Cloud Computing

 

You are the CIO of ABC Corp a government contracting corporation that prioritizes security. You are tasked with moving the development team’s resources to the cloud. You need to provide a report to top leadership justifying the type of cloud solution that would be appropriate for this move. Provide the following in your report.

  1. Describe the MOST appropriate cloud service and research justification of its appropriateness.
  2. Select a Cloud Deployment model and research justification of its appropriateness.
  3. What are some of the pros and cons of both the cloud service and model you selected?

Paper should be in APA format, with at least two scholarly resources, and at least 1000 words.

Artificial intelligence

 Research Paper
This paper will follow the traditional format of a college level research paper. Double spaced, APA citations. 

A traditional 5 page research paper (2000 words) 

Research Paper topic: How does artificial intelligence affect unemployment.

Thesis statement : Within the next decade, artificial intelligence will replace human employees in the workplace.  

Must use 5 quality sources. 2 must be from academic journals. 

Application security Procedure guide

  

Scenario

Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly scanned for vulnerabilities. You choose to use the Microsoft Security Compliance Toolkit to assess the basic security for all of your Windows computers, and use OpenVAS to perform vulnerability scans.

Tasks

Develop a procedure guide to ensure that a computer adheres to a standard security baseline and has no known vulnerabilities.

For each application, fill in details for the following general steps:

1. Acquire and install the application.

2. Scan computers.

3. Review scan results.

4. Identify issues you need to address.

5. Document the steps to address each issue.

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 pages

Security Architecture & design

Length:  Minimum of 600 words

Simply, no plagiarism

Vestige, Inc. is an online software company that specializes in selling ad spaces in their parent company’s magazine.  Vestige manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because Vestige’s database needs to connect to the parent company’s database, the parent company has requested that the Vestige system be assessed and verified as secure.

Your company has designated you to be the lead architect for this project because it’s a small company and perfect for the first time.  Since you have spent the past 7 weeks in training to be a System Architect, perform your assessment:

MYSQL

 

we will work with the Sailingdatabase. Download the sailingDB-JS.sql from and load it in MySQL.Submit your lab report as Word document.

1.Read the statements in sailingDB-JS.sql. For each type of statements, choose one example to explain what that statement does. Refer to the textbook or MySQL reference manual for information.

2. Describe briefly each relation in the Sailing database. Point out the entity relations and association relations and explain your rationale.

3. Queries A and B below demonstrate the impact of order when we use outer jointo connect three or more database tables. Execute each query, then compare the query results, and include in your lab report:

•A screenshot of the results for each query

•An explanation of where and why the results of the two queries differ

Query A: SELECT SA.sid, SA.sname AS Sailor_Name, CONCAT(‘S:’,RA.sid,’-B:’,RA.bid) AS Reserv_Track_id, BA.bid, BA.bname AS Boat_NameFROM reserves RA right outer join sailors SA on RA.sid=SA.sid right outer join boats BA on RA.bid=BA.bid;

Query B: SELECT SA.sid, SA.sname AS Sailor_Name, CONCAT(‘S:’,RA.sid,’-B:’,RA.bid) AS Reserv_Track_id, BA.bid, BA.bname AS Boat_NameFROM reserves RA right outer join boats BA on RA.bid=BA.bid right outer join sailors SA on RA.sid=SA.sid;

4.QueriesC, D, and E attempt to find the names of sailors who have reserved BOTH a red boat and a green boat. Execute each query, compare the results, and include in your lab report:

•The screenshot of results for each query

•A comparative analysis of the different results

•Explanation of why Query E does not work

Query C: SELECT S.snameFROM Sailors S, Reserves R1,Boats B1,ReservesR2,Boats B2WHERE S.sid=R1.sid AND R1.bid=B1.bidAND S.sid=R2.sid AND R2.bid=B2.bidAND B1.color=’red’ AND B2.color=’green’;

Query D:SELECT S.snameFROM Sailors S, Reserves R, Boats BWHERE S.sid=R.sid AND R.bid=B.bid AND B.color=’red’AND S.sid IN ( SELECT S2.sidFROM Sailors S2, Boats B2, Reserves R2WHERE S2.sid=R2.sid AND R2.bid=B2.bidAND B2.color=’green’);

Query E:SELECT S.snameFROM Sailors S, Reserves R, Boats BWHERE S.sid=R.sid AND R.bid=B.bidAND (B.color=’red’AND B.color=’green’);

Reference to database below:

Practical Connection Paper for Access Control Course

Provide a reflection of at least 500 words (or 2 pages double spaced APA) of how the knowledge, skills, or theories of Access Control course have been applied, or could be applied, in a practical manner to your current work environment. 

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace

NOTE: I am working as a Software Developer. Please relate the skills and theories of Access Control that have applied in the current work.

Business Intelligence

Discussion:  

Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples. 

Exercise:

1. Go to microstrategy.com. Find information on the five styles of BI. Prepare a summary table for each style.

2. Find information about IBM Watson’s activities in the healthcare field. Write a report.  (limit to one page of analysis) 

 The above assignments should Include an APA cover page and a reference page.