senior portfolio...animal-id, alone, cannot be the pk because it does not functionally determine all...

69
SENIOR PORTFOLIO NOVEMBER 30, 2017 Madeline Warndorf

Upload: others

Post on 07-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

SENIOR PORTFOLIO

NOVEMBER 30, 2017 Madeline Warndorf

Page 2: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Table of Contents

Executive Summary ............................................................................................................... 4

Personal Statement ............................................................................................................... 4

Resume ................................................................................................................................. 4

Senior Activities ..................................................................................................................... 7

Internship ......................................................................................................................................7

Capstone .......................................................................................................................................7

Documentation of Specific Fields ........................................................................................... 7

Programming .................................................................................................................................7

Database Technology .....................................................................................................................8

Computer Networking....................................................................................................................9

Software Testing and Documentation ........................................................................................... 14

Soft Skills ............................................................................................................................. 28

Written Communication ............................................................................................................... 28

Project Management ................................................................................................................... 32

Problem Solving/critical Thinking ................................................................................................. 47

Honors Thesis: ..................................................................................................................................... 47

Honor 200 Tutorial “Book to Film” ..................................................................................................... 48

Extra-Curricular Activities .................................................................................................... 66

Global Experiences ....................................................................................................................... 66

Belize Biology Study Abroad ............................................................................................................... 66

Leadership Activities .................................................................................................................... 66

Dance Team......................................................................................................................................... 66

St. Ambrose School of Business Honors Society ................................................................................. 67

Honors Program .................................................................................................................................. 67

Awards and Honors ............................................................................................................. 68

Awards ........................................................................................................................................ 68

Honors......................................................................................................................................... 68

Career Path ......................................................................................................................... 69

Links to Applicable Sources .................................................................................................. 69

Page 3: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Madeline M. Warndorf

1117 N. Kenilworth St.

Apt. 6

Arlington, VA 22205

703-431-6614

[email protected]

November 30, 2017

Dr. Diane Murphy

Marymount University

2807 N. Glebe Rd.

Arlington, VA 22207

To Dr. Diane Murphy:

I am honored and excited to present my senior portfolio package. It contains all of the important

work and information from my time at Marymount University. This portfolio will be used as a

reference to my skills as well as knowledge gained from my time at the university.

Thank you in advance for your time and consideration. Please feel free to contact me at (703)

431-6614 or by email at [email protected]

Sincerely,

Madeline M. Warndorf

Page 4: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Executive Summary

Passion and determination are key values that help push an individual through struggles and

towards success. Madeline Warndorf believes strongly in that as she attended Marymount full-

time while interning at HumanGeo/DigitalGlobe Radiant all four years of her academic career.

On top of the time that Madeline dedicated to school and work, she continued to follow her

passion for dance through joining the Marymount Dance Team. Both of these statements are

shown in her resume along with her awards and honors. Madeline finished her Honors Thesis her

senior year while becoming proficient in R on her own time. She wanted to do complete this

challenge on her own because she is driven to work in the Data Analytic field.

Personal Statement

Through my passion of math and finding the answers to the harder questions, I decided that I

wanted to do Data Analytics. A family friend helped me pursue this passion by giving me the

chance to intern at HumanGeo. As I continued to gain knowledge through this internship as well

as my schooling, I was able to grow in confidence as well as feed my determination to gain more

knowledge of this field.

I have received many honors through Marymount University, however the best honor that I have

received was through the opportunity given to me through HumanGeo. Through the company, I

was encouraged to apply for the United States Geospatial Intelligence Foundation (USGIF)

Young Professional Group’s Golden Ticket program for their annual GEOINT conference. I was

one of twenty-five individuals selected out of the entire nation to attend the conference in San

Antonio, TX.

I was humbled to be selected as the youngest member of the group and with minimum

experience in the field. The conference helped me narrow my interests to wanting to work for the

government sector as an analyst.

Resume

Page 5: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Madeline M. Warndorf

1117 N. Kenilworth St. Apt. 6∙ Arlington, VA 22205 ∙ (703) 431-6614 ∙ [email protected]

Skills

Languages: Proficient in R and Python. Experienced with Java, CSS, HTML, JavaScript, SQL.

Software: Tableau, LaTeX, MatLab, MS Office, MS Access, MS Project, MS Visio.

Clearances and Certifications

Clearance: TS

Education

Marymount University, Arlington, VA Expected Completion: May 2018

Bachelor of Science, Major in Information Technology with a Concentration in Data Science, Minor in

Mathematics.

Experience

DigitalGlobe Radiant, Arlington, VA Dec 2016-Present (Acquired HumanGeo in Fall of 2016).

Data Analyst Intern

Assisted administration tasks including the onboarding process for the HumanGeo side of the company.

Conducted data research, data analysis, and several technology mentorships under the Rapid Feedback

Team (RFT), operating separately from HumanGeo, for NGA’s GEOINT Services clients.

Key Projects:

• Under the RFT, worked on the data research team for multiple projects gathering open source

data like social media and geological information.

o Projects were either given to the team by the client or proposed by a fellow team

member.

• Used software like Tableau and Excel to analyze and visualize data for projects.

• Pursued mentorships under lead technologist and data analysts on the RFT and HumanGeo

sectors of the company.

The HumanGeo Group, Arlington, VA Aug 2014-Present

Intern

Assisted administration tasks including the onboarding process for the HumanGeo side of the company.

Managed employee database, compiled receipts, managed meetings, and curated and analyzed articles

for clients.

Key Projects:

• Tested and curated articles for the Global Terrorism database project.

• Assisted finance in maintaining receipt database as well as filing of physical receipts.

• Managed and updated employee information throughout the onboarding process.

• Assisted CEO in meetings, information releases, and acquiring process of the company.

Page 6: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Honors and Activities

Honors

YPG Golden Ticket USGIF YPG 2017

DISCOVER Summer Research Grant Marymount University 2017

Kappa Mu Epsilon Marymount University Mathematics Department 2017

Upsilon Pi Epsilon Marymount University Information Technology Department 2017

Phi Eta Sigma Marymount University 2016

Presidential Scholarship Marymount University 2014-2018

St. Ambrose Honor Society Marymount University School of Business 2015-2018

Activities

Membership Chair Head Marymount University 2016-2018

Co-Captain of Dance Team Marymount University 2016-2018

Honors Program Marymount University 2014-Present

Page 7: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Senior Activities

Internship

The internship that I persuaded throughout my four years at Marymount University was

with the HumanGeo Group. More specifically I assisted the Rapid Feedback Team - Unclassified

in mission critical responses to GEOINT Services tools and products. I also conducted research,

compiled data, and created visuals using GEOINT Services tools through Open Source. I chose

this course of action because it is my passion and the once small business company of

HumanGeo provided an amazing place to shadow under a variety of individuals with different

skill sets.

I learned the importance of patience in learning new tools, the importance of finding a

mentor in a variety of fields (development, operations management, and analytics). I have

learned a large variety of skills and new tools that are not taught at Marymount such as Tableau

and Q-GIS.

Capstone

I substituted my Capstone project for my HON400 Thesis. I analyzed the overall vehicle

safety improvements and the efforts to prevent fatal accidents caused by cell phone usage

decreased the number of fatal accidents. I was interested in this topic because after using the

National Highway Traffic Safety Administration’s database of a project that I completed last

year I found that their data is not compared against manufactures, legislation, as well as

campaigns on the same report. This research project will provide the starting point to see if the

efforts to help decrease fatal car accidents are working across a long period of time as well as

provide an interesting way to visualize the data. There is also a lot of information that the FARS

Encyclopedia offers that can be used to look at other aspects as to what could be correlated to

fatal car accidents. I enjoy the how the data can be used to answer a variety of other questions

that are different to the one that I plan on analyzing.

Documentation of Specific Fields

Programming

Java:

https://github.com/madelinew/MUJavaAssignments

R:

https://github.com/madelinew/HON400Thesis

Python:

https://github.com/madelinew/MUPythonAssignments

Page 8: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Database Technology

IT310 Assignment 2 – Logical Design: Normalization

The following relation describes a part of the existing structure of a pet-store database.

PETS (Animal-ID, Name, Category, Breed, Gender, Color, List price, FF, Quantity-of-

FF)

➢ Animal-ID is a unique identifier for each animal. Each animal has a name and belongs to one

category (Cat, Dog, Fish, Bird, etc). Within each category, there are several breeds (such as

German Shepard, Collie, etc. considering dogs).

➢ “FF” stands for “favorite food” and each animal could have more than one FF.

➢ “Quantity of FF” is measured in ounces. It is not the recommended quantity but the quantity

the animal would consume comfortably (without being “digestively-challenged”) based on

the pet store’s experience.

The following functional dependencies hold in the above relation (There are absolutely

NO OTHER dependencies):

➢ Animal-ID Name, Category, Breed, Gender, Color, List-price

➢ Breed Category

➢ Animal-ID, FF Quantity-of-FF

STEP 1: I CLAIM that PETS with Animal-ID as the primary key is in 1NF. Is my claim right?

Please state the reasons for your answer. If my claim is incorrect, then what needs to be done to

the relation for it to satisfy 1NF?

Animal-ID, alone, cannot be the PK because it does not functionally determine all of the

attributes. The definition of 1NF states that they cannot be multi-valued attributes. Animal-ID

does not determine Quantity-of-FF. Therefore, FF must become a PK as well. That means that

Animal-ID and FF are the composite key for this database to satisfy 1NF.

PETS (Animal-ID, FF, Name, Category, Breed, Gender, Color, List price, Quantity-of-FF)

STEP 2: Is your answer to Step 1 in 2NF? Why or Why not? Please articulate the reason(s). If

not, normalize the schema to 2NF.

No it is not in 2NF because Quantity-of-FF is a partially dependent on the PK of Animal-ID and

FF.

Page 9: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

PETS1 (Animal-ID, Name, Category, Breed, Gender, Color, List price)

PETS2 (Animal-ID, FF, Quantity-of-FF)

STEP 3: Is your answer to Step 2 in 3NF? Why or Why not? Please articulate the reason(s). If

not, normalize the schema to 3NF.

It is not in 3NF because there is a transitive dependency between the two non-primary key

attributes Breed and Category.

