Please answer all 3 questions below within 300 words in total, then do the next practical session.
----------------------------------------------------------------------------------------------------------
1. Toyota car company has 80 employee and uses MS-Access software to store the information. Some tables of the data are shown in 2 tables shown in the attached image file. How many fields and records are there in these 2 tables? Which ones are the Primary and Foreign Keys? What and how do you create this relationship between these 2 tables?
2. What is ER diagram? How many types of entities in ER diagram, give me example and explain for each. What is the meaning of Calculated/derived attribute in ER diagram (use example for your explanation)? Why ER diagram is important?
3. Please explain about Distributed Database and the use of it (in what situation). Why distributed database is better compared to other configurations. Is there any draw back
Week 3 Readings and Media
Please review the following for this week:
Vic (J.R.) Winkler, Securing the Cloud, Cloud Computer Security Techniques and Tactics, 2011, Chapter 3
NIST SP 800-125A SECURITY RECOMMENDATIONS FOR HYPERVISOR DEPLOYMENT ON SERVERS, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-125A.pdf
Video:
Public Cloud Security: Surviving in a Hostile Multitenant Environment
https://www.youtube.com/watch?v=lk4eCARD1RU
----------------------------------------------------------------------------------------
Week 3 ASSIGNMENT: Security Concerns, Risk Issues, and Legal Aspects (2 pages)
Write two pages using this weeks reading and media. APA Format and provide two references at a minimum.
Write two paragraphs (for each answer) in a separate document that you can upload (e.g., Microsoft Word file). Precede each answer with the question and its corresponding num
For this case study response, you need to analyze and study the subject presented below and compose an essay response answering the questions posed. Your writing should concentrate on the development of specific events, issues, or conditions of the subject and their relationships. For this activity, you are being asked to write a complete essay, not just an outline as was done in Module 3.
The topic addresses the disposal of our technology devices and gadgets. To begin, view the following video.
The Goal:
1. The student designed lesson which uses modern techniques.
2. To be proficient in the use of computers in teaching as the most important modern technology.
3. To attend lessons and assist his colleagues in preparing lessons using modern technologies.
Description:
Prepare an educational unit from a textbook from the sixth grade and above, provided that the program depends on the teaching method (Individualize learning) The
Program used for
PowerPoint, which can be used to teach a concept in your major. The presentation must include advanced features of PowerPoint such as sound and input Pictures, video clips, etc.
Required:
Alignment with the lesson objective: The presentation should be consistent with the topic or the objective of the lesson. Choose the topic or goal of your major and the grade level you intend to teach.
Length: The width shall be appropriate to the concept and to the chosen
**Must be in IEEE FORMAT and NOT double spaced, please.**
- Using the IEEE template (see link below), write a literature review paper that summarizes
part 10 of our textbook: "Distributed databases, NOSQL, and Big data"
https://www.ieee.org/conferences/publishing/templates.html
- Your paper should have a minimum of 4 pages
- The paper has to present at least the following sections
* Introduction
* Literature review on distributed databases
* Literature review in NOSQL databases
* Literature review on big data
* Practical applications
* Include multiple subsections (one for each example)
* Final remarks and Conclusions
- You should consider other references beyond our textbook
* Check the syllabus for the textbook reference<
they check papers against blackboard to see if any commonality from other students. These do not show up in plagiarism checks
Assess Organizational Readiness
Note: The assignments in this course are a series of papers that are based on the same case, which is located in the XanEdu tab in the left-hand menu of your course. The assignments depend on one another. Review the assigned case study and complete this assignment.
Write a 46 page paper in which you:
Analyze how the critical success factors (CSFs) apply to the facts of the case study. Provide examples to support your analysis.
Determine the project benefits, organizational readiness, and risk culture of the company in the case study. Provide justification for your response.
Develop at least three project risk recommendations based on your analysis.
Identify the initial categories of risk (RBS Level 1 and 2) that you see as being present in the case study using the Example Risk Checklist (Figu
The identity and access management domain of CISSP permits perspective into the the roles, access privileges and permissions of users, subjects, and objects in a system. The goal is to establish, maintain, modify and monitor digital identity, authentication, authorization, accounting and accounting through the access life cycle.
For this week, watch this video (closed captions are available):
https://www.youtube.com/watch?v=B-gKozU6oiw (Links to an external site.)
You can learn more here: https://www.cisa.gov/safecom/icam-resources
Dialogue back and forth at least 4 times on the content, using as many of the topics below as possible in context. Highlight each term in BOLD in your submission.
Your first post may be submitted tonight, but must be submitted no later than Friday 29th. The more terms you use, the more likely your score will be high.
Identification
Authentication
Authorization
Accounting
Review what you completed in Part 1 (last week) and Part 2 of this Investigation Scenario. Create a Final Report for the investigation in the form of a 2-4 page paper (12 point font, double spaced) that includes the following:
A cover sheet with your name and the name of the case (this does not count as one of the pages)
Your investigation notes
The names of anyone arrested and the charges against that individual
Additionally, include an appendix to your report that contains all of your evidence that is separated by letter and organized by type of evidence:
Appendix A original complaint,
Appendix B Company XYZs policies,
Appendix C Company XYZs Authentication log files for May 10 from 8Am to 2PM, etc.
Make sure to include all of the evidence, including the original log files you have received in the appendix
Assessment criteria:
Answer the following questions:
1. COBIT is a widely adopted information technology internal controls framework. COBIT is distributed by ISACA. Access ISACAs Web site at http://www.isaca.org/Knowledge-Center/COBIT/Pages/Overview.aspx. What is the purpose of ISACA? Why should companies use COBIT? Answer thoroughly.
2. It is know that employees are the weakest link in the information security chain. How can companies deal with problems associated with the weakest link? Answer thoroughly.
3. You have been tasked with developing a business continuity plan for the university. Begin by making a list of all of the tasks that are required to complete the assignment.
You must first begin with a risk assessment and business impact analysis. Write a draft memo to the president of the university explaining the need for a business continuity plan. Be sure to include your recommendations on how you would implement a successful plan. (NOTE: Do not actually send th
Task
Write a 500 word essay, using the 3 articles that I attached on code and programming. Talk about the following in your essay:
Essay Title: Code in Computer Programming
Section I: Programming Languages
1. What is a high level language and a low level language? What is the difference?
2. What are some characteristics/ key attributes of low level languages that make them beneficial?
3. What are the benefits and challenges of the C language?
4. What are key optimizers that a C compiler performs?
Section II: The History of Code
5. Describe the history of code
6. Describe Babbage and his analytical engine
7. Describe the ENIAC and the EDVAC
8. Describe the "Modern Code Paradigm"
9. Describe John von Neumann and his contributions
Section III: Metaphors and Code
10. Provide a detailed summary of the article on metaphors and code (should be about 100 words)
Note: Do not
Warning: Use of undefined constant woothemes - assumed 'woothemes' (this will throw an Error in a future version of PHP) in
/home/admin/web/qualityessayresearch.com/public_html/wp-content/themes/cushy/archive.php on line
94
« Older Entries
Warning: Use of undefined constant woothemes - assumed 'woothemes' (this will throw an Error in a future version of PHP) in
/home/admin/web/qualityessayresearch.com/public_html/wp-content/themes/cushy/archive.php on line
95
Newer Entries »