Answer & Explanation:I will upload the syllabus so you can know what is exactly wanted.For your peer review you are asked to review the assigned paper and submit a 1 to 2 page response. You should comment on 1.) was enough background material provide to give a detailed explanation of what will be done 2.) in your opinion, is the topic feasible within one semester 3.) is the thesis (testable hypothesis) clear, can you state in 1 to 2 sentences what exactly will be measured and evaluated 4.) if the thesis is not clear or the topic not feasible in one semester can you offer suggestions for modifying the project to fit the syllabus 5) does the text flow logically – are there gaps in the proposal or major errors in grammer and syntax.peer_review_.pdfit489_narock.pdf
peer_review_.pdf
it489_narock.pdf
Unformatted Attachment Preview
The topic that I have chosen is cloud computing. It is an aspect of Information technology
that has been interesting to me. With the topic I have chosen I will further research it and how
they could solve real world problems. To put cloud computing in the simplest form it is
computing that is based on the internet rather than running applications or programs from
software downloaded on a physical computer or server that would be in the building. Cloud
computing would allow you to run those same processes but instead run through the internet.
Some examples of cloud computing are when you send out a tweet on twitter its cloud
computing, or even checking your bank balance that is also cloud computing. Many companies
have already moved to the cloud. It simply faster, efficient, and cost effective. The flexibility that
cloud computing allows is through the roof. If there is a bigger need for larger bandwidth
demands its easy to scale up your cloud capacity.
Cloud computing also have their cons such as service outages. Since the computing
systems are all internet based your service is dependent on the internet connection. Another
Huge con of cloud computing is the security and privacy of your data on the cloud. Not too long
ago various celebrities had their private photos on ICloud leaked to the public. ICloud allows
IPhone users to save photos and videos to the cloud. Some hacker was able to hack their
ICloud’s and leak pictures to the public that should never have. People wonder how much they
can trust these providers after millions of user credentials. Cloud service providers are expected
to manage and safeguard any hardware infrastructure, but remote access is the responsibility of
the user. Some practices that companies take to minimize security risks are knowing who is
supposed to have access to each resource and service, limiting data access based on the user
context, taking a risk based approach to securing assets used in the cloud, extend security to the
device, adding intel to network protection, build in the ability to see through the cloud. Another
disadvantage is the vulnerability to attack. Since every component of cloud computing is
connected to the internet its not perfectly secured. The biggest issue with cloud computing is
simply security and how a company can make it more security. There are many companies who
have access to your personal information when you store your data in there system. Some
companies sell your information to a third party company for marketing purposes.
The purpose of this research paper is to see how secure and safe using the cloud is. Also to show
that the cloud is the best solution when it comes to data storage. I will know that the customer is
happy once they realize how much money they will save, and the amount of energy that servers
would need. I think more companies should go to the cloud, because more work can be done
with less workers. There wont be a need to spend big money on hardware, software or licensing
fees so capitol cost goes down as well.
The faculty member that would like to work with is Dr.Murphy the reason being is I am in her IT
355 class and I see her often around campus. She has agreed to work with me and oversee my
project. She has also given me some ideas once I introduced that I would like to work on cloud
computing.
My project will be a research study on cloud computing. I feel a full semester working on it
needs a timeline. My timeline will begin with gathering as much information I can on the pros
and cons of cloud computing and I already have done so. With my thesis being that more
companies should use cloud computing as an IT solution I need to gather information that backs
that thesis statement. I need to prove that cloud computing is a faster solution by also adding
charts and diagrams to my research as well. I will spend about two weeks just gathering
information and why cloud computing is the best solution so I can back by thesis. It will take
more time figuring out a solution for the security issues that cloud computing has and some of
the options to minimize those issues. The type of data and references that I will need will be
articles from trusted sights. I will try to find presentations on cloud computing on YouTube as
well and see what ideas I can learn from that. My initial strategy for collecting data is using our
schools library and see what books I can find and articles on consortium.
