1.Enlist some commands of DDL, DML, and DCL.
2.Define DML Compiler.
3.What is DDL interpreter?
4.Enlist the advantages of SQL
5.Explain the terms ‘Record’, ‘Field’ and ‘Table’ in terms of database.
Discussion 2
The United States v. Dioguardi
428 F.2d 1033, 1038 (C.A.N.Y. 1970).
At least, a minimum standard of trustworthiness must be established to eliminate the theory of accuracy, the integrity of computer used to generate evidence, and the admissibility of such records in court. The original contents of free and fair evidence are deep-rooted in writing panache, recording, and photograph required by court standards to ensure that court decisions are based on reliable, and authentic evidence. The advent of photocopiers, scanners, related technology that can be used to create identical acceptable duplicates in place of the original and in the market. A genuine question on the authenticity of the original and accuracy of a photocopy could be unfair to accept in place of the original. Presenting a copy of digital evidence is usually more desirable because it eliminates the risk that the original copy being unintentionally altered.
A paper printout of a digital document may be considered equivalent to the original unless essential portions of the original are not visible in printed format. Hearsay Digital evidence cannot be admitted in court if the author of the evidence is not present to verify and authenticate the evidence’s integrity. Computers is an electronic device can be programed to store and output information with limited human intervention; hence, the computer system can initiate the hosting, emitting errors and uncertainty in various ways in any location and at any time. Digital evidence is generally a suggestive of human activities; for example, the system clock on a computer can be incorrect, and date-time stamps can be misinterpreted. Furthermore, the source internet protocol (IP) address on network traffic may be assigned to a proxy device rather than the actual originating computer.
Scenario: A genuine question on the authenticity of the original and accuracy of the photocopy of an evidence could be unfair to admit in place of the original copy. Furthermore, presenting a photocopy of digital evidence is usually more desirable because it eliminates the risk of original being unintentionally altered. As an organization lead forensic investigator, which of this conclusive evidence will you present in court:
- Provide a comprehensive narrative on the importance of the original copy of the evidence in court?
- Provide a comprehensive narrative on the incongruity of a photocopy of evidence in place of the original copy in court?
Assignment on Cloud computing.
Minimum 900 words total excluding apa formatting:
1. Describe how cloud based data storage works
2. List the pros and cons of cloud based data storage
3. List the pros and cons of cloud based database
BSW11
In 200 and 300 words
Do a bit of research on penetration testing techniques. Investigate and document the following
- Five network penetration testing techniques
- Advantages and disadvantages of each
- One notable social engineering test
- Possible negative implications of penetration testing
BSW 11
In 250-300 words
You are the web master of a college website. You share a server with other school departments such as accounting and HR. create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.
Discussion
For this assignment, you will identify a computer system you have recently had experience with and prepare and attach a PowerPoint presentation (8-10 slides) describing a potential computer security problem related to that system. The target audience is a manager who you are trying to convince to initiate a project to investigate the potential security issues.
Suggestions:
- Begin with an description of the organization and the computer system you have chosen.
- Where necessary, you may make assumptions about any specifics–please note these as such in your presentation notes.
- Draw from the assigned readings (and independent research) to identify what topics should be included.
- If you feel that slide information is not self-explanatory, add additional details in the presentation notes.
Big Data
In the URL’s Listed below, the concept of 3-F Method is introduced. Discuss the purpose of this concept and how it is calculated. Also perform your own research/analysis using these factors and provide your assessment on whether the United States need to introduce top talents in the field of big data and cloud computing by using bibliometrics.
URL :
https://ieeexplore.ieee.org/document/8932815
https://ieeexplore.ieee.org/document/8125463
https://ieeexplore.ieee.org/document/8530688
https://www.sciencedirect.com/science/article/abs/pii/S0747563218304813?via%3Dihub
Cloud Computing week 4
Discussion Topic:
Define and describe both SSO and IDaaS(Identity as a service).
Paper:
For week 4, you will write a paper on SAML and FIDM. The following are the items to discuss in the paper:
- Define SAML and describe its purpose.
- Define and describe provisioning.
- Define and describe FIDM.
- List factors that make mobile ID management difficult.
Paper requirements:
- Minimum 900 words (excluding title page, table of contents, and references pages)
- Minimum of 3 references
- Format your paper consistent with APA guidelines
- When submitting the assignment, please ensure you are submitted as an attached MS Word document.
Required Reading
1. Jamsa – Chapter 5
2. Erl – Chapter 10 (Sections 10.5 through 10.8 Only)
References:
Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing: concepts, technology, & architecture. Upper Saddle River, NJ: Prentice Hall.
Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning.
Assignment -2 , 230 Zero Plagiarism
Zero Plagiarism
Peer-reviewed article pertaining to blockchain and finance
Find a peer-reviewed article pertaining to blockchain and finance that is not one of the required readings for this course. Write a critical review of the article that is at least 3 pages long (content). Be sure to provide in-text citations when you paraphrase or directly quote from the article. Also include a reference page with an APA style citation of the article. Follow the writing requirements for this course when preparing the paper. Use the following format for the paper:
1. Introduction, including the purpose of your paper and a preview of your paper. Be sure to also provide the article’s title and author(s)’ name(s) in the introduction of your paper.
2. Discuss the purpose and problem the article is addressing.
3. Elaborate on the content of the article.
4. Discuss the findings and conclusion(s) drawn by the article’s author.
5. Discuss the author’s point of view and assumptions. Indicate whether unsubstantiated assumptions were made and whether there is bias that exists in the article.
6. Discuss the significance of the article. Why it is important? On what do you base your assertions?
7. Conclude your paper. Summarize the important aspects of the review.
8. References
[11:09 PM, 9/18/2020] RK: Your paper should include 8 centered and bolded headings that correspond to each of the required sections (Introduction, Article’s Purpose and Problem, Content, Article’s Findings and Conclusions, Point of View and Assumptions, Significance, Conclusion, References).Writing Requirements for all Written Work:
References must be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
Always include a cover page and reference page with all submissions (even initial discussion posts)
Provide the exact web link on the reference page citations for all online sources – do not provide just the home page, but the exact link – I check all sources
No abbreviations, no contractions – write formally
Write in the third person formal voice (no first or second person pronouns)
Write more than the minimum requirement of the word count assigned
As always, the word count is only for the body of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
Indent the first line of each new paragraph five spaces
Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a Power Point is provided under the information tab that addresses APA format.
Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.