PETS1 (Animal-ID, Name, Gender, Color, Breed, List price)

PETS2 (Animal-ID, FF, Quantity-of-FF)

PETS3 (Breed, Category)

Computer Networking

Question 1

Question 2

Page 10: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

a) I wouldn’t recommend the Scoops chain to change its server’s NOS to Linux because a

lot of people are more familiar with Windows operating systems. Even though Windows

OS is more expensive than Linux Fedora.

b) It is easy to use and also to upgrade if a new version is released (Windows 8 vs. Windows

10). Windows OS are also more compatible for software applications and hardware

compared to Linux which Scoops will have to make sure that the other software they use

would be compatible.

Question 3

1.

Page 11: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

2.

3.

Question 4

The computers only run the TCP/IP protocol on the Ethernet network and all the computers use

3Com NICs in the lab. That means all of the frames need to depend on type of network the

frames run on. The frame type depends on the NIC that is needed to transport the data from the

Ethernet frames to the token ring. When the student changed the frame type which workstation's

NIC was using to transmit data from Ethernet to token ring, the connection between these two

networking technologies was removed.

Question 5

A) 254

Page 12: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

B) 127

C) 128

D) 192

E) 255

F) 00001010

G) 00111000

H) 01100000

I) 11100000

J) 11111100

Question 6

a) Some of the nodes would still have statically assigned IP addresses because they were

manually assigned them by somebody with an ARP utility. They just haven’t been

changed to DHCP yet.

b) The problems that could happen with having a mix of statically assigned and dynamically

assigned addresses on the same network is that the static IP address could overlap the

addresses in the DHCP pool. The static IP address has to be in the same subnet as the

DHCP server and the default gateway and DNS addresses have to match that of the

DHCP.

c) The steps that I would take to change the address assignment properties for a Windows 7

workstation are:

a. Go to Control Panel, select Network Connections.

b. Right click on the needed connection (local, wireless, etc.) and select Properties.

c. Click on Internet Protocol (TCP/IP) and click Properties.

d. Select the button that says "Use the following IP address:"

e. Enter the desired IP address, Subnet mask, and Default gateway.

f. The button that says "Use the following DNS server addresses:" is selected.

g. Enter all the IP addresses for the DNS servers the router uses

d) There is a way that I could modify the addressing properties of the workstations at each

small office remotely, without having to visit the offices. Some systems have Remote

Registry that will allow the user to view other Window’s workstations and make changes

to the IP addresses through the command line.

http://searchtasks.answersthatwork.com/tasklist.php?File=RemoteRegistry

Question 7

3. IPv4 Address: 10.6.21.94

Hostname: BALL_405_PC18

MAC Address: 18-03-73-35-FF-0A

DHCP Server Address: 10.6.2.2

Page 13: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

9/29/16 10:12:30 AM

9/29/16 7:27:32 PM

Default Gateway Address: 10.6.20.1

Subnet Mask: 255.255.254.0

5. The IP address changed to Autoconfiguration IPv4: 169.254.19.129

6. My IP address, Subnet Mask, Default Gateway, DHCP Server Address, and MAC Address

stayed the same. The only thing that changed from before was the Lease Obtained and Lease

Expires.

Question 8

Bit-Wise: 00001010.00001100.00001110.00010010

Subnet Address: 10.12.0.0

Broadcast Address: 10.12.0.255

Number of hosts: 254

IP Address Range: 10.12.0.0 – 10.12.0.254

Question 9

a) The OSI model layer that is responsible for routing data from one LAN to another is the

Physical Layer. It is Layer 1.

b) The OSI model layer that specifies data formatting and language that is being used is the

Presentation Layer. Also known as Layer 6.

Question 10

a) I would explain her that it is a terrible idea to have the telco rooms in such condition. I

would talk to her about all the expected outcomes of the errors and inform her about the

TIA/EIA 568A and TIA/EIA 568B recommendations. I would also tell her that in case of

any minor problem, it could take hours or even days to find that little error in a telco

room that is in the condition of the current room with the cords, jacks, and devices not

labeled and in order.

b) Proper cable termination is a basic requirement for two nodes on a network to

communicate well. Poor terminations can lead to loss or noise. This would lead to errors

in the signal.

c) It is critical to label patch cables, ports, and data jacks because when people go to fix a

problem and start pulling on wires they will not know which wire is connected to which

Page 14: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

computer or device and could ruin somebodies work. It will also save a lot of time when

it comes to trying to track down the problem if one ever arose.

Software Testing and Documentation

The Online Graduation Petition Process System

Software Development Plan

1. Introduction

This report addresses the software development plan for the Marymount University’s

Online Graduation Petition Process System. The purpose of this system is to eliminate the paper

version of the graduation petition and create a version of the form that will be filed under the

student’s personal account in the Registrar’s Office Database. The objectives of the system are

that it will create an easier and more efficient way for the student to fill out and submit the

application. Another objective of this system is to create an efficient way for the Registrar’s

Office to track and maintain the process of the forms from each student. The developmental

process model that will be used is the Incremental model which takes each requirement that is

shown in the use case diagram and breaks them down into modules and goes over the design,

then testing, and implementation of each modules1.

2. Project Deliverables

All the requirements that need to be delivered by January 11, 2016 have been broken down

into separate modules according to the Incremental Model. Each module contains separate steps

such as design and development, testing, then implementing. After one module is completed the

second module is added onto it. The delivery date for each module listed requires that the entire

module (design and development, testing, and implementation) is finished by that date.

• Module 1 completed by May 1, 2015

This module is a getting the form to be accessed from the Marymount University Registrar’s

Office Website. This is a stand-in blank form that will be replaced by a later module. Then the

team will link the Online Graduation Petition system to the Registrar’s Office Database. By

linking the two systems, the Online Graduation Petition System will be allowed to have access to

the database.

• Module 2 completed by August 21, 2015

1 What is Incremental model- advantages, disadvantages and when to use it? (n.d.). Retrieved November 24, 2015,

from http://istqbexamcertification.com/what-is-incremental-model-advantages-disadvantages-and-when-to-use-it/

Page 15: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

This module enables the student to use their username and password to log into the application

and validate that the user ID is a current student at Marymount University. This module requires

the access to the Registrar’s Database to allow the student to use their university login

information and have the validation of the student. Upon logging into the application, the first

page will display the student’s information such as their identification number, major, any

specialty, and minor. This is the required connection between the application and Registrar’s

Office Database.

• Module 3 completed by December 11, 2015

This module is the section where the student inputs the information that the Registrar’s Office

needs. The questionnaire/form section that concerns the confirmation of semesters (Fall 16,

Spring 16, and Summer 16), indication of walking in the spring semester, and reservation of

tickets. The question concerning the reservation of tickets, a maximum limit must be placed on

them. Then the application will be submitted to the Registrar’s Office Database in the student’s

file. After the application is submitted, then the Registrar’s Office Database or System needs to

send a confirmation e-mail to the student’s email account stating that their application was

received.

• Project complete by January 11, 2016.

This delivery date is for the implementation of the entire Online Graduation Petition Process

System.

3. Project Resources

This section describes any external resources (hardware and software) that is required to

complete the project. These items are documented because they need to be managed throughout

the process of developing the system. By documenting them, it will prevent confusion later down

the line and provide a checklist of the equipment needed for the project. Both the hardware

resources and software resources indicate if they are needed for the development or execution of

the project.

3.1 Hardware Resources

This software development plan assumes that the computers listed include a mouse,

keyboard, and monitor. The exact description of the Registrar’s Office Database computer is

unknown at this time. The description that is listed for the database computer is the requirements

to run Windows 10 operating system2.

2 Windows 10 Specifications - Microsoft. (n.d.). Retrieved November 24, 2015, from

https://www.microsoft.com/en-us/windows/windows-10-specifications#sysreqs

Page 16: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Table 1: Hardware Resource Requirements

Resource Development Execution

Windows Computer

Windows 10, 1 GHz

processor, dual core X X

1 GB RAM, CD drive,

Ethernet connection X X

16 GB disk space, 800x600

minimum graphics X X

Registrar’s Office

Computer3

Windows 10, 1 GHz

processor, dual core X

1 GB RAM, CD drive,

Ethernet connection X

16 GB disk space, 800x600

minimum graphics X

Ethernet Cables X X

4. CMSI 402: SW Dev. Plan. (n.d.). Retrieved November 24, 2015, from

http://myweb.lmu.edu/bjohnson/cmsi402web/sdevplan.html

Page 17: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

3.2 Software Resources

The provided information for the software requirements for this project is the web

development environment is HTML5/CSS, the coding is requested to be done in Java, and the

database that will be accessed is Oracle.

Table 2: Software Resource Requirements

Resource Development Execution

Text Editor Sublime Text Editor X

Operating System Windows 10 X X

Third Party Software Oracle Database 12c

Release X

Change Control GitHub X

IDE NetBeans 8.0 X

IDE Plug-In Sublime Theme Plug-In X

4. Project Organization

For this system, the Incremental Model will be used to develop the Online Graduation

Petition Process System. The project is broken down into different modules that have different

requirements. To minimize risk and confusion, there will only be one team for the project that

will work on all six modules. The team will consist four sub-teams. The amount of specific

developers, designers, testers, and project executers can be modified because this is a small

project. This software development plan is designed with the maximum number of personnel

required to complete this project. The team will continue to work through the modules together

since the modules are designed to be built upon after the implementation of the previous.

4.1 Roles and Responsibilities

Page 18: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Project Manager

The project manager is in charge of overseeing the entire project from start to finish. The

project manager is the head of communication, planning, execution, management of personnel,

and resources for the project4. All of the team leads, business analyst, and release manager get all

of their information concerning the project from the project manager. The project manager also

will have the final say in any decision that is made.

Database Analyst

Database analysts are specialists that understand how databases are created and

designed5. These individuals will work along side the development team and the programming

team because these two teams will need to access the Registrar’s Office database. They will be in

charge of answering any questions concerning the database. They will also answer to the team

leads of each of the teams.

4.1.1 Design Sub-Team

Design Team Lead

The design team lead is in charge of communicating the information about the project

from the project manager and the designer to the rest of the design team. The other

responsibilities and roles that they will cover is communication from the design team to the other

team leads and managing the progress of the design stage for each module of the Incremental

model. They also keep close contact with the client to have a strong understanding of the

business requirements for the project6.