School of Business Administration
2015-16
COURSE SYLLABUS
Course Number
IT 489-A
Course Title
Capstone Project
Fall Semester
Spring Semester
X
Summer Semester
Year
2016
Name of Instructor
Dr. Tom Narock
Meeting Day, Time, and Room Number
Students work independently and meet with instructor as needed
Final Exam Day, Time, and Room Number
No Final Exam for this course
Office Hours, Location, Phone
Monday 10am – 2pm 4040, Room 423 703-284-5935
E-mail and Web Site
tnarock@marymount.edu http://narock.github.io
UNIVERSITY STATEMENTS
Academic Integrity
By accepting this syllabus, you pledge to uphold the principles of Academic Integrity expressed by the Marymount University
Community. You agree to observe these principles yourself and to defend them against abuse by others.
Special Needs and Accommodations
Please advise the instructor of any special concerns or needs at the beginning of the semester. If you seek accommodation
based on disabilities, you should provide a Faculty Contact Sheet obtained through the Office of Student Access Services,
located in Rowley Hall.
Access to Student Work
Copies of your work in this course including copies of any submitted papers and your portfolios may be kept on file for
institutional research, assessment and accreditation purposes. All work used for these purposes will be submitted
anonymously.
Student Copyright Authorization
For the benefit of current and future students, work in this course may be used for educational critique, demonstrations, samples,
presentations, and verification. Outside of these uses, work shall not be sold, copied, broadcast, or distributed for profit without
student consent. Items submitted for this course also may be submitted to TurnItIn.com for analysis.
University Policy on Weather and Emergency Closings
Weather and Emergency closings are announced on Marymount’s web site, through MUAlerts, area radio stations, and TV stations.
You may also call the Weather and Emergency Hotline at (703) 526-6888 for current status. Unless otherwise advised by local media
or by official bulletins listed above, students are expected to report for class as near normal time as possible on days when weather
conditions are adverse. Decisions as to inclement closing or delayed opening are not generally made before 6:00 AM and by 3:00 PM
for evening classes of the working day. Emergency closing could occur at any time making MUAlerts the most timely announcement
mechanism. Students are expected to attend class if the University is not officially closed. If the University is closed, course content
and assignments will still be covered as directed by the course instructor. Please look for communication from course instructor (e.g.,
Blackboard) for information on course work during periods in which the University is closed.
1.
BROAD PURPOSE OF COURSE
This is the capstone course for students in the B.S. in Information Technology program and is designed to allow students
to work on their own, to simulate the work environment. Students have the opportunity to select their own project based
upon their Information Technology interests.
The course is based on the Real Project for Real Clients (RPRC) methodology and the student works with a client and/or
a Marymount University full-time faculty member selected by the student to reflect their area of study. The client may be
a Marymount faculty member or an external client such as a not-for-profit organization.
2.
COURSE OBJECTIVES:
Upon successful completion of this course students will be expected to:
INQUIRY OBJECTIVES
a.
b.
c.
d.
Formulate an appropriate information technology inquiry and provide context;
Gather, evaluate and use information or knowledge to support the inquiry topic;
Conduct research to provide the basis for the project work; and
Present and communicate the results of the inquiry project,
Outcomes of Writing Intensive Course
a. Students will produce written work appropriate to the discipline through a process that involves drafting and
revision based on feedback.
b. Students will produce focused and coherent texts that address a specific audience, move effectively between
generalizations and details, make honest use of sources, and engage complex ideas without distortion.
c. Students will produce texts that show careful attention to fluent sentence structure, grammatical correctness, and
proper documentation.
d. Students will identify a suitable subject for scholarly inquiry in the discipline, analyze appropriate primary and
secondary source materials, and support a focused thesis or argument in a clear and coherent product.
COURSE-SPECIFIC OBJECTIVES
a. Gather, analyze, and communicate technical information related to a specific topic in information technology;
b. Demonstrate the ability to prepare a satisfactory project proposal in the information technology field for a real
client;
c. Demonstrate the successful completion of a project for a real client including a full understanding of the client’s
requirements;
d. Demonstrate the ability to seek out, identify and evaluate sources of valid, reliable and current information in the
information technology field including potential solutions;
e. Demonstrate the ability to construct a thorough, professional and properly documented final project report on the
completed project;
f. Demonstrate the ability to work independently with minimal supervision; and
g. Review a project critically and identify areas for improvement.
