database Management system

  

Given the relational model below, using your ADU ID and SQL statements.

List all your courses of the last term [0.5 pt.]

List the instructors’ names of these courses in descending order [0.5 pt.]

List all courses of the last term that have no prerequisite [0.5 pt.]

List all courses of the last term with grade above ‘C’ [0.5 pt.]

Determine the CSIT department of the last term courses [1 pt.]

Define the courses of the last term that have more than one section [1 pt.]

Display the sections of the courses above that are offered in your location (‘Abu Dhabi’ or ‘Al-Ain’) [1 pt.]

Please attach your last semester schedule details for crosschecking. 

Wireless Technology 3

Wireless Technology

Overview

There are a number of cellular phone companies, each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the pros and cons of 3G and 4G technologies and their roles in today’s applications.    

Instructions

Write a fully developed paper in which you:

  1. Compare the pros and cons of 3G and 4G technology to determine the best uses of 3G and 4G technology in today’s applications.
  2. Describe how an enterprise would use 3G, 4G, WWAN, and WiAMX to improve business. Explain why they would use one solution over the remaining three.
  3. Analyze the changes in 4G technology since the printing of the textbook in 2013 and identify those of importance for a user of 4G technology.
  4. Take a position on the following statement, “Wireless application protocol is a necessity for wireless communication organizations and their users.” Then, explain your position with supporting evidence.
  5. Use at least three quality resources in this assignment.

Note: Wikipedia and similar websites do not qualify as quality resources.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Justify a position on the necessity for wireless application protocol using evidence from research on enterprise use and evolution of relevant technology.

Analyzing and Visualizing Data

According to Kirk (2016), The essence of “Formulating Your Brief” is to “identify the context in which your work will be undertaken and then define its aims: it is the who, what, where, when and how.” It could be formal or informal as any project you think you must make it. This phase is where you create a vision for your work. Checkout Chapter 3 “Formulating Your Brief” from the attachment. 

Answer Needed in APA 7 format with in-text citations and References with 500 + Words.

Question to Answer is:
Why is it so important to formulate your brief for a data presentation? Discuss some ways you would implement to formulate an effective brief. What are some advantages to your methods? What are some disadvantages?

Research Paper

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion 3

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Privacy Issues in HealthCare

please write a research paper on “Privacy issues in HealthCare” which should be 7-9 pages long with citations. Need to include HIPPA and other related laws.

Need 2 Page document with proper APA formatting and citations, references and No plagiarism

Assignment: Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course( Telecomm Network Security, Firewalls and VPNs ) have been applied, or could be applied, in a practical manner to your current work environment (software developer in Financial industry). If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Research Paper

 

While this weeks topic highlighted the uncertainty of Big Data, the author identified the following as areas for future research.  Pick one of the following for your Research paper:

  • Additional study must be performed on the interactions between each big data characteristic, as they do not exist separately but naturally interact in the real world.
  • The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined.
  • New techniques and algorithms must be developed in ML and NLP to handle the real-time needs for decisions made based on enormous amounts of data.
  • More work is necessary on how to efficiently model uncertainty in ML and NLP, as well as how to represent uncertainty resulting from big data analytics.
  • Since the CI algorithms are able to find an approximate solution within a reasonable time, they have been used to tackle ML problems and uncertainty challenges in data analytics and process in recent years.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Signature Assignment: Backup Policies

Securing company data is not as simple as backing up to another hard drive. It is important to have backup tools, processes, and policies for both business continuity and disaster recovery plans.  

In the final section of your Playbook, create a 3- to 4-page outline of backup policies for when the data center is inaccessible.  

Complete the following in your outline: 

  • List the tools used for backup purposes. 
  • Explain the following: 
  • Where employees should work from that day 
  • How employees can get to their data 
  • The communication methods about updates 
  • Outline step-by-step instructions to recover your databases and telecommunications. 
  • Provide a step-by-step guide to recover and provide any additional company assets. 
  • Discuss policies for backup media storage. 
  • Discuss policies for encryption of backup data. 

Note: Numbered or bulleted steps or guidelines make the document easy to for others to follow under potentially stressful situations. Paragraphs can be used to help support the steps or guidelines. 

Cite at least 2 resources to support your assignment.

Format your assignment according to APA guidelines.