Designer

The designer is in charge of understanding the requirements, determining the best

approach on how to reach them, and the data needs7. They will keep close communication with

the development team because their work is the basis for the development of the system. The

designer is responsible for the layout of the system and the design specifications. They are also

responsible for change control within the development process.

4.1.2 Development Sub-Team

4 What is a Project Manager (PM)? - Definition from Techopedia. (n.d.). Retrieved November 25, 2015, from

https://www.techopedia.com/definition/677/project-manager-pm 5 Project Roles and Responsibilities. (n.d.). Retrieved November 25, 2015, from

http://www.lifecyclestep.com/open/408.0LifecycleRoles.htm

6 Project Roles and Responsibilities. (n.d.). Retrieved November 25, 2015, from

http://www.lifecyclestep.com/open/408.0LifecycleRoles.htm 7 Project Roles and Responsibilities. (n.d.). Retrieved November 25, 2015, from

http://www.lifecyclestep.com/open/408.0LifecycleRoles.htm

Page 19: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Development Team Lead

The development team lead is in charge of communicating the information about the

project from the project manager to the rest of the team. The other responsibilities and roles that

they will cover is communication from the development team to the other team leads and

managing the progress of the development stage for each module of the Incremental model. The

development team is also working along side of the design team because these two actions

happen at the same time in the model.

Developer

The developers will be responsible for creating and building the software application for

the Online Graduation Petition Process System8. They will write the front-end and back-end of

the software and debug it. They are also responsible for preserving the code from module to

module as they continue to build onto it.

4.1.3 Testing Sub-Team

Testing Team Lead

The testing team lead is responsible for leading the team that tests the system towards the

end of each module and one final time before final deployment. They will be in charge for

communication between the team and the project manager and the other team leads. They will

notify the development team and the project manager about any failures or fixes that are in the

system. This team lead is responsible for the testing stage of each module of the Incremental

Method.

Tester

The tester is responsible for making sure that the system meets all the business

requirements and that the system is free of errors9. They are responsible for maintaining that the

testing team lead thoroughly understands what needs to be fixed to the development team. The

testers are not to fix the code, but to only notify the development team lead.

4.1.4 Project Execution Sub-Team

Project Execution Team Lead

This individual is responsible for leading the team that is in charge of executing the final

project to the project manager then the client. They will be in charge for communication between

8 What is a Developer? - Definition from Techopedia. (n.d.). Retrieved November 25, 2015, from

https://www.techopedia.com/definition/17095/developer 9 Project Roles and Responsibilities. (n.d.). Retrieved November 25, 2015, from

http://www.lifecyclestep.com/open/408.0LifecycleRoles.htm

Page 20: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

the team and the project manager and the other team leads. This team lead is responsible for

managing the installation and implementation of the total project.

Project Executer

The project executer is responsible for finalizing the project and preparing it to be

presented to the client and project manager. They are also responsible for the installation of the

program.

Page 21: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

4.2 Organizational Chart

Project Manager

Developer

Developer

Database Analyst

Development

Team Lead

Designer

Team Lead

Testing

Team Lead

Project Execution

Team Lead

Designer

Designer

Tester

Tester

Tester

Project Executer

Project Executer

Page 22: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

5. Schedule

The development process used is the Incremental model which is broken down into

subtask sections with their own personal meetings. The subtasks are the design section,

development section, testing section, and implantation section. The GANTT table and GANTT

chart below defines the timeline for the tasks and meetings needed to complete this project.

5.1 Module One

Page 23: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

5.2 Module Two

Page 24: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

5.3 Module Three

Page 25: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

5.4 GANTT Charts

Page 26: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

6. Risks

This system, through the developmental process of the Incremental model should not

have major risks. Through the Incremental model, risks are diminished because at the end of

each module the section that was developed is tested10. The schedule that was developed through

the GANTT chart predicted that the project will be completed ahead of schedule. This will give

some leeway if any part of the modules falls behind schedule.

7. Glossary

CSS: “Cascading Style Sheet” style sheets that are used to format web pages (Christensson,

2006).

Developmental Process: system used to define the steps and tasks that need to be accomplished

in an organized flow (What is product).

Ethernet: way to connect computers to a network over a wired connection, Ethernet cable,

(Christensson, 2014).

GANTT Chart: is a chart that is used to describe a schedule through the use of a timeline

(CMSI 402: SW Dev. Plan).

HTML5: fifth standard of HTML (Hypertext Markup Language), which is a language that is

used to create webpages (Christensson, 2015).

IDE: Integrated Device Environment, it is an application that is used by developers used to

create programs (Christensson, 2015).

Incremental Model: model used during the software life cycle. It is a “multi-waterfall” cycle

containing of multiple modules that build on top of each other (What is Incremental).

Java: a high-level programming language used to develop programs (Christensson, 2012).

Operating System: it is the software that communicates to the hardware that allows programs to

run on the computer (Christensson, 2012).

Oracle: type of database. It is a collection of data that is stored in a unit (1 Introduction).

Text Editor: any word processing program that can type and edit text (Christensson, 2006).

Use Case Diagram: visual set of scenarios that describes an interaction between a user and a

system (Murphy, 2015, sld. 4).

10 What is Incremental model- advantages, disadvantages and when to use it? (n.d.). Retrieved November 24, 2015,

from http://istqbexamcertification.com/what-is-incremental-model-advantages-disadvantages-and-when-to-use-it/

Page 27: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

8. Bibliography

1 Introduction to the Oracle Database. (n.d.). Retrieved November 24, 2015, from

http://docs.oracle.com/cd/B19306_01/server.102/b14220/intro.htm

Christensson, P. (2006). CSS Definition. Retrieved 2015, Nov 24, from http://techterms.com

Christensson, P. (2014, November 20). Ethernet Definition. Retrieved 2015, Nov 24, from

http://techterms.com

Christensson, P. (2015, May 23). HTML Definition. Retrieved 2015, Nov 24, from

http://techterms.com

Christensson, P. (2015, July 28). IDE Definition. Retrieved 2015, Nov 24, from

http://techterms.com

Christensson, P. (2012, April 19). Java Definition. Retrieved 2015, Oct 16, from

http://techterms.com

Christensson, P. (2012, January 27). Operating System Definition. Retrieved 2015, Nov 24, from

http://techterms.com

Christensson, P. (2006). Text Editor Definition. Retrieved 2015, Nov 24, from

http://techterms.com

CMSI 402: SW Dev. Plan. (n.d.). Retrieved November 24, 2015, from

http://myweb.lmu.edu/bjohnson/cmsi402web/sdevplan.html

Murphy, D. (Fall 2015). IT210 Software Engineering Unit 5B Use Cases [PowerPoint slides].

Project Roles and Responsibilities. (n.d.). Retrieved November 25, 2015, from

http://www.lifecyclestep.com/open/408.0LifecycleRoles.htm

What is a Developer? - Definition from Techopedia. (n.d.). Retrieved November 25, 2015, from

https://www.techopedia.com/definition/17095/developer

What is Incremental model- advantages, disadvantages and when to use it? (n.d.). Retrieved

November 24, 2015, from http://istqbexamcertification.com/what-is-incremental-model-

advantages-disadvantages-and-when-to-use-it/

What is product development process? definition and meaning. (n.d.). Retrieved November 24,

2015, from http://www.businessdictionary.com/definition/product-development-

process.html

What is a Project Manager (PM)? - Definition from Techopedia. (n.d.). Retrieved November 25,

2015, from https://www.techopedia.com/definition/677/project-manager-pm

Page 28: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Windows 10 Specifications - Microsoft. (n.d.). Retrieved November 24, 2015, from

https://www.microsoft.com/en-us/windows/windows-10-specifications#sysreqs

"This assignment is all my own work and contains no Plagiarism. All text, diagrams or other

materials copied from other sources (including, but not limited to, books, journals and the

internet) have been clearly acknowledged and referenced as such in the text by the use of

'quotation marks' (or indented italics for longer quotations) followed by the author's name and

date [e.g. (Byrne, 2008)] either in the text or in a footnote/endnote. These details are then

confirmed by a fuller reference in the bibliography.

I understand that only assignments which are free of plagiarism will be awarded points.

I have completed the Academic Integrity Tutorial."

Soft Skills

Written Communication

2017 DISCOVER Summer Research Program

Student/Faculty Application Form

Eligibility To be eligible for a Summer Research Program grant, students must be undergraduates in good academic standing who are collaborating with a faculty mentor on a research project or creative activity. Student projects must be related to the faculty mentor's scholarship. Students who will be August 2017 graduates are not eligible. Application Applications are jointly submitted by the student and faculty mentor. The student should fill out Part I of the application and provide to the faculty mentor, who fills out Part II. Email the completed application to the associate vice president for Academic Affairs ([email protected]). Deadline Summer 2017 research grant applications are due April 7, 2017.

Part I. To be filled out by the student.

Name: Madeline Warndorf

Page 29: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Local Address: 16641 Paloma Circle, Round Hill, VA 20141

Telephone number: (703) 431-6614

Email address: [email protected]

Major: Information Technology (Data Science Concentration) with Math Minor

Anticipated Graduation Date: May 2018

If you are an international student: What type of VISA do you hold? Are you eligible to work in the US?

Will you have any on-campus employment this summer? If so, please indicate what that job will be: I will not have any on-campus employment this summer.

Summer Housing or Commuter Meal Plan Please note: DISCOVER funds a maximum of 6 weeks** in university residence halls. Indicate your need for housing:

___ I am not requesting summer housing. ___ I am requesting a commuter meal plan for the following period:

__X_ I am requesting summer housing for the following period**: 7/10/17-8/15/17

Duration of summer housing or commuter meal plan must match dates of research. **In exceptional cases, when a research project requires more than 6 weeks, additional housing may be granted.

Description of your research project (Please limit to no more than 2 pages; space will expand as you type)

The goal of this thesis is to analyze the Fatal Accident Report System (FARS) data collected

nationwide and compare the data in a timeline to see the trends of accidents as safety improvements

were made from 2007-2015. The safety improvement data points that will be compared against

include new legislations passed, new automobile safety technology releases, milestone cell phone

releases, and the implementation of distracted driving campaigns. The purpose of this research is to

determine if the efforts to prevent fatal car accidents caused by distracted driving and overall vehicle

Page 30: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

safety improvements will have a correlation with the number of fatal accidents. It will also be

analyzed nationwide, not by state.

