Loops

 

You will complete this assignment in Python 3.x. Make sure you have downloaded the software and it is installed correctly. You will download it from this site

You will code the following and submit it in one file. Use the information in the Content area for this week to assist you. Save it as a python file (.py), and upload it into the Assignments area.

1. Include comment block on line1 of your code with the following information:

“”

“””

Your Name

Course Name, Section (example: ENTD200 B002 Spr18)

Instructor name

Week #

Date completed

“””

2. Create 2 Python programs based on week 5 flowcharts and requirements. You must use loops, do not use function call

Here is a SAMPLE run for a simple calculator to add to numbers (this is for reference only)

Simple Calculator

What is your name –> Supa

Enter first number –> 7

Enter second number –> 5

Supa, The total of 7.0 + 5.0 = 12.0

Do you want another calculation ? (y/n) y

What is your name –> Lupa

Enter first number –> 21

Enter second number –> 11

Lupa, The total of 21.0 + 11.0 = 32.0

Do you want another calculation ? (y/n) n

Thanks for using my calculator

week 5

 Minimum words 600 words

In  the following scenario you are the CISSO of a Major E-commerce  Organization. The organization has decided to migrate their entire IT  infrastructure and associated processes to the cloud. Considering the  ecosystem of the cloud and the ever-present threats, you’ve been tasked  to develop a secure implementation plan which includes the ability for  threat modeling and simulations.

  • Paper should be developed in accordance to APA
  • Use citations with appropriate references

This assignment should be in APA format and have to include at least two references.

Computer science

1.Define Entity, Entity type, and Entity set.
2.Define a Weak Entity set.
3.Explain the terms ‘Attribute’ and ‘Relations’
4.What are VDL and SDL?
5.Define Cursor and its types.

Discussion – Are machine learning based intrusion detection system always secure? An insight into tampered learning.

Provide a summary of the attached paper by going through the hypothesis and conclusion (attached paper link). Discussion post has to on where you discuss? what you found interesting? in the dissertation.

http://eds.a.ebscohost.com/eds/detail/detail?vid=5&sid=31a624dc-02d8-443c-9bbe-886bfcc3a1a5%40sessionmgr4007&bdata=JkF1dGhUeXBlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#AN=132098629&db=buh

1 page is needed.

APA format

Citation is needed.

References should also be added.

Answer below

 

  • Use the star schema developed in Portfolio Milestone 1 – Option 1 in Module 3; incorporate your instructor’s feedback.
  • Use the tables created in Portfolio Milestone 2 – Option 1 in Module 5; incorporate your instructor’s feedback.

Develop and execute the SQL commands to populate the fact and dimension tables by extracting data from the Northwind OLTP database and loading the data into the tables within the Northwind Data Warehouse. Your ETL workflow should consist of selecting the required variables from the source database and tables and inserting the required variables into the destination database and tables. After you have populated the tables, construct an SQL command to count the number of rows in each table. Capture a screenshot of the row count for each table. Finally, construct an SQL command to list the first ten rows of each table. Capture a screenshot of each listing.

Your deliverable for this Portfolio Project is a report containing the following information:

  • Changes to your business process, business questions, and fact table grain from Module 5
  • Updated version of the star schema incorporating your instructor’s feedback from Module 5
  • Screenshots of the row counts and table listings
  • Listing of SQL commands used in this assignment
  • A brief description of lessons learned in completing the Portfolio Project and the two Milestones. Based on your lessons learned, what advice would be offer to an organization embarking on building a data warehouse system?

Assignment

 Discussion #1: There have been many books and opinion pieces written about the impact of AI on jobs and ideas for societal responses to address the issues. Two ideas were mentioned in the chapter – UBI and SIS. What are the pros and cons of these ideas? How would these be implemented? 

 Discussion #2: Based upon the current state of the art of robotics applications, which industries are most likely to embrace robotics? Why? 

Discussion #3:  Conduct research to identify the most recent developments in self-driving cars. 

Course Reflective Paper

 

Assignment 1 – Reflective Paper

Provide a reflection of at least 500 words (2 pages double spaced excluding Title and Reference pages) that summarizes what you feel are the most important or interesting concepts you have learned so far in this Cloud Computing course.  Would be good to include an insight as to whether the learning was new to you or reinforced knowledge that you already had.

Requirements:  Provide a 500-word (2 or more pages double spaced not counting the title and reference pages) paper.  The paper should include a title page, body pages, and reference page.  An abstract and introduction is not required for this assignment.  Correct use of APA guidelines for sources and citations is required. If supporting evidence from outside resources is used those must be properly cited.

Please refer to the attached text books for the cloud computing course.

Corporate IT Security Audit Compliance

 Discuss this statement: Effective communication of the results is vital to prevent any misunderstanding”. How should the report be presented to prevent misunderstandings or misinterpretations?  

threat modeling

 

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writin