grader project

Start Access. Open the downloaded file named go_a03_grader_h3_Career_Books and enable the content. View the relationship between the Publishers table and the Career Books table. One publisher can publish many career books. Close the Relationships window.02Use the Form tool to create a form based on the Career Books table. Save the form as Career Book Form and display the form in Form view. Using the Career Book Form, add the following new record to the underlying Career Books table:

Field                            Data
Title ID                        T-25
Title                           Effective Networking
Author Last Name        Nunez
Author First Name       Charlene
Publisher ID                PUB-109
Category                     Job Search
Copies On Hand           6
Value of Books            180

63
Find the record for the Title ID of T-19 and delete it. Find the record for the Title ID of T-25. From the Print dialog box and the Setup option, change the column size width of a printed form to 7.5 inches. Click OK on the Page Setup window, then click Cancel on the Print window. Save the form.24Use the Filter By Form tool to create a filter for the Career Book Form that displays records with a Category of Interviewing Strategies or Resumes. After verifying that 10 records match the filter criteria, toggle the filter off to display all 24 records. Save and close the form.55Use the Form Wizard to create a form based on the Publishers table. Add the following fields (in this order) to the form: Company Name, Rep Last Name, Rep First Name, Job Title, and Phone Number. Apply a columnar layout and name the form Publisher Form.126With the Publisher Form displayed in Layout view, apply the Stacked layout to all of the controls. Apply the Integral theme to this form only. Select the title-Publisher Form. Change the font size to 16, apply bold, and change the font color to Dark Teal, Text 2, Darker 50% (under Theme Colors, in the fourth column, the last color). Save the form.57
With the Publisher Form displayed in Layout view, from the Field List pane, add the Publisher ID field to the form directly above the Company Name controls. Close the Field List pane. In the form, move the Rep First Name controls directly above the Rep Last Name controls. Change the width of the Job Title text box control to 2.5 inches. Save the form.38With the Publisher Form displayed in Layout view, select all six text box controls and change the background color to Turquoise, Accent 1, Lighter 80% (under Theme Colors, in the fifth column, the second color). Select all six label controls and change the font color to Dark Teal, Text 2, Darker 50% (under Theme Colors, in the fourth column, the last color). For the same controls, apply bold and change the width to 1.75 inches. Save the form.49With the Publisher Form displayed in Layout view, select the six label controls and the six text box controls. Change the font size to 12, and change the height to 0.25 inch. Save the form.210With the Publisher Form displayed in Design view, change the height of the Form Footer section to 0.5 inch. Add a label control to the Form Footer section that displays Texas Lakes Southwest Campus. For the selected label control, change the font color to Dark Teal, Text 2, Darker 50% (under Theme Colors, in the fourth column, the last color). Apply bold to the label control and change the width to 2.2 inches. For the same label control, set the Top property to 0.1 inch and the Left property to 1.25 inches. Close the Property Sheet and save the form.811With the Publisher Form displayed in Form view, add the following new record to the underlying Publishers table:
Field                     Data
Publisher ID          PUB-111
Company Name     Associated Publishers
Rep First Name      Marquis
Rep Last Name      Sullivan
Job Title                Sales Associate
Phone Number      (512) 555-7373

312Use the Report tool to create a report based on the Resume or Interview Books Query object. With the report displayed in Layout view, apply the Retrospect theme to only this report. Delete the Publisher ID, Category, and Company Name fields from the report. Change the width of the Title text box controls to 3 inches. Sort the records in ascending order by the Title field. Change the width of the Author Last Name and Author First Name text box controls to 1.5 inches.913With the report displayed in Layout view, add a calculated control to the Title field that counts the number of records. Change the height of the calculated control that displays 10 to 0.25 inch. For the page number control, set the Left property to 5 inches. Select the title of the report and change the font size to 14. In the title, change the word Query to Report. In the body of the report, for the Title label control, set the Left property to 0.75 inch (the Title text box controls move to the right, and all of the other fields also move to the right).  Save the report as Resume or Interview Books Report, close the Property Sheet and the report.1014Use the Report Wizard to create a report based on the Career Books table. Add the following fields (in this order) to the report: Category, Title, and Value of Books. Group the data by the Category field and sort the records in ascending order by the Title field. Summarize the report by summing the Value of Books field. Be sure the layout is Stepped and the orientation is Portrait. Name the report Book Values by Category Report, then finish the wizard.1015Display the Book Values by Category Report in Layout view. Apply the Ion Boardroom theme to this report only. Select the title of the report, change the font size to 14 and apply bold. Delete the controls that begin with Summary for ‘Category’. At the top of the report, apply bold to the three label controls that display the field names. In the body of the report, change the width of the Title text box controls to 3.5 inches. Set the Left property of the Value of Books label control to 6 inches. Save the report.716With the Book Values by Category Report displayed in Layout view, at the bottom of the report, in the last column, select the following three controls: text box control that displays $420, calculated control that displays $945, and the calculated control that displays 7,730. Change the width of the selected controls to 1.25 inches and the Left property to 6 inches. Change the width of the Grand Total label control to 1 inch. Change the text in the label control that displays Sum to Total Value of Books by Category. In the body of the report, change the height of the Title text box controls to 0.35 inch. Close the Property Sheet and save the report.717Display the Book Values by Category Report in Design view. Select the following two controls: the Total Value of Books by Category label control (in the Category Footer section) and the Grand Total label control (in the Report Footer section). Align the left edges of the two selected controls. Save the report.218Display the Book Values by Category Report in Print Preview as two pages and notice how the groupings break across the pages. Display the report in Layout view and open the Group, Sort, and Total pane. Set the grouping option so that each group of category records is kept together on one page when the report is printed. Close the Group, Sort, and Total pane. Display the report in Print Preview and notice that the groupings are not split between pages.  Save and close the report.519If necessary, close all database objects and open the Navigation Pane. Close Access and submit the database as directed.0
Close

discussion

 

To successfully complete this week’s discussion, you will need to refer to Chapter 6, “Culture,” in your Project Management Best Practices: Achieving Global Excellence textbook. 

