MIS433-Module 2: Discussion: Data Relations Instructions

In your discussion post, address the following:

Part 1-

Identify the typical relationships between the entities listed below. As you are completing this, comment on your assumptions and the mental models that affect your decision. Be sure to include minimum and maximum values. Use the Internet to look up terms and examples. 

When denoting the relationships, use the scheme introduced in the textbook to depict one-to-one (1:1) or one-to-many (1:*).

  1. Company, CEO
  2. Restaurant, Cook
  3. TV Show, commercial ad
  4. E-mail address, computer user
  5. Item, List price
  6. Car, Car wash
  7. House, Painter
  8. Dog, Owner
  9. Manager, Worker
  10. Doctor, Patient

Part 2-

For each of the entities in the following list (left side), identify whether each of the items on the right should be an attribute of that entity or a separate entity.  In the case of a separate entity, be sure to defend your answer.

1) Employee – Name, Date Hired, Manager, Spouse, Job

2) Factory –  Manager, Address, Supplier, Machine, Size

3) Boat –  Dock, Length, Passenger, Captain, Weight

4) Dentist-  Patient, Graduate School, Emergency Phone, Drill

5) Library – Book, Librarian, Number of Books, Visitor

Computer Architecture, Computer Engineering, Computer

1- For performance evaluation, please describe the rationale of quality improvement performance evaluation.

2- Please list & describe possible parallelization approaches and analysis their advantages or disadvantages.

3- If a computer system is with turbo frequency design, can the computer system always use the turbo mode to replace the regular common mode?

4-Caches, TLBs, virtue memory may initially look very different, but they rely on the same 2 principles of locality, please answer the following questions: 

a- where can a block be placed?

b- how can a block be found? 

c- if there is a miss, how can a block be replaced? 

d- if a write is needed, how can you do that?  

SE494 week 9

APA FORMAT & references 350 words each questions 

Topic: Menus in Mobile Apps

Read the article titled: Top 8 Mobile Navigation Menu Design for Your Inspiration and answer the following questions

https://uxplanet.org/top-8-mobile-navigation-menu-design-for-your-inspiration-8a2d925bffc0

QUESTION 1 : Compare the following navigation menu types  based on advantage and disadvantages

  • Classic navigation menu
  • Rectangular, grid navigation menu
  • Drawer navigation
  • Rudder navigation

QUESTION 2 : Which one you would use for the Mobile application for health services. Assume that the mobile app is going to be used by the patient to do the followings;

Schedule an appointment, see the bold test results, refill a prescription and communicate with Doctor, Nurse and the Pharmacy.

Exp19_Access_App_CapAssessment – Student Loans 1.0

Exp19_Access_App_CapAssessment – Student Loans 1.0

  

Exp19_Access_App_CapAssessment – Student Loans 1.0

Project Description:

Quill Financial Services has recently started working with student loans. You will build the company’s database. The initial set of financed student loans are stored in an Excel spreadsheet. You have already compiled the list of colleges and universities into an Access table. You will use your expertise to import the information from Excel, modify the table, create relationships, create queries, create forms, and create reports.

     

To   start, you have been provided with a database the Information Technology   department created. The database has one table. You will be importing an   Excel spreadsheet into a table   and creating a primary key. 

Start Access. Open the   downloaded Access file named Exp19_Access_Ch03_CapAssessment_Student_Loans.accdb.

 

Import the exploring_acap_grader_a1_Clients.xlsx Excel workbook into a table   named Clients. While importing the data, make   sure to select the option First Row Contains Column Headings, and select   ClientID as the primary key field.

 

Now that you have imported the   data from the spreadsheet, you will modify the field properties in the   Clients table and demonstrate sorting.

Open the Clients table in Design   view. Change the ClientID field size to 6 and remove the @ symbol from the ClientID format   property. Change the ZIP field size to 5. Change the ExpectedGraduation field to have 0 Decimal Places. Delete the   Comments field. Add a new field named LastContact as the last field in the table.   Change the data type to Date/Time, and change the format to Short Date. Switch   to Datasheet View, and apply Best Fit to all columns. Sort the table on the   LoanAmount field in descending order, then save and close the table.

 

Now that the table is imported   and modified, you will create a relationship between the Colleges and Clients   tables.
 

  Open the Relationships window. Add the Clients and Colleges tables to the   window, and create a one-to-many relationship between the CollegeID fields in   the Clients and Colleges tables. Enforce referential integrity between the   two tables and select the cascade updates and cascade delete options. Save   the changes, and close the Relationships window.

