senior portfolio...animal-id, alone, cannot be the pk because it does not functionally determine all...
TRANSCRIPT
![Page 1: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/1.jpg)
SENIOR PORTFOLIO
NOVEMBER 30, 2017 Madeline Warndorf
![Page 2: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/2.jpg)
Table of Contents
Executive Summary ............................................................................................................... 4
Personal Statement ............................................................................................................... 4
Resume ................................................................................................................................. 4
Senior Activities ..................................................................................................................... 7
Internship ......................................................................................................................................7
Capstone .......................................................................................................................................7
Documentation of Specific Fields ........................................................................................... 7
Programming .................................................................................................................................7
Database Technology .....................................................................................................................8
Computer Networking....................................................................................................................9
Software Testing and Documentation ........................................................................................... 14
Soft Skills ............................................................................................................................. 28
Written Communication ............................................................................................................... 28
Project Management ................................................................................................................... 32
Problem Solving/critical Thinking ................................................................................................. 47
Honors Thesis: ..................................................................................................................................... 47
Honor 200 Tutorial “Book to Film” ..................................................................................................... 48
Extra-Curricular Activities .................................................................................................... 66
Global Experiences ....................................................................................................................... 66
Belize Biology Study Abroad ............................................................................................................... 66
Leadership Activities .................................................................................................................... 66
Dance Team......................................................................................................................................... 66
St. Ambrose School of Business Honors Society ................................................................................. 67
Honors Program .................................................................................................................................. 67
Awards and Honors ............................................................................................................. 68
Awards ........................................................................................................................................ 68
Honors......................................................................................................................................... 68
Career Path ......................................................................................................................... 69
Links to Applicable Sources .................................................................................................. 69
![Page 3: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/3.jpg)
Madeline M. Warndorf
1117 N. Kenilworth St.
Apt. 6
Arlington, VA 22205
703-431-6614
November 30, 2017
Dr. Diane Murphy
Marymount University
2807 N. Glebe Rd.
Arlington, VA 22207
To Dr. Diane Murphy:
I am honored and excited to present my senior portfolio package. It contains all of the important
work and information from my time at Marymount University. This portfolio will be used as a
reference to my skills as well as knowledge gained from my time at the university.
Thank you in advance for your time and consideration. Please feel free to contact me at (703)
431-6614 or by email at [email protected]
Sincerely,
Madeline M. Warndorf
![Page 4: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/4.jpg)
Executive Summary
Passion and determination are key values that help push an individual through struggles and
towards success. Madeline Warndorf believes strongly in that as she attended Marymount full-
time while interning at HumanGeo/DigitalGlobe Radiant all four years of her academic career.
On top of the time that Madeline dedicated to school and work, she continued to follow her
passion for dance through joining the Marymount Dance Team. Both of these statements are
shown in her resume along with her awards and honors. Madeline finished her Honors Thesis her
senior year while becoming proficient in R on her own time. She wanted to do complete this
challenge on her own because she is driven to work in the Data Analytic field.
Personal Statement
Through my passion of math and finding the answers to the harder questions, I decided that I
wanted to do Data Analytics. A family friend helped me pursue this passion by giving me the
chance to intern at HumanGeo. As I continued to gain knowledge through this internship as well
as my schooling, I was able to grow in confidence as well as feed my determination to gain more
knowledge of this field.
I have received many honors through Marymount University, however the best honor that I have
received was through the opportunity given to me through HumanGeo. Through the company, I
was encouraged to apply for the United States Geospatial Intelligence Foundation (USGIF)
Young Professional Group’s Golden Ticket program for their annual GEOINT conference. I was
one of twenty-five individuals selected out of the entire nation to attend the conference in San
Antonio, TX.
I was humbled to be selected as the youngest member of the group and with minimum
experience in the field. The conference helped me narrow my interests to wanting to work for the
government sector as an analyst.
Resume
![Page 5: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/5.jpg)
Madeline M. Warndorf
1117 N. Kenilworth St. Apt. 6∙ Arlington, VA 22205 ∙ (703) 431-6614 ∙ [email protected]
Skills
Languages: Proficient in R and Python. Experienced with Java, CSS, HTML, JavaScript, SQL.
Software: Tableau, LaTeX, MatLab, MS Office, MS Access, MS Project, MS Visio.
Clearances and Certifications
Clearance: TS
Education
Marymount University, Arlington, VA Expected Completion: May 2018
Bachelor of Science, Major in Information Technology with a Concentration in Data Science, Minor in
Mathematics.
Experience
DigitalGlobe Radiant, Arlington, VA Dec 2016-Present (Acquired HumanGeo in Fall of 2016).
Data Analyst Intern
Assisted administration tasks including the onboarding process for the HumanGeo side of the company.
Conducted data research, data analysis, and several technology mentorships under the Rapid Feedback
Team (RFT), operating separately from HumanGeo, for NGA’s GEOINT Services clients.
Key Projects:
• Under the RFT, worked on the data research team for multiple projects gathering open source
data like social media and geological information.
o Projects were either given to the team by the client or proposed by a fellow team
member.
• Used software like Tableau and Excel to analyze and visualize data for projects.
• Pursued mentorships under lead technologist and data analysts on the RFT and HumanGeo
sectors of the company.
The HumanGeo Group, Arlington, VA Aug 2014-Present
Intern
Assisted administration tasks including the onboarding process for the HumanGeo side of the company.
Managed employee database, compiled receipts, managed meetings, and curated and analyzed articles
for clients.
Key Projects:
• Tested and curated articles for the Global Terrorism database project.
• Assisted finance in maintaining receipt database as well as filing of physical receipts.
• Managed and updated employee information throughout the onboarding process.
• Assisted CEO in meetings, information releases, and acquiring process of the company.
![Page 6: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/6.jpg)
Honors and Activities
Honors
YPG Golden Ticket USGIF YPG 2017
DISCOVER Summer Research Grant Marymount University 2017
Kappa Mu Epsilon Marymount University Mathematics Department 2017
Upsilon Pi Epsilon Marymount University Information Technology Department 2017
Phi Eta Sigma Marymount University 2016
Presidential Scholarship Marymount University 2014-2018
St. Ambrose Honor Society Marymount University School of Business 2015-2018
Activities
Membership Chair Head Marymount University 2016-2018
Co-Captain of Dance Team Marymount University 2016-2018
Honors Program Marymount University 2014-Present
![Page 7: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/7.jpg)
Senior Activities
Internship
The internship that I persuaded throughout my four years at Marymount University was
with the HumanGeo Group. More specifically I assisted the Rapid Feedback Team - Unclassified
in mission critical responses to GEOINT Services tools and products. I also conducted research,
compiled data, and created visuals using GEOINT Services tools through Open Source. I chose
this course of action because it is my passion and the once small business company of
HumanGeo provided an amazing place to shadow under a variety of individuals with different
skill sets.
I learned the importance of patience in learning new tools, the importance of finding a
mentor in a variety of fields (development, operations management, and analytics). I have
learned a large variety of skills and new tools that are not taught at Marymount such as Tableau
and Q-GIS.
Capstone
I substituted my Capstone project for my HON400 Thesis. I analyzed the overall vehicle
safety improvements and the efforts to prevent fatal accidents caused by cell phone usage
decreased the number of fatal accidents. I was interested in this topic because after using the
National Highway Traffic Safety Administration’s database of a project that I completed last
year I found that their data is not compared against manufactures, legislation, as well as
campaigns on the same report. This research project will provide the starting point to see if the
efforts to help decrease fatal car accidents are working across a long period of time as well as
provide an interesting way to visualize the data. There is also a lot of information that the FARS
Encyclopedia offers that can be used to look at other aspects as to what could be correlated to
fatal car accidents. I enjoy the how the data can be used to answer a variety of other questions
that are different to the one that I plan on analyzing.
Documentation of Specific Fields
Programming
Java:
https://github.com/madelinew/MUJavaAssignments
R:
https://github.com/madelinew/HON400Thesis
Python:
https://github.com/madelinew/MUPythonAssignments
![Page 8: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/8.jpg)
Database Technology
IT310 Assignment 2 – Logical Design: Normalization
The following relation describes a part of the existing structure of a pet-store database.
PETS (Animal-ID, Name, Category, Breed, Gender, Color, List price, FF, Quantity-of-
FF)
➢ Animal-ID is a unique identifier for each animal. Each animal has a name and belongs to one
category (Cat, Dog, Fish, Bird, etc). Within each category, there are several breeds (such as
German Shepard, Collie, etc. considering dogs).
➢ “FF” stands for “favorite food” and each animal could have more than one FF.
➢ “Quantity of FF” is measured in ounces. It is not the recommended quantity but the quantity
the animal would consume comfortably (without being “digestively-challenged”) based on
the pet store’s experience.
The following functional dependencies hold in the above relation (There are absolutely
NO OTHER dependencies):
➢ Animal-ID Name, Category, Breed, Gender, Color, List-price
➢ Breed Category
➢ Animal-ID, FF Quantity-of-FF
STEP 1: I CLAIM that PETS with Animal-ID as the primary key is in 1NF. Is my claim right?
Please state the reasons for your answer. If my claim is incorrect, then what needs to be done to
the relation for it to satisfy 1NF?
Animal-ID, alone, cannot be the PK because it does not functionally determine all of the
attributes. The definition of 1NF states that they cannot be multi-valued attributes. Animal-ID
does not determine Quantity-of-FF. Therefore, FF must become a PK as well. That means that
Animal-ID and FF are the composite key for this database to satisfy 1NF.
PETS (Animal-ID, FF, Name, Category, Breed, Gender, Color, List price, Quantity-of-FF)
STEP 2: Is your answer to Step 1 in 2NF? Why or Why not? Please articulate the reason(s). If
not, normalize the schema to 2NF.
No it is not in 2NF because Quantity-of-FF is a partially dependent on the PK of Animal-ID and
FF.
![Page 9: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/9.jpg)
PETS1 (Animal-ID, Name, Category, Breed, Gender, Color, List price)
PETS2 (Animal-ID, FF, Quantity-of-FF)
STEP 3: Is your answer to Step 2 in 3NF? Why or Why not? Please articulate the reason(s). If
not, normalize the schema to 3NF.
It is not in 3NF because there is a transitive dependency between the two non-primary key
attributes Breed and Category.