The years that will be analyzed are still being determined but it will begin with the year 2007.

The goal is to analyze the years 2007-2015, specifically the car model years 2008-2016. The FARS

raw data will be queried through their site to meet the specific constraints placed on the data. These

constraints include the car has to be in the model year 2008 through 2016. The driver must be using a

restraint, and the vehicle must be a passenger car or a light truck. The additional data that will be

collected from various sources to help normalize the results include total number of mobile phone

subscriptions per year and automotive recalls.

Dates & duration of research project (Note: if you are requesting housing or a commuter meal plan, project duration must match housing request) If housing is being required for more than 6 weeks, you must provide a rationale. The dates for the research project will be 7/10/17-8/15/17. This will allow us to finish gathering and analyzing the nine years of data for the different factors as well as work on the write-up of the thesis.

Personal Statement. What are your professional aspirations? How does this project fit with these? (Space will expand as you type)

I am interested in this topic because after using the National Highway Traffic Safety

Administration’s database of a project that I completed last year I found that their data is not

compared against manufactures, legislation, as well as campaigns on the same report. This research

project will provide the starting point to see if the efforts to help decrease fatal car accidents are

working across a long period of time as well as provide an interesting way to visualize the data. There

is also a lot of information that the FARS Encyclopedia offers that can be used to look at other

aspects as to what could be correlated to fatal car accidents. I enjoy the how the data can be used to

answer a variety of other questions that are different to the one that I plan on analyzing.

Page 31: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

This topic connects to my major of IT Data Science with a minor in Mathematics because it

implements the use of the programming language R that is in high demand for this field. It also is

analyzing a large amount of data from the National Highway Traffic Safety Administration (NHTSA)

Fatality Analysis Reporting System (FARS) Encyclopedia database. This topic incorporates the

knowledge needed to handle large amounts of data as well as use of statistics to answer the question

proposed by the topic. This thesis topic also introduces the intense utilization of gathering a lot of

information from a variety of sources.

I also plan on submitting my final findings to the NHTSA as well as looking for conferences

to show the results of my thesis that this research grant will give me more time to do the deep

analysis that I want to do for the thesis.

Part II

Name:

Department:

Significance of Project Describe the relationship and significance of this project to your scholarship. (Space will expand as you type)

Recommendation of Student Provide your recommendation for funding this student. (Space will expand as you type)

Institutional Review Board (IRB) Approval If this project involves human subjects, please provide evidence of IRB approval or pending approval.

Page 32: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Project Management

Washington Colonial Open House

Project Report

1. Background and Statement of Need

Jane Smith’s Realtor Company (the Company) is member of the National Association of

Realtors (NAR) and has been selling houses in the DC/Maryland/Virginia (DMV) area for over

30 years. The company needs to host open houses so that the potential clients can view the

house. Jane Smith begins her major house selling season during the months of May and June.

During this time period, her company puts on 20 open houses. The open house must attract

potential buyers and promote Jane Smith’s Realtor Company to gain clients.

The house for this project is a three-story colonial in Arlington, VA. It was built in 1925

and has 3 full baths and 4 bedrooms. The house’s general information including a virtual

walkthrough is already listed on the Company’s website. This is this house’s first open house and

the date is for Saturday June 24 th, 2017. The house’s interior has already been cleaned and the

current owners have already moved out.

Jane Smith relies on open houses to showcase the house that is for sale as well as attract potential

clients. The Company has used this technique successfully to promote their business as well as

gain clients for the past couple of years. With the increase need to sell houses and gain clients,

Jane Smith has pushed her open houses to also include an “Internet Push” before and after the

open house event. This internet push includes using social media for marketing purposes and

reaching out to the clients and potential buyers after the open house as a follow up. With the

increase in of planning and additional requirements for the event, Jane Smith has requested that

each open house have their own project team.

2. Project Goals

2.1 To use the “Internet Push” phase as a major factor in the outreach process.

This goal is set in place to gain the most of the use and vast outreach the Internet provides. This

goal focuses on pushing the event through social media, the Company’s website, and internet

advertisements. It also focuses on reaching the optimum number of individuals while keeping the

cost to the company low.

2.2 To effectively attract and entertain potential buyers and clients for the Company throughout

the entire event.

This purpose of this goal is to maintain the number of interested individuals at the event without

the use of the internet. It focuses on creating a theme for the event instead of having a traditional

open house. The other focus of this goal is to gain the interest of potential clients for the

Company.

Page 33: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

3. Project Objectives

3.1 To use the “Internet Push” phase as a major factor in the outreach process.

3.1.1 To market the event to the entire DMV area before the event.

The event needs to be marketed so that people will attend the event. Through the Internet, the

event can be marketed across multiple platforms (the Company’s website and social media sites)

and reach the entire DMV area. This objective will be continuing until the day of the event to

optimize the total number of people who viewed the event advertisement.

3.1.2 To reach out to current interested buyers to provide them with information about the

event.

The Company has current clients who are looking to buy a house. Since the need to buy a new

house is already expressed by these individuals, an email should be sent out to them with the

house’s details. Included in the email should be a personalized invitation to the open house. This

objective will be completed after the email is sent to the current clients.

3.1.3 To increase interest in the house via the internet.

People will not be interested in touring a house that they are unsure of what it looks like. The

house’s virtual tour has been released on the Company’s website prior to the beginning of this

project. The open house has to be different than what people expect to create a sense of curiosity

and interest to come to the open house. This objective will be completed when the event goes

live on June 24th.

3.1.4 To gather feedback about the event and follow-up with potential clients.

The Company should gather data to see how people viewed the event. This will help measure the

success of the event. At the same time that the feedback is being gathered, the new potential

clients for the Company should be contacted to remind them of the services available. The email

reminder should also thank them for attending the event. This objective will be completed after

the event and after the feedback is analyzed and the emails are received by the new potential

clients.

3.2 To effectively attract and entertain potential buyers and clients for the Company throughout

the entire event.

3.2.1 To market the event outside the internet realm.

The impact that flyers and posters have on marketing an event still provides the opportunity to

attract individuals that do not use social media. The flyers will follow the design of the theme

and decorations. This objective will be completed after the day of the event and the physical

marketing materials are collected from where they were displayed.

Page 34: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

3.2.2 To make the house appealing from the exterior to attract people from the street.

In order to attract people from the street, the house has to be appealing and welcoming. People

do not want to go into a house if it seems empty or if it looks run-down. To increase the number

of people who will want to walk into the house as well as potentially buy it, the house has to be

clean and welcoming. This objective will be completed before the start of the event and when the

decorations are set-up.

3.2.3 To use the created theme (“Gold and Champagne”) for the event to maintain people’s

interest.

The theme is used to attract the guests and take a traditional open house to something that the

guest will remember. This is a new marketing idea that the Company implements in all of their

open houses to help maintain the flow and interest of clients and buyers. This objective will be

completed at the end of the event.

4. Project Approach

4.1 To use the “Internet Push” phase as a major factor in the outreach process.

4.1.1 To market the event to the entire DMV area before the event.

4.1.1.1 Use social media to announce the event.

This approach will send out the digital version of the flyers as a post on the Company’s

Twitter, Facebook, Instagram, and LinkedIn accounts. This is to reach the maximum

number of people and allow them to share the event with their friends and family members

who could be interested in buying the house.

4.1.1.2 Create a Facebook event that people can RSVP to.

This would be a calendar event that people will be able to RSVP to so that they can stay up to

date on the event as well as receive additional information about the open house. This will be

used to also track the number of interested attendees to help plan the amount of refreshments that

will be needed.

4.1.1.3 Post weekly reminders before the event.

The Social Media team will post “leaks” with photos that show the house and setup of the event

weekly to increase interest about the house. This will also help remind the people about the

timing of the event so that they will not forget. These leaks will be posted on all of the

Company’s accounts.

4.1.2 To reach out to current interested buyers to provide them with information about the event.

4.1.2.1 Send initial email about the event.

Page 35: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

This email will be sent from the Company’s distribution list of potential buyers. This will be sent

before the social media posts are released. It will give the potential buyers the sense that they are

the Company’s top priority before the general public.

4.1.2.2 Send email containing floor plan and house information.

This will be another “leak” tactic that is specific to the clients of the Company. They will receive

the floor plans and house information before the general public because they are valued members

of the Company’s family. The focus of this approach is to increase interest and hopefully find a

buyer for the house.

4.1.2.3 Send email reminder closer to the day of.

This approach is simply a reminder strategy about the event as well as the final push to try to

persuade the individual into coming to the event. The Marketing Team will be in charge of this

approach.

4.1.3 To increase interest in the house via the internet.

4.1.3.1 Reveal open house theme on social media accounts.

This is another “leak” tactic in the interest of increasing the attendance rate of the event. The

theme will attract the guests and create a sense of curiosity to what the event and house will look

like. The main purpose of this approach is to increase the number of people who will attend the

event by broadcasting the theme as a big reveal on all social media accounts.

4.1.3.2 Post the floor plan of the house to attract people.

This will be specific to the general public as well as reminding the clients what the floor plan

looks like. They will receive the floor plans and house information before the general public

because they are valued members of the Company’s family. The focus of this approach is to

increase interest and hopefully find a buyer for the house.

4.1.3.3 Post pictures of the house’s attractive and unique features with the decorations for

open house.

These pictures will be released the day before and during the event to show how interesting the

actual event is. This objective will be completed during the event and while the event is being set

up.

4.1.4 To gather feedback about the event and follow-up with potential clients.

4.1.4.1 Email a survey to those that provided emails at the event.

This will help measure the success of the event. At the same time that the feedback is being

gathered, the new potential clients for the Company should be contacted to remind them of the

Page 36: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

services available. This will be emailed to new clients and existing clients. This will be

completed the Monday after the event.

4.1.4.2 Provide a general survey on social media accounts where people can fill out their

satisfaction and offer comments.

This will be conducted through the Company’s Facebook page and it will be a very general five

question survey. It will gadget the public’s interest and response to the open house incase the

email was not received by them. This survey will be posted the Wednesday after the event.

4.1.4.3 Send email follow-up and “Thank You” message to new potential clients.

The purpose of this objective is to continue to remind clients and potential buyers that the

Company appreciates them and the time they took out of their day to attend the event. This

continues to promote the kindness of the Company as well as give the Company a good image in

their minds. This will be completed the Monday after the event.

