software -9D

Please write at most 2 to 3 paragraphs and in your own words briefly discuss what was your learning outcome/experience from this course ( Software Engineering)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Normalization

 

You were asked to create a data model for a company dinner club…the final database design must enable the manager to mail invitations to the club’s members, plan the meals, and keep track of who attends the dinners…you were also given the following business rules…

  • Each dinner serves many members, and each member may attend many dinners…
  • A member receives many invitations, and each invitation is mailed to many members…
  • A dinner is based on a single entre…but an entre may be used as the basis for many dinners…for example, a dinner may be composed of a fish entre, rice, and corn…or the dinner may be composed of a fish entre, a baked potato, and string beans…

The chart below was created by the manager of the company who is NOT a database expert…

TableP06_07.gif

Based on the business rules and diagram above, you need to do the following:

  1. Develop a CROW’S FOOT DIAGRAM of the database for EACH NORMAL FORM…I want to see your progression from 1NF to 2NF to 3NF (yes, you need to turn in THREE diagrams)…MAKE SURE YOU USE PROPER NAMEING CONVENTIONS (i.e., XXX_XXX_XXX)…
  2. For EACH Normal Form, explain how you arrived at that diagram…
  3. Explain how you decided on the final Primary and Foreign Keys…
  4. Identify any additional business rules that you may need…

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Presentation slides

Hi, I need help with my Data Analytics assessment. Need to create 16 PowerPoint slides to describe and explain what has been asked in the assessment manual. I need the assessment by 7th June. It needs to be 100% authentic, can’t be plagiarized. Assessment manual must be followed thoroughly. 

Assessment manual, class lectures are attached.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Datamining Case study by Krizanic 2020

 

  1. What is the definition of data mining that the author mentions?  How is this different from our current understanding of data mining?
  2. What is the premise of the use case and findings?
  3. What type of tools are used in the data mining aspect of the use case and how are they used?
  4. Were the tools used appropriate for the use case?  Why or why not?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Practical Assignment

Go to Hands-On Tutorials for AWS. (https://aws.amazon.com/getting-started/hands-on/?getting-started-all.sort-by=item.additionalFields.sortOrder&getting-started-all.sort-order=asc&awsf.getting-started-category=*all&awsf.getting-started-level=*all&awsf.getting-started-content-type=*all)

2. Select: Cloud Level: 100 and Content-Type: Hands-on from the lefthand side menu. 

3. Go through these hands-on tutorials:

-Store and Retrieve a File (Free Tier) – Provide proof (screenshots of the last page) and an explanation of what you did in a 1-page document. 

-Launch a WordPress Website (Free Tier) – Provide proof (screenshots of the last page) and an explanation of what you did in a 1-page document. 

-Launch a Linux Virtual Machine (Free Tier) – Provide proof (screenshots of the last page) and an explanation of what you did in a 1-page document.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

article

 

What are the risks associated with using public Wi-Fi?

NOTE: Remember, the important thing here is QUALITY, not QUANTITY and your posts/comments MUST BE IN YOUR OWN WORDS (not copied and pasted from the Internet). We will use the SafeAssign tool to check for plagiarism.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cybersecurity article

Locate article about cybersecurity in online  Prepare a brief written summary (2-4 paragraphs that describe the article. Include a LINK to the article or a reference citation so the work can be located. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

SE494 10

Programming Project

You will be developing “ATM Software” for MyBank. This ATM software will be accepting deposits and can make withdraws.

The ATM is PIN code protected. You will be developing program to ensure that unauthorized users cannot get into the system. Your program will check if the entered PIN CODE is in the prerecorded data file.

Your source code must be saved as C++ file. And, the document name must be: LastName_ATM.CPP.

The source code file must contain a file header formatted as specified below. The header information must be complete and accurate. The source code file should use self-documenting code and additional comments (as required) to improve code readability.