PETS1 (Animal-ID, Name, Gender, Color, Breed, List price)
PETS2 (Animal-ID, FF, Quantity-of-FF)
PETS3 (Breed, Category)
Computer Networking
Question 1
Question 2
![Page 10: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/10.jpg)
a) I wouldn’t recommend the Scoops chain to change its server’s NOS to Linux because a
lot of people are more familiar with Windows operating systems. Even though Windows
OS is more expensive than Linux Fedora.
b) It is easy to use and also to upgrade if a new version is released (Windows 8 vs. Windows
10). Windows OS are also more compatible for software applications and hardware
compared to Linux which Scoops will have to make sure that the other software they use
would be compatible.
Question 3
1.
![Page 11: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/11.jpg)
2.
3.
Question 4
The computers only run the TCP/IP protocol on the Ethernet network and all the computers use
3Com NICs in the lab. That means all of the frames need to depend on type of network the
frames run on. The frame type depends on the NIC that is needed to transport the data from the
Ethernet frames to the token ring. When the student changed the frame type which workstation's
NIC was using to transmit data from Ethernet to token ring, the connection between these two
networking technologies was removed.
Question 5
A) 254
![Page 12: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/12.jpg)
B) 127
C) 128
D) 192
E) 255
F) 00001010
G) 00111000
H) 01100000
I) 11100000
J) 11111100
Question 6
a) Some of the nodes would still have statically assigned IP addresses because they were
manually assigned them by somebody with an ARP utility. They just haven’t been
changed to DHCP yet.
b) The problems that could happen with having a mix of statically assigned and dynamically
assigned addresses on the same network is that the static IP address could overlap the
addresses in the DHCP pool. The static IP address has to be in the same subnet as the
DHCP server and the default gateway and DNS addresses have to match that of the
DHCP.
c) The steps that I would take to change the address assignment properties for a Windows 7
workstation are:
a. Go to Control Panel, select Network Connections.
b. Right click on the needed connection (local, wireless, etc.) and select Properties.
c. Click on Internet Protocol (TCP/IP) and click Properties.
d. Select the button that says "Use the following IP address:"
e. Enter the desired IP address, Subnet mask, and Default gateway.
f. The button that says "Use the following DNS server addresses:" is selected.
g. Enter all the IP addresses for the DNS servers the router uses
d) There is a way that I could modify the addressing properties of the workstations at each
small office remotely, without having to visit the offices. Some systems have Remote
Registry that will allow the user to view other Window’s workstations and make changes
to the IP addresses through the command line.
http://searchtasks.answersthatwork.com/tasklist.php?File=RemoteRegistry
Question 7
3. IPv4 Address: 10.6.21.94
Hostname: BALL_405_PC18
MAC Address: 18-03-73-35-FF-0A
DHCP Server Address: 10.6.2.2
![Page 13: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/13.jpg)
9/29/16 10:12:30 AM
9/29/16 7:27:32 PM
Default Gateway Address: 10.6.20.1
Subnet Mask: 255.255.254.0
5. The IP address changed to Autoconfiguration IPv4: 169.254.19.129
6. My IP address, Subnet Mask, Default Gateway, DHCP Server Address, and MAC Address
stayed the same. The only thing that changed from before was the Lease Obtained and Lease
Expires.
Question 8
Bit-Wise: 00001010.00001100.00001110.00010010
Subnet Address: 10.12.0.0
Broadcast Address: 10.12.0.255
Number of hosts: 254
IP Address Range: 10.12.0.0 – 10.12.0.254
Question 9
a) The OSI model layer that is responsible for routing data from one LAN to another is the
Physical Layer. It is Layer 1.
b) The OSI model layer that specifies data formatting and language that is being used is the
Presentation Layer. Also known as Layer 6.
Question 10
a) I would explain her that it is a terrible idea to have the telco rooms in such condition. I
would talk to her about all the expected outcomes of the errors and inform her about the
TIA/EIA 568A and TIA/EIA 568B recommendations. I would also tell her that in case of
any minor problem, it could take hours or even days to find that little error in a telco
room that is in the condition of the current room with the cords, jacks, and devices not
labeled and in order.
b) Proper cable termination is a basic requirement for two nodes on a network to
communicate well. Poor terminations can lead to loss or noise. This would lead to errors
in the signal.
c) It is critical to label patch cables, ports, and data jacks because when people go to fix a
problem and start pulling on wires they will not know which wire is connected to which
![Page 14: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/14.jpg)
computer or device and could ruin somebodies work. It will also save a lot of time when
it comes to trying to track down the problem if one ever arose.
Software Testing and Documentation
The Online Graduation Petition Process System
Software Development Plan
1. Introduction
This report addresses the software development plan for the Marymount University’s
Online Graduation Petition Process System. The purpose of this system is to eliminate the paper
version of the graduation petition and create a version of the form that will be filed under the
student’s personal account in the Registrar’s Office Database. The objectives of the system are
that it will create an easier and more efficient way for the student to fill out and submit the
application. Another objective of this system is to create an efficient way for the Registrar’s
Office to track and maintain the process of the forms from each student. The developmental
process model that will be used is the Incremental model which takes each requirement that is
shown in the use case diagram and breaks them down into modules and goes over the design,
then testing, and implementation of each modules1.
2. Project Deliverables
All the requirements that need to be delivered by January 11, 2016 have been broken down
into separate modules according to the Incremental Model. Each module contains separate steps
such as design and development, testing, then implementing. After one module is completed the
second module is added onto it. The delivery date for each module listed requires that the entire
module (design and development, testing, and implementation) is finished by that date.
• Module 1 completed by May 1, 2015
This module is a getting the form to be accessed from the Marymount University Registrar’s
Office Website. This is a stand-in blank form that will be replaced by a later module. Then the
team will link the Online Graduation Petition system to the Registrar’s Office Database. By
linking the two systems, the Online Graduation Petition System will be allowed to have access to
the database.
• Module 2 completed by August 21, 2015
1 What is Incremental model- advantages, disadvantages and when to use it? (n.d.). Retrieved November 24, 2015,
from http://istqbexamcertification.com/what-is-incremental-model-advantages-disadvantages-and-when-to-use-it/
![Page 15: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/15.jpg)
This module enables the student to use their username and password to log into the application
and validate that the user ID is a current student at Marymount University. This module requires
the access to the Registrar’s Database to allow the student to use their university login
information and have the validation of the student. Upon logging into the application, the first
page will display the student’s information such as their identification number, major, any
specialty, and minor. This is the required connection between the application and Registrar’s
Office Database.
• Module 3 completed by December 11, 2015
This module is the section where the student inputs the information that the Registrar’s Office
needs. The questionnaire/form section that concerns the confirmation of semesters (Fall 16,
Spring 16, and Summer 16), indication of walking in the spring semester, and reservation of
tickets. The question concerning the reservation of tickets, a maximum limit must be placed on
them. Then the application will be submitted to the Registrar’s Office Database in the student’s
file. After the application is submitted, then the Registrar’s Office Database or System needs to
send a confirmation e-mail to the student’s email account stating that their application was
received.
• Project complete by January 11, 2016.
This delivery date is for the implementation of the entire Online Graduation Petition Process
System.
3. Project Resources
This section describes any external resources (hardware and software) that is required to
complete the project. These items are documented because they need to be managed throughout
the process of developing the system. By documenting them, it will prevent confusion later down
the line and provide a checklist of the equipment needed for the project. Both the hardware
resources and software resources indicate if they are needed for the development or execution of
the project.
3.1 Hardware Resources
This software development plan assumes that the computers listed include a mouse,
keyboard, and monitor. The exact description of the Registrar’s Office Database computer is
unknown at this time. The description that is listed for the database computer is the requirements
to run Windows 10 operating system2.
2 Windows 10 Specifications - Microsoft. (n.d.). Retrieved November 24, 2015, from
https://www.microsoft.com/en-us/windows/windows-10-specifications#sysreqs
![Page 16: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/16.jpg)
Table 1: Hardware Resource Requirements
Resource Development Execution
Windows Computer
Windows 10, 1 GHz
processor, dual core X X
1 GB RAM, CD drive,
Ethernet connection X X
16 GB disk space, 800x600
minimum graphics X X
Registrar’s Office
Computer3
Windows 10, 1 GHz
processor, dual core X
1 GB RAM, CD drive,
Ethernet connection X
16 GB disk space, 800x600
minimum graphics X
Ethernet Cables X X
4. CMSI 402: SW Dev. Plan. (n.d.). Retrieved November 24, 2015, from
http://myweb.lmu.edu/bjohnson/cmsi402web/sdevplan.html
![Page 17: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/17.jpg)
3.2 Software Resources
The provided information for the software requirements for this project is the web
development environment is HTML5/CSS, the coding is requested to be done in Java, and the
database that will be accessed is Oracle.
Table 2: Software Resource Requirements
Resource Development Execution
Text Editor Sublime Text Editor X
Operating System Windows 10 X X
Third Party Software Oracle Database 12c
Release X
Change Control GitHub X
IDE NetBeans 8.0 X
IDE Plug-In Sublime Theme Plug-In X
4. Project Organization
For this system, the Incremental Model will be used to develop the Online Graduation
Petition Process System. The project is broken down into different modules that have different
requirements. To minimize risk and confusion, there will only be one team for the project that
will work on all six modules. The team will consist four sub-teams. The amount of specific
developers, designers, testers, and project executers can be modified because this is a small
project. This software development plan is designed with the maximum number of personnel
required to complete this project. The team will continue to work through the modules together
since the modules are designed to be built upon after the implementation of the previous.
4.1 Roles and Responsibilities
![Page 18: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/18.jpg)
Project Manager
The project manager is in charge of overseeing the entire project from start to finish. The
project manager is the head of communication, planning, execution, management of personnel,
and resources for the project4. All of the team leads, business analyst, and release manager get all
of their information concerning the project from the project manager. The project manager also
will have the final say in any decision that is made.
Database Analyst
Database analysts are specialists that understand how databases are created and
designed5. These individuals will work along side the development team and the programming
team because these two teams will need to access the Registrar’s Office database. They will be in
charge of answering any questions concerning the database. They will also answer to the team
leads of each of the teams.
4.1.1 Design Sub-Team
Design Team Lead
The design team lead is in charge of communicating the information about the project
from the project manager and the designer to the rest of the design team. The other
responsibilities and roles that they will cover is communication from the design team to the other
team leads and managing the progress of the design stage for each module of the Incremental
model. They also keep close contact with the client to have a strong understanding of the
business requirements for the project6.