4.2 To effectively attract and entertain potential buyers and clients for the Company throughout

the entire event.

4.2.1 To market the event outside of the internet realm.

4.2.1.1 Create flyers to post in local businesses around the area near the house.

The flyers will provide a physical reminder and outreach tactic to draw people to the event. They

will follow the design of the theme and decorations. They will be placed around the area a week

before the event and taken down the week after the event.

4.2.1.2 Create lawn signs to place in front of the house.

The lawn signs will be used to show which house is for sale as well as alert the neighbors that the

event will be taking place. They will be used to attract customers as well as continue to promote

the open house. The lawn signs will be put in place two weeks before the event and taken down

the day after.

4.2.2 To make the house welcoming.

4.2.2.1 Setup lawn and find parking for attendees.

The purpose of this approach is to designate a specific area for the attendees to park so that they

are not confused. If the event’s parking is too confusing or frustrating people may not park at all

and leave.

4.2.2.2 Have realtors (2-3) to be available to answer questions.

This approach is focused making the customers feel comfortable in the house as well as feeling

comfortable to ask questions about the house. The realtors will be there to answer any questions

Page 37: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

as well as be available to give tours of the house and yard. This approach will be completed after

the event ends.

4.2.3 To use the created theme (“Gold and Champagne”) for the event to maintain people’s

interest.

4.2.3.1 Decorations will be black with gold details with music throughout the house.

For the open house to be appealing, it will need a theme. The theme’s color scheme will be black

and gold to accent the features of the house. This approach’s goal is to distinguish this open

house from other open houses that clients might have gone to. This approach will begin before

the event starts and end after the event is completed.

4.2.3.2 Guests will be given champagne to have during their tour as well as a light snack.

This will increase interest in the guests to remain at the event and learn more about the house.

This will also help them relax more and open up to asking questions. This approach focuses on

maintaining attendance during the event. It will be completed after the event has ended.

4.2.3.3 Outdoor activities will be provided for kids to play with (ex: cornhole, ring toss,

etc.).

The outdoor activities will help distract the kids and entertain them while their parents tour the

house. This also provides a visual for parents to see if they could envision their kids playing in

the yard in the future. It is a great marketing technique for the house as well as an outlet for the

kids while their parents look at the house.

5. Project Risk Management

The importance of Risk Management is to identify potential risks that could hinder the project,

alter the objectives of the project, or cause the project to fail entirely. The Risk Management plan

is an organized way to identify these risks as well as a way to help decrease the probability of

them happening and providing a “Plan B” if the risk does occur. This helps the Project Manager

and the team prepare for the worst and be ready to handle the risk if it does happen. The general

approach that will be taken in this project to manage risks is to follow the Risk Management

Plan. Along with the appropriate mitigation and contingency plans for each risk identified

throughout the entire lifespan of the project.

For more details on each risk, please refer to the “MSC 345 WCOP Risk Register” MS Excel

file.

5.1 Possibility of bad weather.

5.1.1 Risk #1 Mitigation Strategies

5.1.1.1 List possible backup games to play incase of bad weather.

Page 38: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

The Event Set-up team will need to have a list of backup games that can be played indoors in

case of bad weather.

5.1.1.2 Search for possible tent rental companies and get quotes.

If there is bad weather, the event-setup team needs to find a tent rental company for the back

porch and have them on standby.

5.1.1.3 See if garage can be used as backup.

The set-up team is also responsible for determining if the garage is safe and suitable to be used as

a space for backup games.

5.1.2 Risk #1 Contingency Plans

5.1.2.1 Plan for different indoor activities to play.

In order to keep things running smoothly in the event of inclement weather, the event set-up

team will need to find activities to play indoors. The indoor activities will be held in the garage

and run for the duration of the open house.

5.1.2.2 Check weather forecast two days before the event and report to Project Manager.

The event set-up team will review the forecast two days prior to the event. The event set-up team

will then report the weather to the Project Manager( the Realtor) and the Project Manager will

then make the call of whether or not to move planned activities inside or keep them outside as

planned.

5.1.2.3 Bring both types of activities (outdoor and indoor) to the event.

If the forecast calls for inclement weather then, the set-up team is responsible for bringing both

outdoor and indoor events to the open house.

5.2 Dependency on flyers for promotion.

5.2.1 Risk #2 Mitigation Strategies

5.2.1.1 Keep design team on schedule

The event social media and event marketing team are responsible for keeping the event design

team on schedule.

5.2.1.2 .Retrieve flyers from printing office as soon as available.

Once the flyers are made and available for pickup, the event design team is in charge of picking

them up immediately to begin the process of hanging the flyers.

5.2.1.3 Begin hanging the flyers the day following retrieval.

Page 39: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

After flyers are picked up, the marketing team will then begin to hang flyers around the

surrounding neighborhood and nearby businesses.

5.2.2 Risk #2 Contingency Plans

5.2.2.1 Use the dry-erase lawn boards to promote early event early in front of the house.

The event design team will place dry-erase lawn boards to promote the open house event to

onlookers and passersby.

5.2.2.2 Use the flyers until the day of the event.

The marketing team will need to push the event by hanging and passing out flyers until the day

of the event.

5.2.2.3 Push event even more through social media.

The social media team will also need to push the open house through all available social media .

5.3 Dependency on automated reminder system.

5.3.1 Risk #3 Mitigation Strategies

5.3.1.1 Post weekly about the event on social media accounts.

The event social media team is to post weekly reminders of the open house event on all social

media networks.

5.3.1.2 Send reminders to staff to see if it going through.

In order to ensure that our reminders are going through to customers and potential buyers, the

event marketing team is responsible to staff to make sure our emails are delivered.

5.3.1.3 Continue updates on the email distribution system.

The event marketing team is also responsible for the maintenance and upkeep of the email

distribution system.

5.3.2 Risk #3 Contingency Plans

5.3.2.1 Post weekly reminders on social media accounts about the event.

The event social media team are responsible to post weekly reminders on all social media

accounts

5.3.2.2 Have realtors personally email their current clients about the event.

The event realtors and event marketing team are to collaborate and reach out and personally

contact potential clients about the event via email.

Page 40: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

5.3.2.3 Post on the Company's website about the event with a countdown.

The event marketing and event design team are to collaborate as well and post a countdown on

the company’s website.

5.4 Risk Assessment Worksheet

Page 41: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

6. Project Communications Management

6.1 Description

Page 42: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

The purpose of the Communications Management Plan is to define the communication

requirements for the project and how information will be distributed. The Communications

Management Plan defines the following:

• What information will be communicated—to include the level of detail and format.

• How the information will be communicated—in meetings, email, telephone, web portal,

etc.

• When information will be distributed—the frequency of project communications both

formal and informal.

• Who is responsible for communicating project information.

• Communication requirements for all project stakeholders.

• What resources the project allocates for communication.

• How any sensitive or confidential information is communicated and who must authorize

this.

• How changes in communication or the communication process are managed.

• The flow of project communications.

• Any constraints, internal or external, which affect project communications.

• Any standard templates, formats, or documents the project must use for communicating.

• An escalation process for resolving any communication-based conflicts or issues.

Communication with stakeholders of this project is a substantial part of communication

management plan. Stakeholders group would include everyone interested in attending

Washington Colonial Open House event.

6.2 Communications Matrix

Audience

(Who)

Message

(What)

Objective

(Why)

Delivery

Method

(How)

Delivery

Frequency

(When)

Person (s)

Responsible

Project Event

Teams

Detailed

Project Status

To stay input about the

flow of the project

email weekly Team leads

Project Event

Teams

Collaboration To inform all the members

of the project team about

the progress of the project

Meeting every other

week

Project

Manager

W.C. Open

House

stakeholders

Approval To identify the stakeholder

and add new stakeholders

in the stakeholder register

email as required Project

Manager

7. Project Quality Management

Page 43: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Project Quality Management includes all processes and activities needed to determine and

achieve the project quality. Washington Colonial Open House focuses quality management

mainly on three key points:

• Customer Satisfaction

• Prevention over Inspection

• Continuous Improvement

Customer satisfaction is a key measure of a project's quality. If the customer doesn't feel the

service given by the open house project meets their needs or if the way the project was run didn't

meet their expectations, then the customer is very likely to consider the project quality as poor.

Here is project team needed to improve their services and offer better customer service as soon

as possible.

8. Project Organization

8.1 Organization Chart

8.2 Project Roles & Responsibilities

Role Responsibility

Social Media Posts Event Social Media Team

Take Photos Event Social Media Team

Emails Event Marketing Team

Floor Plans Event Marketing Team

Page 44: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Survey (Creating and Sending) Event Marketing Team

Flyers Event Design Team

Lawn Signs Event Design Team

Getting and Setting Up Decorations Event Set-Up Team

Getting Food and Drinks Event Set-Up Team

Getting and Setting Up Games Event Set-Up Team

Clean Up Event Set-Up Team

Show House Event Realtors Team

9. RACI Chart

Page 45: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

1. Work Breakdown Structure

1.1. Event team members will be selected from the branches of the Company

1.1.1. Event Social Media Team

1.1.2. Event Marketing Team

Page 46: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

1.1.3. Event Design Team (sub-team that is pulled from Event Marketing and Event

Social Media Team).

1.1.4. Event Set-up Team

1.1.5. Event Realtor Team

1.2. Gain passwords to the Company’s social media accounts.

1.3. The Company's social media channels will be used to promote the project and event.

Will be done by the Event Social Media Team.

1.4. Event Social Media Team will grab 10 compelling photos and visuals of the house.

1.5. Event Design Team will obtain the digital floor plans from the Project Manager who is

the Lead Realtor for this project.

1.6. Event Marketing Team will obtain the Company’s email list to share information

provided by the Project Manager.

1.7. Event Marketing will handle:

1.7.1. Sending emails about the event.

1.7.2. Sending the reminders via email.

1.7.3. Creating the Post-Event Survey and sending it.

1.7.4. Sending the “Thank you” email.

1.8. Event Realtor Team will be trained three weeks before the events to ensure quality

function.