Please respond to the following in a substantive post (3–4 paragraphs):

  • Explain the primary reasons project management causes a cultural change.
  • Describe the impact of that cultural change on integrative information technology.
  • Provide at least one example of a cultural change that project management can cause.

Artificial Intelligence (Python lab)

This is python lab.

 Please download the zipped folder (emailClassification.zip) containing empty Python files for you to implement the support vector machines for email classification model in classifier_lingSpam.py and classifier_euron.py files within the folder. For complete details including the deadline, please download “Assignment 1 Email Spam Classification.docx” file attached here.

Please note that your assignment will be graded according to the attached Rubric. Please carefully read and check each option to work accordingly on the assignment and receive credit to the fullest possible.

Compress your assignment (i.e., the report with screenshots and your edited python files classifier_lingSpam.py, classifier_euron.py, evaluation.py and any other file you created/edited) into a zip file 

Reply to discussion board.

 Requirement for discussion board: 

Response and respond to at least one other post, offering one or two paragraphs of additional insight and details. This could be additional support for their point of view, or it could be arguing a counterpoint. 

Discussion Board of other student is below:

# – Is a cyberattack ever morally justified in response to an enemy conventional attack?

For the discussion topic on ethical considerations for cyber operations, I chose to answer questions 1 and 5.  According to Dipert (2010), cyber warfare and conventional warfare share commonality based on the uncertainty of the outcome of an attack, as well as any side effects that may occur as a result (p 385).  He also believes that the evidence you have to justify an attack should be weighed against the moral conditions for going to war in the first place (p 400).  Therefore, I believe a cyber-attack is morally justified in response to a conventional attack, especially if the war outcome is devasting and the cyber-attack is used prevent further destruction from happening.  My reason is based on Dipert’s (2010) description of cyber tactics in warfare using an electromagnetic force to disrupt a target’s radio communications, machinery, and infrastructure (p 397).  In conventional warfare the attacker is probably already known, and the evidence needed to justify deploying a cyber-attack is likely valid.  My decision to deploy a cyber-attack would be based on what might happen as a result of not stopping the attack.

# – Once a war (cyber- or conventional) has begun what kinds of cyberattacks are morally justified?

Dipert (2010) says that we should think about proportionality and likelihood of success when considering to what extent a cyber-attack is morally justified once a war has begun (p 392).  Based on this theory, proportionality means that however you decide to respond to a conflict, your response should be less harsh than what was inflicted on you (Pope, p 29).  Therefore, under the proportionality criteria the saying ‘eye for an eye’ may not be justified in response to war because it would suggest that I am trying to enforce equal treatment on target solely in retaliation.  I understand why proportionality should be considered in this case because, if not, it could lead to unnecessary casualties and economies being without resources, like food, housing, and utilities for a long period of time.  However, once the war has begun, the kinds of cyber-attacks that could be deployed morally would really depends on the severity or likelihood that the situation will only get worse if nothing is done to stop it.  For instance, I think dismantling electronic devices to prevent communication and machinery to keep it from functioning as it normally would, would be a morally justified cyber-attack.  I would consider taking down any resources that keep an enemy in power.  While I would also be concerned with noncombatant immunity and ensuring that innocent people do not endure inhumane conditions (Pope, 15), I would likely be less concerned with noncombatant immunity of a target if no other options existed for a cyber-attack to be morally justified. 

ransomware attacks

 

Problem – ransomware attacks are evolving and becoming more successful

Theory/model – why they are becoming more successful  – followed by any research questions related to ransomware.

In a minimum of 5-pages, where you clearly explain the overall topic and include at least 20 scholarly references. 

Build a working sample of

  

Build a working sample of Huffman Trucking’s fleet truck maintenance database.
Use the CREATE table statement to create a table for each entity for Huffman Trucking’s fleet truck maintenance database.
Use the INSERT statement to populate the tables with realistic sample data, demonstrating each relationship in your entity relationship diagram. Include at least two entries for each table.
Use the SELECT statement to create the following queries:
• Create a simple query for each table that returns all of the columns and all of the rows for each table.
• Write a query that displays each part that has been purchased by Huffman Trucking Company. For each part, also retrieve its parts catalog information from the parts catalog table and vendor information from the vendor table.
• Write a query that displays all of the rows in the vehicle maintenance table. For each vehicle maintenance row, join the corresponding information from the maintenance descriptions table and vehicles table.
• Write a query that displays each row in the maintenance work order table. For each row in the maintenance work order table, join the corresponding information from the maintenance description table.
• Write a query that counts the number of maintenance work orders for each vehicle in the maintenance work order table. Display the vehicle column and the corresponding count of work orders for each vehicle.
Use Reporting Services to design and create a report on the parts purchasing history for Huffman Trucking Company. The report should display all parts purchasing history including manufacturer and vendor information, parts catalog information, and associated parts inventory issues, and all parts inventory purchases.
Format the report to present to senior management at Huffman Trucking.

Firewalling

Again turn to our VM and use the built-in Linux firewall and the tool netcat to learn some firewall basics. iptables is a common Linux firewall that can be found in a variety of unexpected locations. It is extremely powerful with a lot of capabilities but we are going to focus on some of the more straightforward capabilities. In this week’s assignment, you will be using netcat to create some direct network communications on the system then using the firewall to interrupt those communications. 

Refer to the attached file uploaded for additional requirements for this work.