Homework

Answer the following question:

SQL is a pervasive querying language. While there is one primary SQL dialect that all SQL RDBMS implementations must support, and that’s ANSI SQL, each database platform comes out with its own context. Each of these dialects has its own  DDL (Data Definition Language). DML (Data Manipulation Language). and DQL (Data Query Language). Other than for marketing purposes (to sell the product as unique), what is the value of creating a new variation of a SQL dialect. 

Provide an example of one SQL dialect as part of your write-up. 

Instructions:

This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed. 

You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.

Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.

Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.

Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.

Discussion: Activities Encapsulated by Working With Data

According to Kirk (2016), most of your time will be spent working with your data.  The four following group actions were mentioned by Kirk (2016):

  • Data acquisition: Gathering the raw material
  • Data examination: Identifying physical properties and meaning
  • Data transformation: Enhancing your data through modification and consolidation
  • Data exploration: Using exploratory analysis and research techniques to learn

Select 1 data action and elaborate on the actions performed in that action group.

Remember your initial post on the main topic should be posted by Wednesday 11:59 PM (EST). Your 2 following posts should be commenting on your classmates’ post on different days by Sunday 11:59 PM (EST). You should end the week with 3 total discussion posts.

A quality post is more than stating, “I agree with you.” Maybe you should state why you agree with your classmate’s post. Additionally, post some examples or find a related topic on the internet or University library and comment on it in the discussion post.

 Reference: Kirk, A. (2016). Data Visualisation: A Handbook for Data-Driven Design (p. 50). SAGE Publications.

HTML programming

  

The purpose of this assignment is to get some experience using HTML web editors. There are many commercial and free options to choose from. If you have access to programs such as Adobe Dreamweaver or Microsoft Expression Web feel free to utilize them. There are several free open source web editors such as Kompozer, Amaya, and Bluefish.

Here is a page link from Wikipedia showing a comparison of Web HTML Editors. This might be a good place to start when making your choice of software. Copy the URL below to your browser.

http://en.wikipedia.org/wiki/Comparison_of_HTML_editors

Assignment

Your assignment is to download (if necesary) and experiment with two different Web HTML Editors. Search YouTube for any available tutorials on how to use the software. For each editor, create a page with a table, image, lists, and cascading style sheet. Include the name of the editor in the comments in the HTML file. Feel free to also include any other features you find interesting. Create a short write up containing information about your reaction to using each program. Did you like it? What features did you like? What features did you not like or felt could have been better? If you prefer, you can include this information inside the pages (display it when the file is opened with a browser) that you create using the programs. Do this process for two different HTML Web Editor programs. Do not submit the exact same code for each editor. The HTML file for each editor must be different. Submit the pages you created along with the write ups (If separate documents) to the correct submission box. 

Security Architecture Assignment

Minimum Length 700 Words.

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Using Figure 5.4 as the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?

security architecture 12.1

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be include at least two references.

As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?

Organizational Leadership and Decision Making 2

1. Review chapter 8 in the course text.

Discuss the key decision criteria that IT managers need to examine to help them make an IT sourcing decision.

2. Review chapter 9 in the course text.

Discuss the IT Budgeting practices that deliver value.

Which of the practices do you consider to be the most important and why?

3. Review chapter 10 of the course text.

In your own words, discuss the actions that could lead to the development of effective risk management capabilities.

4. Review chapter 11 of the course text.

In your own words, discuss the different stages for implementing information management in order to move from general principles to specific applications.

5. Read the Nationstate Case Study on pages 160-164 in the textbook. Answer Discussion Questions 1-2 at the end of the Case Study. Your responses must be complete, detailed, and in APA format. 2 pages at least.

6. Read the RR Communications Case Study on pages 156-159 in the textbook. Answer Discussion Questions 1-3 at the end of the Case Study. Your responses must be complete, detailed, and in APA format. 2 pages at least.

References must be added for each question individually.

Discussion

 

Most hackers start their careers breaking into computer systems as teenagers. 

What can we as a community of computer professionals do to reduce the temptation to become a hacker?