Designer
The designer is in charge of understanding the requirements, determining the best
approach on how to reach them, and the data needs7. They will keep close communication with
the development team because their work is the basis for the development of the system. The
designer is responsible for the layout of the system and the design specifications. They are also
responsible for change control within the development process.
4.1.2 Development Sub-Team
4 What is a Project Manager (PM)? - Definition from Techopedia. (n.d.). Retrieved November 25, 2015, from
https://www.techopedia.com/definition/677/project-manager-pm 5 Project Roles and Responsibilities. (n.d.). Retrieved November 25, 2015, from
http://www.lifecyclestep.com/open/408.0LifecycleRoles.htm
6 Project Roles and Responsibilities. (n.d.). Retrieved November 25, 2015, from
http://www.lifecyclestep.com/open/408.0LifecycleRoles.htm 7 Project Roles and Responsibilities. (n.d.). Retrieved November 25, 2015, from
http://www.lifecyclestep.com/open/408.0LifecycleRoles.htm
![Page 19: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/19.jpg)
Development Team Lead
The development team lead is in charge of communicating the information about the
project from the project manager to the rest of the team. The other responsibilities and roles that
they will cover is communication from the development team to the other team leads and
managing the progress of the development stage for each module of the Incremental model. The
development team is also working along side of the design team because these two actions
happen at the same time in the model.
Developer
The developers will be responsible for creating and building the software application for
the Online Graduation Petition Process System8. They will write the front-end and back-end of
the software and debug it. They are also responsible for preserving the code from module to
module as they continue to build onto it.
4.1.3 Testing Sub-Team
Testing Team Lead
The testing team lead is responsible for leading the team that tests the system towards the
end of each module and one final time before final deployment. They will be in charge for
communication between the team and the project manager and the other team leads. They will
notify the development team and the project manager about any failures or fixes that are in the
system. This team lead is responsible for the testing stage of each module of the Incremental
Method.
Tester
The tester is responsible for making sure that the system meets all the business
requirements and that the system is free of errors9. They are responsible for maintaining that the
testing team lead thoroughly understands what needs to be fixed to the development team. The
testers are not to fix the code, but to only notify the development team lead.
4.1.4 Project Execution Sub-Team
Project Execution Team Lead
This individual is responsible for leading the team that is in charge of executing the final
project to the project manager then the client. They will be in charge for communication between
8 What is a Developer? - Definition from Techopedia. (n.d.). Retrieved November 25, 2015, from
https://www.techopedia.com/definition/17095/developer 9 Project Roles and Responsibilities. (n.d.). Retrieved November 25, 2015, from
http://www.lifecyclestep.com/open/408.0LifecycleRoles.htm
![Page 20: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/20.jpg)
the team and the project manager and the other team leads. This team lead is responsible for
managing the installation and implementation of the total project.
Project Executer
The project executer is responsible for finalizing the project and preparing it to be
presented to the client and project manager. They are also responsible for the installation of the
program.
![Page 21: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/21.jpg)
4.2 Organizational Chart
Project Manager
Developer
Developer
Database Analyst
Development
Team Lead
Designer
Team Lead
Testing
Team Lead
Project Execution
Team Lead
Designer
Designer
Tester
Tester
Tester
Project Executer
Project Executer
![Page 22: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/22.jpg)
5. Schedule
The development process used is the Incremental model which is broken down into
subtask sections with their own personal meetings. The subtasks are the design section,
development section, testing section, and implantation section. The GANTT table and GANTT
chart below defines the timeline for the tasks and meetings needed to complete this project.
5.1 Module One
![Page 23: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/23.jpg)
5.2 Module Two
![Page 24: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/24.jpg)
5.3 Module Three
![Page 25: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/25.jpg)
5.4 GANTT Charts
![Page 26: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/26.jpg)
6. Risks
This system, through the developmental process of the Incremental model should not
have major risks. Through the Incremental model, risks are diminished because at the end of
each module the section that was developed is tested10. The schedule that was developed through
the GANTT chart predicted that the project will be completed ahead of schedule. This will give
some leeway if any part of the modules falls behind schedule.
7. Glossary
CSS: “Cascading Style Sheet” style sheets that are used to format web pages (Christensson,
2006).
Developmental Process: system used to define the steps and tasks that need to be accomplished
in an organized flow (What is product).
Ethernet: way to connect computers to a network over a wired connection, Ethernet cable,
(Christensson, 2014).
GANTT Chart: is a chart that is used to describe a schedule through the use of a timeline
(CMSI 402: SW Dev. Plan).
HTML5: fifth standard of HTML (Hypertext Markup Language), which is a language that is
used to create webpages (Christensson, 2015).
IDE: Integrated Device Environment, it is an application that is used by developers used to
create programs (Christensson, 2015).
Incremental Model: model used during the software life cycle. It is a “multi-waterfall” cycle
containing of multiple modules that build on top of each other (What is Incremental).
Java: a high-level programming language used to develop programs (Christensson, 2012).
Operating System: it is the software that communicates to the hardware that allows programs to
run on the computer (Christensson, 2012).
Oracle: type of database. It is a collection of data that is stored in a unit (1 Introduction).
Text Editor: any word processing program that can type and edit text (Christensson, 2006).
Use Case Diagram: visual set of scenarios that describes an interaction between a user and a
system (Murphy, 2015, sld. 4).
10 What is Incremental model- advantages, disadvantages and when to use it? (n.d.). Retrieved November 24, 2015,
from http://istqbexamcertification.com/what-is-incremental-model-advantages-disadvantages-and-when-to-use-it/
![Page 27: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/27.jpg)
8. Bibliography
1 Introduction to the Oracle Database. (n.d.). Retrieved November 24, 2015, from
http://docs.oracle.com/cd/B19306_01/server.102/b14220/intro.htm
Christensson, P. (2006). CSS Definition. Retrieved 2015, Nov 24, from http://techterms.com
Christensson, P. (2014, November 20). Ethernet Definition. Retrieved 2015, Nov 24, from
http://techterms.com
Christensson, P. (2015, May 23). HTML Definition. Retrieved 2015, Nov 24, from
http://techterms.com
Christensson, P. (2015, July 28). IDE Definition. Retrieved 2015, Nov 24, from
http://techterms.com
Christensson, P. (2012, April 19). Java Definition. Retrieved 2015, Oct 16, from
http://techterms.com
Christensson, P. (2012, January 27). Operating System Definition. Retrieved 2015, Nov 24, from
http://techterms.com
Christensson, P. (2006). Text Editor Definition. Retrieved 2015, Nov 24, from
http://techterms.com
CMSI 402: SW Dev. Plan. (n.d.). Retrieved November 24, 2015, from
http://myweb.lmu.edu/bjohnson/cmsi402web/sdevplan.html
Murphy, D. (Fall 2015). IT210 Software Engineering Unit 5B Use Cases [PowerPoint slides].
Project Roles and Responsibilities. (n.d.). Retrieved November 25, 2015, from
http://www.lifecyclestep.com/open/408.0LifecycleRoles.htm
What is a Developer? - Definition from Techopedia. (n.d.). Retrieved November 25, 2015, from
https://www.techopedia.com/definition/17095/developer
What is Incremental model- advantages, disadvantages and when to use it? (n.d.). Retrieved
November 24, 2015, from http://istqbexamcertification.com/what-is-incremental-model-
advantages-disadvantages-and-when-to-use-it/
What is product development process? definition and meaning. (n.d.). Retrieved November 24,
2015, from http://www.businessdictionary.com/definition/product-development-
process.html
What is a Project Manager (PM)? - Definition from Techopedia. (n.d.). Retrieved November 25,
2015, from https://www.techopedia.com/definition/677/project-manager-pm
![Page 28: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/28.jpg)
Windows 10 Specifications - Microsoft. (n.d.). Retrieved November 24, 2015, from
https://www.microsoft.com/en-us/windows/windows-10-specifications#sysreqs
"This assignment is all my own work and contains no Plagiarism. All text, diagrams or other
materials copied from other sources (including, but not limited to, books, journals and the
internet) have been clearly acknowledged and referenced as such in the text by the use of
'quotation marks' (or indented italics for longer quotations) followed by the author's name and
date [e.g. (Byrne, 2008)] either in the text or in a footnote/endnote. These details are then
confirmed by a fuller reference in the bibliography.
I understand that only assignments which are free of plagiarism will be awarded points.
I have completed the Academic Integrity Tutorial."
Soft Skills
Written Communication
2017 DISCOVER Summer Research Program
Student/Faculty Application Form
Eligibility To be eligible for a Summer Research Program grant, students must be undergraduates in good academic standing who are collaborating with a faculty mentor on a research project or creative activity. Student projects must be related to the faculty mentor's scholarship. Students who will be August 2017 graduates are not eligible. Application Applications are jointly submitted by the student and faculty mentor. The student should fill out Part I of the application and provide to the faculty mentor, who fills out Part II. Email the completed application to the associate vice president for Academic Affairs ([email protected]). Deadline Summer 2017 research grant applications are due April 7, 2017.
Part I. To be filled out by the student.
Name: Madeline Warndorf
![Page 29: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/29.jpg)
Local Address: 16641 Paloma Circle, Round Hill, VA 20141
Telephone number: (703) 431-6614
Email address: [email protected]
Major: Information Technology (Data Science Concentration) with Math Minor
Anticipated Graduation Date: May 2018
If you are an international student: What type of VISA do you hold? Are you eligible to work in the US?
Will you have any on-campus employment this summer? If so, please indicate what that job will be: I will not have any on-campus employment this summer.
Summer Housing or Commuter Meal Plan Please note: DISCOVER funds a maximum of 6 weeks** in university residence halls. Indicate your need for housing:
___ I am not requesting summer housing. ___ I am requesting a commuter meal plan for the following period:
__X_ I am requesting summer housing for the following period**: 7/10/17-8/15/17
Duration of summer housing or commuter meal plan must match dates of research. **In exceptional cases, when a research project requires more than 6 weeks, additional housing may be granted.
Description of your research project (Please limit to no more than 2 pages; space will expand as you type)
The goal of this thesis is to analyze the Fatal Accident Report System (FARS) data collected
nationwide and compare the data in a timeline to see the trends of accidents as safety improvements
were made from 2007-2015. The safety improvement data points that will be compared against
include new legislations passed, new automobile safety technology releases, milestone cell phone
releases, and the implementation of distracted driving campaigns. The purpose of this research is to
determine if the efforts to prevent fatal car accidents caused by distracted driving and overall vehicle
![Page 30: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/30.jpg)
safety improvements will have a correlation with the number of fatal accidents. It will also be
analyzed nationwide, not by state.
