Microsoft Access Data Queries

  

Part 2

Software skills: Database design and querying

Business skills: Inventory management

In this exercise, you will use database software to design a database for managing inventory for a small business. Kamen Rider, located in New York, sells road, mountain, hybrid, leisure, and children’s bicycles. Currently, Kamen Rider’s purchases bikes from three suppliers but plans to add new suppliers in the near future. Using the information found in the tables given in the small desktop database, help manage information about Kamen Rider’s suppliers and products. Perform the following.

1. Execute a query that identifies the five most expensive bicycles (for customers). The query should list the bicycles in descending order from most expensive to least expensive (by Selling Price), the quantity on hand for each, and the markup percentage for each. Save this query as Q1_Five_Most_Expensive_Bicycles. Hint: Profit Mark Up = (Selling Price – Cost Price)/Cost Price. (2.5 points)

2. Execute a query that lists each supplier, its products, the quantities on hand, and associated reorder levels. For each supplier, the products should be sorted alphabetically. Include a criterion for bicycles that have Quantity_on_Hand that is more than 5. Hint: This requires hierarchical sorting and a numerical filter. Save this query as Q2_Supplier_Product (2.5 points)

3. Execute a query listing only the bicycles with names starting with “E” as well as those that end with “er”, and their corresponding suppliers. In your query, include the Product Name, Purchase Cost, and the supplier’s Company_Name. This needs a little bit of thinking. Save this query as Q3_BR_bicycles (2.5 points).

4. To enhance the database, we need a table of supplier information. Create a table called Supplier_Info that has supplier telephone numbers. For full credit here, include an appropriate input mask. Populate the table with the appropriate fields. Populate the table with the suppliers to demonstrate our ability to enter data to a database and to check that it works. Be sure to enter all suppliers (there should be 5). Make up the telephone numbers. This requires some thinking on what field(s) to include other than telephone numbers in the new table. Recall that databases should be normalized, and we should join apples to apples, oranges to oranges; and we want to avoid redundancies. For purposes of this assignment, create the table accordingly. There’s no need to join other tables. Save this table as Supplier_Info (2.5 points).

Your work will be evaluated on the accuracy of the results, quality of your answers, and ability to apply the concepts. Submit your work on Canvas. There should be 2 documents: (1) a single word document (or pdf) for part 1, and (2) the database file (Access file) for part 2 by the due date. Late submissions will result in a 5% penalty for each day late.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Systems Analysis and Design

  

Pretend that you are going to build a new system that automates or improves the interview process for the Career Services Department of your school. Develop a requirements definition for the new system. Include both functional and nonfunctional system requirements. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CLOUD COMPUTING (IN)SECURITY

1. Do some Internet research to identify businesses who have suffered because of cloud security weaknesses or failures. What can companies who are contemplating cloud computing services learn from the negative experiences of these businesses?

 2. Do some Internet research on security mechanisms associated with virtualization. How can virtualization be used by cloud service providers to protect subscriber data? 

 3. Choose one of the following cloud services categories: SaaS, IaaS, PaaS. Do some Internet research that focuses the security issues associated with the selected cloud service category. Summarize the major security risks associated with the cloud service category and identify mechanisms that can be used to address these risks. 

 Read the Case Study and answer the “Discussion Points” in a clear but concise way. Be sure to reference all sources cited and use APA formatting throughout. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Lambert and Barron’s Case

  

There are certain promises that are not considered consideration.

· As a business owner or stakeholder, how can you ensure that your contracts are enforceable?

· Think back to the Lambert v. Barron case What should Lambert have done differently?

· Lambert and Barron’s Case

· Question 1: Facts that Support the Position of Lambert that a Contract Existed

· Barron and Lambert had a meeting in Farmerville, and there was a verbal contract. According to the contract, Lambert will provide consulting services to Barron to overcome issues of this contract. The amount that Lambert was to be paid was $3100 monthly for one year (Beringer, 1999). After reviewing the details of the five pending projects, Lambert assisted DMB Inc. to start the arbitration process. He was sent all the relevant documents regarding DMB Inc.’s contract. In December 1999, Barron made a payment of $3100 to Lambert. Lambert had the evidence relating to the bills, and he sent a letter to Barron on the 30th October, 2000 (Beringer, 1999). It was about the payment of the rest of the money for the contract.

