Define the following database terms

  

1) Define the following database terms: relational database, table, record, and field. 

2) What is SQL and what is it used for? Can you give some examples of SQL statements and explain what results are obtained from these statements?

3) Read the Week 7 iLab instructions and discuss the expectations you have regarding this lab. Do you see the importance of being able to access a database from a script or program? How did your actual lab experiences meet your expectations? Are there specific insights or challenges you encountered that you would like to share with the class?  
 

What did you learn about VBScript database access and SQL commands in completing this lab?

Coding Assignment

Coding Assignment # 4 

1. The (unnamed) customer loved the API you produced in Assignment# 3, but he/she would like 

to be able to extend it to work for pretty much any operation on the student record in the 

“YAML‐base”. So, he/she keeps on asking you for more silly features every time. Can you 

provide a query for student’s state? How about the age? How about the less than weight? You 

quickly get tired of the “Can you please just add one more feature?” game and think of a 

scheme that will “wow” the customer and make your API forward‐compatible with the future 

attributes of the student record (as well as future silly customer requests). Your DbApi class 

(db_api.rb) will only have ONE method, 

 

which will 

a. Load the students into a class variable the first time around 

b. Parse out the last part of the “ghost” method being called and assume it to be an 

attribute of the student class 

c. Use the 2 arguments passed into the “ghost” method to perform the appropriate query 

d. The new db_client2.rb is provided as part of the homework (free of charge).  

 

(Hint:  You are basically combining “ghost” method technique with Dynamic Dispatch technique 

– both covered in the lecture.)  

 

2. Implement a restful API client for http://www.recipepuppy.com/about/api/ similar to the one 

we presented in class. It should have a class method for, which will take a keyword to search 

for and use a request parameter (q) to send the request up to the API. Also, specify a default 

parameter of onlyImages equal to 1 in order to only return results that contain associated 

thumbnails. (A sample is shown below.) 

 

 

Submission Guidelines 

1. Commit all the files to your local repo and push your repo out to your private team repo on 

github creating a remote branch called assignment4.  

2. You can do one of the following to accomplish the above 

a. Create a local branch called assignment4 ($git checkout –b

assignment4)  and then push it out by doing $git push remote_alias

assignment4 

b. Work on a master branch in your repo and then do  

$git push remote_alias master:assignment4 

3. Feel free to include a README.txt with any comments… 

Search and seizure as it applies to digital crime

 In order to complete Assignment #4 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #4). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.

1. Explain the intent and fundamental concepts of search and seizure law as it applies to digital crime.

2. Identify and explain situations where search and seizure are possible without a warrant. Please describe the limitations. 

Research paper review in detail

I need the following after reviewing the paper

Problem Statement – Issues discussed by the author

Approach & design – How the authors approach to the issue & what proposed ideas they mentioned

Strengths and Weakness – strengths & weakness of the proposed approach & design, and about the paper.  

Evaluation(Performance) – How the authors evaluated the proposed system, what parameters they used to test the performance

Conclusion(In readers perspective)

Along with these, I need to have a detailed explanation of the paper section-wise:

sections are:

Abstract

Introduction

Design

Mechanism for scaling

Use, Surprises and design errors

Comparision with related work

Summary

Conclusion

discussion

Regi grew up in a war zone where peace was a far-off dream. He lost his family due to the ravages of war, and eventually had to leave his home country. This drastically impacted his attitude and made him a strong advocate of peace in war-torn regions of the world.Regi became a professional hacker, listing his many services through one of the IRC channels. Hacking passwords was his specialty, and defacing Web sites, cracking software licenses, and reverse engineering applications were among his many talents. When the opportunity came along to support a noble cause he believed in, he took it.Frustrated by the many delays and hindrances in the way of the peace process in his home country, he planned to voice his concerns by targeting a Web site of one of the not-for-profit government organizations he was familiar with. He did not want any other child to lose their family like he did.While searching for target Web sites, Regi stumbled upon the government Web site XChil- drenrelief4U, a welfare organization Web site dedicated to the abolishment of child labor in the region. Regi ran an FTP brute force tool against the Web site and quickly cracked the admin pass- word. With the password, he logged onto the site and changed the Index.htm file. He posted: “Stop War, We Need Peace” to the logon page, deleted the log file, and logged out.

  • Do Regi’s reasons justify his action? Why or why not?
  • What are the possible consequences of Regi’s action?

network administration

The databases used by the Datacenter Edition servers are experiencing rapid growth in terms of use and size. Many of the databases are now used across departments. These databases are considered by the Management Council to be one of the company’s best strategic assets. The Management Council wants to consolidate physical management of the databases and the Datacenter Edition servers in the IT department’s computer room as a way to secure them in one place. Also, they want to consolidate the disk storage used for these databases and provide for fault tolerance. Create a report or slide show for the Management Council with your recommendations, including the advantages of what you recommend.

PowerPoint Presentation and Survey

  

READ CAREFULLY!

PART 1: As a user support specialist, you may be asked to prepare a slideshow presentation for use in a training activity to an individual or a large group. Create a Slideshow of 10 slides explaining/training others how to develop professional FILE MANAGEMENT (using folders, what type of names for folders, files, where do they come from (one creates a file in PPT)         Use attractive background color (1 color or 1 main color as in a template where the following slides use that color plus other colors).

Use the writing guidelines in this chapter along with the material in Appendix C to prepare a slideshow presentation. (chapter and Appendix C are attached check them down below)

PART 2:   Create a MONKEY SURVEY with at least 5 questions. Go to SurveyMonkey.com and SIGN UP FREE. Follow its instructions. 

Cover Letter

 Need to be done within 6 hours. My major is computer science and will graduate with bachelor degree in computer science.

Question for the cover letter is down below. Please review carefully and write cover letter for me.

In order to help you get started on your cover letters, identify three of your own experiences that you think would persuade an employer that you would be a good candidate for employment. Find an actual job posting that you could apply for after graduation by searching the MSU Connections job board Links to an external site., LinkedIn, or another job board, and choose experiences that are relevant to the job posting you’ve chosen. After you’ve chosen three experiences, write a brief summary of each one. Your completed assignment should include the job title and at least three separate paragraphs that discuss your relevant experience.

Your cover letter should focus on a mix of your educational background and experience and your work background and experience. So for this assignment, include both types of experiences.

Java class

Hello,

I am looking for assistance with my Java class through Sofia. I am looking for a person with a decent amount of Java experience.