Database

 

Using the Entities and Attributes you created for your business from the week 1 discussions, show the tables and relationships resulting from your model in the form of an E/R diagram.  Be sure to identify key attributes and relationships across all entities.

You can use Microsoft tools like PowerPoint/Visio, or any other graphical modeling tool to create your E/R diagram.

Business from week 1:

 

Custom 3D Printed Jewelry

Business Overview: Custom 3D Printed Jewelry is a niche business specializing in designing, customizing, and producing 3D printed jewelry pieces such as rings, necklaces, bracelets, and earrings. Customers can choose from pre-designed pieces or request custom designs. The business uses advanced 3D printing technology to create unique, personalized jewelry items.

Possible Entities and Their Attributes

1. Customer

  • CustomerID: 
  • FirstName:
  • LastName: 
  • Email: 
  • Phone: 
  • Address: 
  • JoinDate: 

2. JewelryPiece

  • JewelryID: 
  • Name: 
  • Description: 
  • Type: 
  • Price: 

3. Order

  • OrderID: 
  • OrderDate: 
  • CustomerID: 
  • TotalAmount: 

4. OrderDetails

  • OrderDetailID:
  • OrderID: 
  • JewelryID: 
  • Quantity: 
  • Price: 

5. Customization

  • CustomizationID: 
  • JewelryID: 
  • CustomerID: 
  • Details: 
  • DesignFile:

Database Processing and Application Software

Database Processing

  • Relational Database Management System (RDBMS): A relational database, such as MySQL, PostgreSQL, or Microsoft SQL Server, would be ideal for managing the entities and their relationships.
  • CRUD Operations: The system will require Create, Read, Update, and Delete operations to manage customers, jewelry pieces, orders, and customizations.
  • Transaction Management: To ensure data integrity, particularly for order processing and payment transactions.
  • Search and Filtering: Customers should be able to search for jewelry pieces by type, material, price range, etc.
  • Reporting: Generate reports on sales, customer orders, popular items, etc.

Application Software

  • Web Application: A user-friendly web application for customers to browse jewelry pieces, place orders, and request customizations. Technologies could include HTML, CSS, JavaScript, React.js for the front-end, and Node.js or Django for the back-end.
  • Inventory Management System: To keep track of available materials and manage inventory levels for 3D printing supplies.
  • Customer Relationship Management (CRM): To manage customer interactions, track order history, and handle customer support.
  • Design Software Integration: Integration with 3D design software (e.g., Blender, Tinkercad) to handle custom design requests and process 3D models.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cyber5

 

 Defensive Tactics and Procedures.

Instructions: Discuss how you would develop strategies for security architecture consisting of tools, techniques, and technologies to detect and prevent network penetration and to design effective cybersecurity countermeasures.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

w5

 

Assignment Instructions:
You are tasked as the Cybersecurity Director to develop an Organizational Strategic Security Plan to defend against Cyber Attacks. This plan includes strategies and plans for security architecture consisting of tools, techniques, and technologies to detect and prevent network penetration, and to design effective Cybersecurity countermeasures.

For the purpose of this assignment, your plan is only required but not limited to have the areas outlined under the requirements listed below:

REQUIREMENTS:

  1. 4 – 6 Pages in length in APA format (not including a cover page and reference section)
  2. Cover Page
  3. Introduction (your fictitious organization [use one developed in previous assignments] background and IT architecture)
  4. Develop an Organizational Strategic Security Plan that does the following:
    • Establishes a Security Awareness & Training Program
    • Defines Policy and Compliance for your organization
    • Addresses Intrusion Detection and Prevention Tools and Techniques
    • Defines Vulnerability Assessment and Penetration Testing Procedures
    • Establishes a Disaster Recovery Program
    • Defines Defense in Depth principles
  5. Reference Section

MISCELLANEOUS:

  1. Your references should not be more than 5 years old
  2. Your assignment is due by Sunday not later than 11:59 p.m. Eastern time.