The years that will be analyzed are still being determined but it will begin with the year 2007.
The goal is to analyze the years 2007-2015, specifically the car model years 2008-2016. The FARS
raw data will be queried through their site to meet the specific constraints placed on the data. These
constraints include the car has to be in the model year 2008 through 2016. The driver must be using a
restraint, and the vehicle must be a passenger car or a light truck. The additional data that will be
collected from various sources to help normalize the results include total number of mobile phone
subscriptions per year and automotive recalls.
Dates & duration of research project (Note: if you are requesting housing or a commuter meal plan, project duration must match housing request) If housing is being required for more than 6 weeks, you must provide a rationale. The dates for the research project will be 7/10/17-8/15/17. This will allow us to finish gathering and analyzing the nine years of data for the different factors as well as work on the write-up of the thesis.
Personal Statement. What are your professional aspirations? How does this project fit with these? (Space will expand as you type)
I am interested in this topic because after using the National Highway Traffic Safety
Administration’s database of a project that I completed last year I found that their data is not
compared against manufactures, legislation, as well as campaigns on the same report. This research
project will provide the starting point to see if the efforts to help decrease fatal car accidents are
working across a long period of time as well as provide an interesting way to visualize the data. There
is also a lot of information that the FARS Encyclopedia offers that can be used to look at other
aspects as to what could be correlated to fatal car accidents. I enjoy the how the data can be used to
answer a variety of other questions that are different to the one that I plan on analyzing.
![Page 31: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/31.jpg)
This topic connects to my major of IT Data Science with a minor in Mathematics because it
implements the use of the programming language R that is in high demand for this field. It also is
analyzing a large amount of data from the National Highway Traffic Safety Administration (NHTSA)
Fatality Analysis Reporting System (FARS) Encyclopedia database. This topic incorporates the
knowledge needed to handle large amounts of data as well as use of statistics to answer the question
proposed by the topic. This thesis topic also introduces the intense utilization of gathering a lot of
information from a variety of sources.
I also plan on submitting my final findings to the NHTSA as well as looking for conferences
to show the results of my thesis that this research grant will give me more time to do the deep
analysis that I want to do for the thesis.
Part II
Name:
Department:
Significance of Project Describe the relationship and significance of this project to your scholarship. (Space will expand as you type)
Recommendation of Student Provide your recommendation for funding this student. (Space will expand as you type)
Institutional Review Board (IRB) Approval If this project involves human subjects, please provide evidence of IRB approval or pending approval.
![Page 32: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/32.jpg)
Project Management
Washington Colonial Open House
Project Report
1. Background and Statement of Need
Jane Smith’s Realtor Company (the Company) is member of the National Association of
Realtors (NAR) and has been selling houses in the DC/Maryland/Virginia (DMV) area for over
30 years. The company needs to host open houses so that the potential clients can view the
house. Jane Smith begins her major house selling season during the months of May and June.
During this time period, her company puts on 20 open houses. The open house must attract
potential buyers and promote Jane Smith’s Realtor Company to gain clients.
The house for this project is a three-story colonial in Arlington, VA. It was built in 1925
and has 3 full baths and 4 bedrooms. The house’s general information including a virtual
walkthrough is already listed on the Company’s website. This is this house’s first open house and
the date is for Saturday June 24 th, 2017. The house’s interior has already been cleaned and the
current owners have already moved out.
Jane Smith relies on open houses to showcase the house that is for sale as well as attract potential
clients. The Company has used this technique successfully to promote their business as well as
gain clients for the past couple of years. With the increase need to sell houses and gain clients,
Jane Smith has pushed her open houses to also include an “Internet Push” before and after the
open house event. This internet push includes using social media for marketing purposes and
reaching out to the clients and potential buyers after the open house as a follow up. With the
increase in of planning and additional requirements for the event, Jane Smith has requested that
each open house have their own project team.
2. Project Goals
2.1 To use the “Internet Push” phase as a major factor in the outreach process.
This goal is set in place to gain the most of the use and vast outreach the Internet provides. This
goal focuses on pushing the event through social media, the Company’s website, and internet
advertisements. It also focuses on reaching the optimum number of individuals while keeping the
cost to the company low.
2.2 To effectively attract and entertain potential buyers and clients for the Company throughout
the entire event.
This purpose of this goal is to maintain the number of interested individuals at the event without
the use of the internet. It focuses on creating a theme for the event instead of having a traditional
open house. The other focus of this goal is to gain the interest of potential clients for the
Company.
![Page 33: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/33.jpg)
3. Project Objectives
3.1 To use the “Internet Push” phase as a major factor in the outreach process.
3.1.1 To market the event to the entire DMV area before the event.
The event needs to be marketed so that people will attend the event. Through the Internet, the
event can be marketed across multiple platforms (the Company’s website and social media sites)
and reach the entire DMV area. This objective will be continuing until the day of the event to
optimize the total number of people who viewed the event advertisement.
3.1.2 To reach out to current interested buyers to provide them with information about the
event.
The Company has current clients who are looking to buy a house. Since the need to buy a new
house is already expressed by these individuals, an email should be sent out to them with the
house’s details. Included in the email should be a personalized invitation to the open house. This
objective will be completed after the email is sent to the current clients.
3.1.3 To increase interest in the house via the internet.
People will not be interested in touring a house that they are unsure of what it looks like. The
house’s virtual tour has been released on the Company’s website prior to the beginning of this
project. The open house has to be different than what people expect to create a sense of curiosity
and interest to come to the open house. This objective will be completed when the event goes
live on June 24th.
3.1.4 To gather feedback about the event and follow-up with potential clients.
The Company should gather data to see how people viewed the event. This will help measure the
success of the event. At the same time that the feedback is being gathered, the new potential
clients for the Company should be contacted to remind them of the services available. The email
reminder should also thank them for attending the event. This objective will be completed after
the event and after the feedback is analyzed and the emails are received by the new potential
clients.
3.2 To effectively attract and entertain potential buyers and clients for the Company throughout
the entire event.
3.2.1 To market the event outside the internet realm.
The impact that flyers and posters have on marketing an event still provides the opportunity to
attract individuals that do not use social media. The flyers will follow the design of the theme
and decorations. This objective will be completed after the day of the event and the physical
marketing materials are collected from where they were displayed.
![Page 34: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/34.jpg)
3.2.2 To make the house appealing from the exterior to attract people from the street.
In order to attract people from the street, the house has to be appealing and welcoming. People
do not want to go into a house if it seems empty or if it looks run-down. To increase the number
of people who will want to walk into the house as well as potentially buy it, the house has to be
clean and welcoming. This objective will be completed before the start of the event and when the
decorations are set-up.
3.2.3 To use the created theme (“Gold and Champagne”) for the event to maintain people’s
interest.
The theme is used to attract the guests and take a traditional open house to something that the
guest will remember. This is a new marketing idea that the Company implements in all of their
open houses to help maintain the flow and interest of clients and buyers. This objective will be
completed at the end of the event.
4. Project Approach
4.1 To use the “Internet Push” phase as a major factor in the outreach process.
4.1.1 To market the event to the entire DMV area before the event.
4.1.1.1 Use social media to announce the event.
This approach will send out the digital version of the flyers as a post on the Company’s
Twitter, Facebook, Instagram, and LinkedIn accounts. This is to reach the maximum
number of people and allow them to share the event with their friends and family members
who could be interested in buying the house.
4.1.1.2 Create a Facebook event that people can RSVP to.
This would be a calendar event that people will be able to RSVP to so that they can stay up to
date on the event as well as receive additional information about the open house. This will be
used to also track the number of interested attendees to help plan the amount of refreshments that
will be needed.
4.1.1.3 Post weekly reminders before the event.
The Social Media team will post “leaks” with photos that show the house and setup of the event
weekly to increase interest about the house. This will also help remind the people about the
timing of the event so that they will not forget. These leaks will be posted on all of the
Company’s accounts.
4.1.2 To reach out to current interested buyers to provide them with information about the event.
4.1.2.1 Send initial email about the event.
![Page 35: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/35.jpg)
This email will be sent from the Company’s distribution list of potential buyers. This will be sent
before the social media posts are released. It will give the potential buyers the sense that they are
the Company’s top priority before the general public.
4.1.2.2 Send email containing floor plan and house information.
This will be another “leak” tactic that is specific to the clients of the Company. They will receive
the floor plans and house information before the general public because they are valued members
of the Company’s family. The focus of this approach is to increase interest and hopefully find a
buyer for the house.
4.1.2.3 Send email reminder closer to the day of.
This approach is simply a reminder strategy about the event as well as the final push to try to
persuade the individual into coming to the event. The Marketing Team will be in charge of this
approach.
4.1.3 To increase interest in the house via the internet.
4.1.3.1 Reveal open house theme on social media accounts.
This is another “leak” tactic in the interest of increasing the attendance rate of the event. The
theme will attract the guests and create a sense of curiosity to what the event and house will look
like. The main purpose of this approach is to increase the number of people who will attend the
event by broadcasting the theme as a big reveal on all social media accounts.
4.1.3.2 Post the floor plan of the house to attract people.
This will be specific to the general public as well as reminding the clients what the floor plan
looks like. They will receive the floor plans and house information before the general public
because they are valued members of the Company’s family. The focus of this approach is to
increase interest and hopefully find a buyer for the house.
4.1.3.3 Post pictures of the house’s attractive and unique features with the decorations for
open house.
These pictures will be released the day before and during the event to show how interesting the
actual event is. This objective will be completed during the event and while the event is being set
up.
4.1.4 To gather feedback about the event and follow-up with potential clients.
4.1.4.1 Email a survey to those that provided emails at the event.
This will help measure the success of the event. At the same time that the feedback is being
gathered, the new potential clients for the Company should be contacted to remind them of the
![Page 36: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/36.jpg)
services available. This will be emailed to new clients and existing clients. This will be
completed the Monday after the event.
4.1.4.2 Provide a general survey on social media accounts where people can fill out their
satisfaction and offer comments.
This will be conducted through the Company’s Facebook page and it will be a very general five
question survey. It will gadget the public’s interest and response to the open house incase the
email was not received by them. This survey will be posted the Wednesday after the event.
