Policy, Legal, Ethics

  

1) Do a bit of research on JSON and AJAX. How do they relate to the the Same-Origin policy?

Using WORD, write several short paragraphs on each. A total of 250-300 words. Use your own words.

2) Answer below questions, each of these questions in a paragraph with at least five sentences.Include the question and number your responses accordingly. Min 1 citation for EVERY question and it needs to be referenced. References & citations should be less than 6 years old. They also need to be an academic source something from the library or scholar Google not just any random website. It must be a peer reviewed academic source or an industry recognized type reference. Make sure your citations and your references use proper APA formatting if you are unsure consult the OWL website. 

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

11. Make an argument for legalizing the copying of music or software. 

12. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I  don’t own them, what is my legal right to them?

3) Watch this video about Joseph Shumpeter’s concept of Creative Destruction. For example, many think that the introduction of self-driving cars will disrupt the job market for drivers. 

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.  Write in essay format not in bulleted, numbered or other list format. It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. 

Information Assurence

Topic: Cryptographic Applications 

  Recommend 4-5 pages (body), including a cover page and reference page (does not count toward 4-5 pages), at least three references and in APA format with 12pt font DOUBLE SPACED ONLY! If you do more than double space you WILL lose points! Safe Assign needs to be under 35% .

C++

 

This is a written assignment where you will research answers to the below questions. All answers will be in your own words. Any copy/paste = 0/100. Feel free to use a combination of text and code if that helps you explain a concept easier. 

Please type your answers to the below questions in a Word document, 12 pt font, single space (please put a blank line between each answer to separate them):

  1. What is object-oriented programming (OOP)? Give examples
  2. Name at least two benefits of OOP. Give examples
  3. What is an object? Give an example
  4. What is a class? Give an example
  5. There are main components of OOP, define each and also explain how works with examples:
    1. Inheritance
    2. Polymorphism
    3. Encapsulation
    4. Data abstraction

I expect to see detailed answers to each of the above. Short, vague answers will result in a low grade. 

Network Assignment

 

Assignment Details

Part 1

For many thousands of years, the primary method of communication was for people to physically gather together to share ideas and discuss concerns. In today’s technology driven world, huge numbers of people gather together without ever directly seeing each other. This is done through social media. Social media is known to produce great changes on how individuals and communities communicate and perceive each other.

Complete the following in a minimum 1-page response:

  1. Briefly, define social media such as Google+®, Twitter®, Pinterest®, LinkedIn®, and Facebook® and how it differs from traditional media. In addition, how has social media impacted the workplace?
  2. Given the increased prevalence of social media, how has your personal perspective of multiculturalism and diversity been impacted?
  3. Select an organization you belong to. How do you think your perspective has impacted that organization? How do you feel that others in the organization have been impacted?

Part 2

As an information technology professional, you are faced with opposing perspectives on ethical issues in your daily work. Research opposing perspectives on ethical issues faced in the Information Technology field as it pertains to networking. An example might be the difference in perspectives of utilizing biometrics for authentication.

Take into consideration the opposing perspectives of different technologies, as it relates to ethics and complete the following in a minimum 1-page essay.

  1. Identify the opposing perspective you have chosen.
  2. Explain the ethical implications that are inherent with both sides of the issue.
  3. Given the ethical implications on both sides of the issue, evaluate the ethical implications on both sides.
  4. Provide your perspective on how you might apply the issue in a work situation.

Just need my worked checked

I need my SQL assignment looked over. I’m currently using MS management studio

  

1. List the employee whose employee number is 100.

Select * from Employee where employee_Num=100;

2.  List the Employee whose salary is between 50 K to 100k.

Select * from Employee where salary between 50000 and 100000;

Select * from Employee where salary >= 50000 and salary <= 100000;

3.  List the Employees whose name starts with ‘Ami’.

Select * from Employees where name like ‘Ami%’;

4. List the Employees whose name starts with A and surname starts with S.

Select * from Employees where name like ‘A%’ and surname like ‘S%’;

5.  List the Employees whos surname contains kar word.

Select * from Employees where  surname like ‘%kar%’;

6.  List the Employees whose name starts with P,B,R characters.

Select * from Employees where name like ‘[PBR]%’;

