Database system

  

What is the importance of the master system database? Discuss the pros and cons of full database backup. Discuss all components of the database engine in relation to data availability, and their benefits and disadvantages in relation to server redundancy, database redundancy, and file redundancy. Provide examples to justify your ideas. (50-70 words with reference)

Entities within databases take on many forms. Provide three examples of entities you may encounter and summarize the attributes of each. Explain why entities are important and provide examples to illustrate your ideas. (50-70 words with reference)

Lists, Sets, Stacks and Queues

 

retainAll

Write a method called retainAll that takes two sets of integers as parameters and that removes any values in the first set that are not found in the second set. 

For example, given sets: 

s1: [0, 19, 8, 9, 12, 13, 14, 15]  

s2: [0, 19, 2, 4, 5, 9, 10, 11]  

If the following call is made: 

retainAll(s1, s2);  

after the call, the sets would store the following values: 

s1: [0, 19, 9]  

s2: [0, 19, 2, 4, 5, 9, 10, 11]  

You are implementing a two-argument alternative to the standard Set method called retainAll, so you are not allowed to call that method to solve this problem. 

You are also not allowed to construct any structured objects to solve the problem (no set, list, stack, queue, string, etc) although you can construct iterators. 

Your method should not change the second set passed as a parameter.

Create Two Flow-Charts

 

Use the information below to solve each problem using flowchart symbols to illustrate how you would complete your program. You may use Microsoft PowerPoint® or Microsoft Word ® for your flowchart.

  • Problem 1: Build a flowchart to solve a simple payroll calculation. Calculate the amount of pay, given hours worked, and hourly rate. (The formula to calculate payroll is pay = hourly rate * hours worked.) Display hourly rate, hours worked, and pay. ( Do not add any feature such as overtime, bonus, taxes, insurance, … )
  • Problem 2: Build a flowchart that will calculate the average miles per gallon obtained on a trip. Input the amount of gas used and the number of miles driven. (The formula to calculate miles per gallon is miles per gallon = number of miles driven / amount of gas used. ) Display gas used, miles driven and MPG.

implementation of innovation technologies.

 

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Review Article

 review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

Address the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. 

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Python cod

  

Write a Python program that reads IP addresses from an input file (ip_input.txt), checks its format and validity, and then checks its connectivity to each IP. Use the IP input file shown as below. Submit your code and the output screen shots after a run.

8.8.8.8

2.2.2.2.2

127.5.6.7

3.3.3.305

0.120.3.5

8.8.8.1

169.234.6.8

8.8.4.4

4.4.8.8

(you may add more to test your code)

Validity check (check the format and filter the addresses that are not publicly routable):

– IP should be four dotted format (x.x.x.x)

– octets having values between 0-255.

– IP should not belong to one of these blocks: 

o 0.0.0.0/8

o 127.0.0.0/8

o 169.254.0.0/8

o (you may add more if you like)

Connectivity check:

– Use ping for testing reachability to the IP address.

The output could look like:

Ip address: 8.8.8.8

Validity: yes

Reachability: yes

Ip address: 2.2.2.2.2

Validity: no – bad format

Reachability: no

Ip address: 127.5.6.7

Validity: no – in block 127.0.0.0/8

Reachability: no

…….

…….