· Question 2: Facts that Support Barron’s Position that no Contract Existed

· Barron received the letter from Lambert, and he wrote back. He stated that he was surprised since he had no such contract with Lambert. He said that he only paid £3100 to Lambert since he once reviewed their contract agreement (Beringer, 1999). Additionally, he said that he considered the efforts that Lambert made to travel to Farmerville. It was despite the fact that he organized Lambert’s flights during the round trip. From that time, Barron never contacted Lambert, though he returned some calls.

· Question 3: Whether I agree with the Case’s Outcome

· I agree with the court’s outcome that there was no contract. There was no evidence that the two parties had a mutual agreement on a one year contract. It was alleged that an agreement took place in December 1998, but the first payment to Lambert occurred in December 1999. He then wrote a letter to Barron in October 2000. Hence, he was not expecting a monthly payment from Barron. The court’s arguments look valid and logical. It is hard to believe Lambert’s arguments in this case.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Managing Security Operations

Answer the following 12 questions by selecting the single BEST answer for each. Using your course materials and/or other credible resources, provide a 50–100-word explanation on why you chose your answer. Please cite your sources for your answers from your course materials or other credible resources.

1. You must provide SOC 2 and SOC 3 reports on the security, availability, confidentiality, processing integrity, and privacy of operational controls. As part of these reports, you must provide information regarding the disclosure of data to third parties. To which tenet of SOC 2 and SOC 3 does this information apply?

A. Privacy
B. Security
C. Confidentiality

2. You must provide SOC 2 and SOC 3 reports on the security, availability, confidentiality, processing integrity, and privacy of operational controls. As part of these reports, you must provide information regarding the backup and restoration of data. To which tenet of SOC 2 and SOC 3 does this information apply?

A. Privacy
B. Availability
C. Security

3. As part of routine maintenance, your organization requires that system administrators perform a routine access review and audit. As part of this process, you decide to audit user access to files and folders. Which Windows audit policy should you enable?

A. Object access
B. Logon events
C. Account logon events
D. Directory service access

4. You have received a list of users and their jobs. You need to implement the principle of least privilege. What is the next step that should be performed?

A. Determine the minimum set of privileges needed to perform the user’s job.
B. Determine the maximum set of privileges needed to perform the user’s job.
C. Configure the appropriate privileges for the user’s account.

5. Which statement best describes a two-man control?

A. Two operators work together to complete a given task.
B. Two operators review and approve each other’s work.
C. An operator handles more than one position within an organization.

6. Which type of security identifies the process of safeguarding information assets after the implementation of security?

A. Physical security
B. Operations security
C. Application security

7. Several users in your organization have administrative-level user accounts. During a recent security audit, the auditors suggest that new user accounts be created for these users to grant the users the minimum permissions that they need to carry out their daily tasks. The users should only use their administrative-level accounts when performing administrative-level tasks. Which operations security principle is being implemented?

A. Separation of duties
B. Least privilege
C. Job rotation

8. As an organization’s security administrator, you must prevent conflicts of interest when assigning personnel to complete certain security tasks. Which operations security tenet are you implementing?

A. Separation of duties
B. Due diligence
C. Due care

9. Which of the following is MOST important to the success of an information security program?

A. Senior management sponsorship
B. Security awareness training
C. Adequate start-up budget and staffing

10. What is the BEST defense against a structured query language injection attack?

A. Regularly updated signature files
B. Strict controls on input fields
C. A properly configured firewall

11. Which of the following is the MOST important consideration when implementing an intrusion detection system?

A. Patching
B. Tuning
C. Encryption

12. Which of the following is the MOST important consideration when securing customer credit card data acquired by a point-of-sale cash register?

A. Authentication
B. Hardening
C. Encryption

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion Week 2

 After completing the reading this week answer the following questions:Chapter 2:

  1. What is an attribute and note the importance?
  2. What are the different types of attributes?
  3. What is the difference between discrete and continuous data?
  4. Why is data quality important?
  5. What occurs in data preprocessing?
  6. In section 2.4, review the measures of similarity and dissimilarity, select one topic and note the key factors.

