

    • 80 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 1

    • 266 Words
    • 1 Page

    The Johnson Company can do several things to reach out to new customers. Even though many companies still use them, the yellow pages are all but obsolete and viewed by a low number of people. Most companies utilize websites and social media to attract customers. The Johnson Company can create these to get their name out on the internet. In conjunction with these websites, they could utilize web advertising services such as Google advertisements or banner ads. Additionally, they could contact their local cable providers to film commercials to air on television.…

    • 266 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    UNIT 2 ASSIGNMENT 1

    • 1061 Words
    • 5 Pages

    4. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two home telephones in the United States? (Choose two answers.)…

    • 1061 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    13. This attribute configures how content is situated to the left, right, or center of a Web page: align…

    • 335 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 3

    • 288 Words
    • 1 Page

    Data classification policy is important for securing data from risks, which includes unauthorized users, modification, disclosure, access, use, and removal. This is to ensure protection on data assets from unauthorized users. Data must be maintained in a secure, accurate and reliable manner and be available for authorized use. In order to implement security measures, the data must be classified into categories like; confidential, restricted, and public. Confidential and restricted will be required some sort of access mechanism to authenticate anyone who wants to access any classified documents. In order to construct a Classification policy, one must know what type of data are available, where they are located, what type of access levels are implemented and what protection level is implemented and does it adhere to compliance regulations.…

    • 288 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 assignment 1

    • 405 Words
    • 2 Pages

    1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve?…

    • 405 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    P1 Unit 3 Assignment

    • 582 Words
    • 3 Pages

    A multimedia essay combines textual content and multimedia elements to create a unique and inventive version of an essay to share with others. In this activity, you will use textual material from your literary essay and multimedia elements such as sound, layout, video, images, web-quests, etc. to create a unique version of your essay to share with your classmates.…

    • 582 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment

    • 486 Words
    • 2 Pages

    1. What is the purpose of having an advance directive? The purpose of having an advanced directive is to make sure your doctor and family know what you want it also gives you a choice regarding treatment, life support, stopping treatment and Life-Sustaining treatment.…

    • 486 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The campaign shows a skillful use of advertising appeals and rhetorical appeals that work together effectively to entice the audience to read the book.…

    • 841 Words
    • 4 Pages
    Powerful Essays