3. TEACHING METHOD
There are no regularly scheduled class meetings. Students will work independently on a topic of their choosing. Each student will
have a Topic Expert and the course instructor to periodically report to. Depending upon the topic, the course instructor may also be
the Topic Expert. The student and Topic Expert will establish a schedule for meeting and discussing the student’s progress as needed.
The student is responsible for submitting period deliverables to the course instructor via BlackBoard. All students are required to
give a final in-person presentation on their project during the final week of the semester. The course instructor will arrange
presentation times with students as the semester progresses.
4. GRADING POLICY
The project is graded as follows:
a.
b.
c.
d.
e.
f.
g.
Topic Submission
Peer Review 1
Project Draft Submission
Peer Review 2
Final Project Report
Meeting with Instructor
Project Retrospective
10%
15%
10%
15%
30%
10%
10%
Students must receive C- or above to pass this capstone class.
The grading scale is as follows (points obtained):
93-100 A; 90-92 A-;
87-89 B+; 84-86 B; 80-83 B-;
77-79 C+; 74-76 C; 70-73 C-;
67-69 D+; 64-66 D; 60-63 D-;
0-59 F
12, February, 2016, is the last day to withdraw from a class without academic record
18, March, 2016, is the last day to withdraw from a class with a grade of W
5. CLASS SCHEDULE
The course is self-paced with ad-hoc meetings of faculty and students as needed.
The project has the following due dates:
Topic Submission
Peer Review 1
Project Draft
Peer Review 2
Final Report
Project Retrospective
Meeting with Instructor
Friday January 29, 2016 by midnight
Friday February 12, 2016 by midnight
Friday March 4, 2016 by midnight
Wednesday March 30, 2016 by midnight
Friday April 29, 2016 by midnight
Friday April 29, 2016 by midnight
To be scheduled between 3/14 and 4/25
In addition, the student will meet as needed with their Topic Expert and the course instructor and may interact with other
students through the Blackboard site and in ad-hoc meetings.
Submitting Assignments and Late Submissions
§
§
§
§
§
To receive full credit, all submissions must be submitted to BlackBoard by their due date
Each assignment builds upon the previous ones. As a result, all assignments must be submitted in order to receive an A.
Successful submission is the responsibility of the student. Verify that your submissions are actually available in
BlackBoard. In the case of BlackBoard technical difficulties then you should email your assignment to Dr. Narock. It is
your responsibility to ensure that the instructor receives all project deliverables by the above deadlines.
Late submissions will lose 2 points per day they are late
The Peer Review Assignment affects other students in the course and as such cannot be submitted late. Any Peer
Reviews not submitted on time will receive a grade of 0.
Requirements for deliverables are as follows:
Topic Submission: (3 pages of written text)
The topic submission is your chance to define your project. You should think about which aspects of Information
Technology most interest you and would motivate you for further study. An appropriate topic should either 1.) apply specific
Information Technology skills to a real-world problem or 2.) design, develop, and deploy a research study to evaluate
Information Technology. Some examples of the application project include identifying an organization with information
technology needs, designing a solution to those needs, and deploying a prototype of that solution. In previous semesters
students have created mobile apps and e-commerce sites for their organization. An example of a research study project is the
examination of digital currencies, such as BitCoin, investigating how they operate and should they be regulated.
The thing that is common to both of these project types is a testable hypothesis. All IT Capstone projects must have a
testable hypothesis. If you are deploying an IT solution for an organization, what are your expectations for success? How can
you show that other potential solutions are not better? How can you show that you met the customer’s needs? Examples of
testable hypothesis in this case is, for example, “my solution will be faster than the existing system and I will show this
through a side-by-side technical evaluation” or “my solution will better meet the customer’s needs and I will show this
through responses to a survey I conduct”.
