DB Systems Discussion

  1. Compare inheritance in the EER model to inheritance in the OO model.
  2. What are the differences between structured, semistructured, and unstructured data?

300 words per question

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wk 5 – Apply: Summative Assessment: Request for Proposal

 

This week you take on the role of the Senior IT Project Manager for the organization you chose in Week 1. In this position, your responsibilities may include proficiently working with a variety of technologies, conducting meetings with stakeholders, creating and forecasting budgets, and designing project plans. 

The CIO of your chosen organization wants the organization to purchase and integrate 6 new web servers. The CIO envisions more business travelers using the Internet to purchase airline tickets and reserve rental cars and hotel rooms for business trips. Expansion of your company’s web capacity is needed. 

Research information about your chosen organization to complete this week’s assignment. 

Create a 3- to 5-page request for proposal (RFP) in Microsoft Word for the CIO, which will minimize procurement-related risks for this project. Include the following components in the RFP: 

  • The purpose of the RFP 
  • The organization’s background as it applies to the use of the request for new web servers 
  • An analysis of procurement risks 
  • Methods for managing procurement risks 
  • Basic requirements for the current and new hardware and software 
  • Software and hardware environment 
  • A statement of work/requirements and schedule information 
  • The process for evaluating the RFP 

Include APA-formatted citations to support your assignment. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

URGENT

 

Project proposals are rarely accepted in their entirety in the first round. Usually what occurs is a series of back and forth between the proposing party and the sponsor to ensure that questions and tweaks are made before committing to move forward.

Congratulations, your proposal was one of the chosen few to move forward to the second round. Unfortunately, the project sponsor has some change requests that he would like for you to consider before submitting your proposal to the board.

  1. Request 1: Decrease total budget by 15%.

  1. Request 2: Decrease time to completion by 25%.

  1. Request 3: Create a role within the project that manages all security procedures for the data center (if not already identified) entitled ‘security specialist’.

  1. Request 4: Provide an estimate of the cost per year for a data center security specialist.

  1. Request 5: Develop and document a change request that enhances the value that the project will deliver to the sponsor and company. Hint: Consider a request that enhances a technical aspect of the solution.

As the project manager for this proposal, you are empowered to accommodate for requests as appropriate. Support any decision made with solid data. Be sure to consider the success of the project as you commit to making changes to cost and timelines. Include your decisions and updates in your project proposal (approximately six pages in length). Include any and all models, diagrams, wireframes, topography, and graphics needed to support your proposal.

Submit your proposal to your group’s discussion board (no later than 4 days before the assignment is due). Likewise, provide constructive feedback on the proposals posted by your group members (no less than 2 days before the assignment is due).

Draft an email as a response to the requests by your sponsor (maximum of two pages). This email will serve three purposes: Justify and explain the changes made to your proposal, then communicate the cost estimates of the security specialist. Lastly, determine whether a cloud solution or an on-site managed data center would be feasible for your project. Explain the benefits and pitfalls of both.

Submit your assignment as one document, beginning with the email and concluding with your final proposal.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cloud based anti virus

 

Need a  Cloud-based Antivirus which would satisfy the specs mentioned below

1. Must have a local agent/software on the local computer that monitors a directory for new files.

2. Whenever a new file is added to this directory, the local agent must check the file to find if it is in the blacklist or whitelist.

3. If it is in neither, then the local agent must upload it to the cloud.

4. On the cloud side, there must be the following components: multiple virtual machines each with a separate anti virus engine installed, and a central monitor virtual machine that accepts file uploads (or monitors file uploads to S3), and then uses cloud services such as AWS Lambda to provide the file to the virtual machines with anti virus engines. The engines scan the file and sends report back to the monitor which combines the reports and sends the report back to the local engine, telling it if it is a virus/not a virus. Also, the blacklist or whitelist must be updated

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cloud-based Home Security System

Need to design a  Cloud-based Home Security System which should satisfy the below conditions

1. Must use AWS IoT core

2. Must support at least 1 or preferably 2 home security devices

3. Must use MQTT or other standard protocols to communicate with the cloud IoT core.

4. Must support multiple homes and require authentication.

5. The User can access the system using a website or app. The user can enter phone number to call or text in case of an intrusion.

6. The user chooses system’s action upon detecting a possible intrusion. 

7. Must work with real hardware devices (for example, camera or door sensor).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

wk 14

  Discuss the key components of composition in data visualization.  Note why the components are valuable when creating visualizations.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

pc image

 Unit II Discussion Board Question IICOLLAPSE

Do you do a full backup of your PC with the system image tool?  How do you do it?  

Have you ever had to do a full restore from your backup?  How do you do it?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Security Threat Awareness Infographic and Presentation

Imagine you are the information systems security officer at your company and are tasked with creating a cybersecurity threat awareness training. You must create an infographic or job aid for the company’s intranet and a brief presentation for the company’s stakeholders, including executives, managers, and staff.

Refer to the LinkedIn course “PowerPoint: Creating an Infographic” by Heather Ackmann, located in this week’s Learning Activities folder, for guidance on creating infographics.

Create a 1-page infographic or job aid of the cyber domain using the OSI model.

Identify 5 to 7 threats to the cyber domain, including at least 1 threat for each of the layers in your infographic.

Create a 4- to 6-slide presentation in which you:

  • Discuss the challenges of securing each layer of the cyber domain in the company’s cyber threat awareness training.
  • Select 3 threats from your infographic or job aid.
  • Identify 2 challenges from the threats you identified.

