Information -3

 

Write a paragraph description for each of the following terms. Use APA formatting. (For APA coaching, refer to the Announcements tab on the course Canvas shell.)

  1. Computer
  2. Operating system
  3. System software
  4. Applications software
  5. Mobile computing
  6. E-Commerce
  7. Database
  8. Malware
  9. System security
  10. Data security

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Information -4

 

Describe the importance of security in protecting data on computer systems. Outline security concepts, including physical security, access controls of authentication and permissions, the role of encryption, and company policies and procedures. Describe the threats posed on the inside by employees of a company. 

Submit your paper in APA format with in-text citations and reference

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Analysis of the Breach Notification Law Letter

  

Describe the purpose of a breach notification letter and appropriate content.

  

Search online for an example of an official breach notification letter. Analyze the notification letter. Write a summary of your findings. The summary must include:

  • The specific laws      alleged to have been violated in the breach notification letter
  • The      roles/responsibilities each department possesses in relation to the breach      based on your state-specific data breach policy

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial 10-point size,      Double-space
  • Citation Style: Follow your school’s preferred style guide
  • Length: Minimum 500 words

Evaluation Criteria and Rubric

  1. Prepare a list      enumerating which department should perform what function in the given      scenario

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

40/p1

(Security and Risk Management, Asset Security, Security Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, Software Development Security).   From the best practices area selected that is of interest of you as the basis of this Project (Change Management Program), write a two-five page paper that includes the following:

  1. Domain where the need for change (your research problem) exists.
  2. Information Assurance best practice being evaluated or selected and the justification for the selection.  You can make a problem statement and justification.
  3. Summary paragraph of why you think it is important to study the change process as it relates to your selected Information Assurance best practice.  Be sure to address how the change process impacts your research problem.
  4. Annotated bibliographic references of three of the previous articles used in your analysis.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

10 questions-Customer Service Information Systems

Answer the 10 questions and save in Word document. 

-All of the following are examples of environmental actors in an information system except:

-What is the relationship between ITIL and IT service request?

-How are service desks and help desks the same? How are they different?

-List and describe the components of a successful service desk

-List two reasons that customer support is projected to increase as an occupation through the year 2020?

-How are technically savvy customers changing the way that service desks interact with customers?

-What is a customer service value chain?

-What is customer satisfaction?

-What is a Service Level Agreement?

-Technical support services are the same as customer support services. True or False? Explain your answer

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

dis10

 

  1. What is K-means from a basic standpoint?
  2. What are the various types of clusters and why is the distinction important?
  3. What are the strengths and weaknesses of K-means?
  4. What is a cluster evaluation?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assin10

 

  1. What is the definition of data mining that the author mentions?  How is this different from our current understanding of data mining?
  2. What is the premise of the use case and findings?
  3. What type of tools are used in the data mining aspect of the use case and how are they used?
  4. Were the tools used appropriate for the use case?  Why or why not?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

This week we focus on the various generations. Please note the various generations starting with the 1950s and note the major contributions and concerns from each generation. Do you agree with these generalizations?

Discussion: This week we focus on the various generations.  Please note the various generations starting with the 1950s and note the major contributions and concerns from each generation.  Do you agree with these generalizations?

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project Communications Management

Project Communications Management

Several issues have arisen on the Recreation and Wellness Intranet Project. The person from the HR department who was supporting the project left the company, and now the team needs more support from that group. A member of the user group that supports the project is extremely vocal and hard to work with, and other users can hardly get a word in at meetings. The project manager, Tony, is getting weekly status reports from all of his team members, but many of them do not address obvious challenges that people are facing. The team is having difficulty deciding how to communicate various project reports and documents and where to store all of the information being generated. Recall that the team members include you, a programmer/analyst and aspiring project manager; Patrick, a network specialist; Nancy, a business analyst; and Bonnie, another programmer/analyst.

1.    Summarize three different communications media that could be used for getting more support from the HR department and which you think would be most effective.

2.    Prepare a partial communications management plan to address some of the challenges mentioned in the previous paragraph.

3.    Prepare a sample of a good weekly progress report that could be used for this project. Include a list of tips to help team members provide information on these reports.

4.    Write a one-page paper describing two suggested approaches for communicating with the hard-to-work-with user.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database,ER diagram, SQL

 

ER Model and Normalization

Q1: Garage Database [40 points]

We want to design a database for a local garage. For each customer, we want to record the (unique) name, the customer address, and the contact phone number. For each vehicle, we want to record the unique vehicle’s identification number (VIN), and the vehicle’s make, model and year. For each repair job we want to record the description of the job done (maximum 200 chars), the date, and the total dollar cost. A repair job may involve zero or more parts (like, e.g., “windshield wipers”, “battery”, etc.) For each part we want to record its (unique) part number, the part name and its cost. In addition, note that:

• Each vehicle may have 1 or more repair jobs.

