Discuss some of the constraints that must be overcome in order to build a successful implementation of a database system.

This discussion forum focus on the many dimensions of building a properly functioning database system that meets customer demands. Discuss some of the constraints that must be overcome in order to build a successful implementation of a database system.

Should be more than 400 words 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Sales Commissions (C# Programming)

 (Sales Commissions) Use a one-dimensional array to solve the following problem: A company pays its salespeople on a commission basis. The salespeople receive $200 per week plus 9% of their gross sales for that week. For example, a salesperson who grosses $5,000 in sales in a week receives $200 plus 9% of $5,000, or a total of $650. Write an app (using an array of counters) that determines how many of the salespeople earned salaries in each of the following ranges (assume that each salesperson’s salary is an integer). Summarize the results in tabular format.

  1. $200-299
  2. $300-399
  3. $400-499
  4. $500-599
  5. $600-699
  6. $700-799
  7. $800-899
  8. $900-999
  9. $1,000 and over

Note: This is a programming assignment.  Follow the previous instructions for submitting a program and documentation. 
 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Homework

Sub: intro to data mining

 

Week 5 Homework

After reviewing the case study this week by Krizanic (2020), answer the following questions in essay format.

  1. What is the definition of data mining that the author mentions?  How is this different from our current understanding of data mining?
  2. What is the premise of the use case and findings?
  3. What type of tools are used in the data mining aspect of the use case and how are they used?
  4. Were the tools used appropriately for the use case?  Why or why not?

In an APA7 formatted essay answer all questions above.  There should be headings to each of the questions above as well.  Ensure there are at least two-peer reviewed sources to support your work. The paper should be at least two pages of content (this does not include the cover page or reference page). 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Disaster Recovery Plan

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762). This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.

  •     Introduction
  •     Roles and Responsibilities
  •     Incident Response
  •     Plan Activation
  •     Document History
  •     Procedures

Your paper should meet the following requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Laws, Regulations, and Compliance

part-1

provide a 50–100-word explanation on why you chose your answer. Please cite your sources for your answers from your course materials or other credible resources.

1. Which guidelines state that the data gathered for private individuals should only be used for the purpose for which it is collected?

A. European Union Principles on Privacy
B. Computer Security Act of 1987
C. Economic Espionage Act of 1996

2. Which pillar of Basel II determines the lowest amount of funds that a financial institute must keep on hand?

A. Supervision
B. Market Discipline
C. Minimum Capital Requirements

3. Your organization’s website follows the Platform for Privacy Preferences Project (P3P) guidelines for user privacy on its public website. Which organization developed P3P?

A. Internet Architecture Board (IAB)
B. World Wide Web Consortium (W3C)
C. European Union

4. Based on the Federal Privacy Act of 1974, which type of permission must be obtained by a government agency to disclose private information that the agency collected?

A. Verbal permission
B. Implied permission
C. Written permission

5. What is the correct definition of a data aggregator?

A. A company that compiles, stores, and sells personal information
B. A company that analyzes personal information
C. A company that secures personal information

6. You work for a pharmaceutical company. The research department of your company has recently created a chemical formula for a new drug. Which property law term applies in this case?

A. Trade secret
B. Copyright
C. Trademark

7. You work for a United States federal agency. Your manager indicates that you must identify computers that contain sensitive information. Which law requires this?

A. HIPAA Act
B. Computer Security Act of 1987
C. Economic Espionage Act of 1996

8. Which statement is true of reverse engineering?

A. It involves compiling vendor object codes.
B. It analyzes the operation of an application.
C. It removes security flaws from object code.

9. Which of the following is MOST important in determining whether a disaster recovery test is successful?

A. Critical business processes are duplicated
B. Only business data files from offsite storage are used
C. IT staff fully recovers the processing infrastructure

10. An organization determined that if its email system failed for 3 days, the cost to the organization would be eight times greater than if it could be recovered in one day period. This determination most likely was the result of:

A. Disaster recovery planning
B. Business impact analysis
C. Full interruption testing

11. Which of the following should be performed FIRST in the aftermath of a denial of service DOS attack?

A. Restore servers from backup media stored offsite
B. Conduct an assessment to determine system status
C. Perform an impact analysis of the outage

12. Which of the following is the MOST important element to ensure the successful recovery of a business during a disaster?

A. Network redundancy is maintained through separate providers
B. Hot site equipment needs are re certified on a regular basis
C. Detailed technical recovery plans or maintained off site

part-2

provide a 50–100-word explanation on why you chose your answer. Please cite your sources for your answers from your course materials or other credible resources.

1. You are researching computer crimes. All of the following are categories of this type of crime, EXCEPT:

A. Computer-assisted crime
B. Computer-targeted crime
C. Computer-commerce crime

2. Which crime term is used to indicate when and where a crime occurred?

A. Means
B. Motive
C. Opportunity

3. Which type of law governs the payment of compensation and fines without sentencing the offenders to jail?

A. Civil law
B. Criminal law
C. Copyright law

4. An employee is suspected of criminal activity involving access to data in excess of the employee’s authority. You have obtained the original signed copy of the no-right-to-privacy agreement that the employee signed when he was hired. What kind of evidence is this agreement?