Final Project Smr2020.pdf

https://cdn.inst-fs-iad-prod.inscloudgate.net/a1b7447d-c35d-4192-b0a3-b3e3d71fff34/Final%20Project%20Smr2020.pdf?token=eyJhbGciOiJIUzUxMiIsInR5cCI6IkpXVCIsImtpZCI6ImNkbiJ9.eyJyZXNvdXJjZSI6Ii9hMWI3NDQ3ZC1jMzVkLTQxOTItYjBhMy1iM2UzZDcxZmZmMzQvRmluYWwlMjBQcm9qZWN0JTIwU21yMjAyMC5wZGYiLCJ0ZW5hbnQiOiJjYW52YXMiLCJ1c2VyX2lkIjpudWxsLCJpYXQiOjE2NTQ0OTQ1ODIsImV4cCI6MTY1NDU4MDk4Mn0.dBlm68QEx1qsSQlKdxp6wubWq5mQAh0SZsxhAOemHDG-R-O2sYiKgMNpoPTWoU4B2AW0AHoOkiXNEmcNDH4zew&download=1&content_type=application%2Fpdf

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Mobile -10

 

Programming Project

You will be developing “ATM Software” for MyBank. This ATM software will be accepting deposits and can make withdraws.

The ATM is PIN code protected. You will be developing program to ensure that unauthorized users cannot get into the system. Your program will check if the entered PIN CODE is in the prerecorded data file.

Your source code must be saved as C++ file. And, the document name must be: LastName_ATM.CPP.

The source code file must contain a file header formatted as specified below. The header information must be complete and accurate. The source code file should use self-documenting code and additional comments (as required) to improve code readability.

Final Project Smr2020.pdf

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ITS-836 – Data Science & Big Data Analytics – Blockchain Initiatives Literature Review

Reading resources:

Alkadi, Moustafa, N., & Turnbull, B. (2020). A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions. IEEE Access, 8, 104893–104917.

Duran, Yarleque-Ruesta, D., Belles-Munoz, M., Jimenez-Viguer, A., & Munoz-Tapia, J. L. (2020). An Architecture for Easy Onboarding and Key Life-Cycle Management in Blockchain Applications. IEEE Access, 8, 115005–115016.

Mohamed, & Al-Jaroodi, J. (2019). Applying Blockchain in Industry 4.0 Applications. 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), 0852–0858. 

Literature Review: Blockchain Initiatives

While most applications of blockchain technology have emerged in the financial sector (for example, Zcash, Circle, and Abra), its practical applications go beyond finance, because essentially any type of digital asset can be tracked and traded through a blockchain. Many different industries are experimenting in the blockchain space, even though this experimentation is still in its early stages. Examples range from medical records (MedRec, PokitDok), to digital rights and micropayments (Brave Browser, Ascribe, Open Music Initiative), identity systems (uPort), and supply chains (Everledger, Hyperledger).

For your literature review this week, you are required to choose a blockchain initiative that interests you. It could be an existing application that you have come across in your own research, one of the examples listed above, or an idea that you may have for blockchain technology as a solution to a business problem.

You are to review the literature on your blockchain initiative and discuss problems and gaps that have been identified in the literature. You will expand on the issue and how researchers have attempted to examine that issue by collecting data – you are NOT collecting data, just reporting on how researchers did their collection. 

Paper Layout:

– Title Page

– Table of contents: Use a Microsoft Enabled Table of Contents feature.

– Background:  (minimum 1 page)

Describe the issue, discuss the problem, and elaborate on any previous attempts to examine that issue. Be sure to discuss similar blockchain initiatives here.

– Research Questions: (minimum 1.5 pages)

In the identified problem area that you are discussing, what were the research questions that were asked? Be sure to include main research questions from all the literature you are reviewing.

– Methodology:  (minimum 2 page)

What approach did the researcher use, qualitative, quantitative, survey, case study? Describe the population that was chosen. You will discuss the methodology for all the literature you are reviewing.

– Data Analysis:  (minimum 2 page)

What were some of the findings, for example, if there were any hypotheses asked, were they supported?

– Conclusions:  

What was the conclusion of any data collections, e.g., were research questions answered, were hypotheses supported? Be sure to also include the similarities and differences between the literature. Also discuss here the future of this blockchain initiative and if it is a viable initiative.

Paper requirements:

– Be a minimum of 7 pages in length, not including the required cover page, table of contents and reference pages.

– Follow APA 7 guidelines. Be sure to conduct research on formatting literature reviews.

– Your literature review should include a minimum of 8 scholarly peer-reviewed journal articles.

– Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. You can use Grammarly for help with your grammar and spelling.

Note: plagiarism check required, APA7 format, include References, within 8hrs 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now