Module3

  Complete: Access Module 3: Maintaining and Querying a Database.

There is 3 parts to it:

1.) “Access Module 3 SAM Tra*ning“: this consists of watching videos and then completing what has been showed to you on the video.

2.) “Access Module 3 SAM End of Module Proj*ct 1“: This consists of following instructions to complete an assignment. Download all files and follow directions.

3.) “Access Module 3 SAM *am“: This consists of completing the skills learned on first assignment.

In the file below, you can find the instructions.

Week 7 DQ IT

Q.  Why are security policies important?

Note: 300 words with intext citations and 2 references needed.

Practical Connection Assignment for Infotech Import in Strat plan

it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own careers.Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Host

 Discuss the influence of age on the conclusion that a piece of technology is or is not user-friendly.  Think of specific examples where the age of the user might be a factor in the perception that technology is user-friendly. 

What is output from the following

  

What is output from the following segment of code? (note: this is a code segment, not a complete program.)
 

int x;
 

for (x= 1; x <= 5; x++)
printf (“%i “, x+1)

Using the variable declarations below, what gets output once the printf statement shown below is executed:
int num1 = 2;
int num2 = 3;
printf (“%i”, num1 + num2);

What is output from the following code segment:
int a, b;
for (a = 1; a <= 2; a++)
for (b = 1; b <= 3; b++)
printf(“%i “, a + b);

Write a program that asks the user to enter how many hot dogs they wish to purchase. It will then compute the price of that many hot dogs at $1.50 each, compute the meals tax of 5%, and display the number of hot dogs and the original price, the meals tax amount, and the total amount due on three separate lines with appropriate labels. (No header or comments should be inserted in the code! No trap loops or any loops are needed, it will result in deductions!).

Assume that a, b, c, and d are all variables of type int. Also assume that: a = 2, b = 3, and c = 5. What value is stored in variable d after the following C statement is executed:
d = (a + b) + c * 5;

How many times would the following loop execute?
for (x = 2; x <= 10; x += 2)
printf (“I am in the loop!n”);

In C, for variables of type int we use %i as the format specifier in printf and scanf statements. What do we use as the format specifier for variables of type float, if we want to output the floating point value, showing 3 decimal places?

Assume x is a variable of type int. Which for loop below would output the following: (Choose all that apply.)
10
20
30
40
50

 

b. for (x = 1; x <= 50; x++)
printf (“%in”, x);
 

c. for (x = 1; x <= 5; x++);
printf (“%in”, x);
 

Cloud and IoT Security Concerns

 You have been asked for a cloud-based/IoT solution to replace a traditional client-server configuration. You may download the opensource version of MS Visio called Dia to create the network diagram or use the drawing features available in any Office Suite. Just make sure to label your components. The current technologies are as follows:

  •  A database server (Microsoft SQL)
  •  SplendidCRM running on a server (See http://www.splendidcrm.com/ )
  •  A Microsoft Exchange Server (For email)
  • A Windows Server 2012 R2 running Web Server (IIS)

Your deliverables are:

  • An assessment of the current configurations (Pros and Cons)
  • Potential replacement technologies
  • Proposed Network Diagram incorporating Cloud and IoT technologies (Do not neglect security measures such as firewalls, IDT, IDS, honeypots, DMZ, or encryption)
  • A narration explaining your network diagram

Your well-written paper should meet the following requirements:

  • Four to five pages in length, not including the title and reference pages.
  • Label each section clearly.
  • Include two external references in addition to the textbook. The Saudi Digital Library is a good source for these references.
  • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, citing references as appropriate.

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading.  

Web Techonology

 Create a site map of a website you are familiar with. It need not be an overly large or complex website (in fact, it would be to your detriment to choose a very large site!). It can be the website of a local business or one in your hometown, or even the website of a friend or one of your own. Something 7 to 10 pages in size is sufficient. All links must be accounted for and mapped. Using Microsoft Word for this is preferred, but you may use any similar software you choose as long as you achieve map with a similar look to those created in Coding Video 2.  

Question 2

Write a five paragraph paper describing the quadrants in R Studio. Do not use spinbot or other word replacement strategy. Use your own words. This paper should be single spaced. It should have a meaningful title. It must include 3 quotes from the text or from expert sites found in the library’s research databases or from the text. They should be cited properly in APA format.