7. List the Employees whose name not starts with P,B,R characters.

Not Operator Symbol

Select * from Employees where name like ‘[!PBR]%’;

Not Operator

Select * from Employees where name not like ‘[PBR]%’;

8. Write a query to fetch first record from Employee table?

Select * from Employees where rownum=1;

9. Write a query to fetch the last record from Employees table?

Select * from Employees where rowid = select max(rowid) from Employee; 

10. Write a query to find the 2nd highest salary of Employees using Self Join

Select * from Employees a where 2 = select count (distinct salary) from Employee where a.salary <= b.salary;

11. Write a query to display odd rows from the Employees table 

Select * from(select rownum as rno,E.*from Employees E) where Mod(rno,2)=1;

12. Write a query to display even rows from the Employees table 

Select * from(Select rownum as rno,E.* from Employees) where Mod(rno,2)=0;

13. Write a query to show the max salary and min salary together form Employees table

Select max (salary) from Employees

Union

Select min (salary) from Employees;

14. Write a query to fetch all the record from Employee whose joining year is 2018 

Select * from Employees where substr(convert(varchar,joining_date, 103),7,4)= ’2018′

15. Write a SQL Query to find maximum salary of each department 

Select Dept_id,max(salary) from Employees group by Dept_id;

16. Write a query to find all Employees and their managers (Consider there is manager id also in Employee table). 

Select e.employee_name,m.employee name from Employees e,Employees m where e.Employee_id=m.Manager_id;

17. Write a query to display 3 to 7 records from Employee table 

Select * from (Select rownum as ‘No_of_Row’,E.* from Employee E)

18. Write a query to fetch common records from two different tables Employees and Employees1 which has not any joining conditions 

Select * from Employees 

Intersect 

Select * from Employees1;

19. Write a query to validate Email of Employee 

SELECT

EMAIL 

FROM

EMPLOYEE

Where NOT REGEXP_LIKE(Email, ‘[A-Z0-9._%+-]+@[A-Z0-9.-]+.[A-Z]{2,4}’, ‘i’);

20. Write a query to remove duplicate rows from Employees table 

Select Employee_No FROM Employees WHERE ROWID < >

(Select max (rowid) form Employees b where Employee_No =b.Employee_No);

500 words minimum assignment

  

For this assignment, complete the following:

1. For this assignment, you will explore the demo site (https://demo.matomo.org/index.php?module=CoreHome&action=index&idSite=62&period=day&date=yesterday#?idSite=62&period=day&date=yesterday&segment=&category=Dashboard_Dashboard&subcategory=1 )and its features.

2. Now locate the date range tool and select date range. (left side of page)

3. Choose Jan 1, 2014 through Jan 31, 2014 and apply the date range.

4. From the date range select the following metrics to track, Visits Unique Visitors and Avg Time on Website. (see attached screenshot)

5. Roll your mouse over the plot peak points to discover the total each color graph line means something important be sure to note the totals for the days.

6. Create an on page screenshot of the chart and post with your assignment Word Document submission.

Explain what the metrics for the date range within these 30 days is telling you about your website visitors, how long are they staying on the site, how many unique visitors were there, is there a best day of the week with the most visitors. Report what you found from the metrics date range and submit a Word Document with your analysis.

MINIMUM 500 WORDS

CCM-3

   

Research desktop virtualization and summarize at least one  peer-reviewed scholarly article on the topic.  Provide at least two full  paragraphs as a summary.

Additionally, provide at least one more paragraph to contrast and compare Hyper-V and ESXi.

BI_Assignment_1

 

Complete the following assignment in one MS word document:

Chapter 1 –discussion question #1 & exercises 9 and 15 (limit to one page of analysis for question 15)

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

Discussion question #1:

Survey the literature from the past six months to find one application each for DSS, BI, and analytics. Summarize the applications on one page, and submit it with the exact sources

Exercise 9:

Go to microstrategy.com Find information on the five styles of BI. Prepare a summary table for each style.

Exercise 15:

Visit the Million Song Dataset(http://millionsondataset.com/), search the collection, and download a few titles. How are the songs indexed, and how would you download the entire database?