Arrays play an important part of programming

  

Arrays play an important part of programming. An array object contains a number of variables. In 3-4 paragraphs, discuss the following:

In 3-4 paragraphs, discuss the following:

•Find at least two approaches for allocating memory for an array. Summarize the approaches and provide examples.

•Describe approaches for initializing an array. Please include example code that does this.

•How do you design and create programs that use control structures? 

ALICE 2.0 FINAL PROJECT

Can someone write my final computer science project for me? I havent been paying attention and am hopelessly lost, it needs to be a 1 minute commercial or video game, designed using ALICE 2.0. 

DATA BASE DESIGN project

  

Project

Can be any business other than a bicycle shop (sales/repair)

1 Person 20 Tables

(Average 5 Columns per table) Important note: I need 100 attributes in total in 20 20 tables(it may be either 5-6 attributes 1 table or 3-4 attributes in another table)

Should be normalized to 3rd Normal Form

1 (per person) instance where 1st, 2nd, or 3rd normal form is violated, give a detailed explanation as to why you designed this violation (you can have more than one, but it must be explained)

Create Select/Insert/Update/Delete statements for each table (other than  many-to-many tables)

Create at least 12 business rules, 10 should be built into the design (Per person)

Naming convention – explain the naming convention you used.

Data Dictionary(need in excel)

10 rows of dummy data in each table (where possible)(neeed in excel)

DDL Scripts for each table, PK, and FK

Using https://app.diagrams.net/ create the ERD using Crow’s Foot Notation (No other Notation will be accepted)

If you are working as a team, make sure it is obvious who created which pieces. Color code the ERD, showing who did what.

One person should submit the project for the team.

Discussion: Security Assessment and Testing

 

Your task: Develop an “intake” briefing for middle  managers who will be assisting in the planning and execution of an  internal audit of employee use of company owned laptops as part of the  company’s “Work From Home” arrangements. The purpose of an “intake”  briefing is to get everyone “on the same page” with respect to what will  be done, who will do it, and what the roles & responsibilities of  the managers will be during the audit (e.g. assist with employee  contacts and “smooth ruffled feathers” amongst their workers).

Background: The purpose of the audit is to determine  how the laptops are being used by the employees working from home (what  corporate and non corporate systems, services, networks, and websites  are being accessed) and to uncover, if possible, any misuse (e.g. usage  that is outside of the company’s acceptable use policy). The audit  should also look for evidence of laptops that are improperly configured  or have vulnerable software installed.

Background: The company will follow the Information  System Security Audit Process as defined by Harris & Maymi in the  CISSP All-in-One Exam Guide, 8th edition. The steps are:

  1. Determine Goals
  2. Involve the right business unit leaders
  3. Determine the scope
  4. Choose the audit team
  5. Plan the audit
  6. Conduct the audit
  7. Document the results
  8. Communicate the results

Format: this week, your deliverable should be  formatted as briefing paper (you will have a combination of paragraphs  and bullet points). You should have an introduction, “analysis” section  (explaining the ground rules and processes for how the audit will be  conducted), and an appropriate summary section (including an appeal for  cooperation and assistance). Include citations (in the text) and  references (at the end) to support your work and allow your readers to  fact check your analysis and conclusions.

Database Security

 

(8)

Write at least 450 words discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary? What problems do they solve? How do they benefit companies? 

Do not copy without providing proper attribution. 

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. 

(9)

Describe in 450 words the disaster recovery plan and who is responsible  at your place of employment. Consider the critical business functions and your recovery point objectives and recovery time objectives.

Use at least three sources.

(10)

Write at least 450 words discussing the Safe Harbor provisions under HIPAA.  

Do not copy without providing proper attribution. 

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. 

(11)

In 450 words or more, explain PCI compliance to the database administrator at a large retailer. Consider the consequences for non-compliance. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. 

unit 6 lab

  I need this paraphrased so that it shows less than 10% on turnitin.com report. Please provide turnitin.com report.

This week’s Unit 6 lab showed us how hackers use a method of hacking called social engineering in order to gain access to certain information. The beginning steps of a hackers process they have to do their due diligence and see what they can obtain on a certain individual. This mean the hackers has to navigate through websites such as social media, like Facebook, LinkedIn etc. to gain information on their targets. Unit 6 Lab’s reviews how hackers gain information, and how it maybe exploited in an attack, and lastly how to pick out an attack. The lab in Unit 6 gave us three individuals for a company called CorporateTechs. It had us conduct a search on LinkedIn.com and on Google.com for each individual. After conducting the search, the feedback from the search was pretty good, it provided enough information on the three individuals to be able to conduct an attack. Part number two of the lab, was for us to fill out the contact information in order for us to receive an email. This email appeared to be from a legitimate source with a conformation link. After clicking the link, it took us to another window where it showed us a message stating it was a phishing attack. It also displayed my IP address, and the web browser used. Part number 3 had us using Nmap to see what information could be open. The lab only had it use port number 80 which was the apache server. Then we used IPNetinfo to gain a little more insight on what’s being used. Overall the Unit 6 lab gave us a good insight on how social engineering is used, and what all entails to do so. Social engineer is one of the hackers many tools that can be effective to the untrained users of the internet.