week 5 DB

The latest generation of mobile devices are portable enough to carry at all times, connected to voice and data networks, and contextually aware by using sensors and networks to preemptively complete tasks.  Many of today’s mobile applications are personalized, and are not useful if they can only access the data on the phone.  For a user to get, for example, sports scores, retrieve stock quotes, or perform accounting work, the mobile device needs to communicate with one or more servers, starting with the Window servers.

  • Discuss effective use of screen real estate
  • How does mobile user interface designs & websites reduce end-user self-efficacy?
  • What are the challenges of integrating mobile applications with multiple databases? 

Note:

  • You must apply and use the basic citation styles of APA.
  • Use in-text citation and list the reference of your supporting source following APA’s style and formatting
  • Do not copy and paste information or concepts from the Internet and claim that is your work.  It will be considered Plagiarism and you will receive a zero for your work.

security control

 

Module 03 Content

  1. For this part of your Course Project, you will use the following Trust Service Principle:
    “Logical access security software, infrastructure, and architectures have been implemented to support (1) identification and authentication of authorized users; (2) restriction of authorized user access to system components, or portions thereof, authorized by management, including hardware, data, software, mobile devices, output, and offline elements; and (3) prevention and detection of unauthorized access.”
    Add at least 5 security controls into the XYZ Security Controls Matrix which can be used by XYZ Technologies to adhere to the above trust service principle. Each column of information should include the following:
    XYZ Security Control Matrix.docx

    • Control Activity – The written security control for XYZ Technologies
    • Evidence of Performance of Control – A description of the evidence used to validate the function of the control.
    • Test Plan – How the control will be tested to determine is operating effectiveness.
    • Review Interval – How often the control will be tested throughout the recording period: Daily, Weekly, Monthly, Quarterly, Bi-Annual, Annually
    • Additional requirements are: all three criteria in the trust service principle should be addressed by at least one control.
      Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.

Assembly language code

 

1. Create a variable that is a BYTE with the value 67. What is the value shown in memory? Show work verifying the value that is set.

2. Create a variable that uses 8-bits and correctly stores the value -83. Show what the memory contains and work verifying the result.

3. Create an unsigned 16-bit number that stores the value 13330 (decimal). Show what the memory contains and work verifying the result.

4. Create a signed 16-bit number and store the value -32 (decimal). Show what the memory contains and work verifying the result.

5. Create a variable to hold the value 12345678h (unsigned). (a) Move that variable’s value to the EAX register. (b) Set the AH register to 12. (c) Set the AL register to the value 34. Show the values of the EAX register before and after each parts (a)-(c). Verify that data is being moved as expected and describe it.

6. Write a program using signed 8-bit variables that computes finalVal = 2*X + 3*Y – Z. X, Y, and Z should be variables that are created in your .data section. Additionally, start with X = 1; Y should be set to five times the value of X. Z should be two times the value of X. Only X should be set in the data section; Y and Z should start uninitialized and then set in the main procedure as described. Create the program in assembly to compute finalVal. Does the value that is computed make sense (show work). In separate runs of the program double your value of X continuing to set the values for X, Y, and Z such that Y = 5X and Z = 2X until the value stored in finalVal no longer make sense. What are the values of X, Y, and Z before and after the result stored is correct. Show the contents in memory and describe why the value in finalVal no longer makes sense.

SQL Individual Assignment

 Assume that Orion Star Sports & Outdoors Co. has engaged you as a consultant to advise them on business strategies to increase sales. Study the data tables from this perspective. The most important tables in this data set are:

+ orders + product_line

+ products + profit 

1. Answer the following questions in general:

a) What are the key business questions that can be asked and answered using this data?

b) How does each table relate to answering those questions?

c) How do I have to link the tables in order to be able to answer those questions?

2. For each field in the four tables, answer the following specific questions:

a) Is this a question field, an answer field, or a link field? In other words, is this a key dimension along which I wish to analyze the data (question field), a data item that I want to “slice and dice” along selected dimensions (answer field), or a field that simply helps me link from one table to another?

b) What data type is represented by this field (e.g. integer, text, symbols, currency, etc.)?

c) Are there missing or null values in the data for this field?

d) For range fields (e.g. dates and numbers), what is the range of values in the data? What are the maximum and minimum values?

e) What do you think is the purpose of this field?

f) What questions would you ask the company about this field?

3. Prepare spreadsheets that answer the following questions:

a) What are the top 10 products for orders (by dollar volume)?

b) What are the top 10 countries for orders (by dollar volume)?

c) What are the top 10 selling products by units? By dollar volume?

d) For top two US states and top two countries (excluding the US) in questions 1 and 2, what are the 5 top selling products by units? By dollar volume?

e) Provide the customer ID’s, order dates, and order amounts for all customers who have ordered more than once.

Executive Summary

 

This week, you will submit the one- to two-page executive summary that you started last week. This summary is for the owner of Don & Associates, where you are employed in this scenario.

Use this Executive Summary Template. In the template, you will see specific instructions. Delete the instruction text before you submit the project.

Your summary should include:

  • the types of cloud computing (private, public, hybrid)
  • three major cloud service providers
  • three cloud computing service models
  • potential benefits and risks of migrating the company’s technical infrastructure to the cloud

assignment

  

1. Please share your thoughts about Important Threats and Attacks.

2. Please define Threats, Vulnerabilities and common Attacks(detailed) 

EX16_AC_CH08_GRADER_CAP_HW – Replacement China, Inc.

 EX16_AC_CH08_GRADER_CAP_HW – Replacement China, Inc.

  

Project Description:

You work as an associate database manager at Replacement China, Inc. This firm specializes in finding difficult-to-replace, no-longer manufactured china, crystal, silver, and collectibles. You need to add a hyperlink field that will store a URL for each manufacturer’s website. The HR department manager wants to store a photo and the most recent performance review for each employee. You also export inventory items in three different formats. Finally, you import information from Excel, Access, and text files. Compact and repair the database when you are finished.

     

Start   Access. Open the downloaded Access database named exploring_a08_Grader_h1.accdb. Save the database as exploring_a08_Grader_h1_LastFirst.

 

Create   a new field in the Manufacturer table after RlMfgCode named Website with the Hyperlink data type. Save the   table.

 

Switch   to Datasheet view, add the website http://www.lenox.com to   the Lenox China record (7).