 

Polly Esther, a financial   adviser, would like your assistance in helping her find certain information.   You will create a query for her and demonstrate how she can change information.
  Create a new query using Design view. From the Clients table, add the   LastName, FirstName, Email, Phone, and ExpectedGraduation fields, in that   order. From the Colleges table, add the CollegeName field. Sort the query by   LastName and then FirstName, both in ascending order. Set the criteria in the   ExpectedGraduation field to 2019. Run the query. Save the query as 2019 Graduates and close the query.

 

Now that you have created the   query, you will create a second query for Polly that will calculate the loan   payments for which each student will be responsible (assuming monthly   payments).
 

  Create a copy of the 2019 Graduates query. Name the copy Loan Payments and open the query in Design   view. Remove the criteria from the ExpectedGraduation field. Create   calculated field named MonthlyPayment that determines the estimated monthly student loan   payment. The loan will have a fixed rate of 5% interest, paid monthly, for 10   years. Using the Pmt function, replace the rate argument with 0.05/12, the num_periods argument with 10*12, and the present_value argument   with the LoanAmount field. Use 0 for the future_value and type arguments. Format   the field as Currency. 

Run the query. Ensure the   payment displays as a positive number. Add a total row to Datasheet view.   Average the MonthlyPayment field and count the values in the LastName column.   Save and close the query.

 

Stann Dupp, the director of   finance, needs to summarize information about all of the student loans Quill   Financial Services offers based on each college. You will create a totals   query for him to summarize the number of loans, average loan amount by   college.

 

Create a new query using Design   View. From the Colleges table, add the CollegeName field. From the Clients   table, add the ClientID and LoanAmount fields. Display the Total row, and   group by CollegeName. Show the count of ClientID and the average LoanAmount.

 

Change the caption for the   ClientID field to Num Loans, and the caption for LoanAmount to Avg Loan. Format the LoanAmount field as   Standard. Run the query. Save the query as Loan Summary by College and close it.

 

Jay Walker, one of the company’s   administrative assistants, will handle data entry. He has asked you to   simplify the way he inputs information into the Clients table. You will   create a form based on the Clients table.

 

Create a Split Form using the   Clients table as the source. Change the height of all of the fields and   labels to .25 collectively. Reorder the fields in the bottom half of the split   form so the FirstName displays before the LastName field. Switch to Form view   and click the row for Riya Gonzalez. Change her expected graduation date to 2022. Save the form as Client   Information and   close it.

 

Stann is hoping you can create a   more print-friendly version of the query you created earlier for him to   distribute to the executives. You will create a report based on the Loan   Payments query.

   Create a report using the Report Wizard. From the Loan Payments query, add   the LastName, FirstName, Email, ExpectedGraduation, CollegeName, and   MonthlyPayment fields. Do not add any grouping or sorting. Ensure the report   is in Landscape orientation. Save the report as Loans by Client and view the report in Layout   view. Adjust the width and position of the fields and labels so that all of   the values are visible. Save the report.

 

Now that you have included the   fields Stann has asked for, you will work to format the report to make the   information more obvious.

   Apply the Integral theme. Group the report by the ExpectedGraduation field.   Sort the records within each group by LastName then by FirstName, both in   ascending order. Switch to Print Preview mode and verify that the report is   only one page wide (Note: it may be a number of pages long).

Java- Play Tetris

 

Java programming need to develop game Play Tetris 

 Due Date: March 3

Need full solution: Problem Coverage 100% and 100% code path test coverage

 Please feel free to improve and resubmit your code as many times as you like (before the deadline) in order to improve your score. 

Security Architecture and Design Executive Program Practical Connection Assignment

  

Executive Program Practical Connection Assignment

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of Security Architecture and Design course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Trojans, Malware, and Cryptology Attacks

Part 1: Hacking Windows and Linux

Respond to the following:

  1. How can you distinguish between different operation systems by examining a listing of host services? 200 words minimum.
  2. Why are most networks, even small office/home office (SOHO) networks, considered mixed networks in terms of operating systems? Give some common examples of devices in a typical home that might be running Linux or a derivative of it. 300 words minimum. 
  3. How are UNIX/Linux and the Apple OS X related? 200 words minimum. 

Part 2: Windows 2000™ and Firewall Issues

Respond to the following:

  1. When Windows first released Windows 2000, a default install resulted in IIS being installed and running. Why do you think Microsoft was criticized for this? 200 words minimum.
  2. What are some of the problems that might result from only deploying a firewall at the perimeter of an organization? Do most Linux distros come with a firewall? If so, explain it. What are some of the features of Microsoft’s “Internet Connection Firewall”? 300 words minimum.

