Check Attachment!!
CS-340 2-1 Assignment:CRUD in MongoDB
Please see attached for better formatting.
Overview
To understand and make use of any database system, you must learn various techniques associated with the fundamental operations of create, read, update, and delete (CRUD). For this assignment, you will begin by creating databases of document collections and performing basic reading or querying operations to retrieve specific documents from the database system. You will also gain practice updating documents and subdocuments, and removing documents from a database. You will use the mongo shell and mongoimport commands to complete this assignment.
Note: Since this is the only assignment for Module Two, it is longer than a typical assignment. Be sure to begin working on this early in the week.
Prompt
After completing the textbook reading and reviewing the mongoimport tool documentation in the module resources, complete the following tasks using the mongo shell in Apporto.
- The data set for this assignment, city_inspections.json, has already been loaded into the Apporto environment for you. Using the mongoimport tool, load the database “city” with documents found in the city_inspections.json file into the “inspections” collection. Complete this by typing the following commands in the Linux terminal to perform the import in the right directory:
cd /usr/local/datasets/ #change into the Apporto directory with the data sets mongoimport --db city --collection inspections ./city_inspections.json #mongo import utility
TIP: In any Linux systems, commands must be exact and use proper syntax and case sensitivity. - Verify your load by switching to the “city” database and issuing the following queries in the mongo shell:
db.inspections.find({"id" : "10021-2015-ENFO"})
db.inspections.find({"result":"Out of Business"},{"business_name":1}).limit(10)
- Provide screenshots of the results as evidence.
- Using the appropriate commands in the mongo shell, insert a document to the database named “city” within the collection named “inspections.” Use the following key-value pairs as data for your document.
KeyValueid“20032-2020-ACME”certificate_number9998888business_name“ACME Explosives”dateToday’s dateresult“Business Padlocked”sector“Explosive Retail Dealer-999”addressnumber -> 1721
street -> Boom Road
city -> BRONX
zip -> 10463
Be sure the address is inserted as a sub-document, and use the JavaScript function Date() for “Today’s date.” Verify your database creation and insertion using the findOne() function in the mongo shell. Provide a screenshot as evidence. - Answer the following questions using MongoDB queries.
- What is the distinct list of inspection “sector” in the current inspections collection? How many are in the list? Do not count by hand.
- What is the difference in the date data type for the business named “AUSTIN 2012” versus your business document insertion of “Acme Explosives”?
- How many businesses have a “Violation Issued”? (See Value column above.)
- Verify by providing screenshots of the queries and results as evidence.
- Using the appropriate command in the mongo shell, update the document with the ID “20032-2020-ACME” in the collection “inspections” in the database “city” with the information below.
KeyValuebusiness_name”New ACME Flowers”result”Business Re-opened”comments”Flowers after the explosion”
Verify your database update using the appropriate find() function in the mongo shell. Provide a screenshot as evidence. - Using the database “city” with documents found in the “inspections” collection, perform the tasks listed below. Verify by providing screenshots of the results as evidence.
- Update all the documents that contain the key-value pair “city”:”ROSEDALE” in the address subdocument by changing the zip code in the address subdocument to “76114”.
- Remove the first document with the key-value pair “result”:”Violation Issued.”
- Guidelines for Submission
Submit a Word document containing all of your screenshots. Use a screenshot tool, such as the Snipping Tool, for your screenshots and be sure to enlarge the images in the Word document before submitting. This will help make sure that your screenshots are an appropriate size for your instructor to be able to read them. Refer to this Use Snipping Tool to Capture Screenshots guide for help with taking screenshots.
Research Paper: DR Plan for an Organization
Research Project
Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762):
- Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
- Introduction
- Roles and Responsibilities
- Incident Response
- Plan Activation
- Document History
- Procedures
Your paper should meet the following requirements:
- Be approximately six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Information Security Roles and Responsibilities
This is associated with the Twitter hack of 2020 and is a continued assurance plan to mitigate weakness while outlining the key roles of leaders and their responsibilities. See Below and Attached.
You will submit your roles and responsibilities portion of the final project. Who are the key leaders of the organization specific to how their responsibilities are connected to the security of the organization’s information? You must also identify key ethical considerations. What are the ramifications of key leaders not properly accounting for ethical and legal considerations? What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confidentiality, integrity, and availability of information.