Chapter 3:

  1. Note the basic concepts in data classification.
  2. Discuss the general framework for classification.
  3. What is a decision tree and decision tree modifier?  Note the importance.
  4. What is a hyper-parameter?
  5. Note the pitfalls of model selection and evaluation.

 

  1. ch. 2 & 3 in textbook: Data and Classification: Basic Concepts and Techniques and Alternative Techniques
  2. Capri, H. (2016). Data mining : principles, applications and emerging challenges . Nova Publishers. Chapter 1.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cryptocurrency Paper

 

Prepare a 3-5 page paper on cryptocurrencies and security and dispute  resolution and support your findings with research. How have  cryptocurrencies taken a dominant role in this area? Explain.

Your paper should be 3 pages long (excluding the title and reference pages) and formatted according to APA.

Compose your essay in APA format, including the introduction and  conclusion, and in-text citations for all sources used. In addition to  your 3-5 page essay, you must include an APA-style title page and  reference page.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Ethical Hacking’s History

Do some research on the history of ethical hacking. Find at least two credible resources. To help you begin, try searching on Clifford Stoll, who has written on the topic.

Based on your research, write a 2-page descriptive essay on the following:

Explain the history of ethical hacking, including the role hacking played in the inception of Apple Computers, John Draper, and Phone Phreaks. Include how the term “hacker” came to be and its various meanings. Speculate on what the future has in store for ethical hacking, including the impact of the cloud, ubiquitous data, and quantum computing.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

2 Discussions and 1 case Study

Discussion 5.1

What is the Model Builder? Explain. 

Provide the examples of the industries where it will it be the most useful.

Discussion 5.2

When will be useful to apply for Spatial Analyst extension? Give some examples. 

Minimum 110 words excluding references 

Case Study 6.1

Case Study 12.1 The Problems of Multitasking

  1. How does multitasking confuse the resource availability of project team personnel?
  2. “In modern organizations, it is impossible to eliminate multitasking for the average ­employee.” Do you agree or disagree with this statement? Why?
  3. Because of the problems of multitasking, project managers must remember that there is a difference between an activity’s duration and the project calendar. In other words, 40 hours of work on a project task is not the same thing as one week on the baseline schedule. Please comment on this concept. Why does multitasking “decouple” activity duration estimates from the project schedule?

Writing Requirements

  • 2-3 pages in length  (excluding cover page, abstract, and reference list)
  • APA 6th edition, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cybersecurity Strategy, Law, and Policy

 

The chief technology officer (CTO) has indicated that your  organization has been requested by the National Security Council (NSC)  to comment on the upcoming National Cybersecurity Strategy. The NSC has  asked for specific recommendations as it relates to the next  cybersecurity strategy, private/public partnerships, and comments on how  specific technologies should be incorporated into the assessment.

The CTO has asked you to collaborate with your team to provide the organizational input.

You will be collaborating with your previously assigned team on this  assignment. It is up to the team members to decide how they will plan,  meet, discuss, and complete the six sections of the paper. Remember, if a  member fails to complete his or her part of the work, the team is still  responsible for all sections. You will also complete a peer review for  yourself and for each member of the team. The peer feedback will be  incorporated into each team member’s assignment grade.

As a group, use the Cybersecurity Strategy, Law, and Policy Team Assignment Template to write your paper, which should cover the following topics:

Part 1: National Security Strategy and Cybersecurity

  • After reading the National Security Strategy (2017), comment on the following.
     

    • Should the United States create a separate cybersecurity strategy to  be published alongside the National Security Strategy (NSS), or do you  feel the NSS is sufficient? Why or why not?
       
    • Consider your answer in the context of the original National Strategy to Secure Cyberspace (2003). What is not adequately addressed in the National Security Strategy (2017) as it relates to cybersecurity?
       

Part 2: Public/Private Partnerships

  • After reading the Cybersecurity Act of 2015, address  the private/public partnership with the DHS National Cybersecurity and  Communications Integration Center (NCCIC), arguably the most important  aspect of the act. The Cybersecurity Act of 2015 allows for private and  public sharing of cybersecurity threat information.
     

