DBMS Assign

 Task 1 – Design (40 Marks) a) Produce an entity relationship model for the proposed database system for Universal Conference Management. This should be a fully normalised model to third normal form (3NF). You do NOT have to show the steps you took in normalising the data. b) Produce a data dictionary for the entity relationship model showing all attributes, with data types and identifying primary and foreign keys. 

Task 2 – Data entry and Data Manipulation (45 Marks) a) Create all the tables using SQL. Show your ‘create table’ scripts and the finished tables. b) Enter data on all the events shown in the assignment. c) Enter data for FIVE (5) customers and associate them with events. Note that a customer might have more than one event associated with them. d) Enter data on staff and items taken from the assignment. Give a listing of this. e) Write a query that selects all the events ordered by a particular customer. f) Write a query that selects the staff and items assigned to an event. g) Write a query that selects all the customers’ details for events that require a laptop. h) Write a query that counts all the birthdays that need equipment from Edison Sound and Light. i) Write a query that shows all the events and their customers that need a waiter. j) Update the item table so that Item 2 is no longer a laptop but a ‘tablet’. k) Update the staff table so that Tara Patel is now known as Tara Williams. 

Task 3 – Assessment (15 Marks) Give an assessment of how the work you have done has met the requirements of Universal Conference Management. 

Submission guidelines  Your submission should be in the form of a single word-processed document that includes any necessary diagrams.  The word count for the document is 1250 words (excluding text in any diagrams). You should explain any assumptions you have made.  A digital version must be submitted on a CD, USB flash drive or other similarly acceptable medium, along with a copy of the developed database 

2 Discussions and 1 Case Study Computer Forensics

Discussion 7.1 Computer Forensics

As a digital forensics examiner, it’s a good idea to build a list of references for information on privacy laws in other countries, which can be useful in cases involving cloud storage.  Using the search term “world privacy laws” look for at least three Web sites with references to laws in other countries.  List the URL for each site and summarize what kind of information it offers, and evaluating its ease of use.

Discussion 7.2 Computer Forensics

What is a major advantage of automated forensics tools in report writing?

Case Study 7.1 Computer Forensics

Due: Sunday, End of Module by 11:55 p.m. EST

Privacy laws in other countries are an important concern when performing cloud forensics and investigations. You’ve been assigned a case involving PII data stored on a cloud in Australia. Before you start any data acquisition from this cloud, you need to research what you can access under Australian law. For this project, look for information on Australia’s Privacy Principles (APP), particularly Chapter 8: APP 8 – Cross-border disclosure of personal information. Write a 2 to 3 page paper (not including title and reference pages) using APA format summarizing disclosure requirements for getting consent from data owners, and any exceptions allowed by this law.

Writing Requirements

  • 2-3 pages in length  (excluding cover page, abstract, and reference list)
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Show You Care

Show You Care

Assignment

Required Resources

Read/review the following resources for this activity:

  • Textbook: Chapter 11
  • Lesson
  • Minimum of 2 scholarly sources

Instructions

Develop, in detail, a situation in which a health care worker might be confronted with ethical problems related to patients and prescription drug use OR patients in a state of poverty.

  • Your scenario must be original to you and this assignment. It cannot be from the discussion boards in this class or any other previous forum.
  • Articulate (and then assess) the ethical solutions that can found using “care” (care-based ethics) and “rights” ethics to those problems.
  • Assessment must ask if the solutions are flawed, practicable, persuasive, etc.
  • What health care technology is involved in the situation? What moral guidelines for using that kind of healthcare technology should be used there? Explore such guidelines also using utilitarianism, Kantian deontology, ethical egoism, or social contract ethics.
  • Say how social technologies such as blogs, crowdfunding, online encyclopedias can be used in either case. What moral guidelines for using that kind of healthcare technology should be used there? Develop such guidelines also using utilitarianism, Kantian deontology, ethical egoism, or social contract ethics.

You should not be using any text you used in a discussion board or assignment for this class or any previous class.

Cite the textbook and incorporate outside sources, including citations.

