Security measures for good database

 Considering the importance of data in an organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

data structures and algorithm

In this programming assignment you are asked to expand the SortedArrayList data structure we

have developed in class by adding the following new methods:

 void IncrementItems(T aValue)

– Function: Increments all lists’ values by aValue.

– Precondition: List has been initialized

aValue has been initialized

– Postcondition: Function value = elements of the list have their info incremented

by a Value.

 int CountEven()

– Function: Returns the number of elements that appears an even number of

times the list.

– Precondition: List has been initialized

– Postcondition: Function value = number of even integers in the list.

 void ReverseOrder ( )

– Function: Reverses the order of the list’s elements.

– Precondition: List has been initialized.

– Postcondition: Function value = elements changed to descending order, if

elements are in ascending order, and vice-vers

Wireless Security & Forensics

 

In this weekly discussion, you will discuss the use of a tool for manual examination of a phone:

  • Select  one of the tools mentioned in the text and describe the tools  functionality and process used in an examination of a device.
  • Using the Internet, research the web for an article related to the tool and answer the following questions:
  1. What are some of the advantages or disadvantages of the tool?
  2. Discuss the tools setup
  3. Appraise the value of the tool in gathering evidence for prosecution

Your  response to the DQ must be a minimum of 400 words. You must provide  references for your response (APA format). You will need to reply to two  (2) other fellow student’s posts (See the syllabus). The responses must be made in the week due.

Week 10

explain the importance of crime analysis in reference to secure architectural design.

Remember to cite at least one scholarly peer-reviewed article.  

All citations should be in APA format.

music retrieval techniques assignment 5

Use the template for the assignment. I will send more files and example code from class that will make the assignment easier. The assignment uses python 3 and jupyter notebooks as the IDE. There are a bunch of class notes and code examples

Data Science

 Classification: Basic Concepts

Decision Tree Induction

Bayes Classification Methods

Rule-Based Classification   

Assignment 4

1- Consider the data in the following table: 

  

TID 

Home Owner

Marital Status

Annual Income

Defaulted   Borrower

 

1

Yes

Single

[120 – < 150K]

No

 

2

No

Married

[90 – < 120K]

No

 

3

No

Single

[60 – < 90K]

No

 

4

Yes

Married

[120 – < 150K]

No

 

5

No

Divorced

[90 – < 120K]

Yes

 

6

No

Married

[60 – < 90K]

No

 

7

Yes

Divorced

[120 – < 150K]

No

 

8

No

Single

[90 – < 120K]

Yes

 

9

No

Married

[60 – < 90K]

No

 

10

No

Single

[90 – < 120K]

Yes

Let Defaulted Borrower be the class label attribute. 

a) Given a data tuple X = (Home Owner= No, Marital Status= Married, Income= $120K). What would a naive Bayesian classification of the Defaulted Borrower for the tuple be?

2- Consider the training example in the following table for a binary classification problem.

  

Customer ID

Gender

Car Type

Shirt Size

Class

 

1

M

Family

S

C0

 

2

M

Sports

M

C0

 

3

M

Sports

M

C0

 

4

M

Sports

L

C0

 

5

M

Sports

XL

C0

 

6

M

Sports

XL

C0

 

7

F

Sports

S

C0

 

8

F

Sports

S

C0

 

9

F

Sports

M

C0

 

10

F

Luxury

L

C0

 

11

M

Family

L

C1

 

12

M

Family

XL

C1

 

13

M

Family

M

C1

 

14

M

Luxury

XL

C1

 

15

F

Luxury

S

C1

 

16

F

Luxury

S

C1

 

17

F

Luxury

M

C1

 

18

F

Luxury

M

C1

 

19

F

Luxury

M

C1

 

20

F

Luxury

L

C1

a) Find the gain for Gender, Car Type, and Shirt Size.

b) Which attribute will be selected as the splitting attribute? 

PLEC Week 4

 

Discuss in 500 words your opinion whether Edward Snowden is a hero or a criminal. You might consider the First Amendment and/or the public’s right to know as well as national security concerns. 

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Write in essay format not in bulleted, numbered or other list format.

Discussion 6

 What are the implications for Basic Attention Token” (BAT) and Blockstack relative to global marketing? 

APA format- Minimum 500 words.

 

Read:

Watch:

  • YouTube: Basic Attention Token
  • YouTube: Blockstart – A New Internet for Decentralized Apps
  • YouTube: Data is the New Gold, who are the New Theives?  

BI -Assignment week 6

Complete the following assignment in one MS word document:

Chapter 10 –discussion question #1-2 & exercise 1 & 7

Chapter 11- discussion question #1-4 & exercise 4

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.