Dynamic programming with MySQL and PHP

 

This assignment involves dynamic programming with MySQL and PHP (ch 18 and 19 Internet and world wide web 5th edition). The main activities you need to implement is to create a database connected web application. In this project, you will do listing, deletion, and insertion to a table in a MySQL database. This link http://mycoursework.mywebcommunity.org/p3/ shows a solution for this project using Student table (also a video is attached) In your project, you will use another table of your choice.

Project Description: Choose a data table similar to Student table. You cannot use Student table for this project. The data table could be about anything you want, such as movie, book, business, companies, song, cars, etc. Create this table in your MySQL database. You can use phpMyAdmin or your can use MySQL command. The data table will have at least 10 rows, and 5 columns. Note that my example of Student has 14 rows, and 6 columns.

Second step is implementations of the web applications in five steps:

#1 Implement a html page as index.html. This is main (landing) page listing all four operations (list, list with condition, search, insert).

Requirements about search box (#4): This is a form action without new line. The form action method is POST.

Hint:

#2 This is first link of index.html to list your data in a different .php page. You should list at least three column of the table. The data will be shown in html table. I listed SID, Fname, Lname in Student example in a table (

). Also, you should have “Delete” link to delete a row. This delete method should be implemented as “GET” method.

Hint: Delete

After listing all record, give a message saying how many records found in the data table, such as “14 student(s) records found.”

#3 Implement a .php page to demonstrate a conditional listing, such as Student from TX. You may choose any condition on your data, such as customers in Canada, products more expensive than $10, movies produced in 2010, etc.

#4 Implement a search box as a list item as demonstrated in video.

#5 Implement a .html / .php combination to insert new record to data table. The html (data collection) page should mandate at least there fields, as demonstrated in the video

Hint: HTML 5 support required keyword, such as  

All sub-pages should include a link to main / landing page.

Please use the link given above as a sample solution. And give me all project files (html, css, php),

Cybersecurity

 For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed. 

No Plagiarism 

attribution theory and how it influences the implementation of innovation technologies.

 

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing

Big Data Science Analytics

Your team will select a big data analytics project that is introduced to an organization of your choice … please address the following items: 

(a) Provide a background of the company chosen. 

(b) Determine the problems or opportunities that that this project will solve. What is the value of the project? 

(c) Describe the impact of the problem. In other words, is the organization suffering financial losses? Are there opportunities that are not exploited? 

(d) Provide a clear description regarding the metrics your team will use to measure performance. Please include a discussion pertaining to the key performance indicators (KPIs). 

(e) Recommend a big data tool that will help you solve your problem or exploit the opportunity, such as Hadoop, Cloudera, MongoDB, or Hive. 

(f) Evaluate the data requirements. Here are questions to consider: What type of data is needed? Where can you find the data? How can the data be collected? How can you verify the integrity of the data? 

(g) Discuss the gaps that you will need to bridge. Will you need help from vendors to do this work? Is it necessary to secure the services of other subject matter experts (SMEs)? 

(h) What type of project management approach will you use this initiative? Agile? Waterfall? Hybrid? Please provide a justification for the selected approach. 

(i) Provide a summary and conclusion. 

(j) Your written paper must have at least 10 reputable sources and 10-to-15-pages. 

(k) Please write the paper in APA Style

Provide an outline of the work to be performed. You can submit in MS Word or PPT. Please make sure to include company name, background, and how the work will be divided with the names of team members. You may start on the written paper. 

 Written Paper: The requirements for the written paper are provided above. Please note that each team member must have a deliverable. Please ensure that you avoid any plagiarism issues. Include name of team member and Student ID for the section they completed.  

Hands-On Project 1-1

In cyberspace, people can take on different identities and sometimes act in ways they normally would not if their physical presence were required. God created humans not just with souls but with bodies that were declared “good.”

  1. Complete the Hands-On Project 1-1 from the text (Examine Data Breaches). Document how the loss of government computers and PDAs can have an effect on confidentiality, availability, and integrity of the data stored on these devices.
  2. In a 250- to 500-word essay, explain how you can utilize your digital privacy rights as intended to be used from Christian perspective. Consider the legal and ethical side of your digital privacy rights.

Cloud computing Assignments

 

Literature Review (7 pages)

You will submit a draft of the literature review portion of your research paper. The literature review will form the main body of your final research paper. This will be where you provide a synthesis of the articles you have found related to your topic. When writing a literature review, you should include or consider the following:

  • An introduction and a conclusion
  • Avoid direct quotes.
  • Organize by topic or theme rather than by author
  • Use headings
  • Show relationships and consider the flow of ideas

Discuss BPaaS. Consider how business processes as services can increase the threat surface.

  In 500 words or more 

Most of us are familiar with SaaS, PaaS, IaaS, etc. Discuss BPaaS. Consider how business processes as services can increase the threat surface.

 Write in essay format, not in bulleted, numbered, or another list format.  Cite your sources. Do not copy.

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding the length of your post, and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested. 

Network Management

Instructions:

Part one:
–Create a network drawing for a mock company that has two sites in different geographic locations (at least 40 miles apart).

–The drawing would be drawn similar to the topology you see each time you open a Packet Tracer lab except that you will be drawing how the components connect together.

–The minimum requirements are as follows:

—Each site must have a router that connects to the other site, to the Internet, or to a shared cloud between the two sites.

—At least one site must have a connection to the Internet.

—At least one site must have a firewall that could possibly be part of the router that connects the company site to an external network or to the Internet.

—At least one switch at each site that creates a LAN of at least two PCs.

—The switch should connect to a router or be a Layer 3 switch for those of you that really get into networking.

—One site must have at least one server.

—Appropriate cabling and connectivity between the two sites.

—Labeling to make the drawing professional.

–In a minimum of two paragraphs, describe the mock company, the networks, and type of connectivity to the other site, as well as the Internet that is in your drawing. Describe the network components that will be monitored and/or managed using an NMS(Network Management System).

Part Two:

-The minimum requirements are as follows:

—An executive summary of the implementation plan

—Professionally formatted comparison table of NMS products you considered including costs and features (you may have a bit of a time getting cost, but try or estimate and ensure you note if it is an estimation)

—Other recommended network management or monitoring applications/techniques recommended

—At least 10 recommended scorecards and/or metrics for monitored circuits and devices

—A list of which network devices will be monitored

—Security recommendations

—IT personnel structure diagram and responsibilities within that structure for the NMS implementation and monitoring

—Labeling to make the drawing professional

DS wh-13

  

Bitcoin Forecasting with RNN

Write a paper on forecasting Bitcoin with RNN Techniques

In your whitepaper

  1. Provide an overview of forecasting
  2. Explains the merits of LSTM for forecasting
  3. Uses Kera to perform LSTM forecasting on the bitcoin data
  4. Compare LSTM vs ARIMA models for Bitcoin forecasting (optional)
  5. Write your conclusions and references

References –

https://colab.research.google.com/github/paulgureghian/Google_Colab_Notebooks/blob/master/Bitcoin_Price_Prediction.ipynb

https://www.kaggle.com/humamfauzi/btc-price-prediction-using-lstm

 

Write atleast 4 pages in APA format.

No plagiarism.

On time delivery.