portfolio project

 

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Week 6

 1. Discuss the Sarbanes-Oxley Act and how it impacts you.    

2.  Discuss FISMA and how it impacts you and/or your work. 

Easy Computer Assignment

 

  1. Download the attached data file Snow19.accdb and then save it as SnowRemoval19.

*Make sure you know the location where you are placing your saved file before you continue with step 2.

  1. Use the Form Wizard to create a Form based on the Clients table. Select all fields for the form, use the Columnar layout, and specify the title ClientContactInfo for the Form.
  2. Display the Form in Layout view, and then apply the Organic theme to the ClientContactInfo Form only.
  3. Switch to Form View, and use the Client Contact Info Form to update the Client’s table as follows:Use the Report Wizard to create a Report based on the primary ServiceAgreements table and the related Invoices table. Select all fields from the ServiceAgreements table, and select the InvNum, InvDate, InvAmt, and Paid fields from the Invoices table. Do not specify any additional grouping levels and sort the detail records by the Paid field in descending order. Choose the Outline layout and Landscape orientation. Specify the title InvoicesByAgreement for the report.
    1. Use the Find command to search for pony anywhere in the Company field to display the record for the Pony Grill (Client ID 21). Change the Street field value in this record to 8930 Saddle Brook Way.
    2. Add a new record with your first and last names in the First Name and Last Name fields.
  4. Display the report in Layout view. Change the report title text to Invoices by Agreement.
  5. Apply the Organic theme to the InvoicesByAgreement report only.
  6. Resize the Service Type label so it is about half the width it used to be and resize the Amount field value box so the value in it is right-aligned with the values in the ClientID and DateSigned field value boxes.
  • In case you need help with any step, contact me immediately please.
  • In the event you turn your assignment improperly completed, you need to write a note and explain what step/s you did not properly complete and what you were doing that did not work. You need to be specific and as clear as possible. I need to understand your approach in order to be able to help you better.
  • The last opportunity to turn this assignment and get a chance to resubmit it in case you need to do it to ensure a better grade is Thursday, in that case you will have until Saturday to resubmit your assignment one more time with the necessary corrections to secure a great grade.

Module 2 Assignment

 

Module 2 Assignment

Due: Sunday, November 1st, 2020 by 11:00 pm EST

For this assignment, complete Chapter 1 – Introduction based on the instructions provided. 

INSTRUCTIONS:

This section requires that you complete all sections of Chapter 1 as specified in the CU Research Guide 

  •  Introduction 
    • Based on the literature sources, provide a background of the research problem to be explored. Elaborate on the impact of the problem and why your research is important to pursue. Indicate what the goal of the research will be
  • Problem statement
    • As per the CU guide
  • Relevance and significance 
    • As per the CU guide
  • Research questions
    • Add no more than 2 research questions as they relate to your research focus
  • Barriers and Issues
    • As per the CU guide

Structure  – CU Research Guide
Format – APA 

Course Assignment (course – Bussiness Continuation Plan & Disaster Recovery Plan )

 At this stage of the course, you are fully aware that information security plays a critical role in the business continuity plan. Describe with examples, the various layers of security that are critical to your security plan policy.   

 Reading – Chapters 17, 18, and 19 of the following text: Wallace, M., & Webber, L. (2018). The disaster recovery handbook: a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets. New York, NY: AMACOM. ISBN-13: 978-0814438763 

Loops

 

You will complete this assignment in Python 3.x. Make sure you have downloaded the software and it is installed correctly. You will download it from this site

You will code the following and submit it in one file. Use the information in the Content area for this week to assist you. Save it as a python file (.py), and upload it into the Assignments area.

1. Include comment block on line1 of your code with the following information:

“”

“””

Your Name

Course Name, Section (example: ENTD200 B002 Spr18)

Instructor name

Week #

Date completed

“””

2. Create 2 Python programs based on week 5 flowcharts and requirements. You must use loops, do not use function call

Here is a SAMPLE run for a simple calculator to add to numbers (this is for reference only)

Simple Calculator

What is your name –> Supa

Enter first number –> 7

Enter second number –> 5

Supa, The total of 7.0 + 5.0 = 12.0

Do you want another calculation ? (y/n) y

What is your name –> Lupa

Enter first number –> 21

Enter second number –> 11

Lupa, The total of 21.0 + 11.0 = 32.0

Do you want another calculation ? (y/n) n

Thanks for using my calculator

week 5

 Minimum words 600 words

In  the following scenario you are the CISSO of a Major E-commerce  Organization. The organization has decided to migrate their entire IT  infrastructure and associated processes to the cloud. Considering the  ecosystem of the cloud and the ever-present threats, you’ve been tasked  to develop a secure implementation plan which includes the ability for  threat modeling and simulations.

  • Paper should be developed in accordance to APA
  • Use citations with appropriate references

This assignment should be in APA format and have to include at least two references.

Computer science

1.Define Entity, Entity type, and Entity set.
2.Define a Weak Entity set.
3.Explain the terms ‘Attribute’ and ‘Relations’
4.What are VDL and SDL?
5.Define Cursor and its types.

Discussion – Are machine learning based intrusion detection system always secure? An insight into tampered learning.

Provide a summary of the attached paper by going through the hypothesis and conclusion (attached paper link). Discussion post has to on where you discuss? what you found interesting? in the dissertation.

http://eds.a.ebscohost.com/eds/detail/detail?vid=5&sid=31a624dc-02d8-443c-9bbe-886bfcc3a1a5%40sessionmgr4007&bdata=JkF1dGhUeXBlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#AN=132098629&db=buh

1 page is needed.

APA format

Citation is needed.

References should also be added.