Requirements

  • Length: 3-4 pages (not including title page or references page)
  • 1-inch margins
  • Double spaced
  • 12-point Times New Roman font
  • Title page
  • References page (minimum of 2 scholarly sources)

Discussion 4- Planning Project

Assigned Readings:Chapter 9: Scope PlanningChapter 10: Project Schedule PlanningInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Go online and research the difference between total slack and free slack.
    1. Prepare proper reference citations for the sites you located, using APA style.
    2. Write definitions of total slack and free slack in your own words.
    3. Why would the distinction between different forms of slack be important to a project manager?
  2. How does scope management differ from scope control?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text-

Title: Project Management 

Subtitle: https://opentextbc.ca/projectmanagement/ 

ISBN: 978-1-77420-013-1 

Authors: Adrienne Watt 

Publisher: BCcampus 

Publication Date: August 14, 2014 

Edition: 2nd Edition

Discussion 2- Project Risk & Quality MNGT

Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. What factors make a project high risk?
  2. What are the three types of project risk?
  3. How do you write a good project risk?

Chapter-

Chapter 3: Projects and Project Stakeholders

Text

Textbook:

Title: Managing Project Risks 

ISBN: 9781119489733 

Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards 

Publisher: John Wiley & Sons 

Publication Date: 2019-08-13

Project #4

Database Project

  • Project 4 Instructions Actions | Print and follow these instructions to complete this project
  • You can build the database example I have outlined in these Instructions
    • OR you can build your own database.
    • If you build your own database
      • The database must contain at least 3 tables (with at least 5 fields and 5 records in each table)
      • You may not use a template for this project

Create the pseudocode design that

  

Create the pseudocode design that creates and prints an array of sales amounts, determines the sum of the sales amounts, the average of the sales amounts, and find the highest of the sales amounts. The design should be modular as described below. There should be 5 modules in the design. NOTE the use of SIZE and SIZE -1 in the text readings on arrays. Remember that arrays are 0 based. If an array has 5 elements (as below), they are positions 0, 1, 2, 3, and 4
The main module should
• declare the array of 5 Real sales amounts and give each element a literal value as part of the declaration statement
• call a module to print out the values in the array
• call a module calcSum() to calculate and return the sum of the sales amounts and pass the array to it as an argument
• print a line with the sum returned from calcSum()
• call a module findAverage() to calculate and return the avg of the sales amounts and pass the SIZE and sum as arguments
• print a line with the average returned from findAverage()
• call a module named findAndPrintHigh() and pass the array to it as an argument
The calcSum() module should
• accept the array as a parameter
• declare any variables necessary to compute the sum of the array
• return the sum
The findAverage() module should
• accept the sum and the SIZE as parameters
• declare any variables necessary to compute the average
• return the average
The findAndPrintHigh() module should
• accept the array as a parameter
• use the length function of the array when looping through it
• declare any variables necessary
• determine the highest value in the array
• determine the position of the highest value in the array
• print a line with the highest value and the position of that value
 

Add a 2nd array ( a parallel array) to the main module of part A with the names of 5 salesmen. Rewrite the findAndPrintHigh() module passing both arrays to it. Include in the line which prints the highest sales in the array, the name of the salesman who sold that high sales amount

 

Assignment

  1. Please give in-depth view of Security Threats what are the characteristic of Trojan Horses, Viruses, and Worms. Also brief describe common terms like malware, spyware, bots…etc. 

2. Please describe in details what is Denial of Service in terms of common form of Security Attack with example(s).

3. Describe more details then just brief about most common Four-layered Model of Security. Also study/research and brief describe common concepts of whitelisting, blacklisting…etc. in an organization environment. 

4.Please read chapter 32 of your textbook and review PP slides and read reputable articles/ web resources and discuss: 

How does disaster recovery relate to business continuity? What is the scope of DR? What is the scope of BCP? Please list your reference/s

5.Read chapter 32 , online resources and reputable articles/journals AND:

Choose an organization that you are familiar with, for example a university, place that you are working for or any other organization and write a paper and describe your plan and proposal for a comprehensive Disaster Recovery and Business Continuity plan.

List all your references/resources.