A. Best evidence
B. Secondary evidence
C. Corroborative evidence

5. As part of an incident investigation, you need to ensure that the primary copy of the original media is stored properly. All of the following steps should be completed, EXCEPT:

A. Label the primary copy with the date, time, collector’s initials, and case number, if applicable.
B. Encrypt the primary copy to ensure the contents are protected.
C. Seal the primary copy in a container and label the container to ensure that the primary copy is safe.

6. Which crime term is used to indicate how a criminal committed a crime?

A. Means
B. Motive
C. Opportunity

7. Which statement is true of circumstantial evidence?

A. It helps prove either a point or an idea.
B. It requires inference from the available facts.
C. It relies on original documents to prove a fact.

8. To investigate computer crimes, with which agency does FBI work?

A. Interpol and NSA
B. Secret Service and local law enforcement
C. Department of Defense

9. When an organization is using an automated tool to manage and house its continuity plans, which would have following is the PRIMARY concern?

A. Ensuring accessibility should a disaster occur
B. Versioning controls as plans are modified
C. Tracking changes in personnel and plan assets

10. Which of the following actions should be taken when an information security manager discovers that a hacker is footprinting the network perimeter?

A. Reboot the border router connected to the firewall
B. Check intrusion detection system logs
C. Enable server trace routing on the Demilitarized Zone segment

11. One performing a business impact analysis, which of the following should calculate the recovery time and the cost estimates?

A. Business continuity coordinator
B. Business process owners
C. Information security manager

12. Which of the following is MOST closely associated with a business continuity program?

A. Periodically testing network redundancy
B. Updating the hot site equipment configuration every quarter
C. Developing recovery time objectives for critical functions

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Austin Martin Electronic Project

There are seven questions in the below attached pdf. All graphs/charts/tables are to be produced in the native format (excel, project, etc.) and then copied into the response area of the Management Word document. Please don’t copy paste from Chegg. 

1. Provide a project objective associated with the Astin Martin Electronics project.  Include a list of assumptions about the project. 

2. What is a work breakdown structure? What is a responsibility matrix? Using the Astin  Martin Astin Martin Electronics project activity list and activity duration schedule,  create a WBS and RAM. 

Work Breakdown Structure (Should provide hierarchical graph) 

??? 

Responsibility Assignment Matrix 

??? (Example RAM Template: From different requirements.  Be sure and remove any examples in your management response  document.)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Learning Journal/Python 1

 

Create a Python dictionary that returns a list of values for each key. The key can be whatever type you want. 

Design the dictionary so that it could be useful for something meaningful to you. Create at least three different items in it. Invent the dictionary yourself. Do not copy the design or items from some other source. 

Next consider the invert_dict function from Section 11.5 of your textbook. 

# From Section 11.5 of: 
# Downey, A. (2015). Think Python: How to think like a computer scientist. Needham, Massachusetts: Green Tree Press. 

def invert_dict(d):
     inverse = dict()
     for key in d:
          val = d[key]
          if val not in inverse:
               inverse[val] = [key]
          else:
               inverse[val].append(key)
     return inverse 

Modify this function so that it can invert your dictionary. In particular, the function will need to turn each of the list items into separate keys in the inverted dictionary. 

Run your modified invert_dict function on your dictionary. Print the original dictionary and the inverted one. 

Include your Python program and the output in your Learning Journal submission. 

Describe what is useful about your dictionary. Then describe whether the inverted dictionary is useful or meaningful, and why. 

PART 2 

 

Describe how tuples can be useful with loops over lists and dictionaries, and give Python code examples. Create your own code examples. Do not copy them from the textbook or any other source. 

Your descriptions and examples should include the following: the zip function, the enumerate function, and the items method. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

analyzing 4

 When thinking about data visualization, it is important to understand regular expressions in data analytics.  Therefore, note the importance of data visualizations and choose two types of expressions (* – wildcards for example) and discuss the difference between the two types of expressions. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Java program compares the execution time to ArrayList and LinkedList

You must include a short description of the program’s function, and comments necessary to explain the operation of your program. please view instructions in ppt for details. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Mobile Application – discussion

Developing in the mobile space can be a daunting task for developers.  Developers must figure out which platforms they should support for their apps, purchase the hardware, and join the developer programs for each platform.   PhoneGap is an open source set of tools which enables developers to create mobile applications for multiple devices by utilizing the same code. It is a hybrid mobile application framework that allows the use of HTML, CSS, and JavaScript to write applications which are based on the open standards of the web.  MonoTouch and Mono for Android rely on the Mono Framework to function. Mono is a cross-platform open source implementation of the .NET Framework.  Mono is a cross-platform open source implementation of the .NET Framework. 

  • How is sharing code being one of the most appealing reasons to use MonoTouch and Mono for Android?  Explain
  • How is the use of debugging tools helpful in resolving mobile application issues quickly?

– 2 pages

– apa with references

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now