• Each customer may be the primary owner of 1 or more vehicles.

• Every vehicle has only one primary owner (we ignore co-owners).

• No vehicle can have more than one repair job in any given day.

Please answer the following questions:

Q1.1. (10 points) Draw an ER diagram for this database. Make sure to indicate primary keys, cardinality constraints, weak entities (if any), and participation constraints. List any assumptions you make in the process.

Q1.2. (10 points) Translate the ER diagram in Q1.1 into relational database tables (i.e. give the SQL DDL statements). Make sure that the translation captures key constraints (primary keys and foreign keys if applicable) and participation constraints in the ER diagram. Identify constraints, if any, that you are not able to capture.

Q1.3. (20 points) Identify the functional dependencies that you expect should hold for the Garage Database domain. Use the dependencies to find keys and BCNF normal forms.

 

Q2: Restaurant Database [ 40 points]

The student administrator of the Mini University wants to design a database for profiling students’ preferences for the nearby restaurants and the dishes. For example, the student Jack Smith likes the “rib eye steak” at the “TGI Fridays”, not the “rib eye steak” at the “Olive Garden”, while the student Nancy Graham likes the Italian spaghetti at “Zeppoli’s”.

• Each student has his/her SSN, the name, and the department.

• Each restaurant has its name, and the mailing address.

• The name of a restaurant may not be unique, but the mailing address is unique.

• Each dish has the name and the price.

• The price of a dish might differ on different restaurants. For example, “rib eye steak” is $15 at “TGI Fridays”, but $20 at the “Olive Garden”.

• The name of a dish is unique within a restaurant. Two restaurants may have the same dish name.

• A dish is offered by at least one restaurant, and a restaurant offers at least a dish.

Please answer the following questions:

Q2.1. (10 points) Draw an ER diagram for this database. Make sure to indicate primary keys, cardinality constraints, weak entities (if any), and participation constraints. List any assumptions you make in the process.

Q2.2. (10 points) Translate the ER diagram in Q2.1 into relational database tables (i.e. give the SQL DDL statements). Make sure that the translation captures key constraints (primary keys and foreign keys if applicable) and participation constraints in the ER diagram. Identify constraints, if any, that you are not able to capture.

Q2.3. (20 points) Identify the functional dependencies that you expect should hold for the Restaurant Database domain. Use the dependencies to find keys and BCNF normal forms.

 

Q3: Reverse Engineering [20 points]

This question tests how well you understand the algorithm for converting E/R diagrams to relational schemas. An E/R diagram when converted to relations (using the mechanical construction that we know and love) gives rise to the following relations:

  • R(a, b, c)
  • S(a, d)
  • T(a, d, f, g)

You may assume that the same symbols refer to the same attribute and different symbols refer to different attributes (e.g., the attributes a in the relations R, S and T are the same) i.e. it ultimately comes from a single entity set or relationship in the E/R diagram.

Your task is to reverse-engineer the E/R diagram from these relations; in other words, what E/R diagram could have produced these relations. For full credit, give two different E/R diagrams that could have produced these (and only these) relations (i.e. 10 points for each correct E/R diagram).

 Submission Guidelines and Requirements

  • Include your name and UCM ID in the assignment
  1. Add the following statement in your solution “I certify that the codes/answers/outputs of this assignment are entirely my own work.”

// Your Name

// Your UCM ID

//Certificate of Authenticity: “I certify that the assignment is entirely my own work.”

  1. Add comments to your submission as much as possible
  2. Submit your ER diagrams, relation schemas, functional dependencies and normalized forms
  3. Zip your files and upload the zipped file onto Blackboard
  4. There could be more than one correct answer. We shall accept them all
  5. Whenever you are making an assumption, please state it clearly
  6. Grading standards:
  • There will be automatic 10 points penalty if your submission is missing certificate of authenticity
  • Late submission: Late submission is allowed with a 10% deduction per day (delay in submission). Submission after 3 days of the deadline won’t be accepted

CHANGES TO BE MADE!!!!!

 1.1 No primary keys, cardinality constraints, weak entities (if any), and participation constraints are given in your ER diagram
1.2 DDL statements means “Create table” statements with primary keys and foreign keys
1.3 Functional dependencies means for example: Customer.Name —> Customer.Address, Customer.PhoneNumber. All dependencies like this and also BCNF normal form.

2.1 No primary keys, cardinality constraints, weak entities (if any), and participation constraints are given in your ER diagram
2.2 DDL statements means “Create table” statements with primary keys and foreign keys
2.3 Functional dependencies means for example: Student.SSN —> Student.Name, Student.Department. All dependencies like this and also BCNF normal form.

3. Please mention participation constraints by double lines()strong and weak participation), keys etc. in the ER diagram 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now