Write a program calculator using python
Deliverable 7 – Conference Presentation
Competency
- Summarize cloud application scalability concepts.
- Evaluate cloud application benchmarking and tuning procedures.
- Assess cloud-based implementation strategies.
- Select a deployment platform using appropriate criteria.
- Describe cloud security architecture.
- Contrast methodologies for the design and deployment of cloud applications.
Student Success Criteria
View the grading rubric for this deliverable by selecting the “This item is graded with a rubric” link, which is located in the Details & Information pane.
Scenario
You are the Cloud Architect for a startup company. Your company has deployed several client implementations on the public cloud. Your team lead wants you to prepare the presentation for a DevOps event in Silicon Valley. This event can have a big impact on your company to attract more clients.
You have pushed several web applications to the public cloud in the past. You have decided to use the best practices from your deployment experiences and use them to create a PowerPoint presentation for this event. You have also decided to associate these experiences with a fictitious situation to give your presentation a more holistic and true-to-life feel. The fictitious situation will be that a company named “Investment Karma LTD.” will roll out a website for client information and interactivity with the company. The website will be a world-wide site that handles clients from nearly every country who invest on all of the world’s stock exchanges.
Instructions
Create a PowerPoint with the following information:
Make sure to thoroughly explain in slide notes for each slide why you made the choices you made for the company.
Slide 1: Select a public cloud vendor for Investment Karma LTD. and provide an overview of the applicable services offered by the cloud vendor.
Slide 2: List the public cloud components used for the company’s web application deployment.
Slides 3-4: Create a Web application deployment architecture that will be used on public clouds.
Slides 5-6: Modify the architecture diagram and include pertinent databases including those which use managed service.
Slides 7-8 Explain what a CI/CD pipeline design should entail. Be sure to include continuous integration and continuous delivery.
Slides 9-11: Explain the use of cloud-native tools (at least 3), that you can use to improve the security of Investment Karma’s web applications.
Slide 12: Describe a way to implement data encryption for the data stored in the appropriate databases.
Slide 13: Identify the correct benchmarking tool that was chosen to evaluate the cloud service.
Slide 14: List a minimum of 5 scholarly resources that you used to create the information for the PowerPoint.
Discussion
Compare and contrast the difference of network security within an on-premise environment and a cloud environment. Give some examples of areas that are common and areas that are different.
It should be 250-300 words. There must be at least two APA formatted reference (and APA in-text citation) to support your thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.
Computer
Answer the following four questions in paragraph format: 75- 150-word count this assignment is a discussion. So there is no upload function. Please type your response in the text box.
- What did you learn about excel that you didn’t know before?
- Explain what it means to be on the cell compared to being in a cell?
- Which tutorial did you have to watch more than once?
- What would you still like to learn about Microsoft Office?
Advanced Programming Languages Paper
explore the peer-reviewed literature and complete a 1 – page paper on the following topic:
- Java Programming
Database Scenario:
Database Scenario:
Jack from the local hardware store, Main Street Hardware, has come to you requesting your database development services. He needs a database that will store product inventory, including products on hand as well as the vendors from whom he purchases these products. He also wants to track sales. He describes the business functions as follows.
- Customers purchase products creating invoices.
- Products are purchased from vendors.
- The product on hand is tracked so that proper ordering from the vendor can take place in a timely manner.
Business Rules:
- A customer creates zero or many invoices and zero or many invoices are created by one and only one customer.
- Many products are associated with zero or many invoices.
- Zero or many invoices are associated with many products.
- A vendor sells one or many products and many or zero products are sold by one and only one vendor.
Instructions
- Database Design: Create the ER diagram using MS Visio. Be sure to include table names, primary /foreign key fields, attributes, relationships, crow’s feet notation, and minimum/maximum cardinalities.
- Database Application: Create the matching Access database using the ER diagram that you just created. Be sure to include table names, primary/foreign keys, attributes, field descriptions where applicable, and relationships setting referential integrity. Add at least 10 records to each table.
- Create two queries. Make sure that each contains either a criterion to refine the search data or a function that computes a value. Be sure to name these queries with a descriptive name as well.
- Uniqueness: In one of your queries you must add a field that shows the current date along with your StudentID. Enter the following into the last field in one of your queries: Uniqueness: Now() & ” STUNAM1234″ (where STUNAM1234 is your studentID).
- Create one report based on one of your queries. You may choose the type of design.
- Upload your Visio ER diagram (.vsdx) and Access database (.accdb) files for grading using the submission instructions below.
Assignment 1
Develop a draft of Chapter 2 where you clearly provide a well developed introduction and other sections relevant to your topic. This should be your first complete draft of Chapter Two.Before submitting, you should carefully review Chapter 2 and check the following:
- Use Grammarly in Microsoft Word to review your assignment before submitting. Grammarly may show areas that you do not think need to be changed. If so, you should use the “trash” feature in Grammarly to remove each area that you do not think need to be addressed.
- Review all of your references. Are all references in APA format? Do all in-text citations have an associated reference in the reference list? Do you have references in the reference list that are not cited in the chapters?
- Did you follow the UC APA dissertation template?
Assignment
Determine CPTED strategies
Research how Tacoma, WA used the concepts of CPTED to build a sense of community using lighting, natural access control, and natural surveillance. Determine if the strategies used could work in your area.
Basic CPTED strategies for building a safer Tacoma
– 2 References
– 350 words in length
– APA 7 format
– No plagiarism
powerpoint
two projects, more information please see files
use of encryption to protect data
Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use.
Write in essay format not in outline, bulleted, numbered or other list format.
Use the five-paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.