Your paper should meet these requirements:

Find a peer-reviewed scholarly journal article discussing electronic innovation and the government. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use the UC library (https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles (https://scholar.google.com/ )

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

Be approximately three to four pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

System Programming

BACKGROUND: A shell provides a command-line interface for users. It interprets user commands and executes them. Some shells provide simple scripting terms, such as if or while, and allow users to make a program that facilitates their computing environment. Under the hood, a shell is just another user program as you know from Minor2 assignment. The file /bin/bash is an executable program file for the bash shell. The only thing special about your login shell is that it is listed in your login record so that /bin/login (i.e., the program that prompts you for your password) knows what program to start when you log in. If you run “cat /etc/passwd”, you will see the login records of the machine.

PROGRAM DESCRIPTION

GROUP COLLABORATIVE PORTION: In this assignment, you will implement the shell “engine” as the group component, where all members are responsible for the following functionality.

A Command-Line Interpreter, or Shell

Your shell should read the line from standard input (i.e., interactive mode) or a file (i.e., batch mode), parse the line with command and arguments, execute the command with arguments, and then prompt for more input (i.e., the shell prompt) when it has finished. This is what Minor 2 program should do with addition of batch processing which means just reading a batch line by line and calling the same interpretation logic.

  1. Batch Mode

In batch mode, your shell is started by specifying a batch file on its command line. The batch file contains the list of commands that should be executed. In batch mode, you should not display a prompt, but you should echo each line you read from the batch file back to the user before executing it. After a batch is finished the shell will exit.

  1. Interactive Mode

No parameters specified on command line when the shell is started. In this mode, you will display a prompt (any string of your choice) and the user of the shell will type in a command at the prompt.

You will need to use the fork() and exec() family of system calls. You may not use the system() system call as it simply invokes the system’s /bin/bash shell to do all of the work. You may assume that arguments are separated by whitespace. You do not have to deal with special characters such as ‘, “, , etc. You may assume that the command-line a user types is no longer than 512 bytes (including the ‘n’), but you should not assume that there is any restriction on the number of arguments to a given command.

INDIVIDUAL PORTIONS

Build-in Commands: Every shell needs to support a number of built-in commands, which are functions in the shell itself, not external programs. Shells directly make system calls to execute built-in commands, instead of forking a child process to handle them.

In this assignment, each member of the group will implement one of the following section and commit in GitLab the code that supports those commands:

  1. Add a new built-in alias command that allows you to define a shortcut for commands by essentially defining a new command that substitutes a given string for some command, perhaps with various flags/options. The syntax is as follows: alias alias_name=’command’. For example, you can define an alias with alias ll=’ls –al’, so that the user can then enter ll at the prompt to execute the ls -al command. Specifying alias with no arguments should display a list of all existing aliases. You may remove a single alias with the command alias -r alias_name or all defined aliases with alias -c.
  2. Add a new built-in exit command that exits from your shell with the exit() system call. Also add support for signal handling and terminal control (Ctrl-C, Ctrl-Z). You do not want those signals to terminate your shell. Instead you need to handle them and terminate processes that your shell started if any. Be aware that forked processes will inherit the signal handlers of the original process.
  3. Add a new built-in path command that allows users to show the current pathname list. The initial value of path within your shell will be the pathname list contained in the PATH environment variable. path + ./dir appends the ./dir to the path variable. You may assume that only one pathname is added at a time. You will need to add it to the “real” PATH environment variable for executables in the path to work correctly. path – ./dir removes the pathname from the path variable. You may assume that only one pathname is removed at a time. Also, you need to restore your PATH environment variable to its original state when the user exits your shell.
  4. Add a new built-in history command that lists your shell history of previous commands. It is up to you to select what number of prior commands to keep in history. history –c command should clear your history list. history N, where N is number, displays your prior N-th command starting with the last one. history N -e executes your prior N-th command.

OPTIONAL assignments for extra credits:

  1. Extend your shell with I/O redirection: <, >, >> (+20%).
  2. Extend your shell with pipelining | (+20%).

DEFENSIVE PROGRAMMING (GROUP COLLABORATIVE EFFORT): Check the return values of all system calls utilizing system resources. Do not blindly assume all requests for memory will succeed and that all writes to a file will occur correctly. Your code should handle errors properly. In general, there should be no circumstances in which your C program will core dump, hang indefinitely, or prematurely terminate. Therefore, your program must respond to all input by printing a meaningful error message and either continue processing or exit, depending upon the situation. Many questions about functions and system behavior can be found in the manual pages. You should handle the following situations:

  • An incorrect number of command line arguments to your shell program;
  • The batch file does not exist or cannot be opened.
  • A command does not exist or cannot be executed.
  • A very long command line (over 512 characters including the ‘n’).

REQUIREMENTS: Your code must be written in C.