CATEGORY

4

3

2

1

Multiplier

Total

Introduction

The introduction clearly states the main topic and previews the structure of the paper.

The introduction clearly states the main topic but only partially previews the structure of the paper.

The introduction states the main topic, but does not preview the structure of the paper.

There is no clear introduction of the main topic or structure of the paper.

X 2.5

Paragraph Construction

All paragraphs include introductory sentence, explanations or details, and concluding sentence.

Most paragraphs include introductory sentence, explanations or details, and concluding sentence.

Paragraphs included related information but were typically not constructed well.

Paragraphing structure was not clear and sentences were not typically related within the paragraphs.

X 2.5

Sequencing

Details are placed in a logical order and correspond to the structure presented in the introduction.

Details are sometimes logically placed, but do not correspond to the structure presented in the introduction.

Some details are not in a logical or expected order, and this distracts the reader.

Many details are not in a logical or expected order. There is little sense that the writing is organized.

X 2.5

Transitions

A variety of thoughtful transitions are used. They clearly show how ideas are connected.

Transitions clearly show how ideas are connected, but there is little variety.

Some transitions work well; but connections between other ideas are fuzzy.

The transitions between ideas are unclear or nonexistent.

X 2.5

Supportive Research

Supporting research studies and/or reports are research-based and accurately reported.

Supporting research studies and/or reports are not accurately reported.

Research studies and/or reports do not support the discussion.

Research studies and/or reports are limited and/or inaccurately reported.

X 2.5

Quality of Information

Information clearly relates to the main topic. It includes several supporting details and/or examples. The paper is in APA format and the body of the paper is between 8 and 10 pages.

Information clearly relates to the main topic. It provides 1-2 supporting details and/or examples. The paper is not completely in APA format and the body of the paper is between 8 and 10 pages.

Information clearly relates to the main topic. No details and/or examples are given.The paper is not completely in APA format and the body of the paper is between 8 and 10 pages.

Information has little or nothing to do with the main topic. The paper is completely in APA format and the body of the paper is between 8 and 10 pages.

X 2.5

Conclusion/

Recommendations

The conclusion effectively summarizes the discussion and provides at least two recommendations for further research.

The conclusion summarizes the paper but provides only one recommendation for further research.

The conclusion partially summarizes the discussion, but provides no recommendations.

The conclusion is poorly constructed.

X 2.5

Sources

Citations

References

All sources (information and graphics) are accurately documented in APA. If you had a citation in the body of your work you must have the appropriate reference in the reference section. (Provided at least 10 references)

Two sources are not documented in APA format. If you had a citation in the body of your work you must have the appropriate reference in the reference section. (Provided at least 10 references)

Several sources are not documented in APA format. Not all citations match the reference in the reference section.(Provided less than 10 references)

Several sources are not documented in APA format.Not all citations match the reference in the reference section. Provided less than 5 references)

X 2.5

Mechanics

No grammatical, spelling or punctuation errors.

One grammatical, spelling or punctuation errors.

Two grammatical, spelling, or punctuation errors.

More than two grammatical, spelling, or punctuation errors.

X 2.5

Timeliness

All late submissions have a 10 point (10%) deduction.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Mit 4

APA FORMAT 300 words REFERENCES AND CITATIONS 

What’s the difference between a SAVINGS and a COST AVOIDANCE???  Give some examples.  Is one Better than the other? 

When do you need a SAVINGS and when do you need an AVOIDANCE?  Why?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ITSM 4

APA FORMAT 300 Words with References and Citations

Requirement 1: Why have hubs become obsolete?  

Requirement 2: What are the advantages of creating virtual LANs?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

week 4 literature review

 BELOW IN THE FILES IS WEEK 2 ASSIGNMENT IT IS TITLED TOPIC DEFINITION STATEMENT I MISTANKELY LEFT OFF THE REFERENCES SO YOU WILL HAVE TO GO AND SEARCH THIS ASSIGNMENT TO FIND THEM!!!

