dis_dba11

 While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.  

one and half page in apa formart, with 2 scholar references , no plagarism of any kind

Database Management Systems

You are hired to design a database for a fitness center. As the fitness center is expanding with more than one branch, they want to create a database to keep track of its customers, facilities and employees. Each branch has a unique id and address (building number, street, district, and city). A branch may have more than one facility (e.g. swimming pool, spa, etc.). Each facility must belong to only one branch, and the information for a facility is name and fees. In addition, each fitness branch offers different classes (such as Yoga, Pilates, Zumba, etc.). All classes should be led by at most one trainer, who is an employee. 

 

Employees must work at one and only one branch. Each employee has an id, name, address (building number, street, district, and city) and can have multiple phone numbers. An employee can only be an admin, managing the facility or working as a clerk, or a trainer. An employee cannot be a trainer and an admin because the trainer id compensated an hourly wage while an admin staff paid a monthly salary. Trainers can train individual customers at different time sessions. 

 

A customer must register at one branch. Each customer has a membership number, name (stored as first name and last name), email, and only one phone number. A customer can join more than one class or uses any number of facilities. A customer may also decide to be trained by at most one personal trainer.  

 

 

Given the above description: 1. Draw an ERD for the database, identifying the following: a. All the entities, attributes and relationships b. Primary key and (discriminator in weak entity, if any). Don’t forget each entity has to have PK. c. Participation and cardinality constraints. (Explain your choices for two constraints- i.e. identify the words the guided your decision) d. Specialization and completeness constraints (if there is an ISA relationship). 

 

2. Write a schema for two entities and two relationships of your choice. Remember, sometimes a relationship is better not be represented in a separate schema; if this is the case with your chosen relationship explain what you will do.

assignment Urgant

6pages and Format APA

Based on your previous work in the previous week,createa 700-word entry in yourDatabase Management Plan.

Cybersecurity Awareness Campaign

 

Assignment Content

  1. As a final project requirement, the executive staff requested recommendations to address the following:
    • Strategy for staff awareness
    • Strategy for ongoing security maintenance
    • The best way to get the message across is to have a solid mission statement to share with the organization. You decide to create an awareness campaign for the organization to address the executive staff member’s request. Your campaign consists of the following three items:
    • Mission statement
    • Poster campaign
    • Message to organization via the intranet
    • Create an approximate 90-word security policy mission statement for Dayton Soft Products.

      Develop a poster campaign consisting of 3 posters for security awareness to display in the workplace and to distribute virtually. Each poster must include the security policy mission statement. Highlight at least 5 legal and ethical issues across the 3 posters. You may use any program to create your posters.

      Write a message for the company’s internal website to a diverse workforce announcing the cybersecurity awareness material. You will need to submit a draft of your announcement message to the executive staff in the form of a Microsoft® Word document.

      Provide the following elements in your announcement message:

    • The reason why the corporate security policy was established
    • A mission statement
    • Employees’ role to meet the mission
    • Announce launch of the poster campaign
    • Large images of the three posters
    • Strategies and tools for ongoing monitoring and enforcement of the security policy
    •  

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

 

System  architecture is the descriptive representation of the system’s  component functions and the communication flows between those  components.  

My definition immediately raises some important questions. 

• What are “components”? 

• Which functions are relevant? 

• What is a communication flow?   

Writing assignment 4

WRITING ASSIGNMENT 4 INSTRUCTIONS

SECURITY ISSUES IN P2P NETWORKS

In this assignment, you will answer the following review questions from the reading materials of the module/week. 

1. Question #1 in Section 2.9 in Chapter 2. 

“What are the key components of a typical P2P application? Describe their functions.”

2. Question #4 in Section 3.9 in Chapter 3. 

“What are the essential features of a typical hybrid network architecture design?”

3. Question #2 in Section 7.11 in Chapter 7. 

“What is Sybil attack? Why is it a serious problem?”

4. Question #4 in Section 7.11 in Chapter 7.

“Why is it possible to launch a DDoS attack using a P2P network?”

You are expected to provide a detailed answer that shows a clear understanding to each question’s subject matter. Biblical worldview should be integrated in an appropriate manner and supported by Scripture. In addition to the module’s “Reading & Study” materials, a minimum of 3 references is required for this assignment and be sure to include complete reference information. Your submission must contain at least 1,000 words and should follow the current APA formatting style. Please refer to the current edition of the APA publication manual for guideline details.

Submit this assignment by 11:59 p.m. (ET) on Sunday of Module/Week 5.