Database management

I will send the picture of the ER diagram for reference, to come up with the queries.!

Use MySQL Server and MySQL Workbench to write/run the SQL queries below. For
each query, provide the following in Report 2:  

 In about 2 lines, explain what the query returns. 

Queries: 

 1 trivial query. Simple select with ordering.
 2 medium difficulty queries. Queries that use composite condition for selection,
computations, aggregate function and grouping.  
 1 query that uses subquery.
 2 queries that uses join (1 inner join, 1 left or right outer join).
 1 view (query must use join – hint: you can use one of the queries from the
previous question).
 1 query that uses union.
 1 custom stored function.
 1 custom stored procedure. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Security Awareness Training

 

Scenario

You have been in your role as the CIO for Premier University for almost one year. In that time, you have managed to hire a chief information security officer (CISO) to oversee Premier University’s information security program. The CISO is working to address the university’s GLBA data safeguarding requirements that you previously provided to the Premier University president.The CISO notes that guidance from the Department of Education Office of Federal Student Aid in 2016 recommends that higher education institutions use NIST SP 800-171 to protect the confidentiality of the student financial aid data that the institution uses and stores.You recently notified the university’s president that information security awareness and training is a gap in the institution’s written information security program. Even though a high percentage of higher education institutions require mandatory information security awareness training for faculty and staff, the university president remains unconvinced that Premier University should require information security training.

Tasks

Using your knowledge of the circumstances of the data breach that the institution experienced over a year ago, guidance from the Department of Education Office of Federal Student Aid, as well as other sources you researched, write a persuasive memo to the Premier University president that argues that the institution should implement mandatory information security awareness training for all faculty and staff.For this part of the project:

  • Read the Department of Education Office of Federal Student Aid at https://ifap.ed.gov/dear-colleague-letters/07-01-2016-gen-16-12-subject-protecting-student-information.
  • Research the need for security awareness training for faculty and staff at public universities, such as the latest EDUCAUSE Information Security Almanac
  • Write a persuasive, professional memo that addresses the need for security awareness training.
  • In the memo, include any sources you consulted.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Copy 9

 This should be 3 pages

  1. How does white-collar crime fit within strain theory? 
  2. What are five techniques of neutralization? Provide an example of each.  
  3. List and describe the assumptions of deterrence theory. 
  4. Explain how cyber stalking and harassment could be the result of strains.
  5. Describe how hackers have formed their own subculture. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Access 2013 Customer Relationship Management Solution

 

  1. Write a basic plan for implementing a contacts database or a customer relationship management database using MS Access for a small to medium size business (500 – 1000 users).
  2. Define the features and benefits of MS Access. 
  3. Discuss the advantages and disadvantages for a company to use MS Access for a contact database or customer relationship database.
  4. Describe the importance of a contacts database or a customer relationship database to a business.

Writing Requirements

4-5 pages long. Double Space.

Must have an introduction with a clear thesis statement, three to four main points and a conclusion

Conduct research to find relevant information using reliable sources to support your views.

Use at least 2 academic books and 3 scholarly articles from a library database

Use APA Style for in-text citations, and references

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Algorithm Design

Help me with this assignment for the discipline Algorithm Design.Write me in the chat if you can do it.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Emerging Technologies

 Write a Research paper on three of the following topics as it relates to or complements Systems Analysis and Design (SAD): 

> Descriptive, Predictive & Prescriptive Analytics (why SAD should consider Analytics) 

> Analytics Competencies Centers (Collaboration between Business Analysts, IT Specialists and Users) 

> Cloud Computing (PaaS, IaaS, SaaS, DaaS, AaaS) (how SAD is different for cloud solutions) 

> Hadoop and Advanced Data Management (data sources that may impact SAD) 

> Blockchains (how Blockchains impact SAD) . 

Your research paper must be at least 5 pages in length, double-spaced, 12 font, and include at least 5 references, at least 2 of which must be peer-reviewed. Your paper must be formatted using APA guidelines. Do not include a cover page. Do not include an abstract. The reference page is NOT included in the 4-page length requirement. 

The paper should include an Introduction (to include a Hypothesis based on the research), Literature Review (Evidence) and Analysis of the Literature. All references must be cited within the text. Since the paper includes multiple topics, each topic must be separated and start with a HEADING. Include a conclusion at the end of the paper to summarize the entire paper and analyze how each topic relates together as related to the use of Systems Analysis and Design. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Python programming help

See attached.

First I need the prospectus on  what I want to write.
then the final project implementation

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Part B: Memo to the CEO

 

Write a 2- to 3-page memo to the Chief Executive Officer (CEO) of the Vampire Legends organization that includes the following two parts:

  • Part 1: Analysis of Components of Information Security that does the following:
  • Categorizes the components of information security
  • Analyzes the components of information security as it applies to the scenario presented in Vampire Legends
  • Contains a breakdown of the budget report
  • Discusses your allocation strategy based on the risks and expenses involved
  • Describes your choice for the best advertising campaign
  • Outlines the course of action in handling information security threats in the future
  • Part 2: Role of Ethics that does the following:
  • Illustrates the role of ethics as presented in the Vampire Legends simulation conflict to reflect the relationship between ethics and the success of the Vampire Legends organization
  • Describes the consequences of the conflict
  • Discusses the solution to the conflict
  • Discusses the impact of ethics on revenue

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Part B: Cruisin Fusion Contest

Now that the Cruisin’ Fusion website is up and running, you and your team have decided to run a contest on the blog asking customers to name the latest fusion recipe. In order to participate, the customer will need to enter their first and last name, phone number, and an email address, as well as the suggested fusion name. The winner of the contest will receive a $20 gift card.

Kiran supports this idea but has concerns she wants the team to consider before moving forward. She has asked that you prepare a 6- to 10-slide presentation with speaker notes for the next web meeting to address the following:

  • Research and assess the ethical issues related to data customer collection and information management. How will customer information be protected?

  • Research and examine the need to protect the intellectual property of the customers who submit name suggestions. What protection will Cruisin’ Fusion need in order to use the name suggested by the winner? What protection or disclaimer does the customer require?

  • Include a 1/2-page disclaimer to add to the blog for customers outlining the contest rules, explaining how their personal information will be used and stored, and discussing the use of all intellectual property submitted as part of the contest.

Note: The title page and reference page do not count toward the assignment length requirement.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Information Governance for E-Mail

We learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.  The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation? Support with references and do your usual critical review 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now