If you are creating a research study, you still need a testable hypothesis or point of view to base your argument around. For
example, “BitCoin should be regulated” could be an appropriate starting point and your research and references would be an
attempt to validate this point. In the end, you may find that the references and evidence contradicts your original hypothesis.
That is ok. As long as your final paper and presentation clearly indicate why your hypothesis was not correct and what
you learned about the alternative point of view.
You should identify a full-time faculty member in the Information Technology department who will act as your content
advisor. Think about a topic and discuss with an appropriate faculty member and ask if they will be responsible for
supervising your work. Get approval from the faculty member that they are available to work with you this semester. Dr.
Narock, the course instructor, is also available to discuss and supervise topics.
Your Topic Submission must be 3 pages of written text that includes (2 points each)
1. A description of your topic – write as if you are introducing the topic to someone not familiar with it. What is the
background and history of this topic? Why is it important? What should a novice in this area be aware of?
2. Testable Hypothesis – What are your starting assumptions and expectations for this project? What will you
measure? What metrics could you use to demonstrate you found the best solution? How will you know the
customer is happy? How do we know you met the customer’s objectives? If your project involves researching a
topic and does not involve much (or any) development, then what is your thesis? What position do you take on
the argument? What points will you try to convince the reader of when you write?
3. Your faculty mentor – Which faculty member would you like to work with? Why? Document that you have
contacted that faculty member and they have agreed to work with you
4. Propose a timeline for your project. What do you need to accomplish to finish this project? How will you divide
up the semester to accomplish everything that needs to be done? How much time will you devote to each item
you need to finish?
5. What types of data and/or references will you need? What is your initial strategy for collecting data and
identifying relevant references?
Peer Review 1: (2 pages of written text)
Your job with the first peer review is to review a fellow classmate’s Topic Submission. All peer reviews will be
anonymous. That is, you will not know the author of the topic submission you are reviewing. The author will not know who
wrote their review. The objective of the peer review is place yourself in the position of an IT manager. Does the topic seem
feasible to you?
The Peer Review must contain
1. What is the author’s thesis or testable hypothesis? After reading the submission is it clear to you what the
author is attempting to do? Has the author clearly stated their stance/position on the issue and what they will
test or measure?
2. Is the document well written? You do not need to point out every grammatical error. However, you should
point out any logical errors and highlight a few grammatical and syntactical errors.
3. Is the timeline feasible? Given what the author described and the timetable they proposed, can this project
reasonably be completed in one semester.
4. Any comments for improving the project – such as resources to look at or ideas to try
Project Draft: (8 or more pages of written text with at least 10 references)
All projects must be initially documented in a project draft report. The document should be concise and include the
following:
Cover Page with Honor Pledge (can be found on BlackBoard)
Table of Contents
Objective of your project (similar to topic submission, but now
including feedback from your faculty mentor and peer review)
Client (if applicable, background on the organization your project is
creating an IT solution for. Who is the organization and what
are there IT needs for this project). If no external client then
use this section to discuss what point of view, argument, or
thesis you plan to convey to the reader
Content Advisor with summary of qualifications (who is your faculty
member and what work have they done in this area)
Project Plan (what will you do and how will you do it, include a
planned schedule, how long do you anticipate each step will
take)
Resources (do you need access to any IT resources such as servers,
storage devices, cloud computing, special software? If so,
how will you obtain access? Will the organization provide
these resources? Are they free?)
Project Details – this is where you make your argument, support
your points with data and references, and provide a detailed
discussion of your capstone project. Describe what you have done with the project up to
this point. What do you have left to do.
Knowledge being applied (which courses, background knowledge, or
prior experience might be applicable to this project? What
might you have to learn this semester to successfully finish
this project?)
Risk factors (are there specific things that could negatively impact
your project? Are you dependent on an organization rolling out a new product? What
happens if that product gets delayed? What happens if you need special resources and
they are not available? What issues and challenges might you run into this semester?).
You should also consider any risk factors for your client. For example, while your
solution may solve one technic …
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more