Note: You do not need to identify how to mitigate the threat; this presentation is focused on raising awareness of cybersecurity threats and the challenges these threats present.

Format any references according to APA guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

midterm

  

1.Which of the following are the CIA properties? (Select the three correct properties.)

Authentication

Confidentiality

Integrity

Availability

Identity

Implementation

2. Which of the following is an example of a rule-based security decision?

Locking a car’s ignition

Performing a step-by-step security analysis

Applying “security theater”

Trying to outdo a neighbor’s security measures

3. We are estimating the impact of an individual attack. Which of the following has the greatest estimated impact?

An attack with a $100 loss that could happen once a week

An attack with a $400 loss that could happen once a month

An attack with a $2000 loss that could happen twice a year

An attack with a $5000 loss that could happen once a year

4. Risk Management Framework is a way to assess _______________ risks when developing large-scale computer systems.

5. What is a worm?

Malware

Sends spam

Blocks flow of computer traffic

Denial of service

6. True or False? Once we have filled in the attack likelihoods and impacts, we compute the significance by multiplying these values together.

Group of answer choices

True

False

7. An attempt by a threat agent to exploit assets without permission is referred to as

Group of answer choices

An attack

A vulnerability

A safeguard

A trade-off

8. The primary element on a computer motherboard that runs programs and makes the computer work is

Group of answer choices

Random access memory (RAM)

An input/output (I/O) circuit

The central processing unit (CPU)

Firmware

9. ____________ flaws in the software, such as finger service, are often exploited.

Group of answer choices

Buffer overflow

Blue screen of death

Shell shock

Windows

10. What is the name of the worm that was written in 1988 that could replicate itself across computers on the internet?

Group of answer choices

Gates

Jobs

Moore

Morris

11. True or False? Not all data is strictly numerical.

Group of answer choices

True

False

12. The __________ board contains slots or sockets for random access memory (RAM).

Group of answer choices

Mother

Father

Daughter

Son

13. True or False? A computer’s basic input/output system (BIOS) is a computer program stored in read-only memory (ROM).

Group of answer choices

True

False

14. True or False? By the late 1980s, some virus writers were inclined toward destruction. The Jerusalem virus, which appeared in 1987 in the city of Jerusalem, contained a “destructive payload” that would delete all executable files on the system on Friday the 13th, starting in 1988.

Group of answer choices

True

False

15. The term _________ was used in operating systems research to describe the access rights a particular subject or process had for a particular object or resource.

Group of answer choices

Cluster

Permission

Capability

Objects

16. The “X” permission on the file indicates that the user has _________ right.

17. True or False? Every executable file begins with a “file header” that describes the structure and format of the program.

Group of answer choices

True

False

18. An interpreter is a program that interprets the text of a program in a symbolic form and performs the actions specified in the text. The following are examples of interpreters, except

Group of answer choices

C++

PHP

Javascript

Lisp

19. True or False? In a default permit, everything is allowed except sites on the prohibited list.

Group of answer choices

True

False

20. An authentication system that requires the user to provide two different passwords and a fingerprint scan is an example of

Group of answer choices

Single-factor authentication

Two-factor authentication

Three-factor authentication

None of these is correct

21. True or False? Authentication associates an individual with an identity.

Group of answer choices

True

False

22. True or False? Two-factor authentication is using two passwords.

Group of answer choices

True

False

23. True or False? Dictionary attacks differ from trial and error attacks because dictionary attacks focus on likely passwords.

Group of answer choices

True

False

24. The following are fundamental strategies for authenticating people on computer systems, except

Group of answer choices

Something you know

Something you have

Something you are

Something you make

25. We need to create a three-factor authentication system. The system already uses a USB device that is unlocked with the user’s fingerprint. Which of the following can we add to implement three separate factors?

Group of answer choices

A file of secret information stored on the user’s authorized computers

A PIN entered via a built-in PIN pad

Signature recognition

A process that requires the user’s cell phone

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Taxonomy of Cross-Platform Mobile Applications Developmen

 

Your assignment:

First read (again) the article: Taxonomy of Cross-Platform Mobile Applications Development – notice how the author breaks the research problem into 6 measurable questions (Code is Resuable, Plugins, Easy for Web Developers, etc.). Use any 3 of these as your research questions. Since your Method is exploratory – using a mini literature review, your research question(s) must be answered appropriately in the literature that you cite. You must cite at least 4 scholarly (peer-reviewed) sources to address each of your research questions. A literature review in practice would be exhausive. Because of the scope of this paper, however, it will  be a Limited Literature Review, Be certain to make this and circumstances clear both in your Introduction, Method and Conclusion sections. Your Method section – your limited literature review, might look simular to the Previous Works section in the article: Mobile_Apps_Development_A_Framework_for_Technology_Decision_Making_PROCEEDINGS , however, connected to YOUR study – your research question(s)

  • Write a seven – ten (7-10) page paper that address your research problem – your paper should be: typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. See hand-outs provided on graduate and APA style research papers.
  • Use at least four different quality resources that address each research questions; other citations may apply as well. Note: Wikipedia, Blogs, Info articles, and similar Websites do not qualify as quality resources for research writing.
  • Include a cover page containing: a title for this assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference pages do not count toward the page count. Review the Helpful Information provided related to critical thinking and also follow the hand-outs provided in this week’s Learning Materials folder.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now