1.9. Event Design Team is in charge of:

1.9.1. Designing the digital flyers.

1.9.2. Designing the printed flyers.

1.9.3. Designing the lawn signs.

1.10. A lawn sign will be placed a week before the event to highlight the open house for

marketing purposes.

1.11. Event Set-up Team will be handling:

1.11.1. Gathering decorations

1.11.2. Cleaning the house.

1.11.3. Obtaining the music and games.

1.11.4. Ordering the food and drinks.

1.11.5. Setting up the lawn signs.

1.11.6. Setting up the flyers.

1.11.7. Setting up the decorations, games, food, and music.

1.11.8. Cleaning up.

11. Critical Path 1. Teams will be selected by the Project Manager from the Company.

2. Event Social Media Team will gather photos.

3. Email distribution list is given to the Event Marketing Team.

4. Digital flyers created.

5. First outreach is sent (social media post as well as initial email sent).

6. Floor plan is obtained and released to the public.

7. Flyers and lawn signs created.

8. House is cleaned.

Page 47: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

9. Train realtors.

10. Order decorations, food, and drinks.

11. House is set up.

12. House is cleaned up.

12. Cost Plan 12.1 Project Cost by Phase

The employees used for this event are on salary wages. For the purpose of this project their

salaries will not be included in the project cost.

• Initiation Phase

o $0

• Planning Phase

o $240

• Execution Phase

o $195

• Monitoring and Controlling

o $0

• Closing

o $38

12.2 Project Cost by Resource

• Hors D'oeuvres $25

• Balloons $50

• Paper Flyers $90

• Lawn Signs $150

• Prosecco $120

• Garbage Bags $10

• Windex $7

• Swiffer $11

• Paper Towels $10

Problem Solving/critical Thinking

Honors Thesis: Abstract

This thesis presents the analysis conducted on the National Highway Traffic Safety

Administration (NHTSA) Fatal Accident Report System (FARS) data collected nationwide

between 2007 and 2015 to create a novel visualization tool to present trends in distracted driving

related accidents as changes in technology, laws, and social awareness came about. This thesis

specifically looked at distracted driving related to cell phone usage. The purpose of this research

is to determine if the data supports the thesis of the overall vehicle safety improvements and the

efforts to prevent fatal accidents caused by cell phone usage decreased the number of fatal

Page 48: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

accidents. As well as present the evidence in multiple useful and graphical forms. For the

technology analysis and campaign analysis, the p-values failed at the α=0.05 significance level,

concluding that there is no correlation between the percentage of cell phone cases and the

percentage of fatalities in the vehicle cases.

Honor 200 Tutorial “Book to Film” Stephen King vs. Alfred Hitchcock

The terrifying stories that Stephen King and Alfred Hitchcock portray have always

intrigued and thrilled me. I understood immediately that Stephen King’s novels were way more

terrifying and detailed than the movies. Reading about King’s women and comparing them to the

bold and idolized women of Hitchcock, similarities began to unfold. The physical acts of terror

that the men experienced in the films and novels were different from the true fears that stood out

of the women. Their women were plagued with internalized fears that stuck with me and haunted

me more than the physical threats that they endured. While Hitchcock's films insinuate that he is

interested by women's fear, King is the one who escalates internalized fears and makes it the

focus of his horror novels, though this focus on women does not translate to film adaptations of

King's books.

In Stephen King’s books his women have very noticeable features. In Misery, Annie

Wilkes’ physical appearance is related to that of a pig. In The Shining, Wendy Torrance is

gorgeous with long blonde hair. Beverly Marsh in It has beautiful red hair. All three women

stand out for the physical make up of their bodies. Also all three women are strong. Both Wendy

and Beverly survive beatings from the supernatural as well as the mental and physical abuse

from their husbands. When Paul Sheldon tries to kill Annie, she survives being hit with a

typewriter, being chocked with wads of burnt paper, hitting her head, and locked in a room. She

is later found dead in the barn with a chainsaw in her hands to finish off Paul.

Page 49: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

In Alfred Hitchcock’s films, his women are more nonchalant about the power and

strength they hold. All of his women characters are gorgeous, breath-taking women. They are all

educated and show an interest in the world. They are also independent and are not shy to take

risks in the situations they are put in.

In Birds, Melanie is the daughter of a successful newspaper in San Francisco. She has a

history with the law because of the pranks she pulls as well as a history with the tabloids for her

rendezvous abroad. She meets Mitch and immediately figures out who he is and where he lives

through calling her father’s newspaper (Figure 1). She then follows Mitch to his family house to

deliver a pair of love birds. She does this all in a weekend and does not stop once to think that it

is rash.

FIGURE 3 MELANIE'S RESPONSE TO MITCH

FIGURE 2 MARION HIDING MONEY FIGURE 1 LILA'S PLAN

Page 50: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

The females in Psycho do not follow the social norms of that time. Marion steals money

from her boss to help her boyfriend and hides away in the Bates Motel (Figure 2). She ends up

getting murdered by Norman/Norma at the motel. Her sister, Lila Crane, helps lead the

investigation in finding Marion with Sam Loomis. When Lila and Sam investigate the Motel,

Lila tells Sam to stay put and distract Norman while she goes and looks in the house (Figure 3).

Normally, the man would tell the woman to stay and distract the murder; not the other way

around.

In Rear Window and Vertigo, the female characters are wealthy and very independent

with their work. Besides Judy, both Midge and Lisa are successful in the fashion world. Midget

designs women’s wear and Lisa is a socialite who wears the best of the best. All three of these

women however, are very in charge of their own lives and are responsible for their own income.

All of the women internalize the fear that men will leave them is very strongly present in

Hitchcock’s films. His women desired to be loved in many ways and kept pushing themselves

and forcing themselves to be changed so that they would fit the standard they needed to. They

make huge accommodations and risks to placate the men in their lives. The women make rash

decisions in the name of love in these four films without second thought. Hitchcock’s women

move forward in a relationship out of fear not desire. They allow themselves to be changed,

become financially dependent on their men, and risk their lives for them.

Marion Crane in Psycho is the girlfriend to Sam Loomis, a divorcé, who she loves dearly.

Sam asks her to miss work to be with him which could make her financially dependent on him in

the future (Hitchcock, Psycho). However, when she asks him why they aren’t married he tells her

its because of his large amount of debt. Her strong desire to marry and fear that she might lose

Page 51: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

him motives her to steal $40,000 from her boss to help pay off the debts. Her fear of being alone

without Sam is stronger enough to cause her to disregard her morals and commit the crime.

In Hitchcock’s Rear Window, Lisa Fremont disregards her own safety to placate her man,

Jeff Jefferies. Jeff confesses that he does not want to marry Lisa because “she’s too perfect.

She’s too talented. She’s too beautiful. She’s too sophisticated.” (Hitchcock, Rear Window). He

wants her to be adventurous like him. All the characteristics he listed that she was too much of

are components that most women aim to align with. Women want to be perfect, beautiful,

talented and sophisticated; making them successful. He tells Lisa, who wants to marry him, that

she won’t fit in his world and it’d be wrong (Figure 4). Lisa refuses to let him push her away

because of how she is so she decides that she will prove herself to him.

FIGURE 5 LISA'S PLACE

FIGURE 4 LISA WITH THE RING

Page 52: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Throughout the movie Lisa has to fight for attention form Jeff. He won’t pay attention to

anything about her or her needs unless it is degrading the idea of marriage. Lisa has to ask Jeff to

pay attention to her even at points where she is sitting on his lap kissing him (Hitchcock, Rear

Window). To make Jeff notice her more, she becomes deeply involved in the investigation of

murder of Mr. Lars’ wife. She goes to the extreme by breaking into the killer’s apartment to look

for the wife’s jewelry while Jeff watches from his window (Figure 5). He realizes from this

situation that Lisa puts herself in that she is adventurous and maybe is worthy enough to marry.

In Hitchcock’s film Vertigo, Judy Barton and Midge Wood do things to try to get Scottie

Ferguson to love them. Scottie toys with Midge’s emotions through asking about her love life,

which she responds with “there’s only one man in the world for me” and his response is depicted

in Figure 6 (Hitchcock, Vertigo). His response doesn’t acknowledge her current feelings rather

just dismisses them. Early on he tells her to “stop being so motherly” yet Midge still visits him

when he is ill in the mental ward (Hitchcock, Vertigo). She cannot bare to be away from him,

even if he does not return the love she gives him. She is held captive by herself in the internal

struggle for Scottie to love her. She bargains with him and even takes out her pain and frustration

out on herself (Figure 7). Figure 7 shows Midge pulling on her hair and crying while insulting

FIGURE 6 SCOTTIE'S RESPONSE TO MIDGE FIGURE 7 MIDGE'S SORROW AND ANGER

Page 53: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

herself. The pain and sacrifice she made for the man in her life upset him, so she punishes herself

for displeasing the man.

The movie focused on how much the men in the movie dominated and controlled the

women in the movie. Scottie fell in love with Madeleine Elster, who was actually Judy Barton

pretending to be her. Once Madeleine “killed herself”, Scottie found the real Judy and wanted

her to become just like Madeleine. Judy succumbed to Scottie’s demand for her change in

identity through Scottie’s persistent demand of “it can’t make that much difference to you” or “it

can’t matter to you” (Hitchcock, Vertigo). Scottie forced Judy to change her make-up, hair color

and style, and wardrobe to match Madeleine’s. She did all of this just because it would make him

love her and he had broken her down to the point that she does not care about herself (Figure 8

and 9).

FIGURE 9 JUDY QUESTIONING SCOTTIE

FIGURE 8 JUDY GIVING IN

Page 54: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

The whole reason why Judy Barton pretended to be Madeleine was because Gavin Elster

killed his wife then paid Judy to act as Madeleine to cover up her murder. When Scottie angrily

yelled at Judy that she was the “copy”, the “counterfeit”, and he states that “[Gavin] made [her]

over just like I made you over…” (Hitchcock, Vertigo). He goes on to say that nothing about

Judy is real. Even though when Scottie met the Judy for the first time as Judy, she was herself

and he made her change that. In Figure 10, Scottie continues to belittle Judy because she could

not even keep a man who killed his wife. Judy tried everything to get Scottie to love her. She

even told him that she “walked into danger and let you change me because I loved you”

(Hitchcock, Vertigo). Hitchcock kills off Judy to solidify her fate that her love would be

unrequited and all her efforts would be eternally lost.

