IT 204 Final Project Guidelines and Rubric


The final project for this course is the creation of a database proposal and implementation plan report that will address the needs of a given scenario. The purpose of this assessment is to assess the students’ understanding of simple database structure, functions, and terminology from an information management perspective.

You are to design a simple database framework that addresses the needs of Birchwood Lane Schools and the development of a strategy for implementing that database. Your submissions will include the relational database model you have designed, including diagrams (e.g., Microsoft Visio), a plan for implementation, and a persuasive presentation to stakeholders, in this case the Birchwood Lane School Board. The persuasive presentation will build off the work completed for this database proposal and implementation plan report and is due in Module Eight. For more details about the presentation, reference the “Final Presentation Guidelines and Rubric” document in the Assignment Guidelines and Rubrics section of the course.

The project is supported by four formative milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Two, Three, Four, and Five. The final submission of your database proposal and implementation plan report will occur in Module Seven.

At the end of your degree program experience, you will develop a portfolio that will provide a clear representation of your mastery of program outcomes, skills, and abilities. The artifact that is suggested for use from this course is the case needs analysis section of your proposal and plan. It is strongly recommended that you save this document in a place where it can be accessed again at a later date.


This assessment will evaluate your mastery with respect to the following course outcomes:

· Apply the appropriate terminology of the realm of data and information management to real-world scenarios

· Develop and address complete and valid data requirements for business cases

· Design and plan to implement a simple relational data model using standard database management methods

· Differentiate between the uses, benefits, and limitations of commonly used tools and technologies in data and information management

· Present database management proposals in a persuasive manner given the needs of specific audiences


You will be developing your submissions (a relational database model, and plan for implementation) around the following scenario: Birchwood Lane Schools currently records all student, instructor, and course data on paper. To meet state and federal requirements, Birchwood Lane Schools must implement an application system that records all student, course, and instructor data electronically. You will design a DBMS model and develop a strategy for implementation, which you will flesh out in a comprehensive written report.

Current data needs include the following:

1. Student data (full name, full address, phone, email, birthdate, enrollment date, graduation date, courses taken, courses currently enrolled)

2. Instructor data (full name, full address, phone, email, birthdate, hire date, courses taught, courses currently assigned)

3. Course data (course name, course start date, course end date, course category, instructor, students)

Each student and instructor may have multiple addresses, each student may be enrolled in multiple courses during a term, and each instructor may teach multiple courses during a term.

Specifically, the following critical elements must be addressed in your submission:

I. Case Needs Analysis: Determine the data requirements of Birchwood Lane Schools.

a. What data from the scenario is needed for the database and why?

b. To what extent is additional information needed to develop complete data requirements? II. Relational Database Model

a. Based on the requirements you have determined, design a relational database model. Be sure to include applicable entities and proper relationship mapping.

b. Develop a logical database model based on the entities present in your visual conceptual database model.

BI. Database Selection: Select an appropriate DBMS (Oracle, IBM DB2, MS SQL Server, or an open-source database) for Birchwood Lane Schools andexplain your reasoning.

a. Why did you choose this DBMS? Be sure to lists all uses, benefits, and limitations for each of the following: data size limit, purchase cost, administration, operating system/hardware and requirements, features, and performance/scalability. What differentiates your selection from other selections?

b. To what extent are there additional or alternative technologies that might assist Birchwood Lane Schools in managing its data? Compare these technologies in terms of their applicability to the needs of Birchwood Lane Schools.

IV. Implementation Plan: Outline a process for implementing the new database.

a. Be sure to include all relevant information and steps.

b. Are there additional pieces of information necessary to develop a full plan for implementation or that may impact implementation success? For example, these could include DBMS management requirements, man hours, or data input.


Milestone One: Group Discussion: Defining the Audience

In task 2-3, you will submit your contribution to a small group collaborative discussion exploring how you would want to present the information to different audiences that will view the presentation. Now, who specifically is your target audience? In other words, who are the consumers? Describe the types of people who will read the report and presentation. What will they do with the material? What kind of evidence do you use to support your ideas? Finally, imagine you are making this presentation to a chief information officer (CIO). How do you present the information differently? In responding to your classmates, comment on approaches that you may not have considered. What makes you believe in these approaches? Why is using evidence important? This milestone is graded with the Discussion Rubric.

Milestone Two: Group Discussion: Business Case for the Database Framework

In task 3-2, you will submit your contribution to a small group collaborative discussion exploring the business case for the final project. Explain your perspective on the need for the new approach to managing data via a database management system and modeling data according to standards. Why does Birchwood Lane Schools need a database? Begin to develop ideas for a logical database model. Include your personal experience, and consider the diversity of perspectives from your group. In your response, comment in detail on your view of their approach and how your view is similar to or different from theirs. Highlight your view of the business value (or lack of value) of database management to Birchwood Lane Schools, and address the issue of data collection. This milestone is graded with the Discussion Rubric.

