Part 3 – Database Administration and Data Governance

 

Assignment Content

  1. Based on your previous work in the previous week, create a 700-word entry in your Database Management Plan. You will use information from this entry in your presentation due in Week 6. Ensure you:  
    • Evaluate and assist company decision makers in understanding the importance of database administration and data governance in relation to building scalable and robust applications.
    • Describe how SQL constructs could be used to create data definition language (DDL) and data manipulation languages (DML).
    • Explain how the design would be checked from each role’s perspective, according to the information they require.
    • Use these roles as an example:
    • The administration team needs access to records and permission to update and enter new data.
    • The development teams need to write the expected transactions relatively easily, which might depend on the degree of normalization.
    • The application team needs access to any and all data to manage the interface.
    • Submit your assignment.

Discussion-virusus and malicious code . Due today

  • Explain the key differences between viruses and other malicious codes. Identify at least three different types of viruses and describe the main differences between each one. Next, explain both the potential threat posed by viruses and other malicious codes and their main effects on computers and productivity.
  • Discuss the fundamental lesson(s) that we can learn from the attacks of viruses and other malicious codes. Speculate on the main steps that both individuals and businesses can take in order to protect themselves from attacks that may occur in the future.

Data Visualization

 1. Identify one or a few visualizations/infographics you think are especially effective  2. Identify one or a few visualizations/infographics you think are especially ineffective.  For each choice, consider the reasons that led you to make that choice?  What design or content factors shaped your selection? 

IT Project Management

 

In your initial post, answer the following questions about IT Project Management. In addition to your course textbook (chapter 11), utilize the UC library for information and examples.

What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents.

In your peer responses, be sure discuss your thoughts on project management, your views on project’s attributes, and your thoughts on successful project management. You can take opposing/differing views than your peers but be sure to provide applicable resources as needed. Properly provide examples in your peer responses as well and any additional challenges you see with IT projects.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Discussion

When are VPN’s used today? Do you use a corporate or individual VPN? If so what are the benefits? Be sure to find at least one article (academic or business) and cite and reference in APA format.

Module 3 – Security Procedures for Servers and General Access

Please complete attached assignment

40.0 to >36.0 pts

Excellent

• Security procedures provided for all application servers include clear, specific, and detailed statements of purpose, scope, procedures, enforcement, and revision history • General access control procedure includes clear explanation of how they can be applied to any infrastructure support and/or administrative personnel (including end-users), and rationale for procedures

Please checked for grammatical errors. Please don’t use books or journals as references.

Week 5 Discussion Questions

Include references in APA format.

  1. Compare HFS+, Ext3fs, and NTFS. Choose the most reliable file system and justify your answers.
  2. Compare Inodes used in Linux and NTFS. Are they the same? If not, which one do you feel is better?
  3. Discuss whether steganography is a good solution for image and movie piracy. Discuss how steganography can relate to digital rights management (DRM) solutions.

Please do not use journals or books. Only use online websites, such as www.google.com

Computer security

Using the Web or other resources, do a bit of research on the methodologies that Microsoft Windows firewall uses. Define a firewall. Define firewall security techniques. Write the strengths and weaknesses of the Microsoft Windows firewall

Write between 200 and 300 words.

Use your own words