Like Hitchcock, King’s women live with the internalized fear that their men will leave

them. However, King gives his women darker everyday fears that women can relate to in their

daily lives. He has them suffer from isolation, submission, and physical pain. Besides that

difference between the two, in Hitchcock’s films women are not seen being abused by men; let

alone their own men. This is another dark side, gruesome side of King’s novels. His women are

entangled in many fears and are abused.

FIGURE 10 SCOTTIE'S "PITY" FOR JUDY

Page 55: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

In King’s book Misery, he places his male character, Paul Shelton, in the dangerous

clutches of Annie Wilkes. She continually beats him and demands him to write for her. Paul’s

fears are understood because of the situation he is placed in. Annie’s internalized fears and

struggles are worse than his. Her fears stem from a long time of suffering from mental illness,

isolation, obsession, and abuse.

She suffers from a range of mental illnesses like depression, binge eating, moodswings,

and paranoia. All horrible things to have to live with and suffer from. Paul distinguishes that

Annie is psychotic. During Annie’s “storms” as Paul refers to her moodswings, she eats a lot and

at one point even threatened suicide. At the worst point Paul related Annie’s mentality to

“the psychotic despair of the woman who dresses her children in their

best…walks them down to the nearest bridge, lifts one into the crook of each arm,

and jumps over the side.” (King, Misery, 173).

King also made Annie suffer from never getting help with these illnesses and having it get

worse. Annie was a nurse for a number of years as well as married to a physical therapist. The

marriage ended in a divorce “after a short illness” (King, Misery, 194). She was never offered the

medical attention or medical diagnoses she needed so that she could be helped. When Paul

suffered through a few of her storms he recognizes that Annie must know that her condition is

worsening (King, Misery, 156).

King also placed her in an isolated location. She lives alone in a house in the snowy

mountains of Colorado with just her pig and other animals on her farm. When she gets upset with

Paul, she retreats to another isolated location she went to think, pray, and scream (King, Misery,

175). This location is even more isolated than her house. Annie’s isolation leads her to find hope

and purpose through Paul’s Misery novels. Annie begins to obsess over his books. She named

Page 56: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

her pig after Misery and forced Paul to produce the new copy she demanded. Paul jokes that

Annie’s odor (which smells like garbage) is the “parfum de Wilkes; a psychic odor of obsession”

(King, Misery, 179). The only way that she was able to keep Paul at her house and incite him to

write the book was to hurt him.

King created a different abusive relationship in Misery. Instead of the male abusing the

female, Annie abused herself. She often scratched and clawed parts of her face and arms off

leaving bloody wounds on her body (King, Misery, 168). During these moments, she would not

take care of herself either causing her body to smell of food and blood. King then placed Annie

as the abuser to Paul. She hobbled him, broke his knees, removed his thumb, and started him on

an addiction to Norvil. She did all of this as punishments and so that he would “know exactly

what the stakes are, and exactly what [he’d] have to do to stay alive” (King, Misery, 278). She

did all of this so that she would have the character Misery alive that kept herself alive.

In his book It, Beverly Marsh suffered from an abusive relationship. She was controlled

and beaten by her drunken, power-hungry husband Tom Rogan. Beverly could not escape or flee

from him because she always broke down and obeyed. No matter how much the physical pain

was, the humiliation was hurt worse for her (King, It, 144). She would listen to his demands

because she knew if she messed up she’d be hit with the belt. When they first met Tom knew that

she was the one he wanted to have and control. Tom believes that “some women want to be

brought down”, like Beverly (King, It, 126). He brings her down through physical violence,

belittling her, sexualizing her, and viewing her as his property. Tom constantly drinks and

controls her own company.

When Beverly tried to leave for Derry, Maine she had to fight Tom, who refused to let

her leave. She realizes this is her chance to leave his tyranny, just like she left her father (King,

Page 57: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

It, 142). In order to leave though, she had to beat Tom to the point where he collapsed because of

his wounds. She suffered through that relationship because she feared him and “her contempt of

herself for choosing him for dim reasons buried in the times that should be over” (King, It, 142).

Beverly realized that she married Tom because he was like her father. Her father was a

controlling man and often “corrected” Beverly as well. Al Marsh believed that it was his God-

given job to correct her often and because she loved him, she obeyed him (King, It, 479).

Besides the struggles of abuse that Beverly lives with, she also suffers from other

internalized fears. Beverly grew up getting bullied from an older classmate named Henry and his

group of friends. As Beverly and her close group of friends face Henry’s gang and the creature

“It” throughout the summer of 1958, she was faced with a lot of obstacles. She faces the fear of

having to be strong enough, both mentally and physically, to fight off “It”. She also had to be

courageous to go down into the Barrens and the sewer to find and kill “It”. Women often have

the debate within themselves of if they are as strong and as courageous as they can be.

Beverly is also the only girl out of the group of seven. All of the boys develop crushes on

her throughout that summer. When they all first went down in the tunnels to kill it, they realized

that their group is fading apart. Beverly comes up with a plan that “will bring [them] together

forever” (King, It, 1,303). In the tunnels, on that night, Beverly sleeps every member of the

Losers’ Club. Beverly remembered all of this when they returned to the tunnels in the summer of

1985. She remembered how powerful as well as loved and desired it made her feel as well as an

act of defiance against her father (King, It, 1,310). This was Beverly’s first sexual experience,

and hit happened in a terrifying place with her six best friends.

King finally had a woman verbally express a feeling that many women feel at one point

in their life. Wendy Torrance confessed that “she had never dreamed there could be so much

Page 58: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

pain in a life when there was nothing physically wrong. She hurt all the time.” (King, The

Shining, 48). Besides the pain, Wendy’s internalized fears in The Shining revolve around the

internal struggle of marital fears, exclusion, and inadequacy. Wendy realized that “she had stuck

with the messy job of her marriage for as long as she could” (King, The Shining, 49). Wendy

could no longer handle Jack’s drunken nights and his temper. Wendy loved her son, Danny, and

she wanted the best for him. She needed to protect her son from Jack; even if Danny favored his

father more (King, The Shining, 52). Danny’s strong connection and favoritism towards Jack

makes Wendy feel excluded. She relates Danny’s love for his father to her own (King, The

Shining, 51).

Though Danny still loved his mother, he chose Jack instead of her to be his favorite. This

fed into Wendy’s existing fear of inadequacy. Wendy constantly feared that she was inadequate

person. Before she married Jack she feared that at one point during a break they had he found a

better woman (King, The Shining, 44). She feared that she was not good enough for Jack.

Though Jack did return and asked her to marry her, she still feared that he would leave her for

another woman. Throughout the marriage, every time that Jack went out she feared it was

because of her. The problem was Jack “had gone out for reasons that had nothing to do with her”

(King, The Shining, 47). Wendy feared no matter what that Jack would leave her because she

convinced herself that she was an inadequate woman.

King creates a fear that Wendy does not speak about but the reader witnesses it. In the

novel Wendy experiences multiple moments of being overlooked. Women care a lot about how

they are perceived. They want to be noticed for their strengths and their beauty. Wendy is a

gorgeous woman and because she is so beautiful she is treated differently. King writes how

Ullman did not shake hands with her and was cold towards her because “perhaps [he noticed] the

Page 59: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

way heads turned when she came through into the lobby…” (King, The Shining, 63). Her

personality and kindness was overlooked because she was too beautiful and that rubbed Ullman

the wrong way.

The entity within the Overlook Hotel, also overlooked Wendy. They saw her as a weak,

worrisome woman. The hotel admitted it made this mistake when she knocked Jack out and

locked him in the pantry. Grady stated how “she appears to be stronger…more resourceful…”

(King, The Shining, 384). After Jack got out of the pantry, he beat Wendy with a roque mallet;

breaking several bones. She also was strong enough to withstand the near-death beating and

immediately went to go try and find Danny. She lived to help save Danny and Dick Hallorann as

well as escape the Overlook before it blew up.

King placed Wendy in a mentally abusive relationship. King had her constantly feel in

pain because of her and Jack’s relationship (King, The Shining, 48). Jack is a recovering

alcoholic and suffers from anger issues. He never physically hurt her, except at the Overlook

when he was not Jack. He constantly hurt her mentally though. He would drink uncontrollably,

making Wendy worry about his safety. He would say things that deliberately hurt Wendy while

he was drunk, like equating her to her mother (King, The Shining, 47). Jack also broke Danny’s

arm finally forcing Wendy to think about getting a divorce. Wendy suffered through this

marriage until the Overlook took over Jack and forced him to attempt to kill her and he perished.

Page 60: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

King’s women internalized fears, like in Wendy’s case, stem from trying to please their

powerful mothers. The quintessential film that focused on the fear of the powerful mother was

Hitchcock’s Psycho. In this film, Norman Bates, owner of the Bates Motel, suffers from the

personality of his deceased mother who was “clinging, demanding” (Hitchcock, Psycho).

Norman was very close to his mother, Norma Bates because after his father died they both only

had each other. Norman believes that “a boy’s best friend is his mother” and “a son is a poor

substitute for a lover” (Hitchcock, Psycho). He still wants to be his mother’s number one though.

In Figure 11, the psychiatrist relates to the others why Norman killed his mother and her

lover. He could not handle what he did so he preserved his mother’s corpse and still took care of

her body as if she was still alive. Through doing this Norman adapted her identity and believed

that she was still thinking, talking, and acting through him. At the end of the movie, Norma’s

personality fully takes over Norman and she becomes him. The jealousy and the fear of losing

his mother caused Norman to go to the extremes of killing her, her lover, and other women.

FIGURE 11 THE JEALOUSY OF NORMAN

Page 61: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

In Hitchcock’s other film The Birds, shows the strong bond between mother and son.

This bond however, is based out of fear of losing the son. Melanie Daniels threatens this bond

between Mitch Brenner and and his widowed mother Lydia. The viewer can see the hostility and

jealousy that Lydia has towards Melanie throughout their various encounters. In Figure 12, Lydia

is interrogating Mitch about Melanie by bringing up Melanie’s scandalous past. Through

bringing up the incident of Melanie’s, she’s making sure that Mitch knows what kind of woman

Melanie could be.

