Software -9A

 

Please read chapter 24 and review PP slides and IGU online library and reputable resources and discuss:

What is software standards? Importance and problems with Standards. Are you in favor or against standards? 

please answer this question

  

Radisson Blue Hotels stores information about their hotels in different countries. Every hotel is identified by hotel id, hotel name, hotel address, city and URL. Every country is identified by country code, country name and country currency. Guests staying in the hotel is identified by guest number, guest name, guest address and guest city. Every room in the hotel is identified by room number, and room floor. Every room booking is identified by booking id, starting date, and ending date. There are different types of rooms in the hotel. Each room type is identified by room type code, room standard rate, and description. In each country, there may be no hotels or more than one hotel. A hotel may have one or more rooms. A guest can book one or more rooms and a room may be booked by one or more guests. A hotel may have one or more bookings and each booking is associated with exactly one hotel. Each room type may have one or more rooms and a room belongs to one room type. 

1) Write the schema of the appropriate relations for the above scenario. Identify the primary key and the foreign key in each of the relations. 

How did you identify the primary key and foreign key? Explain.   

2) Use the designed relations to write SQL statements for the following questions:  –   Explain the working of each query in detail.

a. Display all the rooms having the same rate in the ascending order of room rate.   

b. List the number of hotels in each country. Only include countries with more than 4 hotels.   

 

c. Display the details of hotels that is not yet included in any booking. 

d. Display all the details of guests who booked hotels on ‘2021-05-01’. 

e. Display the room number, room standard rate and the hotel id. 

f. Display the details of countries with country name starting with letters other than any letter within ‘A’ and ‘P’.  

Fail Over and Disaster recovery

 

  1. A twelve minute powerpoint presentation with at least 12 slides not including a reference list. If you use images, you must provide proper attribution. Be focused and provide something your peers will find useful not what we could find on a Wikipedia page.
  2. An annotated reference list of at least five references. Annotations are notes. In this case write two paragraphs about each source. The first is a summary of what the source informs and the second is why it is valuable.
  3. A one page single spaced summary of what you learned in this project. it should be written in essay format with no bullet or numbered lists. It must include quotes from your sources which must be surrounded by quotation marks and cited in-line. It must have an informative title which should not be too broad but should focus attention on your topic.

Operational excellence project

ASSIGNMENT:

Please refer attached document and the actual assignment starts from step2

Please carefully read the deliverables and answer each point.

Below are the points from what professor mentioned 

Requirement 1 (concept map should related to the project ITS631_GroupProjects.docx)

You needed to submit a visualization (the concept map) and a paper that describes motivation (why the topic you are choosing is important and interesting), objectives (what tentative issues/aspects will be researched in the term paper), a work plan, and an initial list of relevant references that you have found.

Please refer the conceptmap example attachement

Requirement 2

Final deliverable are mentioned in the file

Deliverables

1) Issue analysis table (from Step 2)

2) Technology briefing (from Step 3)

3) Migration plan including An “as-is” and “to-be” process flow diagram for at least one system (from Step 4)

4) Final presentation (from Step 5)

Instructions:

Concept map on the topic mentioned on ITS631_GroupProjects.docx

5-6 Pages of project base on same topic mentioned on ITS631_GroupProjects.docx.

ppt based on the same topic mentioned on ITS631_GroupProjects.docx

please include the references (same references on all the papers)

apa format

cite the reference properly

Database Concepts Capstone – Access

 Using Microsoft Access and Word, and using the attached files, we are to complete the capstone project and have the following finished files:

  • [Your initials] Capstone3.accdb
  • [Your initials] StockPriceSummary.html
  • [Your initials] StockPriceSummaryPage2.html
  • [Your initials] StockPriceSummaryPage3.html
  • [Your initials] StockLabelsMerge.docx
  • [Your initials] StockLabels.docx
  • [Your initials] Capstone3_Backup.accdb
  • [Your initials] Capstone3_be.accdb
  • [Your initials] Capstone3.accde

IT317 week 3 assignment

Week 3 assignment 

This program shows how to use an extra tool, which is a button in the window.  When you click on the button the program jumps to the ‘terminate’ section. You can create a jump section by giving it any name and place that section somewhere for the program to go to just like the terminate section.

Program 3:

nomainwin

UpperLeftX  = 1

UpperLeftY = 1

WindowWidth = DisplayWidth – 800

WindowHeight = DisplayHeight – 80

BackgroundColor$ = “red”

ForegroundColor$ = “yellow”

statictext #main.static, ” How is my window looking?” , 20,20, 600, 100

button #main.button1, “Exit”,[terminate], UR, 130, 150, 60, 40

open “Sample Window” for window as #main

print #main, “font Arial 16 bold”

wait

[terminate]

notice ” See you later”

close #main

‘notice ” See you later”

end

Use Justbasic software 

Read chapter 3. Review all the documents in the weekly module before doing the assignment.  

Modify program 3 above to create your own program with the following modifications:

a) Choose different background and foreground colors. Make sure thee text is visible.

b) Create two buttons in the window instead of one.

c) Each button should give a different message when clicked.

Cyber Espionage

What steps should be taken to detect alleged industrial/cyber espionage? Discuss the implications of each of the steps proposed. 

CyA….. discussion 2

 

Review the Comptia CYSA+ training on Security Operations and Monitoring and discuss in your own words the following:

1. What is a Security Operations Center?

2. How can automation benefit security operations monitoring?

Your initial post must be no less than 300 words.