Searching the Network

Since information extracted from router or switch interfaces to not provide specific evidence of a particular crime in most cases, what use is the information collected from these devices.? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week6 Assignment

 

There has been a steady increase in the number of organizations that have implemented and customized their cloud-based computing services. The experiences of these organizations have generated numerous lessons learned and known issues related to cloud-based system implementations, including reports on issues with scalability, performance, reporting, and security as they relate to cloud-based services. Through these cases, an organization can be better informed on the issues of cloud-based services, deployment models, and service models.

To complete this assignment, address the following in a minimum of 3 pages (not counting title page and references page):

  • Identify and explain at least 4 key issues commonly cited in cloud-based system implementations as they relate to scalability, performance, reporting, and security.
  • Suggest at least one solution to each of these issues with your supported rationale, case evidence, and technical details.

Use APA formatting style (title page, references page, and in-text citations).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Need Help with my BI assignment.

Nationwide Insurance Used BI to Enhance Customer Service: Access pages 34 – 35 of your recommended textbook and read the contents therein with a better understanding and thereafter answer the questions below.

1. Why did Nationwide need an enterprise-wide data warehouse?

2. How did integrated data drive the business value?

3. What forms of analytics are employed at Nationwide?

4. With integrated data available in an enterprise data warehouse, what other applications could Nationwide potentially develop?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

sql code

  

HIT 234 Assignment 1

Submission Details:

For Internal and External students: submission is via Learnline. Instructions on how to submit the assignment is located under Assessments / Guidelines.

Please answer all questions.

Part A – Single and multiple table queries

Value: 6%

For the first five questions you have to provide your answer in the form of a SQL statement, with description before as necessary. For example:

1. Example Question: Select all columns from the `Customer` table

Example Answer:

— This answer will select out all the columns from the Customer table

SELECT * from Customer;

Questions 1 – 5:

Worth 3% of the total marks

1. List in ascending order the Last Names of all borrowers with Card Number less than 150.

2. What are the records of those loans between 3 June 2014 and 8 Mar 2018?

◦ The output should include the name of the cardholder, and title of the book

◦ List in ascending order by last name and first name

3. Find the total numbers of loans with last name beginning with D through E (including E); include last name beginning with Q as well as Z also.

4. Find all borrowers for a loan that have the Date-in before 15-March-15 and the Card number between 100 and 300 in Karama or Darwin.

5. Find the number of loans, which have been made from each branch?

◦ Note all branches need to be included even those with no loans

Question 6:

Worth 3% of the total marks

6. Create your own question based on the library database, and also provide a SQL Statement to answer your question.

Part B – Table and Advanced Queries

Value: 4%

The questions are broken into: Q1 (4 marks), Q2 (3 marks), Q3 and Q4 (3 marks). For all questions, provide the answer in the form of a SQL statement, with description before as necessary.

Questions

  

NOTES

 

Questions 1 and 2 require you to answer in the form of a   SQL statement to create a table and insert data into it. The question and   answer is only about the statements to create and put data into the   `Occurrence_Exercise` table, however it is recommended that you create the   statements to create and insert data into all 3 tables, so that you can test   that your statements are correct. Please only provide in your answer the SQL   statement for the `Occurrence_Exercise` table.

 

To understand the terminology:

A   rep is a number of times you do an attempted weight.

A   set is an attempt and in this case, there are 3 attempts (attempt 1,   attempt 2, attempt 3).

An   attempt contains the weight.

So to understand the weight you would lift for a single   exercise in the Exercise attempt table you would need to consider the rep   multiplied by attempts by the weight. So for a single attempt:

e.g. for 9001

rep multiplied by attempts by the weight

8 reps x 3 attempts x 15kg = 360 total kg’s lifted

1. The following Gym application database for weight session recording is as follows. Write and run SQL statements for creating the Occurrence_Exercise table.

◦ Include constraint values for the Condition Column: Heavy, Medium, Light

2. Write an SQL statement that will insert the data into Occurrence_Exercise table only.

◦ Definition of rep stands for repetition.

◦ Each exercise attempt has the rep number as indicated in the occurrence table.

Occurrence Table

  

OccurrenceID

Occ_Date

Occ_Place

Occ_Start_Time

Occ_Finish_Time

 

1

14/03/18

University_Gym

16:00:00

16:30:00

 

2

15/03/18

University_Gym

16:30:00

17:00:00

 

3

16/03/18

University_Gym

16:10:00

17:20:00

 

4

17/03/18

Home

07:00:00

08:00:00

 

5

17/03/18

University_Gym

17:00:00

18:00:00

Occurrence_Exercise Table

  

OccExID

ExerciseNo

OccurrenceID

Rep

Attempt1

Attempt2

Attempt3

Condition

 

9001

001A

1

8

15

15

15

Light

 

9002

002A

1

8

70

75

70

Medium

 

9003

003A

2

12

90

95

90

Heavy

 

9004

004A

3

12

200

200

200

Medium

 

9005

006A

3

8

110

110

115

Heavy

 

9006

005A

4

10

20

25

Medium

 

9007

001A

4

8

10

12

10

Medium

 

9008

002A

5

8

85

90

115

Heavy

Exercise Table

  

ExerciseNo

ExerciseDescription

ExerciseType

 

001A

Situps

Abs

 

002A

Bench Press

Chest

 

003A

Dead Lifts

Back

 

004A

Leg Press

Legs

 

005A

Seated Shoulder Press

Shoulders

 

006A

Squats

Legs

 

007A

Lat pull downs

Lats

Create the following queries:

3. Find the exercise which contains the maximum total weight lifted

◦ Show: Exercise, Maximum weight

◦ Ensure you show captions for each of the columns

◦ Hint: you would need to consider the number of times the weight is lifted and weight e.g. rep multiplied by attempt multiplied by the weight

4. Find the exercise that the user was not able to complete 3 attempts in, or the exercise that the user has not attempted.

