1. Five source annotated bibliography
2. Slide presentation with 12 or more slides
3. Summary or Abstract containing at least 750 words.
1. Five source annotated bibliography
2. Slide presentation with 12 or more slides
3. Summary or Abstract containing at least 750 words.
Arrays play an important part of programming. An array object contains a number of variables. In 3-4 paragraphs, discuss the following:
In 3-4 paragraphs, discuss the following:
•Find at least two approaches for allocating memory for an array. Summarize the approaches and provide examples.
•Describe approaches for initializing an array. Please include example code that does this.
•How do you design and create programs that use control structures?
Can someone write my final computer science project for me? I havent been paying attention and am hopelessly lost, it needs to be a 1 minute commercial or video game, designed using ALICE 2.0.
Project
Can be any business other than a bicycle shop (sales/repair)
1 Person 20 Tables
(Average 5 Columns per table) Important note: I need 100 attributes in total in 20 20 tables(it may be either 5-6 attributes 1 table or 3-4 attributes in another table)
Should be normalized to 3rd Normal Form
1 (per person) instance where 1st, 2nd, or 3rd normal form is violated, give a detailed explanation as to why you designed this violation (you can have more than one, but it must be explained)
Create Select/Insert/Update/Delete statements for each table (other than many-to-many tables)
Create at least 12 business rules, 10 should be built into the design (Per person)
Naming convention – explain the naming convention you used.
Data Dictionary(need in excel)
10 rows of dummy data in each table (where possible)(neeed in excel)
DDL Scripts for each table, PK, and FK
Using https://app.diagrams.net/ create the ERD using Crow’s Foot Notation (No other Notation will be accepted)
If you are working as a team, make sure it is obvious who created which pieces. Color code the ERD, showing who did what.
One person should submit the project for the team.
refer to the attached document.
Your task: Develop an “intake” briefing for middle managers who will be assisting in the planning and execution of an internal audit of employee use of company owned laptops as part of the company’s “Work From Home” arrangements. The purpose of an “intake” briefing is to get everyone “on the same page” with respect to what will be done, who will do it, and what the roles & responsibilities of the managers will be during the audit (e.g. assist with employee contacts and “smooth ruffled feathers” amongst their workers).
Background: The purpose of the audit is to determine how the laptops are being used by the employees working from home (what corporate and non corporate systems, services, networks, and websites are being accessed) and to uncover, if possible, any misuse (e.g. usage that is outside of the company’s acceptable use policy). The audit should also look for evidence of laptops that are improperly configured or have vulnerable software installed.
Background: The company will follow the Information System Security Audit Process as defined by Harris & Maymi in the CISSP All-in-One Exam Guide, 8th edition. The steps are:
Format: this week, your deliverable should be formatted as briefing paper (you will have a combination of paragraphs and bullet points). You should have an introduction, “analysis” section (explaining the ground rules and processes for how the audit will be conducted), and an appropriate summary section (including an appeal for cooperation and assistance). Include citations (in the text) and references (at the end) to support your work and allow your readers to fact check your analysis and conclusions.
2-3 pages with references apa format. Also with references.
please see document
(8)
Write at least 450 words discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary? What problems do they solve? How do they benefit companies?
Do not copy without providing proper attribution.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.
Include at least one quote from each of 3 different articles.
(9)
Describe in 450 words the disaster recovery plan and who is responsible at your place of employment. Consider the critical business functions and your recovery point objectives and recovery time objectives.
Use at least three sources.
(10)
Write at least 450 words discussing the Safe Harbor provisions under HIPAA.
Do not copy without providing proper attribution.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.
Include at least one quote from each of 3 different articles.
(11)
In 450 words or more, explain PCI compliance to the database administrator at a large retailer. Consider the consequences for non-compliance.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format.
I need this paraphrased so that it shows less than 10% on turnitin.com report. Please provide turnitin.com report.
This week’s Unit 6 lab showed us how hackers use a method of hacking called social engineering in order to gain access to certain information. The beginning steps of a hackers process they have to do their due diligence and see what they can obtain on a certain individual. This mean the hackers has to navigate through websites such as social media, like Facebook, LinkedIn etc. to gain information on their targets. Unit 6 Lab’s reviews how hackers gain information, and how it maybe exploited in an attack, and lastly how to pick out an attack. The lab in Unit 6 gave us three individuals for a company called CorporateTechs. It had us conduct a search on LinkedIn.com and on Google.com for each individual. After conducting the search, the feedback from the search was pretty good, it provided enough information on the three individuals to be able to conduct an attack. Part number two of the lab, was for us to fill out the contact information in order for us to receive an email. This email appeared to be from a legitimate source with a conformation link. After clicking the link, it took us to another window where it showed us a message stating it was a phishing attack. It also displayed my IP address, and the web browser used. Part number 3 had us using Nmap to see what information could be open. The lab only had it use port number 80 which was the apache server. Then we used IPNetinfo to gain a little more insight on what’s being used. Overall the Unit 6 lab gave us a good insight on how social engineering is used, and what all entails to do so. Social engineer is one of the hackers many tools that can be effective to the untrained users of the internet.