4.1.4.3 Send email follow-up and “Thank You” message to new potential clients.
The purpose of this objective is to continue to remind clients and potential buyers that the
Company appreciates them and the time they took out of their day to attend the event. This
continues to promote the kindness of the Company as well as give the Company a good image in
their minds. This will be completed the Monday after the event.
4.2 To effectively attract and entertain potential buyers and clients for the Company throughout
the entire event.
4.2.1 To market the event outside of the internet realm.
4.2.1.1 Create flyers to post in local businesses around the area near the house.
The flyers will provide a physical reminder and outreach tactic to draw people to the event. They
will follow the design of the theme and decorations. They will be placed around the area a week
before the event and taken down the week after the event.
4.2.1.2 Create lawn signs to place in front of the house.
The lawn signs will be used to show which house is for sale as well as alert the neighbors that the
event will be taking place. They will be used to attract customers as well as continue to promote
the open house. The lawn signs will be put in place two weeks before the event and taken down
the day after.
4.2.2 To make the house welcoming.
4.2.2.1 Setup lawn and find parking for attendees.
The purpose of this approach is to designate a specific area for the attendees to park so that they
are not confused. If the event’s parking is too confusing or frustrating people may not park at all
and leave.
4.2.2.2 Have realtors (2-3) to be available to answer questions.
This approach is focused making the customers feel comfortable in the house as well as feeling
comfortable to ask questions about the house. The realtors will be there to answer any questions
![Page 37: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/37.jpg)
as well as be available to give tours of the house and yard. This approach will be completed after
the event ends.
4.2.3 To use the created theme (“Gold and Champagne”) for the event to maintain people’s
interest.
4.2.3.1 Decorations will be black with gold details with music throughout the house.
For the open house to be appealing, it will need a theme. The theme’s color scheme will be black
and gold to accent the features of the house. This approach’s goal is to distinguish this open
house from other open houses that clients might have gone to. This approach will begin before
the event starts and end after the event is completed.
4.2.3.2 Guests will be given champagne to have during their tour as well as a light snack.
This will increase interest in the guests to remain at the event and learn more about the house.
This will also help them relax more and open up to asking questions. This approach focuses on
maintaining attendance during the event. It will be completed after the event has ended.
4.2.3.3 Outdoor activities will be provided for kids to play with (ex: cornhole, ring toss,
etc.).
The outdoor activities will help distract the kids and entertain them while their parents tour the
house. This also provides a visual for parents to see if they could envision their kids playing in
the yard in the future. It is a great marketing technique for the house as well as an outlet for the
kids while their parents look at the house.
5. Project Risk Management
The importance of Risk Management is to identify potential risks that could hinder the project,
alter the objectives of the project, or cause the project to fail entirely. The Risk Management plan
is an organized way to identify these risks as well as a way to help decrease the probability of
them happening and providing a “Plan B” if the risk does occur. This helps the Project Manager
and the team prepare for the worst and be ready to handle the risk if it does happen. The general
approach that will be taken in this project to manage risks is to follow the Risk Management
Plan. Along with the appropriate mitigation and contingency plans for each risk identified
throughout the entire lifespan of the project.
For more details on each risk, please refer to the “MSC 345 WCOP Risk Register” MS Excel
file.
5.1 Possibility of bad weather.
5.1.1 Risk #1 Mitigation Strategies
5.1.1.1 List possible backup games to play incase of bad weather.
![Page 38: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/38.jpg)
The Event Set-up team will need to have a list of backup games that can be played indoors in
case of bad weather.
5.1.1.2 Search for possible tent rental companies and get quotes.
If there is bad weather, the event-setup team needs to find a tent rental company for the back
porch and have them on standby.
5.1.1.3 See if garage can be used as backup.
The set-up team is also responsible for determining if the garage is safe and suitable to be used as
a space for backup games.
5.1.2 Risk #1 Contingency Plans
5.1.2.1 Plan for different indoor activities to play.
In order to keep things running smoothly in the event of inclement weather, the event set-up
team will need to find activities to play indoors. The indoor activities will be held in the garage
and run for the duration of the open house.
5.1.2.2 Check weather forecast two days before the event and report to Project Manager.
The event set-up team will review the forecast two days prior to the event. The event set-up team
will then report the weather to the Project Manager( the Realtor) and the Project Manager will
then make the call of whether or not to move planned activities inside or keep them outside as
planned.
5.1.2.3 Bring both types of activities (outdoor and indoor) to the event.
If the forecast calls for inclement weather then, the set-up team is responsible for bringing both
outdoor and indoor events to the open house.
5.2 Dependency on flyers for promotion.
5.2.1 Risk #2 Mitigation Strategies
5.2.1.1 Keep design team on schedule
The event social media and event marketing team are responsible for keeping the event design
team on schedule.
5.2.1.2 .Retrieve flyers from printing office as soon as available.
Once the flyers are made and available for pickup, the event design team is in charge of picking
them up immediately to begin the process of hanging the flyers.
5.2.1.3 Begin hanging the flyers the day following retrieval.
![Page 39: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/39.jpg)
After flyers are picked up, the marketing team will then begin to hang flyers around the
surrounding neighborhood and nearby businesses.
5.2.2 Risk #2 Contingency Plans
5.2.2.1 Use the dry-erase lawn boards to promote early event early in front of the house.
The event design team will place dry-erase lawn boards to promote the open house event to
onlookers and passersby.
5.2.2.2 Use the flyers until the day of the event.
The marketing team will need to push the event by hanging and passing out flyers until the day
of the event.
5.2.2.3 Push event even more through social media.
The social media team will also need to push the open house through all available social media .
5.3 Dependency on automated reminder system.
5.3.1 Risk #3 Mitigation Strategies
5.3.1.1 Post weekly about the event on social media accounts.
The event social media team is to post weekly reminders of the open house event on all social
media networks.
5.3.1.2 Send reminders to staff to see if it going through.
In order to ensure that our reminders are going through to customers and potential buyers, the
event marketing team is responsible to staff to make sure our emails are delivered.
5.3.1.3 Continue updates on the email distribution system.
The event marketing team is also responsible for the maintenance and upkeep of the email
distribution system.
5.3.2 Risk #3 Contingency Plans
5.3.2.1 Post weekly reminders on social media accounts about the event.
The event social media team are responsible to post weekly reminders on all social media
accounts
5.3.2.2 Have realtors personally email their current clients about the event.
The event realtors and event marketing team are to collaborate and reach out and personally
contact potential clients about the event via email.
![Page 40: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/40.jpg)
5.3.2.3 Post on the Company's website about the event with a countdown.
The event marketing and event design team are to collaborate as well and post a countdown on
the company’s website.
5.4 Risk Assessment Worksheet
![Page 41: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/41.jpg)
6. Project Communications Management
6.1 Description
![Page 42: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/42.jpg)
The purpose of the Communications Management Plan is to define the communication
requirements for the project and how information will be distributed. The Communications
Management Plan defines the following:
• What information will be communicated—to include the level of detail and format.
• How the information will be communicated—in meetings, email, telephone, web portal,
etc.
• When information will be distributed—the frequency of project communications both
formal and informal.
• Who is responsible for communicating project information.
• Communication requirements for all project stakeholders.
• What resources the project allocates for communication.
• How any sensitive or confidential information is communicated and who must authorize
this.
• How changes in communication or the communication process are managed.
• The flow of project communications.
• Any constraints, internal or external, which affect project communications.
• Any standard templates, formats, or documents the project must use for communicating.
• An escalation process for resolving any communication-based conflicts or issues.
Communication with stakeholders of this project is a substantial part of communication
management plan. Stakeholders group would include everyone interested in attending
Washington Colonial Open House event.
6.2 Communications Matrix
Audience
(Who)
Message
(What)
Objective
(Why)
Delivery
Method
(How)
Delivery
Frequency
(When)
Person (s)
Responsible
Project Event
Teams
Detailed
Project Status
To stay input about the
flow of the project
email weekly Team leads
Project Event
Teams
Collaboration To inform all the members
of the project team about
the progress of the project
Meeting every other
week
Project
Manager
W.C. Open
House
stakeholders
Approval To identify the stakeholder
and add new stakeholders
in the stakeholder register
email as required Project
Manager
7. Project Quality Management
![Page 43: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/43.jpg)
Project Quality Management includes all processes and activities needed to determine and
achieve the project quality. Washington Colonial Open House focuses quality management
mainly on three key points:
• Customer Satisfaction
• Prevention over Inspection
• Continuous Improvement
Customer satisfaction is a key measure of a project's quality. If the customer doesn't feel the
service given by the open house project meets their needs or if the way the project was run didn't
meet their expectations, then the customer is very likely to consider the project quality as poor.
Here is project team needed to improve their services and offer better customer service as soon
as possible.
8. Project Organization
8.1 Organization Chart
8.2 Project Roles & Responsibilities
Role Responsibility
Social Media Posts Event Social Media Team
Take Photos Event Social Media Team
Emails Event Marketing Team
Floor Plans Event Marketing Team
![Page 44: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/44.jpg)
Survey (Creating and Sending) Event Marketing Team
Flyers Event Design Team
Lawn Signs Event Design Team
Getting and Setting Up Decorations Event Set-Up Team
Getting Food and Drinks Event Set-Up Team
Getting and Setting Up Games Event Set-Up Team
Clean Up Event Set-Up Team
Show House Event Realtors Team
9. RACI Chart
![Page 45: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/45.jpg)
1. Work Breakdown Structure
1.1. Event team members will be selected from the branches of the Company
1.1.1. Event Social Media Team
1.1.2. Event Marketing Team
![Page 46: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/46.jpg)
1.1.3. Event Design Team (sub-team that is pulled from Event Marketing and Event
Social Media Team).
1.1.4. Event Set-up Team
1.1.5. Event Realtor Team
1.2. Gain passwords to the Company’s social media accounts.
1.3. The Company's social media channels will be used to promote the project and event.
Will be done by the Event Social Media Team.
1.4. Event Social Media Team will grab 10 compelling photos and visuals of the house.
1.5. Event Design Team will obtain the digital floor plans from the Project Manager who is
the Lead Realtor for this project.
1.6. Event Marketing Team will obtain the Company’s email list to share information
provided by the Project Manager.
1.7. Event Marketing will handle:
1.7.1. Sending emails about the event.
1.7.2. Sending the reminders via email.
1.7.3. Creating the Post-Event Survey and sending it.
1.7.4. Sending the “Thank you” email.
1.8. Event Realtor Team will be trained three weeks before the events to ensure quality
function.