◦ Show appropriate columns

◦ List in ascending order exercise type

◦ Do not show repeated names

◦ Ensure you show captions for each of the columns

Part C – All Topics

Value: 10%

For the first four questions refer to the Library Database. For question 5 refer to CDU Customer Invoice Database.

The questions are broken into: Q1-4 (6 marks) and Q5 (4 marks).

For all questions, provide the answer in the form of a SQL statement, with description before as necessary.

Questions Using the Library Database

1. What are the 5 most popular books?

◦ Show ASBN, Title.

◦ HINT: To limit results use ROWNUM.

2. Which branches currently have no loans out?

◦ Show all branch names.

◦ List in ascending order by branch.

3. Find the longest time a book has been loaned out for each branch

◦ Show only branch name and number of days.

◦ List in ascending order by branch name.

◦ Show all branches, even if there are no loaned out books. Therefore, a branch may have a null value for the longest loaded out book.

◦ Format the number of days to one decimal place.

4. Find the borrower that has returned a book on the dated 16 December 2010 and 8 May 2012

◦ Show two different methods.

Question Using the CDU Customer Invoice Database

5. Devise a delete query, which will eliminate duplicates for customer columns `ID`, `CustomerLastName`, `CustomerFirstName` and invoice columns `Invoice_Date` and `Invoice_No`.

◦ Ensure the query removes all duplicate data.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion:

 

In this module, you learned about library databases and resources. In this discussion post please address the following:

  • What is a library database?
  • Name at least 5 databases available through yourLibrary Resources and how and why you would use them?
  • What databases do you think will be helpful to your research for your PowerPoint project? 
  • Have you reached out to a Broward librarian for help? 

You will need to do an original post before you can read other students’ posts.

Once you have done your own original post, read the majority of posts from your classmates and choose two to respond to. Your response should be well thought out and further the discussion. One idea is to respond to posts to help a student find better databases for their projects, include specific example.  When writing on a discussion board, including personal experiences and examples can help to make your posts more interesting and unique.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

discussion 4- capstone

Question:

You have been asked to draft a corporate usage policy regarding the use of instant messaging. The policy should encourage the use of IM and chat while also providing useful guidance to avoid potential problems. What would you say in the policy?

Please read the above question and write the response in 300 words, APA format, provide references and no plagiarism.

Turnitin tool to submit, please make sure that the score must be below 10%.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Dis4/cyber

On the discussion forum, describe an instance where a government has taken some action the result of which is influence on commerce. Minimum 250 words. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database Roles

 

Discuss, in your own words using 500 words or more, the relationship between users and roles in databases. Explain why we use roles rather than simply assigning rights and privileges to each individual user. Consider how to handle new hires and job changes.

Include at least one quote from 3 articles, place them in quotation marks and cite in-line (as all work copied from another should be handled).

Do not copy without providing proper attribution. Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment 5

 For thisassignment, please provide responses to the following items:

(a) Provide a comprehensive response describing naive Bayes?

(b) Explain how naive Bayes is used to filter spam. Please make sure to explain how this process works.

(c) Explain how naive Bayes is used by insurance companies to detect potential fraud in the claim process.

Your assignment should include at least five (5) reputable sources, written in APA Style, and 500-to-650-words. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Need a project work document on the question been posted.

 

Risk management is an important process for all organizations. This is particularly true in information systems, which provides critical support for organizational missions. The heart of risk management is a formal risk management plan. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation.

In the upcoming weeks, you will be completing the following assignments in your assigned groups. 

Project Part

Deliverable

Project Part 1

Task 1: Risk Management Plan

Task 2: Risk Assessment Plan

Task 3: Risk Mitigation Plan

Project Part 2

Task 1: Business Impact Analysis (BIA) Plan

Task 2: Business Continuity Plan (BCP)

Task 3: Disaster Recovery Plan (DRP)

Task 4: Computer Incident Response Team (CIRT) Plan

Final Project

Risk Management Plan Final Submission

Submission Requirements

All project submissions should follow this format:

  • Format: Microsoft Word or compatible
  • Font: Arial, 10-point, double-space
  • Citation Style: APA

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors.

Company Products

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

  • Loss of company data due to hardware being removed from production systems
  • Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops
  • Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on
  • Internet threats due to company products being accessible on the Internet
  • Insider threats
  • Changes in regulatory landscape that may impact operations

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined.

Project Part 1

Project Part 1 Task 1: Risk Management Plan

For the first part of the assigned project, you must create an initial draft of the final risk management plan. To do so, you must:

  1. Develop and provide an introduction to the plan by explaining its purpose and importance.
  2. Create an outline for the completed risk management plan.
  3. Define the scope and boundaries of the plan.
  4. Research and summarize compliance laws and regulations that pertain to the organization.
  5. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk management.
  6. Develop a proposed schedule for the risk management planning process.
  7. Create a professional report detailing the information above as an initial draft of the risk management plan.

Write an initial draft of the risk management plan as detailed in the instructions above. Your plan should be made using a standard word processor format compatible with Microsoft Word.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now