relational databases & SQL query language

 1. Each year, there are many emerging technologies and applications. What are the drawbacks -if any- of relational databases when used with the new technologies? Do you think a new database model should be proposed to keep up with the new technologies? 

2. What alternatives are there to SQL query language? Why these alternatives are not as popular as SQL? 

Discussion post – Qualitative research methods

 

Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Part 1

Top management of a large company has told you that they would like to be able to determine what the impact of years of service at their company has on workers’ productivity levels, and they would like to be able to predict potential productivity based upon years of service. The company has data on all of its employees and has been using a valid productivity measure that assesses each employee’s productivity.

What is a possible way to answer management’s question, and how does the analysis work? Reference the section on bi-variate linear regression from Green & Salkind.

Part 2

After reviewing the results of the analysis in Part I, the company found they are significantly related. However, a statistician reviewed the output and said that the results really do not explain much of what is happening in the total relationship.

What information is the statistician referring to from your output, and why is it important? Reference the section on bi-variate linear regression from Green & Salkind. 

EH week11 DB

 

Hello,

i need this paper by 11/05 afternoon.

Strictly No plagiarism please use your own words.

Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.

Select one of these compromises and explain how it could be avoided. Words 350.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Preview the document

Data Science and Big Data Literature Review Test

 

Data Science and Big Data Literature Review Test

Submit Assignment

  • Due Sep 17 by 11:59pm
  • Points 11
  • Submitting a file upload
  • Available after Sep 1 at 12am

Data Science Literature Review Test

INF 160 Introduction to Data Science

About the test:

  • Total points: 100 (carries 11% of the final grade)
  • Each question worth 20 points 
  • Must answer all question to achieve a maximum of 20 points each
  • Each answer must contain a minimum of 300 words. 
  • Submit responses as a word document in Canvas Assignment page. 

Questions:

  1. Define data science and big data in your own words. Why data science and big data matters?
  2. Write down some applications of data science/big data in the real world.
  3. What are the five “V”s of big data? Explain those. What is the process of data science research/project?
  4. What are some challenges of big data research? Explain those. 
  5. How do you intend to prepare yourself as a data scientist? Explain some areas of data science you will use in your foreseeable professional life as a data scientist. 

Helpful Articles:

access control discussion

Information Assurance (IA) is the practice of safeguarding information and managing risks related to the use, processing, storage, and transmission of information or data, the systems and processes used for those purposes. In financial industry, how does information assurance applied, in assuring that debit and credit card information and other financial information is protected.

Discuss the weaknesses in these systems and how to improve them.

I recommend your initial posting to be between 200-to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words. All initial posts must contain a properly formatted in-text citation and scholarly reference.

Analyzing and Visualizing Data

According to Kirk (2016), The essence of “Formulating Your Brief” is to “identify the context in which your work will be undertaken and then define its aims: it is the who, what, where, when and how.” It could be formal or informal as any project you think you must make it. This phase is where you create a vision for your work. Checkout Chapter 3 “Formulating Your Brief” from the attachment. 

Answer Needed in APA 7 format with in-text citations and References with 500 + Words.

Question to Answer is:
Why is it so important to formulate your brief for a data presentation? Discuss some ways you would implement to formulate an effective brief. What are some advantages to your methods? What are some disadvantages?

Computer science

-What do you understand by ‘Database’?
-Define DBMS
-Define RDBMS.
-Enlist the advantages of DBMS
-What do you understand by Data Redundancy?
-What are the various types of relationships in Database? Define them

5s week 8 assignment PL

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

include references. do not copy paste.