SQL Servers installation and access (Cyber Security)

 Using your textbook, the Internet, and any other suitable references, answer the following questions in your own words. Save your answers in a single file (minimum length of a full page of content).  Remember to include any sources that you use.

  1. Why would you perform a silent installation?
  2. Under what circumstances would a system administrator lose access to an instance of SQL Server? Give an example.
  3. Oracle offers a free download of all editions of the Oracle Database.  How does the company derive benefits from this approach?

ME-8

 
Discuss in 500 words or more why, in this age of distributed computing, centralized IAM systems are necessary. 

Discussion Post 3 and Assignment

 1) Note the various aspects of knowledge management, continuous innovation, and competitive advantage and how they integrate with one another. ( 250 to 300 words)

2) What is the difference between the Internet and the World Wide Web? Create at least three statements that identify the differences between the two.

3)  Find the information security policy at your place of employment or study. Is it a good policy? Does it meet the standards outlined in the chapter?

4)How diligent are you in keeping your own information secure? Review the steps listed in the chapter and comment on your security status

Question

 

Watch this video about Joseph Shumpeter’s concept of Creative Destruction. For example, many think that the introduction of self-driving cars will disrupt the job market for drivers. 

Use at least three sources.   Use the Research Databases available from the Danforth Library, not Google.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested

DQ

links:

https://www.youtube.com/watch?v=l8XNRTfPgZI&ab_channel=Boxmining

http://www.jbonneau.com/doc/BMCNKF15-IEEESP-bitcoin.pdf

Data mining

After reading Chapter 1-Introduction, answer the following prompts and then create a new thread with your content.
 

1) In your own words, define “data mining”

2) Suppose that you are employed as a data mining consultant for an Internet search engine company. Describe how data mining can help the company by giving specific examples of how techniques, such as clustering, classification, association rule mining, and anomaly detection can be applied. (provide at least 1 example for each technique)

In order to receive full credit for the initial discussion post, you must include at least two citations (APA) from academic resources

Corporate IT Security Audit Compliance

 

  • Read the Case Study:
     (this case study is attached) 
  • Write a summary analysis and what is your opinion of the discussion? What is the high point that convinces you that Corporate governance compliance does make a difference in the operating performance?

Assignment

 

Describe in 500 words discuss the scope of a cloud computing audit for your business.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.