Poorly implemented database

We all had the unfortunate experience of seeing how computers can, at times, make life’s journey about more difficult. This is especially true in knowledge-centric workplaces. Describe an example of a very poorly implemented database that you’ve encountered (or read about) that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them

Search the peer-reviewed literature for examples of this. You may select any topic relating to technology that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide supporting evidence, with citations from the literature. It is not enough for you to simply create a own posting. You must read the postings of the other members of the class and comment on each of them. Please see Discussion Forum of the class syllabus for additional details on content.

Discussion 1- Initiating the Project

  1. Using an example of your own, describe a project in terms that are common to most projects. Define the terms based on Kloppenborg text and then apply these to your example.
  2. Discuss how a project could be successful in terms of some measures yet unsuccessful by others.
  3. Compare and contrast project managers and functional managers.

Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes.

APA format required.

Text-

Title: Contemporary Project Management 

ISBN: 9781337406451 

Authors: Timothy Kloppenborg, Vittal S. Anantatmula, Kathryn Wells 

Publisher: Cengage Learning 

Publication Date: 2018-02-08 

Edition: 4th

HCI

 

Second job

this is continuation of HCI project 

 

Detailed discussion about the participants of the evaluation  – this may include any relevant characteristic (like the number of participant, what ages, gender split, education, proficiency level, etc.)  

  • children 4 -6 yo
  • male/female…even # of boys and girls
  • schooling (preschool and kindergarten) / no school
  • social & economic status
  • previous technology exposure (have they used mobile devices before?)

article of history

You are doing a deep dive into the article.go beyond summerizing the paper to analyze the author’s argument. what sort of sources does she use to back her argument? how does she use those sources? where do you think she is effective and hwere do you think she fails? 900 words paper.

CIS222 DB 2

 1 page apa format cite sources 

Unit 2 DB: Threats

The PCS working group has been a smashing success and the team members have already formed better inter-department communications. The customer Security Director from the Istanbogus Ministry of Defense has requested a threat briefing explaining the top risks to his new system. As the CISO you have your ideas but would like to get the opinion of the working group members. Describe at least three different categories (human and non-human) of threats from your Unit research. Explain how each category presents risk to information systems. Make a case for the top threat to the missile defense system for each category and give an example of how that threat might be realized in a real compromise of the system. Discuss some of the factors that play into the assessment of system threats. Include at least one research reference and associated in-text citation using APA standards. In your replies to your peers discuss the other described threats and if you feel they are greater or lesser risks to the system. 

What is the purpose and benefits of

  

(a) What is the purpose and benefits of Clustering data in a file?

(b) What is the code for creating a cluster and associated tables in Oracle

(d) What are the advantages/disadvantages of horizontal and vertical partitioning?

(e) Describe RAID and outline the benefits of implementing such an installation. 

(f) In the large Enterprise two functions have evolved to manage the Enterprise Database – Data Administration and Database Administration. Provide definitions and outline the activities for both of these functions and outline how they have evolved with the changes in relational database technology solutions and in organisations’ requirements for information. 

(g) Database Security is a huge challenge to the large Enterprise, outline the threats that exist to data and the features included in modern DBMS to enhance data security. 

(h) Transaction control is vital in a busy database, outline transaction ACID properties. 

(i) Explain Locking and outline the locking levels and types of locks available in DBMS today.

(j) What is deadlock and how would you prevent it?

IT Strat Plan – Wk4

 Q1. 275 words

 Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented?  Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.  

Q2. Research paper: 5 pages

 This week, you have to read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness for virtualization.
  • Explain Microsoft (or another product) licensing for virtualized environments.
  • Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.
  • Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations. 

 Your paper should meet the following requirements: 

  • Be approximately 5 full pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.