1.9. Event Design Team is in charge of:
1.9.1. Designing the digital flyers.
1.9.2. Designing the printed flyers.
1.9.3. Designing the lawn signs.
1.10. A lawn sign will be placed a week before the event to highlight the open house for
marketing purposes.
1.11. Event Set-up Team will be handling:
1.11.1. Gathering decorations
1.11.2. Cleaning the house.
1.11.3. Obtaining the music and games.
1.11.4. Ordering the food and drinks.
1.11.5. Setting up the lawn signs.
1.11.6. Setting up the flyers.
1.11.7. Setting up the decorations, games, food, and music.
1.11.8. Cleaning up.
11. Critical Path 1. Teams will be selected by the Project Manager from the Company.
2. Event Social Media Team will gather photos.
3. Email distribution list is given to the Event Marketing Team.
4. Digital flyers created.
5. First outreach is sent (social media post as well as initial email sent).
6. Floor plan is obtained and released to the public.
7. Flyers and lawn signs created.
8. House is cleaned.
![Page 47: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/47.jpg)
9. Train realtors.
10. Order decorations, food, and drinks.
11. House is set up.
12. House is cleaned up.
12. Cost Plan 12.1 Project Cost by Phase
The employees used for this event are on salary wages. For the purpose of this project their
salaries will not be included in the project cost.
• Initiation Phase
o $0
• Planning Phase
o $240
• Execution Phase
o $195
• Monitoring and Controlling
o $0
• Closing
o $38
12.2 Project Cost by Resource
• Hors D'oeuvres $25
• Balloons $50
• Paper Flyers $90
• Lawn Signs $150
• Prosecco $120
• Garbage Bags $10
• Windex $7
• Swiffer $11
• Paper Towels $10
Problem Solving/critical Thinking
Honors Thesis: Abstract
This thesis presents the analysis conducted on the National Highway Traffic Safety
Administration (NHTSA) Fatal Accident Report System (FARS) data collected nationwide
between 2007 and 2015 to create a novel visualization tool to present trends in distracted driving
related accidents as changes in technology, laws, and social awareness came about. This thesis
specifically looked at distracted driving related to cell phone usage. The purpose of this research
is to determine if the data supports the thesis of the overall vehicle safety improvements and the
efforts to prevent fatal accidents caused by cell phone usage decreased the number of fatal
![Page 48: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/48.jpg)
accidents. As well as present the evidence in multiple useful and graphical forms. For the
technology analysis and campaign analysis, the p-values failed at the α=0.05 significance level,
concluding that there is no correlation between the percentage of cell phone cases and the
percentage of fatalities in the vehicle cases.
Honor 200 Tutorial “Book to Film” Stephen King vs. Alfred Hitchcock
The terrifying stories that Stephen King and Alfred Hitchcock portray have always
intrigued and thrilled me. I understood immediately that Stephen King’s novels were way more
terrifying and detailed than the movies. Reading about King’s women and comparing them to the
bold and idolized women of Hitchcock, similarities began to unfold. The physical acts of terror
that the men experienced in the films and novels were different from the true fears that stood out
of the women. Their women were plagued with internalized fears that stuck with me and haunted
me more than the physical threats that they endured. While Hitchcock's films insinuate that he is
interested by women's fear, King is the one who escalates internalized fears and makes it the
focus of his horror novels, though this focus on women does not translate to film adaptations of
King's books.
In Stephen King’s books his women have very noticeable features. In Misery, Annie
Wilkes’ physical appearance is related to that of a pig. In The Shining, Wendy Torrance is
gorgeous with long blonde hair. Beverly Marsh in It has beautiful red hair. All three women
stand out for the physical make up of their bodies. Also all three women are strong. Both Wendy
and Beverly survive beatings from the supernatural as well as the mental and physical abuse
from their husbands. When Paul Sheldon tries to kill Annie, she survives being hit with a
typewriter, being chocked with wads of burnt paper, hitting her head, and locked in a room. She
is later found dead in the barn with a chainsaw in her hands to finish off Paul.
![Page 49: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/49.jpg)
In Alfred Hitchcock’s films, his women are more nonchalant about the power and
strength they hold. All of his women characters are gorgeous, breath-taking women. They are all
educated and show an interest in the world. They are also independent and are not shy to take
risks in the situations they are put in.
In Birds, Melanie is the daughter of a successful newspaper in San Francisco. She has a
history with the law because of the pranks she pulls as well as a history with the tabloids for her
rendezvous abroad. She meets Mitch and immediately figures out who he is and where he lives
through calling her father’s newspaper (Figure 1). She then follows Mitch to his family house to
deliver a pair of love birds. She does this all in a weekend and does not stop once to think that it
is rash.
FIGURE 3 MELANIE'S RESPONSE TO MITCH
FIGURE 2 MARION HIDING MONEY FIGURE 1 LILA'S PLAN
![Page 50: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/50.jpg)
The females in Psycho do not follow the social norms of that time. Marion steals money
from her boss to help her boyfriend and hides away in the Bates Motel (Figure 2). She ends up
getting murdered by Norman/Norma at the motel. Her sister, Lila Crane, helps lead the
investigation in finding Marion with Sam Loomis. When Lila and Sam investigate the Motel,
Lila tells Sam to stay put and distract Norman while she goes and looks in the house (Figure 3).
Normally, the man would tell the woman to stay and distract the murder; not the other way
around.
In Rear Window and Vertigo, the female characters are wealthy and very independent
with their work. Besides Judy, both Midge and Lisa are successful in the fashion world. Midget
designs women’s wear and Lisa is a socialite who wears the best of the best. All three of these
women however, are very in charge of their own lives and are responsible for their own income.
All of the women internalize the fear that men will leave them is very strongly present in
Hitchcock’s films. His women desired to be loved in many ways and kept pushing themselves
and forcing themselves to be changed so that they would fit the standard they needed to. They
make huge accommodations and risks to placate the men in their lives. The women make rash
decisions in the name of love in these four films without second thought. Hitchcock’s women
move forward in a relationship out of fear not desire. They allow themselves to be changed,
become financially dependent on their men, and risk their lives for them.
Marion Crane in Psycho is the girlfriend to Sam Loomis, a divorcé, who she loves dearly.
Sam asks her to miss work to be with him which could make her financially dependent on him in
the future (Hitchcock, Psycho). However, when she asks him why they aren’t married he tells her
its because of his large amount of debt. Her strong desire to marry and fear that she might lose
![Page 51: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/51.jpg)
him motives her to steal $40,000 from her boss to help pay off the debts. Her fear of being alone
without Sam is stronger enough to cause her to disregard her morals and commit the crime.
In Hitchcock’s Rear Window, Lisa Fremont disregards her own safety to placate her man,
Jeff Jefferies. Jeff confesses that he does not want to marry Lisa because “she’s too perfect.
She’s too talented. She’s too beautiful. She’s too sophisticated.” (Hitchcock, Rear Window). He
wants her to be adventurous like him. All the characteristics he listed that she was too much of
are components that most women aim to align with. Women want to be perfect, beautiful,
talented and sophisticated; making them successful. He tells Lisa, who wants to marry him, that
she won’t fit in his world and it’d be wrong (Figure 4). Lisa refuses to let him push her away
because of how she is so she decides that she will prove herself to him.
FIGURE 5 LISA'S PLACE
FIGURE 4 LISA WITH THE RING
![Page 52: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/52.jpg)
Throughout the movie Lisa has to fight for attention form Jeff. He won’t pay attention to
anything about her or her needs unless it is degrading the idea of marriage. Lisa has to ask Jeff to
pay attention to her even at points where she is sitting on his lap kissing him (Hitchcock, Rear
Window). To make Jeff notice her more, she becomes deeply involved in the investigation of
murder of Mr. Lars’ wife. She goes to the extreme by breaking into the killer’s apartment to look
for the wife’s jewelry while Jeff watches from his window (Figure 5). He realizes from this
situation that Lisa puts herself in that she is adventurous and maybe is worthy enough to marry.
In Hitchcock’s film Vertigo, Judy Barton and Midge Wood do things to try to get Scottie
Ferguson to love them. Scottie toys with Midge’s emotions through asking about her love life,
which she responds with “there’s only one man in the world for me” and his response is depicted
in Figure 6 (Hitchcock, Vertigo). His response doesn’t acknowledge her current feelings rather
just dismisses them. Early on he tells her to “stop being so motherly” yet Midge still visits him
when he is ill in the mental ward (Hitchcock, Vertigo). She cannot bare to be away from him,
even if he does not return the love she gives him. She is held captive by herself in the internal
struggle for Scottie to love her. She bargains with him and even takes out her pain and frustration
out on herself (Figure 7). Figure 7 shows Midge pulling on her hair and crying while insulting
FIGURE 6 SCOTTIE'S RESPONSE TO MIDGE FIGURE 7 MIDGE'S SORROW AND ANGER
![Page 53: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/53.jpg)
herself. The pain and sacrifice she made for the man in her life upset him, so she punishes herself
for displeasing the man.
The movie focused on how much the men in the movie dominated and controlled the
women in the movie. Scottie fell in love with Madeleine Elster, who was actually Judy Barton
pretending to be her. Once Madeleine “killed herself”, Scottie found the real Judy and wanted
her to become just like Madeleine. Judy succumbed to Scottie’s demand for her change in
identity through Scottie’s persistent demand of “it can’t make that much difference to you” or “it
can’t matter to you” (Hitchcock, Vertigo). Scottie forced Judy to change her make-up, hair color
and style, and wardrobe to match Madeleine’s. She did all of this just because it would make him
love her and he had broken her down to the point that she does not care about herself (Figure 8
and 9).
FIGURE 9 JUDY QUESTIONING SCOTTIE
FIGURE 8 JUDY GIVING IN
![Page 54: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/54.jpg)
The whole reason why Judy Barton pretended to be Madeleine was because Gavin Elster
killed his wife then paid Judy to act as Madeleine to cover up her murder. When Scottie angrily
yelled at Judy that she was the “copy”, the “counterfeit”, and he states that “[Gavin] made [her]
over just like I made you over…” (Hitchcock, Vertigo). He goes on to say that nothing about
Judy is real. Even though when Scottie met the Judy for the first time as Judy, she was herself
and he made her change that. In Figure 10, Scottie continues to belittle Judy because she could
not even keep a man who killed his wife. Judy tried everything to get Scottie to love her. She
even told him that she “walked into danger and let you change me because I loved you”
(Hitchcock, Vertigo). Hitchcock kills off Judy to solidify her fate that her love would be
unrequited and all her efforts would be eternally lost.
