Week 3 Assignment B.I

 

Complete the following assignment in one MS word document: 

Chapter 3 –discussion question #1-4 & exercise 12

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).

What are the differences between

  

What are the differences between 802.11b, 802.11a, 802.11g, and 802.11n wireless LANs? Do you think standards are beneficial in wireless networking or do you think they limit new technologies? Explain your answer.

Discussion Response 300 words and 1 references.

The implementation of the database performs an important part in creating any program. In fact, the database is utilized to store the information with which a software program interacts. Software uses the database all the time to store but also retrieve information as necessary. Relational database management system – RDMS primarily supports the provision of a structure of information called entities as well as helps create a connection between them (Brown, et al., 2016). In general, data bases are key to modelling the appropriate company; they offer space for new features, reduce the redundant data, preserve data integrity as well as provide excellent speed while using the database.

Analysis

One example that I can think of is an Easy Digital Downloads Database, which is poorly implemented. This is a basic e-commerce for the selling of digital files usually. The connection mapping among entities has been inadequately defined as well as thus the database developers have built database architecture depending on the WordPress need (Sreenivasaiah & Kim, 2010). This data comprises primarily of order products, payment records, metadata ordering, as well as they are kept on tables called after the post as well as post table. The designers did not focus on how hard the data in the post table has contributed to an exponential growth in the processing of same information from such a table, which is causing a poor database structure. The outcomes were the database restrictions on people who may access this website as well as also adversely impacted website performance.

Potential Solution

This poor database implementation will be enhanced through the following reconstruction techniques. The first protocol will provide the database with an abstraction layer utilizing backward compatibility methods to enable developers read, write, and retrieve data more easily without externally requiring requests to be sent (Sreenivasaiah & Kim, 2010). Make sure this layer is built slowly and without hurrying. In that scenario, the post table I described before provides an abstraction layer that would allow us execute different queries on data from the post database without having to a write SQL.

References

Brown, R., Lakhani, Z., & Place, P. (2016). Big(ger) Sets: decomposed delta CRDT Sets in Riak. https://doi.org/10.1145/2911151.2911156

Sreenivasaiah, P. K., & Kim, D. H. (2010). Current trends and new challenges of databases and web applications for systems-driven biological research. Frontiers in Physiology1. https://doi.org/10.3389/fphys.2010.00147

Penetration testing

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately four pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

risk matrix

 

Following the example found here, create a company risk assessment matrix for your present or previous employer.

H2a_Risk_assessment_Matrix.xlsx

Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.

summary

Summary over class material , Please follow instructions with the paper and see resources attached.