Big DATA Project

 

Assignment:

  • Define SQL and No SQL.?
  • Outline the distinguishing characteristics of SQL and NoSQL?
  • List and explain the family members of NoSQL database?
  • Why is NoSQL an ideal database type for Big Data Analytics? Provide examples.

Requirement

  • 3 page paper, double spaced. (Does not include title page or reference page)
  • APA format
  • At least 2 scholarly reference

Computer Security

 

Instructions

In order to complete assignment #2 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #2). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 2

  1. For apps to be featured on the iPhone, developers must build it with Apple’s software development kit and then apply for approval. Apple rejected the Google Voice iPhone App, and further stated that it would not accept any applications that incorporated Google Voice functionality. Apple reasoned that this app duplicates the phone’s core features. It also rejected Google’s location-based app Google Latitude. If you were developing a collaborative platform, do you think the best model is this collaborative model, or is the open innovation model better – if your main goal is to maximize innovation? What if your main goal is to make money?

Chapter 3
2.Plaintiffs filed a class action lawsuit against investment banks alleging that they inflated prices on more than 300 IPOs, causing IPO investors to overpay for stock, and unlawfully benefited these banks through overcompensation of banking commissions and profits made through quick sales of this stock in their own accounts before prices settled into a more realistic valuation. How would you combat such abuses going forward?

3. Read the following laws and articles:

1. The Computer Security Act of 1987

2. The Patriot Act.

3. Jaeger, P. T., McClure, C. R., Bertot, J. C., & Snead, J. T. (2004). The USA PATRIOT Act, the Foreign Intelligence Surveillance Act, and information policy research in libraries: Issues, impacts, and questions for libraries and researchers. The Library Quarterly, 74(2), 99-121.

4. Politics

Discuss the relationship and impacts of CSA, USA PATRIOT ACT, and FISA. Also discuss the current status of these laws and the replacement of these laws.

Discussion

 3. Discussion

Biometric System Evaluation

Learning Objectives and Outcomes

  • Identify the correct advantages of each biometric method
  • Identify the correct disadvantages of each biometric method 

Assignment RequirementsRead the worksheet named “Biometric System Evaluation” and address the following:Using what you have learned about the biometric method, identify the correct advantages and disadvantages of each listed biometric type. 

Discuss, in your own words using 500 words or more, how virtualization may create it's own security vulnerabilities.

Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.

Use at least three sources. Use the (https://libguides.nec.edu/az.php) Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

EDMS Business Requirements

You are ready to prepare the final version of the EDMS business requirements document (BRD) incorporating the assignments you completed and faculty feedback provided for Weeks 1–5. You will present your BRD to the Board of Directors for Hollywood Organic Co-op.

Write at least 4 to 6 pages for the final business requirements document for the new EDMS and prepare an 8- to 10-slide media-rich presentation summary of the BRD to the Hollywood Organic Co-op’s Board of Directors.

Analyze the critical components of your information security program as it relates to Hollywood Organic Co-op. Justify how the security objectives for the EDMS align with the business objectives.

Identify and describe document access controls and best practices, including:

Viewing

Editing

Copy/paste (including screen capture)

Printing

Forwarding e-­mail containing secured e­-documents

Identify, define, and describe document access policies and best practices including:

Text documents

Spreadsheets

Financial statements

E-mail messages

Policy and procedure manuals

Research

Customer and project data

Personnel files

Medical records

Intranet pages

Other sensitive information

Identify, define, and describe all stages of the document life cycle and best practices including:

Creation

Storage

Categorizing

Metadata tagging

Delivery or sharing

Repurposing

Review and reporting archiving and/or destruction

Format citations according to APA guidelines.

Discussion

 

After reading chapter 1, compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organizations security posture. You are also required to post a response to a minimum of two other student in the class by the end of the week.  You must use at least one scholarly resource. 

Every discussion posting must be properly APA formatted.

Your initial response is due by Thursday of each week of the course and you must respond to a minimum of two other learners during the week.

Your responses to other students must be more than a simple “Good job” or “I agree with your post”. They must also not just be “Let me add to your post…” Instead, your responses to each other should do three things:

1. Acknowledge the other student’s post with some form of recognition about what they posted
2. Relate their posting to something you have learned or are familiar with
3. Add to the conversation by asking additional questions about their post, or discussing their topic further

Remember, this is a discussion forum. Your engagement with each other should be similar to how you would speak with each other if you were seated at the same table talking. Plagiarism in the discussion will not be tolerated