Like Hitchcock, King’s women live with the internalized fear that their men will leave
them. However, King gives his women darker everyday fears that women can relate to in their
daily lives. He has them suffer from isolation, submission, and physical pain. Besides that
difference between the two, in Hitchcock’s films women are not seen being abused by men; let
alone their own men. This is another dark side, gruesome side of King’s novels. His women are
entangled in many fears and are abused.
FIGURE 10 SCOTTIE'S "PITY" FOR JUDY
![Page 55: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/55.jpg)
In King’s book Misery, he places his male character, Paul Shelton, in the dangerous
clutches of Annie Wilkes. She continually beats him and demands him to write for her. Paul’s
fears are understood because of the situation he is placed in. Annie’s internalized fears and
struggles are worse than his. Her fears stem from a long time of suffering from mental illness,
isolation, obsession, and abuse.
She suffers from a range of mental illnesses like depression, binge eating, moodswings,
and paranoia. All horrible things to have to live with and suffer from. Paul distinguishes that
Annie is psychotic. During Annie’s “storms” as Paul refers to her moodswings, she eats a lot and
at one point even threatened suicide. At the worst point Paul related Annie’s mentality to
“the psychotic despair of the woman who dresses her children in their
best…walks them down to the nearest bridge, lifts one into the crook of each arm,
and jumps over the side.” (King, Misery, 173).
King also made Annie suffer from never getting help with these illnesses and having it get
worse. Annie was a nurse for a number of years as well as married to a physical therapist. The
marriage ended in a divorce “after a short illness” (King, Misery, 194). She was never offered the
medical attention or medical diagnoses she needed so that she could be helped. When Paul
suffered through a few of her storms he recognizes that Annie must know that her condition is
worsening (King, Misery, 156).
King also placed her in an isolated location. She lives alone in a house in the snowy
mountains of Colorado with just her pig and other animals on her farm. When she gets upset with
Paul, she retreats to another isolated location she went to think, pray, and scream (King, Misery,
175). This location is even more isolated than her house. Annie’s isolation leads her to find hope
and purpose through Paul’s Misery novels. Annie begins to obsess over his books. She named
![Page 56: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/56.jpg)
her pig after Misery and forced Paul to produce the new copy she demanded. Paul jokes that
Annie’s odor (which smells like garbage) is the “parfum de Wilkes; a psychic odor of obsession”
(King, Misery, 179). The only way that she was able to keep Paul at her house and incite him to
write the book was to hurt him.
King created a different abusive relationship in Misery. Instead of the male abusing the
female, Annie abused herself. She often scratched and clawed parts of her face and arms off
leaving bloody wounds on her body (King, Misery, 168). During these moments, she would not
take care of herself either causing her body to smell of food and blood. King then placed Annie
as the abuser to Paul. She hobbled him, broke his knees, removed his thumb, and started him on
an addiction to Norvil. She did all of this as punishments and so that he would “know exactly
what the stakes are, and exactly what [he’d] have to do to stay alive” (King, Misery, 278). She
did all of this so that she would have the character Misery alive that kept herself alive.
In his book It, Beverly Marsh suffered from an abusive relationship. She was controlled
and beaten by her drunken, power-hungry husband Tom Rogan. Beverly could not escape or flee
from him because she always broke down and obeyed. No matter how much the physical pain
was, the humiliation was hurt worse for her (King, It, 144). She would listen to his demands
because she knew if she messed up she’d be hit with the belt. When they first met Tom knew that
she was the one he wanted to have and control. Tom believes that “some women want to be
brought down”, like Beverly (King, It, 126). He brings her down through physical violence,
belittling her, sexualizing her, and viewing her as his property. Tom constantly drinks and
controls her own company.
When Beverly tried to leave for Derry, Maine she had to fight Tom, who refused to let
her leave. She realizes this is her chance to leave his tyranny, just like she left her father (King,
![Page 57: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/57.jpg)
It, 142). In order to leave though, she had to beat Tom to the point where he collapsed because of
his wounds. She suffered through that relationship because she feared him and “her contempt of
herself for choosing him for dim reasons buried in the times that should be over” (King, It, 142).
Beverly realized that she married Tom because he was like her father. Her father was a
controlling man and often “corrected” Beverly as well. Al Marsh believed that it was his God-
given job to correct her often and because she loved him, she obeyed him (King, It, 479).
Besides the struggles of abuse that Beverly lives with, she also suffers from other
internalized fears. Beverly grew up getting bullied from an older classmate named Henry and his
group of friends. As Beverly and her close group of friends face Henry’s gang and the creature
“It” throughout the summer of 1958, she was faced with a lot of obstacles. She faces the fear of
having to be strong enough, both mentally and physically, to fight off “It”. She also had to be
courageous to go down into the Barrens and the sewer to find and kill “It”. Women often have
the debate within themselves of if they are as strong and as courageous as they can be.
Beverly is also the only girl out of the group of seven. All of the boys develop crushes on
her throughout that summer. When they all first went down in the tunnels to kill it, they realized
that their group is fading apart. Beverly comes up with a plan that “will bring [them] together
forever” (King, It, 1,303). In the tunnels, on that night, Beverly sleeps every member of the
Losers’ Club. Beverly remembered all of this when they returned to the tunnels in the summer of
1985. She remembered how powerful as well as loved and desired it made her feel as well as an
act of defiance against her father (King, It, 1,310). This was Beverly’s first sexual experience,
and hit happened in a terrifying place with her six best friends.
King finally had a woman verbally express a feeling that many women feel at one point
in their life. Wendy Torrance confessed that “she had never dreamed there could be so much
![Page 58: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/58.jpg)
pain in a life when there was nothing physically wrong. She hurt all the time.” (King, The
Shining, 48). Besides the pain, Wendy’s internalized fears in The Shining revolve around the
internal struggle of marital fears, exclusion, and inadequacy. Wendy realized that “she had stuck
with the messy job of her marriage for as long as she could” (King, The Shining, 49). Wendy
could no longer handle Jack’s drunken nights and his temper. Wendy loved her son, Danny, and
she wanted the best for him. She needed to protect her son from Jack; even if Danny favored his
father more (King, The Shining, 52). Danny’s strong connection and favoritism towards Jack
makes Wendy feel excluded. She relates Danny’s love for his father to her own (King, The
Shining, 51).
Though Danny still loved his mother, he chose Jack instead of her to be his favorite. This
fed into Wendy’s existing fear of inadequacy. Wendy constantly feared that she was inadequate
person. Before she married Jack she feared that at one point during a break they had he found a
better woman (King, The Shining, 44). She feared that she was not good enough for Jack.
Though Jack did return and asked her to marry her, she still feared that he would leave her for
another woman. Throughout the marriage, every time that Jack went out she feared it was
because of her. The problem was Jack “had gone out for reasons that had nothing to do with her”
(King, The Shining, 47). Wendy feared no matter what that Jack would leave her because she
convinced herself that she was an inadequate woman.
King creates a fear that Wendy does not speak about but the reader witnesses it. In the
novel Wendy experiences multiple moments of being overlooked. Women care a lot about how
they are perceived. They want to be noticed for their strengths and their beauty. Wendy is a
gorgeous woman and because she is so beautiful she is treated differently. King writes how
Ullman did not shake hands with her and was cold towards her because “perhaps [he noticed] the
![Page 59: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/59.jpg)
way heads turned when she came through into the lobby…” (King, The Shining, 63). Her
personality and kindness was overlooked because she was too beautiful and that rubbed Ullman
the wrong way.
The entity within the Overlook Hotel, also overlooked Wendy. They saw her as a weak,
worrisome woman. The hotel admitted it made this mistake when she knocked Jack out and
locked him in the pantry. Grady stated how “she appears to be stronger…more resourceful…”
(King, The Shining, 384). After Jack got out of the pantry, he beat Wendy with a roque mallet;
breaking several bones. She also was strong enough to withstand the near-death beating and
immediately went to go try and find Danny. She lived to help save Danny and Dick Hallorann as
well as escape the Overlook before it blew up.
King placed Wendy in a mentally abusive relationship. King had her constantly feel in
pain because of her and Jack’s relationship (King, The Shining, 48). Jack is a recovering
alcoholic and suffers from anger issues. He never physically hurt her, except at the Overlook
when he was not Jack. He constantly hurt her mentally though. He would drink uncontrollably,
making Wendy worry about his safety. He would say things that deliberately hurt Wendy while
he was drunk, like equating her to her mother (King, The Shining, 47). Jack also broke Danny’s
arm finally forcing Wendy to think about getting a divorce. Wendy suffered through this
marriage until the Overlook took over Jack and forced him to attempt to kill her and he perished.
![Page 60: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/60.jpg)
King’s women internalized fears, like in Wendy’s case, stem from trying to please their
powerful mothers. The quintessential film that focused on the fear of the powerful mother was
Hitchcock’s Psycho. In this film, Norman Bates, owner of the Bates Motel, suffers from the
personality of his deceased mother who was “clinging, demanding” (Hitchcock, Psycho).
Norman was very close to his mother, Norma Bates because after his father died they both only
had each other. Norman believes that “a boy’s best friend is his mother” and “a son is a poor
substitute for a lover” (Hitchcock, Psycho). He still wants to be his mother’s number one though.
In Figure 11, the psychiatrist relates to the others why Norman killed his mother and her
lover. He could not handle what he did so he preserved his mother’s corpse and still took care of
her body as if she was still alive. Through doing this Norman adapted her identity and believed
that she was still thinking, talking, and acting through him. At the end of the movie, Norma’s
personality fully takes over Norman and she becomes him. The jealousy and the fear of losing
his mother caused Norman to go to the extremes of killing her, her lover, and other women.
FIGURE 11 THE JEALOUSY OF NORMAN
![Page 61: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/61.jpg)
In Hitchcock’s other film The Birds, shows the strong bond between mother and son.
This bond however, is based out of fear of losing the son. Melanie Daniels threatens this bond
between Mitch Brenner and and his widowed mother Lydia. The viewer can see the hostility and
jealousy that Lydia has towards Melanie throughout their various encounters. In Figure 12, Lydia
is interrogating Mitch about Melanie by bringing up Melanie’s scandalous past. Through
bringing up the incident of Melanie’s, she’s making sure that Mitch knows what kind of woman
Melanie could be.
