CIT WA WEEK 6

Prepare a complete written work of two pages in a word file about the advances in your project with the following elements: 

1. Explicit information of the Mission, Vision, SWOT elements, Possible Cross Impacts, and strategic objectives of your company 

2. A list of types of software and social medias proposal according to the information and examples of them with vendors and websites. 

3. Arguments in favor of them and recommendations about their use. 

4. Include three references in APA style

COMPANY: TARGET

GO19_AC_CH03_GRADER_3A_HW – Students and Majors 1.0

GO19_AC_CH03_GRADER_3A_HW – Students and Majors 1.0

  

Project Description:

This project will be completed by following the Activities in the Project 3A of your GO! textbook. You can use the print or eText version to locate and read the Activity instructions. For the purpose of grading the project you are required to perform the following tasks:

     

Start Access.Open the file Student_Access_3A_Majors.accdb   downloaded with this project. Then, in your textbook, turn to Project 3A and   complete all of the steps in Activities 3.01-3.15.

 

Complete Activity 3.01 Opening   and Saving an Existing Database, Renaming Tables, and Viewing a Table   Relationship.

 

Complete Activity 3.02 Creating   a Form and Viewing Records.

 

Complete Activity 3.03 Creating   a Second Form.

 

Complete Activity 3.04 Adding   Records to a Table by Using a Form.

 

Complete Activity 3.05 Deleting   Records from a Table by Using a Form.

 

Complete Activity 3.06 Filtering   Data by Selection of One Field.

 

Complete Activity 3.07 Using   Filter by Form.

 

Complete Activity 3.08 Using   Advanced Filter/Sort.

 

Complete Activity 3.09 Creating   a Form by Using the Form Wizard.

 

Complete Activity 3.10 Grouping   Controls in Layout View.

 

Complete Activity 3.11 Applying   a Theme and Formatting a Form in Layout View.

 

Complete Activity 3.12 Adding,   Resizing, and Moving Controls in Layout View.

 

Complete Activity 3.13   Formatting Controls in Layout View.

 

Complete Activity 3.14 Modifying   a Form in Design View.

 

Save and close the database, and   then submit for grading.

Discussion 2_database

250 words+

1. Please describe the concept of (1) Schema, (2) Primary Key and Foreign Key used for database system.

2. Except the listed 6 algebra operations such as select, join/intersection, project, … is there any potential algebra operand may/can be used for database management processing.

Discussion

 

The rising importance of big-data computing stems from advances in many different technologies.  Some of these include:

  • Sensors
  • Computer networks
  • Data storage
  • Cluster computer systems
  • Cloud computing facilities
  • Data analysis algorithms

How does these technologies play a role in global computing and big data?

Business iNtelligence

 Hi Below are the questions for the assignment

1.  Discuss the difficulties in measuring the intelligence of machines.

4.  In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed. (Note: This is a class project.)

5.  Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report.

15.  Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recogni-tion product.

 

CIS 109 Discussion 8

As a business professional, why does the following difference matter to you? Why does knowing the difference help you avoid some common mistakes?

  • Information technology contains three major components: Hardware (such as computers), Software (such as operating systems and office software), and Data (the facts, figures, and numbers collected from the daily activities of the organization).  
  • Information systems contain those same components, with two additions: People (such as the employees who work there), and Procedures (such as the step-by-step instructions employees follow to complete a sale).

BMIS662 – Application Activity Network Security Assignment

  

Application Activity Network Security Assignment Instructions

Overview

Security was once a separate topic from networking and many professionals dismissed it as unnecessary. Today, network security is one of the most important parts of the networking professional’s job. A key point in the threat environment today is that wizard hackers who hacked for the thrill of breaking in and the enhancement of their reputation have given way to career criminals. Computer crime for traditional greed motives dominates the threat environment today.

Instructions 

The planning section has many important concepts. Arguably, the most important planning principle is risk analysis. You cannot stop all attacks, any more than society can stop all robbery. The important thing is to spend money on protection only if there is a larger reduction in probable losses. 

For this activity utilize Microsoft Visio or a subsequent visual design tool and create a diagram that lists types of attackers in a way that illustrates them from most dangerous to least dangerous. 

Create categories to place these attackers in such as:

traditional hackers, 

malware writers, 

disgruntled employees, 

career criminals,

terrorist groups, 

nation-states, etc. 

Once you have completed this, describe the types of attacks that each attacker is likely to engage in, and be sure to analyze the weaknesses that these attacks are targeting as well as which layer of the OSI model they are targeting

The report must be a minimum of 7 pages, excluding the title page, Visio diagrams, and references. It must include at a minimum of 7 peer-reviewed sources to justify your assertions. 

Total of 11 Pages at least

Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.