IT-project management

  

  

Pretend your team has been given a computer by the T-Zone Help Desk with the instructions to rename the computer from John Martinson to the name of the new owner (John sold the computer to his niece, Alison Rogers). John made his administrative password “password” and his administrative username is Admin; his computer’s name is “JohnLaptop.” He created a user account for himself, “John” and his user account password is “English!9&”. Your job is to 

1. delete or rename the user account so that it is changed from John’s to Alison’s account, 

2. create a new password, 

3. change the administrative account to include a new administrative password, and 

4. change the computer name from “JohnLaptop” to “Alison Rogers Computer”.

Can you do this using the Registry? 

· If so, write down the process you used to change the computer account. 

· If not, write the details of the method you used to change the computer account. 

DELIVERABLE:

describe how you went about renaming the computer and changing accounts from John to Alison. That person should submit the document in Canvas on behalf of the team.

Analyzing and Visualizing Assignment

 

Essay Questions – Write a 500 words document explaining and describing the question below.  

You are required to use APA format with at least 5 references

Explain and describe 5 data cleansing techniques involved in data transformation during a data visualization projects.

Bus Cont Plan&Disas Recov Plan 190

 

write 1 – 2 pages where you show the connection that this course has to your current role at work. If you are not working the you can convey how this course integrates with your personal life.

web browser forensics_3.1

 

Web Browser Tools

Last week you completed a short APA research paper on an overview of a particular Web Browser, this week we are going to dig a little deeper. You are to explore the different web browser forensic tools available, both paid and free. You are to research the different tools available to you, concentrate on free tools, and provide a summary of the tools and how you can use them to perform web browser forensics. You should also note whether the tools can be used on virtual machines.

Your research should include a 3-4 page executive summary paper in APA format, with all supporting references and screen shots of the software you explored that is available for you to use. Eventually you will be providing a video on the software in action and you using the software.  The goal is to be able to use the software to conduct the investigation and analysis and provide a final report for testimony, just to give you an idea on where we are heading.

Database Assignment SQLite

This exam consist of 3 parts. This is Part 1. Write your answer in one pdf or docx format or type them here.

I. Assuming the schema for a database,

employee (employee-name, street, city)
works (employee-name, company-name, salary)
company (company-name, city)
manages (employee-name, manager-name)

give SQL queries for the following questions, assuming a person can have more than one job and a company can exists in more than one city:

1) A list of the names of those employees who work for the Google.

2) A list of the names and cities of residence for those employees who work for Google.

3) A list of the names, streets and cities of residence for those employees who work for Google and earn more than $250000 a year.

4) A list of the names of those employees who live in the same city as the company for which they work.

5) A list of the names of those employees who live in the same city and on the same street as their managers.

6) A list of the names of those employees who do not work for Google.

7) A create statement for the table works, including the keys.

part 2

This exam consist of 3 parts. This is the 2nd part Write your answer in one pdf or docx format.

II. Write a 1200-2000 words essay about the attribute closure algorithm studied in slides, reproducing the algorithm and describing it line by line with its logic and applications to the detection of candidate keys. The essay should contain the following sections:

a) Motivation

b) The algorithm reproduced from slides

c) A line by line description of its logic and complexity

d) Exemplify computing the attribute closure (C,D)+ for the following problem:

  R=(A,B,C,D,E)

  F={B->A; C->A; DE->AC; E->B }

e) Exemplify the process of finding  and proving a candidate key for the problem at (d)

f) Describe applications of the algorithm to other problems

part 3

This exam consist of 3 parts, this being the 3rd part, and is personalized. Write your answer in one pdf or docx format.

III. Write a 1000 word essay, reproducing the corresponding algorithm or definition and describing it line by line with its logic and applications, for the following personalized topic (find the topic associated with your name).

A. Alfifi     Functional Dependencies closure 

Discussion due date 28th August

   Discuss why you selected below two journal. 

1. Information Systems 

2.  DATA BASE 

 Note: Minimum 300 words not including title and reference page. References should be taken from peer revived 

Organization leadership & decision making

  • What factors drive innovation?
  • What is the leader’s role in facilitating the process of innovation?

Requirements

  • Your answer must be substantive, which usually requires 300 or more words
  • Your answer must be well written and well organized
  • Your answer must include one properly formatted APA in-text citation to a scholarly reference other than the assigned course reading. The full reference must be provided at the end of your answer with a link if one is available.
  • No plagiarism 
  • Post two replies

cyber security

 

You may have noticed that when you look at products on a search engine, that same product appears as an advertisement in your social media and other sites you visit. Many search engines provide advertisers with tools for evaluating the impact of different keywords or phrases. These tools typically “track” user behavior patterns and associate products for sale by companies that subscribe to and pay for their services to help identify potential customers. On the other hand, there are also ad blockers that block this type of communication.

  • What constraints, if any, should be applied to this practice? Do not repeat ideas that have been posted by other students.
  • How might your feelings toward the technology be affected if you are the CIO or an executive manager at a small company that depends on this type of advertising to generate revenue?

Managing Transaction Processing using MongoDB

1. Write a research report on the topic “Managing Transaction Processing using MongoDB”.

Instructions:

Please refer to attached Doc for guidelines and please strictly follow all the instructions carefully while writing the report.

2. Prepare a PPT 

·       PPT should reflect a summary of the Research Report.

·       Should have 12-15 slides.

·       The design elements and content will be judged equally.

Note: No Plagiarism, Relevant research goal and questions are must.