Mitch’s ex-lover, Annie, admits to Melanie to be cautious of Lydia because she does not
take well to women who are interested in Mitch. The relationship between Mitch and his mother
again resembles Oedipus complex and mentioned it through Annie’s conversation with Melanie
(Hitchcock, Birds). Though in the conversation she denies that it is like Oedipus, it still causes
the viewer to make connections in their relationship. Mitch often refers to his mother as
“darling” and “dear” while Lydia seems to look at him as a husband rather than a son
(Hitchcock, Birds).
Hitchcock, however reinstates that it is not like Oedipus through the scene where Lydia
confesses to Melanie her fears. Lydia confesses that she only is cautious about Mitch because she
is so afraid of losing him (Hitchcock, Birds). In Figure 13, she states how she was hurt because
FIGURE 12 LYDIA QUESTIONING MITCH
![Page 62: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/62.jpg)
of her husband dying and how it affected her. Hitchcock takes a mother who is looked like the
clinging mother identity in Psycho to a very vulnerable feminine state. This transformation of a
mother figure from the fear-instating woman to one of the is not seen in King’s works. The
physical resemblance and fear of losing Mitch bonds Lydia and Melanie during the movie.
King’s book It matches Hitchcock’s Psycho because of the man struggling with the
strong overprotective presence of his deceased mother. It develops the maternal theme in a
different way. Much like how Beverly, Eddie Kaspbrak was in a cycle. He had a very
overprotective mother who was constantly afraid that Eddie would hurt himself or get hurt. She
refused to let Eddie participate in his physical education class in elementary school because he
was “too delicate” (King, It, 107). Eddie fell under the spell his mother placed on him. He
believed he was fragile but he knew that she was holding him back. Eddie “left his mother three
times and returned home to her three times” (King, It, 109). He tried to leave her, yet her
impression on him was too great. He fell into the cycle that Beverly by marrying a woman who
perfectly resembled his mother. Eddie admitted that the reason he married Myra was because “in
the end the old ways and the old habits had simply been too strong” (King, It, 108). His strong
underlying need for a maternal presence led him to marry her and continue the cycle.
FIGURE 13 LYDIA’S CONFESSION
![Page 63: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/63.jpg)
King’s work of maternal relationships and instincts in Misery is shown through Annie’s
philosophy and manners with Paul as well as her desire to save the suffering. Annie’s
explanation to Paul for having him burn Fast Cars, was
“the mother feels badly when her child says she’s mean or if he cries for what’s
been taken away, as you are crying now. But she knows she’s right, and so she
does her duty. As I am doing mine.” (King, Misery, 43).
Annie sees herself as a mother figure to Paul as she “nurses” him to heal. Annie used to be the
R.N. in London’s Bedlam Hospital in charge of the senior citizens (King, Misery, 191). The
sickest suddenly began dying off under her care. It is believed she did this to save them. After
leaving that job, she becomes the nurse of maternity ward. She killed the sick and weak infants
there just like the senior citizens.
Annie Wilkes had a very strong connection with her mother. She constantly quoted her
mothers sayings and has her picture on her mantle. It is unclear unsure if her love for her mother
persuaded her to kill her father or not. The amount Annie talks about her mother also drives Paul
crazy. He taunts her mother saying how Annie would have a collection of “pictures of her dear
old sainted mother” throughout her house (King, Misery, 84). Paul detests how much Annie
idolizes her mother. This is different from other King stories like The Shining, where Wendy is
scarred and belittled by her mother.
In The Shining, King really placed an emphasis on the effects from the relationship
between Wendy and her mother. Wendy had a horrible relationship with her mother. She
constantly lives in fear that she could possibly turn into her mother. She admits to Jack that
sometimes she is like her mother (King, The Shining, 261). Throughout the book Wendy
![Page 64: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/64.jpg)
continues to have revelations on how she is like her mother in some ways, but she refuses still to
be like her.
Wendy’s mother constantly blamed Wendy for the divorce of Wendy’s parents, calling
her a home-wrecker (King, The Shining, 49). When Danny was born, Wendy was constantly
belittled by her mother and was told that she was an inadequate mother. Her mother did this as a
“way of keeping the thumbscrews handy” (King, The Shining, 45). Her mother’s insistence that
Wendy is inadequate causes Wendy to second guess her relationship with Jack as well.
Her mother’s treatment of her caused Wendy to worry about a lot of things such as her
marriage and herself. With Jack frequently going out and her mother telling her that she’s not
being a good mother, Wendy questions if she a good wife (King, The Shining, 47). Wendy’s
mother caused to believe that she is at fault for not only her mother’s failed marriage, but hers as
well. Whenever something goes wrong in the marriage or with Danny, she immediately thinks of
what her mother would say. Her dreams are always filled with her mother’s face and the pain
continued to set in because of her mother (King, The Shining, 48). Wendy’s internalized fears
came from the pain her mother caused her.
The fear and horror surrounding women’s internalized fears is what makes King’s novels
so terrifying. The film renditions of King’s novels do not focus the women’s fears. The films
FIGURE 14 WENDY'S TERROR OF THE AXE
![Page 65: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/65.jpg)
focus on the fear that is installed by actions. Much like Hitchcock’s films, there is such a strong
pull for the male in the story. In the film, The Shining, Wendy is not the attractive, maternal
woman she is in novel. The film removed the presence of Wendy’s mother and replaced it with
the fear of Jack and his slipping mentality. It seems that her character is just there to whine and
scream in response to the terrifying actions taken upon her (Figure 14). Hollywood removed the
fear that women could relate to and just focused on the action/reaction form to recreate fear and
horror for their viewers.
Works Cited
Hitchcock, Alfred, dir. The Birds. Universal Pictures, 1963. Film.
Hitchcock, Alfred, dir. Psycho. Paramount Pictures, 1960. Film.
Hitchcock, Alfred, dir. Rear Window. Paramount Pictures, 1954. Film.
Hitchcock, Alfred, dir. Vertigo. Paramount Pictures, 1958. Film.
King, Stephen. It. New York: First Signet Printing, 1981. Print.
King, Stephen. Misery. New York: Viking, 1987. Print.
King, Stephen. The Shining. New York: Doubleday, 1977. Print.
Kubrick, Stanley, dir. The Shining. Warner Bros., 1980. Film.
![Page 66: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/66.jpg)
Extra-Curricular Activities
Global Experiences
Belize Biology Study Abroad In the summer of 2016, I studied and tagged sea turtles in Belize for my Natural Science credits.
I spent my time learning about the nature in Belize as well as the culture.
Leadership Activities
Dance Team I have been a member of the Marymount Dance Team for all four years of my academic career
and served as co-captain for two of those four. As co-captain, I assisted in running practices,
attending Co-Curricular Council meetings, managing the budget, and assisting in try-outs.
![Page 67: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/67.jpg)
Vincent Stovall
St. Ambrose School of Business Honors Society I served for two years on the Leadership Board as Membership Chair. I was in charge of
recruiting new members, tracking attendance, and giving the seniors their cords at the time of
their graduation.
Dr. Catherine England
Honors Program Once I reached the end of my junior year, I decided that I wanted to give back to the Honors
Program. I decided to run for Student Representative office position to donate my time and
advice to the Honors Student Committee.
Dr. Stacy Lopresti-Goodman
![Page 68: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/68.jpg)
Awards and Honors
Awards
YPG Golden Ticket
Awarded in Spring 2017 by the USGIF YPG. It is a full paid scholarship to attend the USGIF
GEOINT conference. It is awarded to 25 individuals that are either under the age of 35 or have
less than 5 years in the GEOINT community.
DISCOVER Summer Research Grant
Awarded in Spring 2017 by Marymount University to be able to conduct research surround my
Honors Thesis.
Honors
Honors awarded from Marymount University:
Kappa Mu Epsilon Mathematics Department 2017-2018
To become a member, you must (a) be a regularly enrolled student at Marymount
University, (b) have completed at least three semesters and rank in the upper 35% of your
class, and (c) have completed at least three math courses and attained an average of B or
better in all math courses.
Upsilon Pi Epsilon Information Technology Department 2017-2018
To be eligible for election to membership, undergraduate students must rank in the upper
35% of the class and shall have attained a general scholarship rating, in all college work
thus far completed, of not less than 3.0/4.0 grade-points provided (1.) that candidates in
any particular academic level who satisfy the requirements of Article VIII, Section 2, (2.)
that the candidate shall have completed at least 45 (Forty Five) semester hours of college
work including fifteen (15) semester hours or twenty-three (23) quarter hours in the basic
courses in the Computing and Information Disciplines to be eligible under this Section.
The Chapter shall have the right to set any limit above this minimum attainment as a
basis for eligibility.
Phi Eta Sigma 2016-2018
To be a member, you must obtain a 3.5 GPA or higher during their first semester at
Marymount.
Presidential Scholarship 2014-2018
To obtain this scholarship, one must maintain a 3.5 cumulative GPA.
Dean’s List 2014-2018
![Page 69: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued](https://reader033.vdocuments.us/reader033/viewer/2022060512/5f2b5b34bb48a076f904a51f/html5/thumbnails/69.jpg)
The Dean's List is comprised of undergraduate students who carry a full academic load
(12 or more credits) for a given semester, are in good academic standing, and obtain a
grade point average of at least 3.4.
St. Ambrose Honor Society School of Business 2015-2018
Students belonging to this society must maintain a 3.0 cumulative GPA and must hold
high standards in the School of Business.
Honors Program 2014-2018
Honors students must maintain a 3.5 overall GPA as well as complete at least 24 Honors
credit with a minimum of a B. The full list of requirements can be found at
https://www.marymount.edu/Academics/Programs-of-Study/Honors-Program/Program-
Requirements
Career Path
Next 5 years:
In the next five years I plan to apply for graduate school at George Washington University for
their new Data Analytic program. While I am applying for graduate school, I plan on continuing
to work either with DigitalGlobe if they offer me a permanent position or pursue other job
opportunities.
I am currently interested in still working in the government contracting are, however I am
interested in applying for a government position. I have been connected by recruiters through
LinkedIn, so I plan on finding a job through using that process as well as through my
connections at HumanGeo.
Next 10 years:
I plan to have my Master’s degree as well as be working in the government sector. My goal is
eventually to work for the CIA, FBI, or other DOD or DOJ agency. I plan on finding these jobs
through the connections I made through HumanGeo as well as finding them off of their personal
websites.
Links to Applicable Sources
https://commons.marymount.edu/it423warndorf/home
https://github.com/madelinew