Note: You will submit an individual proposal in Module Four for your final project that includes the case needs analysis and your conceptual database model. Usethis discussion to finalize your ideas.

Milestone Three: Proposal Draft

In task 4-3, you will submit to the instructor a two- to three-page individual proposal as a Word document. In your proposal, you should include the first two elements of your project: case needs analysis and the relational database model. Use what you have discussed in your collaborative groups to finalize your proposal. This milestone will be graded using the Milestone Three Rubric.

Milestone Four: Data and Database Management System (DBMS) Comparisons Wiki

In task 5-2, you will compare different DBMS components in the Data and Database Management System (DBMS) Comparisons Wiki. For this milestone, you are going to discuss the attributes to consider for selection of an appropriate DBMS for the Birchwood Schools. That is, what are the needed attributes? This task will be done in a whole class wiki so the whole class can view all the ideas. You should view all the posts before finalizing your recommendations for your individual proposal. The wiki is graded with the DMBS Comparisons Wiki Rubric.

Final Submission: Database Proposal and Implementation Plan—Individual Report

In task 7-2, you will submit your database proposal and implementation plan report. The report should be a complete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission is graded with the Final

Project Rubric.


MilestoneDeliverablesModule DueGrading
1Group Discussion: Defining the AudienceTwoGraded separately; Discussion Rubric
2Group Discussion: Business Case for theThreeGraded separately; Discussion Rubric
Database Framework
3Proposal DraftFourGraded separately; Milestone Three Rubric
4Data and Database Management SystemFiveGraded separately; DBMS Comparisons Wiki Rubric
(DBMS) Components Wiki
Final Submission: Database Proposal andSevenGraded separately; Final Project Rubric (in this document)
Implementation Plan Report

Final Project Rubric

Guidelines for Submission: Written components of project must follow these formatting guidelines when applicable: double spacing, 12-point Times New Romanfont, 1-inch margins, and discipline-appropriate citations. The written proposal report must be between 5 and 10 pages, not including cover page, diagrams, or resources.

Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information,review these instructions

Critical ElementsExemplary (100%)Proficient (85%)Needs Improvement (55%)Not Evident (0%)Value
Case Needs AnalysisMeets “Proficient” criteria, andDevelops complete and validDevelops data requirementsDoes not develop data20
delivery of data requirements isdata requirements forthat are not complete or are notrequirements
conciseBirchwood Lane Schoolsvalid
Conceptual ModelMeets “Proficient” criteria, andVisual conceptual model clearlyVisual conceptual model doesVisual conceptual model does10
model is organized simply andillustrates all applicable entitiesnot clearly illustrate the entitiesnot illustrate the entities and
intuitivelyand relationships as required byand relationships indicated byrelationships relevant to
the determined datathe determined datadetermined requirements, or no
requirementsrequirementsvisual conceptual model exists
Logical DatabaseMeets “Proficient” criteria andThe key elements of the entitiesThe key elements of the entitiesSubmission does not include a10
Modelthe logical database model isillustrated in the conceptualare not logically parsed outlogical model based on the
clearly and simply organizedmodel are parsed out logicallyconceptual model
Database SelectionMeets “Proficient” criteria, andDatabase selection is supportedSubmission lacks substantialSubmission lacks an explanation20
reasoning evidences keenwith an in-depth explanation ofexplanation of uses, benefits,of database selection
insight into the world ofthe uses, benefits, andand limitations over other
information technologylimitations over other optionsoptions
Additional orMeets “Proficient” criteria, andComparatively evaluatesComparatively evaluatesDoes not comparatively15
Alternativeevaluation is concise andadditional or alternativeadditional or alternativeevaluate additional or
Technologiesappropriate for the targettechnologies in terms of howtechnologies, but not in termsalternative technologies in
audiencethey could meet the needs ofof applicability to the needs ofterms of how they could meet
Birchwood Lane SchoolsBirchwood Lane Schoolsthe needs of Birchwood Lane
ImplementationMeets “Proficient” criteria, andSubmission includes a step-by-Submission fails to address theThere are gaps in the step-by-15
Outlineoutline is organized in a mannerstep plan for implementationrequirements forstep process that impede
that shows keen insight into thethat is logically organized andimplementation in accordanceunderstanding of the
nuances of successfuladdresses all the identifiedwith the needs of the scenario,implementation outline, or
implementationrequirementsconceptual model, and logicalthere is no implementation
Articulation ofSubmission is free of errorsSubmission has no major errorsSubmission has major errorsSubmission has critical errors10
Responserelated to citations, grammar,related to citations, grammar,related to citations, grammar,related to citations, grammar,
spelling, syntax, andspelling, syntax, or organizationspelling, syntax, or organizationspelling, syntax, or organization
organization and is presented inthat negatively impactthat prevent understanding of
a professional and easy-to-readreadability and articulation ofideas
formatmain ideas
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"


Write the pseudocode using modules and show how your module will be called for the following example:

BMI is often used to determine whether a person is overweight or underweight based on height and weight. The calculation uses the following formula:

BMI = Weight x 703/Height2

Design a program that calculates and displays a person’s body mass index (BMI).

