PAPER

 

Write an essay of at least 500 words comparing or contrasting ISO v. NIST database security frameworks.

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format, not in bulleted, numbered, or another list format

Eu data protection laws

 Hide Assignment InformationInstructions

In order to complete assignment #8 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #8). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 14A large American multinational corporation wants to establish a telephone and email hotline for employees to report wrongdoing within the company. The company has offices in the European Union and wants to ensure that it avoids violations of E.U. data protection laws. What steps can the company take to increase the likelihood that its hotline reporting system remains in compliance? 

ERD Diagram

  

Lab 2 – EERD

Overview

Wally Los Gatos, owner of Wally’s Wonderful World of Wheels, has hired you as a consultant to
design a database management system for his chain of stores that sell used vehicles. Wally requires this system to track details about inventory, employees, sales and customers. 

Requirements
Based on the following information, draw an EER diagram. Please indicate any assumptions that you have made in your diagrams!

After an initial meeting with Wally, you have developed a list of business rules and specification to begin the design of an the ER Model. 

· Customers place orders through a dealership. Wally has three dealership locations (Cambridge, Kitchener and London), and may add more in the future

· Wally would like to track the following about customers:
Name, Address, City, Province, Postal Code, Telephone, Date of Birth, Email

· A customer may place many orders

· A customer does not always have to order through the same dealer all the time

· A dealership may have many customers

· Orders are composed of one or more vehicles from inventory

· The following information about each order needs to be recorded:
Order Date, Final Sale Price, Credit Authorization Status

· We wish to record the following about each vehicle:
Vehicle Identification Number (VIN), Make, Model, Year, Colour, Km’s, Photo, Purchase Price, Sticker Price

· Wally obtains vehicles from a range of suppliers, including auctions, bank foreclosures, other dealerships, and private sellers

· Wally employs fifty-six employees

· He would like to track the following information about employees:
Name, Address (Street, City, Province, Postal Code), Telephone, Date of Hire, Title, Salary, Age

· If the employee’s role is that of a mechanic, we should track their Certification Number

· If the employee’s role is that of a salesperson, we should track their commission and total Vehicles Sold

· If the employee’s role is that of a manager, we should track which employees they manage

· Each employee works in one and only one dealership

· Each employee may have one or more dependents.
We wish to record the name of the dependent as well as the age and relationship
 

Sample Sales Record:

*********************

Thank you for choosing Wally’s World of Wheels at

Guelph Auto Mall for your quality used vehicle!

Sales Rep: #3265 Peter Green

Processed By: 5487 

Invoice Number: 123654

Date: On Sept. 20, 2017

Customer: John Smith!
22 Front St W

Kitchner, ON, N2A4G8

[email protected]

2013 Toyota Camry, White 

VIN: 27764534RTB KMS: 211023
Purchase Price: $15,260.00

Trade In: $ 0.00

Subtotal = $ 15,260.00

HST (13%) = $ 1,983.80

Sale Total = $ 17,243.80

Analytics

Part1) 

   a) Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics. 

   225 Words + 2 References

Part2) 

   a) How do you describe the importance of data in analyt- ics? Can we think of analytics without data? Explain.

   b) Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?

   c) Where do the data for business analytics come from? What are the sources and the nature of those incoming data?

   d) What are the most common metrics that make for analytics-ready data?

   Min 200 words answer for each question.

Checklist:

APA Formatting

Part1 and Part2 needs to attached as two separate docs

Atleast 2 references for each part

Plagiarism report

discussion 11/28

 Discuss the preparation within your own organization in regards to your Emergency Operations Center.  What are the pros and cons of your current preparations? 

300 words

100 words overview.

Vulnerability Assessment

 

Topic: Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.

Instructions: Please download the Assignment 1 Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. (click here for link).

For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once completed name your file: YourName_Assignment_1_Vulnerability_Assessment.docx and submit to the appropriate assignment folder.

Assignment 1 Vulnerability Assessment Template.docx

Also review the additional files attached for detailed information on Vulnerability Assessments.

Assignment 2: The Basics Behind Effective Police Operations

 

Assignment 2: The Basics Behind Effective Police Operations

Due Week 6 and worth 160 points

Write a four to five (4-5) page paper in which you:

  1. Select at least two (2) types of changes (e.g., public and society, law enforcement officers, police bureaucracy, standards community involvement, technology, etc.), and examine how the selected changes have affected police operations, mission and values, or goals and objectives in the 21st century in the United States. Support your response.
  2. Explain the various lines of communications present within any given local law enforcement agency. Next, determine at least two (2) challenges and concerns that law enforcement might encounter with communication and suggest your strategy to mitigate the challenges. Support your response.
  3. Examine the importance of police patrol in modern policing.
  4. Identify at least two (2) quality of life issues (e.g., panhandlers, prostitution, problems associated with bars and clubs, police interaction with individuals who are mentally ill, homeless people and civil disobedience) that permeate modern law enforcement practices. Propose a response to these issues, based on common practices as outlined in the text, and provide your rationale.
  5. Compare and contrast police reactions as they relate to violence in schools, homes, and workplaces. Provide one (1) example of each to support your response.
  6. Use at least three (3) quality academic resources as references, such as journal articles, newspapers, magazines, and publications from law enforcement associations. Note: Wikipedia, blogs, and similar websites do not qualify as quality academic resources.

Your assignment must follow these formatting requirements:

  • This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Business Intelligence

When submitting work, be sure to include an APA cover page and include APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Discussion

1.What is an artificial neural network and for what types of problems can it be used?

2. Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial ones? What aspects are similar?

3. What are the most common ANN architectures? For what types of problems can they be used?

4. ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.

Excercise:

5. Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding.

Internet Exercise 

6. Go to neuroshell.com. Look at Gee Whiz’s examples. Comment on the feasibility of achieving the results claimed by the developers of this neural network model.

Computer Science Business Data and Communication Presentation

Explain and provide example when it is possible that will cover chapter 6 subjects:

•Network architecture components

•Traditional network design

•Building-block network design

–Needs analysis

–Technology design

–Cost assessment

Pick Two of Network Simulation Tools from the following, and Discuss, Present them on the class:

•[WANsim] WAN simulators and emulators http://www.wan-sim.net/

•[OPNET] OPNET Modeler, http://www.opnet.com/

•[NS2] NS2 official website, http://www.isi.edu/nsnam/ns/

•[NS2-wiki] NS2 resource webpage, http://nsnam.isi.edu/nsnam/index.php/Main_Page

•[NS3] NS3 official website, http://www.nsnam.org/documents.html

•[OMNeT] OMNeT++ official website, http://www.omnetpp.org/

•[REAL] REAL 5.0 simulator overview, http://www.cs.cornell.edu/skeshav/real/overview.html

•[SSFNet] Scalable Simulation Framework (SSF), SSFNet homepage, http://www.ssfnet.org/homePage.html

•[J-Sim] J-Sim homepage http://www.j-sim.org/

•[QualNet] QualNet official site, http://www.scalable-networks.com/products/•[YANS], Yet Another Network Simulator http://yans.inria.fr/code/yans/?summary

•[GTNetS] The Ge orgia Tech Network Simulator (GTNetS) http://www.ece.gatech.edu/research/labs/MANIACS/GTNetS/