GRADING: Your C program file(s), README, and makefile shall be committed to our GitLab environment as follows:

  • Your C program file(s). Your code should be well documented in terms of comments. For example, good comments in general consist of a header (with your name, course section, date, and brief description), comments for each variable, and commented blocks of code.
  • A README file with some basic documentation about your code. This file should contain the following four components:

Your name(s);

Organization of the Project. Since there are multiple components in this project, you will describe how the work was organized and managed, including which team members were responsible for what components – there are lots of ways to do this, so your team needs to come up with the best way that works based on your team’s strengths. Note that this may be used in assessment of grades for this project.

Design Overview: A few paragraphs describing the overall structure of your code and any important structures.

Known Bugs or Problems: A list of any features that you did not implement or that you know are not working correctly.

  • A Makefile for compiling your source code, including a clean directive.
  • Your program will be graded based largely on whether it works correctly on the CSE machines.

Introduction to technology 1010

 We want you to read at least one article or view a video about hardware (not software). Then write a brief summary (or create a short presentation) summarizing the article using MS Word or PowerPoint. Brief means no less than 10 sentences but not more than one page. Make sure to cite your source properly. 

Database (2) database design

1-Write the relational algebra expressions for the following (using Ç):
branch (branch_name, branch city, assets)
customer (customer_name, customer street, customer city)
loan (loan number, branch_name, amount)
borrower (customer name, loan number)
account (account_number, branch name, balance)
depositor (customer_name, account number)
a) Find the names of all customers who have a loan and an account at bank. 
b) Find all customers who have an account from at least the “Downtown” and the “Uptown” branches. 
2- University schema
Classroom (building, room number, capacity)
Department (dept name, building, budget)
Course (course id, title, dept_name, credits)
Instructor (ID, name, dept_name, salary)
Section (course id, sec id, semester, year, building, room number, time slot id)
Teaches (ID, course id, sec id, semester, year)
Student (ID, name, dept_name, tot cred)
Takes (ID, course id, sec id, semester, year, grade)
Advisor (student ID, instructor ID)
Time slot (time slot id, day, start time, end time)
Prereq (course id, prereq id)
Write the following queries in SQL, using the university schema
a) Find the names of all students who have taken at least one Comp. Sci. course; make sure there are no duplicate names in the result
b) Increase the salary of each instructor in the IT department by 15%. 
c) Insert every student whose tot cred attribute is greater than 75 as an instructor in the same department, with a salary of $15,000. 
3- Refer to the university schema used in Q.2 and write the following queries using Nested subqueries.
a) Find the average instructors’ salaries of those departments where the average salary is greater than $50,000. (Hint: use subqueries in the From Clause)
b) Delete all courses that have never been offered (that is, do not occur) in the section relation. 
4- Deleting a record can be costly to an organization if not done in the right way. Let us assume you are working as a DBA (database administrator) and you used the delete command without specifying a condition in the where clause. What do you think will happen to the record in the database? And in case a record was deleted, is there a way to recover the lost data? Answer should be in your own words.

Assignment – Database Security

Write an essay of at least 500 words discussing the use of encryption to protect data at rest, in motion, and in use.    

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

https://www.zdnet.com/article/encrypting-data-at-rest-is-vital-but-its-just-not-happening/

https://digitalguardian.com/blog/data-protection-data-in-transit-vs-data-at-rest

https://docs.microsoft.com/en-us/azure/security/azure-security-encryption-atrest

https://www.datamotion.com/2015/12/best-practices-securing-data-at-rest-in-use-and-in-motion/

https://www.youtube.com/watch?v=5DsnvMkGLS4

Transparent Data Encryption

https://www.youtube.com/watch?v=8DNx4s8q-8E

Homomorphic Encryption

https://www.youtube.com/watch?v=NBO7t_NVvCc

https://www.youtube.com/watch?v=Kfwo-S2jZv4

After completing the reading this week, we reflect on a few key concepts this week

 

  1. Discuss what ethical leadership is and how it impacts the organizational culture.
  2. What are the various dimensions of ethical leadership?
  3. Note some failures in ethical leadership, please find an example, explain the failure and note possible solutions to fix the issue with leadership.

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive. Substantive posts will do at least TWO of the following:

· Ask an interesting, thoughtful question pertaining to the topic

· Expand on the topic, by adding additional thoughtful information

· Answer a question posted by another student in detail

· Share an applicable personal experience

· Provide an outside source

· Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread. Please ensure to use information from your readings and other sources from the UC Library. Use APA references and in-text citations.

300 words

Outline a proposal for health education that can be used in a family-centered health promotion to address the issue for the target population. Ensure your proposal is based on evidence-based practice. (Diabetes Mellitus in African American population )

WEEK 9

Write a fully developed paper in which you:

  1. Assess the two distinct networking functions. 
  2. Analyze the issues Choice is likely to experience as it expands its network to full global reach. Provide a rationale for your answer. 
  3. Critique Choice implementing free high-speed Internet access for all guests in its Clarion Hotels and Comfort Suites from the security point of view. 
  4. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.