Mitch’s ex-lover, Annie, admits to Melanie to be cautious of Lydia because she does not

take well to women who are interested in Mitch. The relationship between Mitch and his mother

again resembles Oedipus complex and mentioned it through Annie’s conversation with Melanie

(Hitchcock, Birds). Though in the conversation she denies that it is like Oedipus, it still causes

the viewer to make connections in their relationship. Mitch often refers to his mother as

“darling” and “dear” while Lydia seems to look at him as a husband rather than a son

(Hitchcock, Birds).

Hitchcock, however reinstates that it is not like Oedipus through the scene where Lydia

confesses to Melanie her fears. Lydia confesses that she only is cautious about Mitch because she

is so afraid of losing him (Hitchcock, Birds). In Figure 13, she states how she was hurt because

FIGURE 12 LYDIA QUESTIONING MITCH

Page 62: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

of her husband dying and how it affected her. Hitchcock takes a mother who is looked like the

clinging mother identity in Psycho to a very vulnerable feminine state. This transformation of a

mother figure from the fear-instating woman to one of the is not seen in King’s works. The

physical resemblance and fear of losing Mitch bonds Lydia and Melanie during the movie.

King’s book It matches Hitchcock’s Psycho because of the man struggling with the

strong overprotective presence of his deceased mother. It develops the maternal theme in a

different way. Much like how Beverly, Eddie Kaspbrak was in a cycle. He had a very

overprotective mother who was constantly afraid that Eddie would hurt himself or get hurt. She

refused to let Eddie participate in his physical education class in elementary school because he

was “too delicate” (King, It, 107). Eddie fell under the spell his mother placed on him. He

believed he was fragile but he knew that she was holding him back. Eddie “left his mother three

times and returned home to her three times” (King, It, 109). He tried to leave her, yet her

impression on him was too great. He fell into the cycle that Beverly by marrying a woman who

perfectly resembled his mother. Eddie admitted that the reason he married Myra was because “in

the end the old ways and the old habits had simply been too strong” (King, It, 108). His strong

underlying need for a maternal presence led him to marry her and continue the cycle.

FIGURE 13 LYDIA’S CONFESSION

Page 63: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

King’s work of maternal relationships and instincts in Misery is shown through Annie’s

philosophy and manners with Paul as well as her desire to save the suffering. Annie’s

explanation to Paul for having him burn Fast Cars, was

“the mother feels badly when her child says she’s mean or if he cries for what’s

been taken away, as you are crying now. But she knows she’s right, and so she

does her duty. As I am doing mine.” (King, Misery, 43).

Annie sees herself as a mother figure to Paul as she “nurses” him to heal. Annie used to be the

R.N. in London’s Bedlam Hospital in charge of the senior citizens (King, Misery, 191). The

sickest suddenly began dying off under her care. It is believed she did this to save them. After

leaving that job, she becomes the nurse of maternity ward. She killed the sick and weak infants

there just like the senior citizens.

Annie Wilkes had a very strong connection with her mother. She constantly quoted her

mothers sayings and has her picture on her mantle. It is unclear unsure if her love for her mother

persuaded her to kill her father or not. The amount Annie talks about her mother also drives Paul

crazy. He taunts her mother saying how Annie would have a collection of “pictures of her dear

old sainted mother” throughout her house (King, Misery, 84). Paul detests how much Annie

idolizes her mother. This is different from other King stories like The Shining, where Wendy is

scarred and belittled by her mother.

In The Shining, King really placed an emphasis on the effects from the relationship

between Wendy and her mother. Wendy had a horrible relationship with her mother. She

constantly lives in fear that she could possibly turn into her mother. She admits to Jack that

sometimes she is like her mother (King, The Shining, 261). Throughout the book Wendy

Page 64: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

continues to have revelations on how she is like her mother in some ways, but she refuses still to

be like her.

Wendy’s mother constantly blamed Wendy for the divorce of Wendy’s parents, calling

her a home-wrecker (King, The Shining, 49). When Danny was born, Wendy was constantly

belittled by her mother and was told that she was an inadequate mother. Her mother did this as a

“way of keeping the thumbscrews handy” (King, The Shining, 45). Her mother’s insistence that

Wendy is inadequate causes Wendy to second guess her relationship with Jack as well.

Her mother’s treatment of her caused Wendy to worry about a lot of things such as her

marriage and herself. With Jack frequently going out and her mother telling her that she’s not

being a good mother, Wendy questions if she a good wife (King, The Shining, 47). Wendy’s

mother caused to believe that she is at fault for not only her mother’s failed marriage, but hers as

well. Whenever something goes wrong in the marriage or with Danny, she immediately thinks of

what her mother would say. Her dreams are always filled with her mother’s face and the pain

continued to set in because of her mother (King, The Shining, 48). Wendy’s internalized fears

came from the pain her mother caused her.

The fear and horror surrounding women’s internalized fears is what makes King’s novels

so terrifying. The film renditions of King’s novels do not focus the women’s fears. The films

FIGURE 14 WENDY'S TERROR OF THE AXE

Page 65: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

focus on the fear that is installed by actions. Much like Hitchcock’s films, there is such a strong

pull for the male in the story. In the film, The Shining, Wendy is not the attractive, maternal

woman she is in novel. The film removed the presence of Wendy’s mother and replaced it with

the fear of Jack and his slipping mentality. It seems that her character is just there to whine and

scream in response to the terrifying actions taken upon her (Figure 14). Hollywood removed the

fear that women could relate to and just focused on the action/reaction form to recreate fear and

horror for their viewers.

Works Cited

Hitchcock, Alfred, dir. The Birds. Universal Pictures, 1963. Film.

Hitchcock, Alfred, dir. Psycho. Paramount Pictures, 1960. Film.

Hitchcock, Alfred, dir. Rear Window. Paramount Pictures, 1954. Film.

Hitchcock, Alfred, dir. Vertigo. Paramount Pictures, 1958. Film.

King, Stephen. It. New York: First Signet Printing, 1981. Print.

King, Stephen. Misery. New York: Viking, 1987. Print.

King, Stephen. The Shining. New York: Doubleday, 1977. Print.

Kubrick, Stanley, dir. The Shining. Warner Bros., 1980. Film.

Page 66: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Extra-Curricular Activities

Global Experiences

Belize Biology Study Abroad In the summer of 2016, I studied and tagged sea turtles in Belize for my Natural Science credits.

I spent my time learning about the nature in Belize as well as the culture.

Leadership Activities

Dance Team I have been a member of the Marymount Dance Team for all four years of my academic career

and served as co-captain for two of those four. As co-captain, I assisted in running practices,

attending Co-Curricular Council meetings, managing the budget, and assisting in try-outs.

Page 67: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Vincent Stovall

[email protected]

St. Ambrose School of Business Honors Society I served for two years on the Leadership Board as Membership Chair. I was in charge of

recruiting new members, tracking attendance, and giving the seniors their cords at the time of

their graduation.

Dr. Catherine England

[email protected]

Honors Program Once I reached the end of my junior year, I decided that I wanted to give back to the Honors

Program. I decided to run for Student Representative office position to donate my time and

advice to the Honors Student Committee.

Dr. Stacy Lopresti-Goodman

[email protected]

Page 68: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

Awards and Honors

Awards

YPG Golden Ticket

Awarded in Spring 2017 by the USGIF YPG. It is a full paid scholarship to attend the USGIF

GEOINT conference. It is awarded to 25 individuals that are either under the age of 35 or have

less than 5 years in the GEOINT community.

DISCOVER Summer Research Grant

Awarded in Spring 2017 by Marymount University to be able to conduct research surround my

Honors Thesis.

Honors

Honors awarded from Marymount University:

Kappa Mu Epsilon Mathematics Department 2017-2018

To become a member, you must (a) be a regularly enrolled student at Marymount

University, (b) have completed at least three semesters and rank in the upper 35% of your

class, and (c) have completed at least three math courses and attained an average of B or

better in all math courses.

Upsilon Pi Epsilon Information Technology Department 2017-2018

To be eligible for election to membership, undergraduate students must rank in the upper

35% of the class and shall have attained a general scholarship rating, in all college work

thus far completed, of not less than 3.0/4.0 grade-points provided (1.) that candidates in

any particular academic level who satisfy the requirements of Article VIII, Section 2, (2.)

that the candidate shall have completed at least 45 (Forty Five) semester hours of college

work including fifteen (15) semester hours or twenty-three (23) quarter hours in the basic

courses in the Computing and Information Disciplines to be eligible under this Section.

The Chapter shall have the right to set any limit above this minimum attainment as a

basis for eligibility.

Phi Eta Sigma 2016-2018

To be a member, you must obtain a 3.5 GPA or higher during their first semester at

Marymount.

Presidential Scholarship 2014-2018

To obtain this scholarship, one must maintain a 3.5 cumulative GPA.

Dean’s List 2014-2018

Page 69: Senior Portfolio...Animal-ID, alone, cannot be the PK because it does not functionally determine all of the attributes. The definition of 1NF states that they cannot be multi-valued

The Dean's List is comprised of undergraduate students who carry a full academic load

(12 or more credits) for a given semester, are in good academic standing, and obtain a

grade point average of at least 3.4.

St. Ambrose Honor Society School of Business 2015-2018

Students belonging to this society must maintain a 3.0 cumulative GPA and must hold

high standards in the School of Business.

Honors Program 2014-2018

Honors students must maintain a 3.5 overall GPA as well as complete at least 24 Honors

credit with a minimum of a B. The full list of requirements can be found at

https://www.marymount.edu/Academics/Programs-of-Study/Honors-Program/Program-

Requirements

Career Path

Next 5 years:

In the next five years I plan to apply for graduate school at George Washington University for

their new Data Analytic program. While I am applying for graduate school, I plan on continuing

to work either with DigitalGlobe if they offer me a permanent position or pursue other job

opportunities.

I am currently interested in still working in the government contracting are, however I am

interested in applying for a government position. I have been connected by recruiters through

LinkedIn, so I plan on finding a job through using that process as well as through my

connections at HumanGeo.

Next 10 years:

I plan to have my Master’s degree as well as be working in the government sector. My goal is

eventually to work for the CIA, FBI, or other DOD or DOJ agency. I plan on finding these jobs

through the connections I made through HumanGeo as well as finding them off of their personal

websites.

Links to Applicable Sources

https://commons.marymount.edu/it423warndorf/home

https://github.com/madelinew