Site surveys allow you to

  

Site surveys allow you to place access points in locations that provide an optimum signal without resorting to trial and error. Conducting a site survey is a critical component of properly designing and installing a wireless LAN. Every building is unique; therefore, a network consultant should always do a thorough walkthrough to analyze signal strength and to identify any objects that might cause interference. In this assignment, you will analyze five office floor plans. The data you gather will assist you in completing your final project. As you analyze each plan, consider what objects or materials affect the signal strength, why they do so, and what you can do to overcome their interference. Resource: Ch. 15 of CWNA Certified Wireless Network Administrator Official Study Guide; Analyze the five floor plans in the Floor Plan Site Survey exercise located on the student website. Each plan has only one access point placed in the data center of each building. The location of the data center may not always be ideal for optimum signal coverage, so you will use this survey to determine where to place other access points as needed. Complete Appendix E. Post your assignment as a Microsoft® Word attachment.

LAB 3 Developing a Security Policy Framework Implementation Plan

Part 1: Research Security Policy Frameworks (0/2 completed)

Note: In this part of the lab, you will review internet resources on security policy frameworks in order to form a basis for their purpose and usage. Understanding the reason behind a security policy framework is key to understanding the component policies and procedures. Please take the time to review the research thoroughly and think through the concepts behind the framework itself.

1. In your browser, navigate to https://www.sans.org/reading-room/whitepapers/policyissues/information-security-policy-development-guide-large-small-companies-1331.

2. Read Sections 1-5 of the SANS Policy Development Guide.

3. Summarize the Policy Development Guide’s recommendations for organizing a policy hierarchy and selecting policy topics.

Note: It is important to understand how and why a policy differs from a standard, a procedure, and a guideline. From the top down, the policy should not change or need modification unless a major shift in corporate values or business process occurs. On the contrary, guidelines should be reviewed, and possibly changed, often.

Similarly, even though a policy should be written clearly and concisely, it is a high-level document answering the “why” questions. Standards are also high level, but they answer the “what” questions. Finally, the procedures and guidelines provide the “how.”

Examples of security policy and guideline templates are available from the SANS Institute at https://www.sans.org/information-security-policy/.

In the next steps, you will learn about COBIT 2019, a popular industry-standard policy framework.

4.  In your browser, navigate to https://www.cio.com/article/3243684/what-is-cobit-a-framework-for-alignment-and-governance.html.

5. Describe the core principles and objectives of COBIT 2019.

Part 2: Define a Security Policy Framework (0/2 completed)

Note: Understanding both unique and universal risks to your organization’s IT infrastructure is essential to developing an appropriate IT security policy framework for your organization. In this part of the lab, you will review a list of risk, threats, and vulnerabilities and define appropriate policies to mitigate them. Next, you will organize your policies into a policy framework.

1. Review the following list of risks, threats, and vulnerabilities at the fictional Healthwise Health Care Company.

  • Unauthorized access from public Internet
  • Hacker penetrates IT infrastructure
  • Communication circuit outages
  • Workstation operating system (OS) has a known software vulnerability
  • Unauthorized access to organization-owned data
  • Denial of service attack on organization’s e-mail
  • Remote communications from home office
  • Workstation browser has software vulnerability
  • Weak ingress/egress traffic-filtering degrades performance
  • Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse
  • User destroys data in application, deletes all files, and gains access to internal network
  • Fire destroys primary data center
  • Intraoffice employee romance gone bad
  • Loss of production data
  • Need to prevent rogue users from unauthorized WLAN access
  • LAN server OS has a known software vulnerability
  • User downloads an unknown e-mail attachment
  • Service provider has a major network outage
  • User inserts a USB hard drive with personal photos, music, and videos on organization-owned computers
  • Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router

2. For each risk, threat, or vulnerability in the list above, select an appropriate security policy that might help mitigate it. You can select one of the SANS policies or choose one from the following list.

Security Policies

  • Acceptable Use Policy
  • Access Control Policy
  • Business Continuity—Business Impact Analysis (BIA) Policy
  • Business Continuity and Disaster Recovery Policy
  • Data Classification Standard and Encryption Policy
  • Internet Ingress/Egress Traffic Policy
  • Mandated Security Awareness Training Policy
  • Production Data Backup Policy
  • Remote Access Policy
  • Vulnerability Management and Vulnerability Window Policy
  • Wide Area Network (WAN) Service Availability Policy

3. Organize the security policies you selected so that they can be used as part of an overall framework for a layered security strategy.

Challenge Exercise (0/2 completed)Note: The following challenge exercise is provided to allow independent, unguided work – similar to what you will encounter in a real situation.

A user at Digital Innovation Products has been using company network resources to download torrent files onto a USB drive and transfer those files to their home computer. IT tracked down the torrent traffic during a recent network audit. Unfortunately, the company does not have a current policy that restricts this type of activity.

Identify at least two appropriate policies that should be in place to define this type of behavior and the consequences thereof.

Write a brief overview for C-level executives explaining which policies should be added to the company’s overall security policy framework, why they should be added, and how those policies could protect the company.