ALSO I HAVE THE FILE WHAT SHE WANTS THE PAPER TO LOOK LIKE AND WHAT SHE DOES NOT WANT YOU TO DO!!

Search the literature for scholarly or peer-reviewed articles on your research topic/problem statement. Locate 10 empirical studies (each must be under five years old) addressing your selected issue. At least two of the 10 articles should have an ethical issue described and at least two of the 10 articles should discuss risk management of a project. Describe what you learned, how it applies to your research topic/problem statement, and what applications apply to your topic. Summarize the methodology, and research results, and provide an analysis of the empirical studies. Draw conclusions for the findings in your research.

Summarize each article. You may want to capture the following information with a tool such as One Note or RefWorks for later use in your doctoral project. Use this assignment and course as a way to build up a reference list for your topic.

Write a report/review of the literature you find that provides the following:

  • Key words in title and abstracts.
  • Theory referenced.
  • Purpose of research.
  • Results.
  • Conclusions.
  • Implications and recommendations.
  • Any ethical implications that exist as a result of the study reviewed toward project management.
  • Description of how risk management processes were discussed, analyzed, or studied in the literature reviewed.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

week 4 discussion risk register

 After reviewing the week studies, discuss how, when, and by whom the risk register should be utilized and how it has an impact on successful risk management. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Flow diagrams

 

  • In your first paragraph, talk about the use of process flow diagrams in the specialization of cyber-security. What did you learn from your research about your area? Be specific and cite your sources.
  • In your second paragraph, describe the process one would create for a process flow diagram in Week 6.
  • Diagrams are useful, but not all people understand them as easily as they understand a written description of what’s going on in the process flow diagram. In your third paragraph, talk about why you think it’s important to have both the diagram and a description of the process in the business requirements.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion Forum

Please review the attached .pdf file. These are the steps for the assignment. You will attach a Word or equivalent document for submitting the assignment. Please make sure that the assignment includes a modified model screenshot and explanation as requested.  Please include a title page and make sure that you cite any references that are used. You can talk with others in the class when you are doing this, but this is an individual assignment.    

Go through and complete each tutorial 

●  Complete each of the tutorials shown 

○  Please make sure that you are saving your models as you go 

○  Please take screenshots of some of your work  

● At the end of each of the tutorials, there are some suggestions to modify the model that you have created. 

○ Make some suggested modifications to the models 

○ Take screenshots of the changes that you have made and the results of how this changed the outcomes.

  ● Put together an “individual” Word document with the screenshots of the changes/modifications.  ○ Please write a couple of paragraphs on what you learned in each one of the tutorials  

■ Include general observations and analysis  

■ Describe the modifications that you made and the outcomes that resulted    

See the attached tutorial      

links 

 Disease Dynamics (SD): https://insightmaker.com/node/3778    

Disease Dynamics (ABM): https://insightmaker.com/node/3790    

Predator-Prey Interactions (SD): https://insightmaker.com/node/3801

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Crusin’ Fusion, Part 1

 

Now that the Crusin’ Fusion website is up-and-running, you and your team have decided to run a contest on the blog asking customers to name the latest fusion recipe. In order to participate, the customer will need to enter first and last name, phone number, and an email address, as well as the suggested fusion name. The winner of the contest will receive a $20 gift card.

Kiran supports this idea but has concerns she wants the team to consider before moving forward. She has asked that you prepare a 6- to 10-slide presentation with speaker notes for the next web meeting to address the following:

  • Research and assess the ethical issues related to data customer collection and information management. How will customer information be protected?
  • Research and examine the need to protect the intellectual property of the customers who submit name suggestions. What protection will Cruisin’ Fusion need in order to use the name suggested by the winner? What protection or disclaimer does the customer require?
  • Include a 1/2-page disclaimer to add to the blog for customers outlining the contest rules, explaining how their personal information will be used and stored, and discussing the use of all intellectual property submitted as part of the contest.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now