Your 3-4 page document must include:

  • Pseudo code for the entire program.
  • Internal documentation, using block and/or line comments.
  • You must declare all variables before using them in your pseudo code. Don’t forget that variables are just names. You need to assign values to variables. For example:
    Set price = 20
    Set dollars = 2.75
  • Your pseudo code must illustrate all calculations and modules called.

Create a flowchart showing how your module will be called for the BMI example from your Module 03 lab:

BMI is often used to determine whether a person is overweight or underweight based on height and weight. The calculation uses the following formula:

BMI = Weight x 703/Height2

Design a program that calculates and displays a person’s body mass index (BMI)

Your submission must include:

  • You may use Microsoft Visio or http://draw.io/ to create your flowchart and export the drawing as a JPG. Paste your image in your Word document with your pseudo code. Use File >> Export As >> Image.

  • Your flowchart must depict each step in the program, as well as the module.
  • Your flowchart must use 3 types of symbols: ovals (start and end terminal symbols), parallelograms (input and output symbols), and rectangles (processing symbols).
  • All symbols must be connected by arrows that represent the flow of the program. The flow must make logical sense.
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Write A Research Paper That Explains How Defense-In-Depth And Awareness Are Complimentary Techniques To Detect Emerging Threats And Strengthen Countermeasures.

 Your final research paper assignment is to write a research paper that explains how defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen countermeasures. 

To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. You must also upload a pdf of EVERY reference that you cite in your paper. Remember that your list of sources must be in APA format, and you MUST cite your reference in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/

Plagiarism detected in your work will result in a grade of zero for the entire paper. 

Here are a few details about the overall research paper Please look at the attached rubric for details on how the paper will be graded. 

You must reference two (4) peer-reviewed articles or papers that support your thesis statement. The final paper must be at least 1000 words in length. (DO NOT exceed 1000 words by a material amount. Excessive words or too many references will NOT impress me.) 

So in summary, here are the research paper requirements:

  • 4 peer reviewed resources (articles or papers) 
  • Paper MUST address:  How defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen countermeasures
  • Cited sources must directly support your paper (i.e. not incidental references)
  • Provide (upload) a pdf of each paper you cite in your paper
  • At least 1000 words in length (but NOT longer than 1500 words)

If you are not sure how to identify peer reviewed papers or articles, please visit the following resources:


Chapter 6 and 10 pdfs are attached below for your reference.

Please follow the instructions carefully and complete the assignment.

Professor is very strict and hard in grading appreciate your concern on this matter! 


"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

CMIT 425 Risk Assessment Paper

• From the devices and systems identified in the GFI Corporate Network Topology, conduct a thorough asset inventory, assign monetary values to each asset (quantitative), and assign a priority value for each asset (qualitative) that could be used to determine which assets are most critical for restoral in the event of a catastrophic event or attack.

• Evaluate the perimeter security, make a list of access points internal and external (remote), identify vulnerabilities and make suggestions for improvements to perimeter and network security.

• Evaluate the remote access infrastructure, identify vulnerabilities and suggest security improvements to mitigate risks to remote access.

• Address the COO’s concern over the mobility security and design a secure mobile computing (smart phones, tablets, laptops, etc.) in terms of authentication technologies and data protection.

• Identify wireless vulnerabilities and recommend what safeguards, authentication technologies,and network security to protect data should be implemented.

• Evaluate the authentication protocols and methodologies within the wired, wireless, mobility and remote access environments and suggest improvements to secure authentication forGFI.

• Evaluate the web system protocols and vulnerabilities within the Intranet server and suggest secure protocol improvements to improve security for web authentication.

• Design a cloud computing environment for the company with a secure means of data protection at rest, in motion and in process.

• Assess all known vulnerabilities on each asset in this environment and impacts if compromised.

• Using the asset inventory and the assigned values (monetary and priority) conduct a quantitative and qualitative risk assessment of the GFI network.

• Recommend risk mitigation procedures commensurate with the asset values from your asset inventory. Feel free to redesign the corporate infrastructure and use any combination of technologies to harden the authentication processes and network securitymeasures.

• Provide an Executive Summary.

• You are welcome to make assumptions for any unknown facts as long as you support your assumptions.

• The Title Page, Table of Contents and References page(s) don’t count in your 15 page minimum!!!

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"