    • What should the DHS NCCIC (public) share with private sector  organizations? What type of threat information would enable private  organizations to better secure their networks?
       
    • On the flip side, what should private organizations share with the  NCCIC? As it is written, private organization sharing is completely  voluntary. Should this be mandatory? If so, what are the implications to  the customers’ private data?
       
    • The government is not allowed to collect data on citizens. How  should the act be updated to make it better and more value-added for the  public-private partnership in regards to cybersecurity?
       

Part 3: Private Sector Organizations

  • Review the General Data Protection Regulation (GDPR) of  the European Commission (EU). It includes many provisions and arguably  strengthens data protection for individuals within the EU. It even  includes the right to be forgotten. The United States does not have a  similar regulation. There have only been a few regulations implemented  related to US citizens’ private data, which include medical and  financial industries. Some argue implementing regulation such as GDPR in  the United States would hinder innovation. They contend that the End  User License Agreements (EULA) provide sufficient protections and allow  the citizens to make the choice of what is and is not shared.
     

    • As a private sector organization, do you believe that an equivalent to GDPR should be implemented in the United States?
       

Part 4: Protecting Critical Infrastructure and the Homeland

  • The Department of Defense (DoD) Cyber Strategy 2018 discusses the protection of critical infrastructure and the homeland.
     

    • What does that mean to private organizations such as yours?
       
    • If most critical infrastructure in the United States is owned by the  private sector, what responsibility does the DoD have in this regard?
       
    • Some would argue US laws are outdated and thus the DoD has little  authority to assist. Others would argue US laws were purposely  established such that the private sector would defend itself and not  need assistance from the military. Obviously, for the DoD to assist, it  would need the private organizations’ data. Said another way, the DoD  would need your data as a private citizen/customer of that organization.  Those that believe our laws need to be updated argue giving up privacy  for protection is legitimate.
       
    • Others will argue that we should not give private information of  citizens to the government for any reason. As a citizen, would you feel  comfortable with this? As a private organization, would you feel  comfortable giving information that may contain your customers’ private  data to the DoD?
       
    • Is there a third solution (middle ground) you would propose that enables privacy but also enables cybersecurity?
       

Part 5: Cybersecurity Technologies

  • The authors of the National Security Strategy (NSS) are  looking to address particular technologies that have the opportunity to  revolutionize cybersecurity. They believe that blockchain technology is  a revolutionary technology that has the ability to significantly  improve cybersecurity.
     

    • What would be your recommendation for how the NSS should incorporate this technology to the public?
       
    • Propose exactly what you believe should be written in the NSS.  Specifically, explain the blockchain technology in layman’s terms to  nontechnical people that may be reading the NSS, give examples of how it  could be used to provide revolutionary cybersecurity, include examples  of how it is being used to provide cybersecurity solutions, and discuss  what, if any policies or laws should be established to mandate its use  in specific industries.
       

Part 6: Ethics in Cybersecurity.

  • Ethical issues are at the core of what we do as cybersecurity  professionals. Think of the example of a cyber defender working in a  hospital. They are charged with securing the network, medical devices,  and protecting sensitive personal health information from unauthorized  disclosure. They are not only protecting patient privacy but their  health and perhaps even their lives. Confidentiality, Integrity,  Availability – the C-I-A triad – and many other cybersecurity practices  are increasingly at play in protecting citizens in all walks of life and  in all sectors. Thus, acting in an ethical manner, is one of the  hallmarks of a cybersecurity professional. 
    • What are the ethically significant harms that may result from mass surveillance (including by government and corporations)? 
    • What are the ethically significant harms that may result from  emerging technologies such as blockchain technology, artificial  intelligence, and machine learning. 

Notes

  • While quality is valued over quantity, it is expected that a quality paper will result in a minimum length of 10–15 pages.
     
  • Use additional sources as needed and be sure to critically analyze the questions, addressing the pros and cons in your proposal.
     
  • Use visuals where appropriate.
     
  • Each team will submit one assignment.
     
  • You will receive an individual grade for this assignment based on your contribution to the overall project.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now