Question and answer
- Which twisted pair cable category should you use on a 1000BaseT network?
- What is the advantage of using single-mode cable on a 1000BaseLX network?
- Which cable type would you use to connect a workstation to a regular port on a hub or a switch?
- Which switch feature makes choosing crossover or straight-through cables easier?
- What happens if a host goes down in star topology?
- What might be the problem if none of the NIC lights are working?
- What is an octet?
- Which portion of a class C address designates the network address?
- What is the difference between subnetting and supernetting?
- How do you know if a host is using an APIPA address?
Corporate IT Security Audit Compliance
Que 1:
In your own words, describe how HIPPA (compliance requirements) can impact the “Remote Access” domain of its infrastructure. How can such requirements be met?
Que 2:
Review the attached diagram.
What measures can be taken to protect web-server that provides an interface to system/applications?
Assignment
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.
As you finalizing your enterprise security assessments, what would be your deliverable for the following team members: – Explain Why and What by examples –
- Executives and boards
- Data security and IT professionals
- Risk manager
1 Case Study
Case Study 3.1
Read “Can We Trust Big Data?” (see attached file)
Answer the questions
Please use this strategy when you analyze a case:
- Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).
- List all indicators (including stated “problems”) that something is not as expected or as desired.
- Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.
- Identify the areas that need improvement (use theories from your textbook)
- Specify and prioritize the criteria used to choose action alternatives.
- Discover or invent feasible action alternatives.
- Examine the probable consequences of action alternatives.
- Select a course of action.
- Design and implementation plan/schedule.
- Create a plan for assessing the action to be implemented.
- Conclusion (every paper should end with a strong conclusion or summary)
Writing Requirements
- 3–5 pages in length (excluding cover page, abstract, and reference list)
- APA format, Use the APA template located in the Student Resource Center to complete the assignment.
- Please use the Case Study Guide as a reference point for writing your case study.
Discussion 3.1
If the following data were stored as rasters, which ones would be discrete and which would be continuous: rainfall, soil type, voting districts, temperature, slope, and vegetation type?
Discussion 3.2
List the main advantages of using topology-based data sets in GIS.
Technology Acceptance Model in Leadership context
This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age. Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).
In this paper, address the following key concepts:
- Define TAM and the components.
- Note how TAM is impacting educational settings.
- Give an overview of the case study presented and the findings.
Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.
The paper should meet the following requirements:
· 3-5 pages in length (not including title page or references)
· APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
· A minimum of five peer-reviewed journal articles.
The writing should be clear and concise. Headings should be used to transition thoughts.
Phd Interview Questions
WRITTEN INTERVIEW QUESTIONS
DOCTORAL CANDIDATES SHOULD PROVIDE AN AUTHENTIC PERSONAL STATEMENT TO EACH OF THE FIVE FOLLOWING QUESTIONS/PROMPTS REFLECTING ON THEIR INTERESTS. IN THE EVENT THAT ANY OUTSIDE RESOURCES ARE USED, RESOURCES SHOULD BE CITED IN APA FORMAT. SUBMISSIONS SHOULD BE A MAXIMUM OF 500 WORDS OR 125 WORDS PER QUESTION/PROMPT. IT IS BEST TO RESPOND TO EACH PROMPT/QUESTION INDIVIDUALLY FOR CLARITY OF THE REVIEWER. WRITING SAMPLES SHOULD BE SUBMITTED IN MICROSOFT WORD FORMAT AND INCLUDE THE CANDIDATE’S NAME.
1. PROVIDE A BRIEF INTRODUCTION FOCUSING ON YOUR EDUCATION, CAREER, AND DECISION TO APPLY TO UNIVERSITY OF THE CUMBERLANDS.
2. IN RELATION TO YOUR DOCTORAL PROGRAM APPLICATION, WHAT AREA OF RECENT RESEARCH IN THE FIELD WOULD YOU WANT TO STUDY, AND WHY?
3. HOW DOES YOUR CURRENT VOCATION RELATE TO YOUR APPLICATION TO THE DOCTORAL PROGRAM?
4. HOW WILL YOUR EXPERIENCES AND PERSONAL SKILLS HELP YOU TO BE SUCCESSFUL IN YOUR PROGRAM?
5. WHAT LONG-TERM GOALS DO YOU HAVE FOR APPLYING YOUR LEARNING FROM YOUR DOCTORAL PROGRAM?