Computer science

-Explain Normalization and De-Normalization.
-What are the different types of Normalization? -What is BCNF? 
-What is SQL?
-How many SQL statements are used? Define them.

Assignment, Memo and discussions

1.Assignment 

Create an alternative decision matrix for the case system. Using Excel or Word, develop a decision matrix to be used to evaluate three proposed design alternatives (alternatives A, B, and C). 

The idea is to create a worksheet that can be applied to any set of alternatives.

Criteria: Decision matrix has columns for criteria weights and points available, and columns that represent three proposals. Within each proposal include columns for points assigned and 

the product of points assigned times criteria weight. The bottom row of the matrix contains column totals.

Your essay should be 3 pages in content and fully explore all of the following items described above. Include at least 2 outside citations (not including your text) and use proper APA formatting.

Atleast 2 In-line citations and references required.

2. Weekly Memo – Memo should be related to the discussions , assignment and should be one page(citations,references, APA not required). 

Relate this weeks assignment and discussions to your work in office/organization.

3.Discussions

1) Describe the primary activities of the design phase of the SDLC.

2)Distinguish between the two-tier, three-tier, and n-tier client–server architectures.

Each discussion should have atleast 3 paragraphs, 2 inline citations, 2 references. Due by next tuesday evening.

Plagiarism should be very minimal. I may ask for changes if required.

EH week13 DB

 

Hello,

i need this paper by 11/18 afternoon.

Strictly No plagiarism please use your own words.

Explain your thoughts on the future of IoT and the security implications. Why do you believe it is important to secure these devices as they become more common in our lives and our businesses?

350 words needed

https://www.youtube.com/watch?v=H_X6IP1-NDc

https://www.youtube.com/watch?v=D3yrk4TaIQQ

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

main discussion

 

Compare and contrast the different techniques for anomaly detection that were presented in Chapter 9.

Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects.

Cloud Computing and Digital Forensics

1.) In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Use at least three sources. Use the  Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. Write in essay format not in bulleted, numbered or other list format. 

2.) Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness. Write a short paper, 200-300 words.

EH week9 P9

 

Hello,

i need this paper by 10/21 afternoon.

Strictly No plagiarism please use your own words.

Using the following link as your reference, select TWO and explain the differences

(viruses, worms, trojans, and bots).

What Is the Difference: Viruses, Worms, Trojans, and Bots?

( https://tools.cisco.com/security/center/resources/virus_differences)

 400 words

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

PHP,HTML,CSS,SQL

 Create web pages for your database using PHP. You should have one page that will return all the information from the database. You should create additional pages or however you want to handle it that will allow you to do various queries of your database. You should be able to retrieve and insert data. For extra credit, include functionality to delete data from your database. I will be looking for these features. Feel free to handle those functions however you feel is best for your project.
Create an html form that will allow you to enter in new information for the database. The information should be handled by a PHP script that will take the data and input it into the database.
The interface doesn’t have to look real pretty at this point. That will be done in the next phase. If you want to go ahead and make things look nice, feel free to do so.
If you have not yet created a home page, create a home page that contains links to each of the web pages you create to access your database. On each of the database pages create a button (link) to go back to the home page. Your project must have more than one page; your home page should have links to other pages to perform operations on the database. Some appropriate picture or image should be on the home page that relates to you project. Make your project look as professional as possible. You may want to show it during a interview. 

Need a research paper.

I need a research paper around 6 pages long (double spaced) . It will go through Turnitin so no plagiarism please. 

Paper Topic: Ethical Issues Involved in the Human Genome Project.

I have attached the grading rubric. Please follow all guidelines.