GO19_AC_CH02_GRADER_2G_AS – Concerts and Sponsors 1.0

  

GO19_AC_CH02_GRADER_2G_AS – Concerts and Sponsors 1.0

Project Description:

In this project, you will use a database to answer questions about concerts in the local college area. You will create a relationship between two tables, create a query from an existing query, and create queries using text, numeric, compound, and wildcard criteria based using the fields in one or both tables. You will create calculated fields, group data when calculating statistics, create a crosstab query, and create a parameter query.

Steps to Perform:

   

Step

Instructions

Points    Possible

 

1

Start Access. Open the file Student_Access_2G_Concerts_Sponsors.accdb   downloaded with this project.

0

 

2

Using Sponsor ID   as the common field, create a one-to-many relationship between the Sponsors   table and the Concerts table. Enforce referential integrity and enable both   cascade options. Create a relationship report with normal margins, and save   it as a3 Relationships. Close all open objects.

20

 

3

In the last record of the Sponsors table,   change the Sponsor ID from SPONSOR-108   to SPONSOR-100, and then close the table. (The related records in the Concerts table   will automatically update.)

2

 

4

Copy the   Concerts $1000 or More Query to create a new query with the name Jan-Apr Concerts Query. Redesign the query to answer the question, What is the Date, Concert   Name, Concert Location, and Box Office Receipts for concerts between 1/1/22 and 4/30/22 sorted in ascending order only by the Date field? Run the query (five   records display). Close the query, saving the changes to the query.

20

 

5

Create a query in Query Design view based   on the Concerts table to answer the question, What is the Date, Concert Name,   Concert Location, and Box Office Receipts for a concert location of Georgetown Community Theater or Austin City Center and for box office receipts that have an amount that is greater than 1000 sorted in ascending order by   the Date field? Run the query (four records display). Save the query as GCT OR ACC Over $1000 Query, and then close the query.

20

 

6

Create a query   in Query Design view based on both tables to answer the question, What is   the Sponsor Name, Concert Name, and   Concert Location for a sponsor name that has radio anywhere in its name and for a concert name that ends in festival sorted in   ascending order by the Concert Location field? Run the query (two records   display). Save the query as Radio Festivals   Query, and then close the query.

20

 

7

Create a query in Query Design view based   on the Concerts table to answer the following question, What is the Concert   ID, Concert Name, Concert Location, Sponsor ID, and Date for records that are   missing the date? Run the query (two records display). Save the query as Missing Concert Date Query, and then close the query.

20

 

8

Create a query   in Query Design view based on both tables to answer the question, What is the   Concert ID, Sponsor Name, Box Office Receipts, and a new field named Sponsor Donation that will   calculate and display the donation amount when the Sponsor donates an amount   equal to 50 percent (0.5) of each box office receipts amount to the Music Department. Sort the   records in ascending order by the Concert ID field. a. Run the query (the   second record—EVENT-102—has a Sponsor Donation of 287.5).

20

 

9

Display the query in Design view. In the   fifth column of the design grid, create a new field named Total Donation that will   calculate and display the total donation when the box office receipts amount   is added to the sponsor’s donation amount. Run the query (the second   record—EVENT-102—has a Total Donation of $862.50).

6

 

10

Display the   query in Design view. Use the Property Sheet to format the Sponsor Donation   field as Currency with 2 decimal places, and then close the Property Sheet.   Run the query, apply Best Fit to the fields, save the query as Sponsor Donation Query, and then close the query.

12

 

11

Create a query in Query Design view based   on the Concerts table to answer the following question, What are the total   Box Office Receipts by Concert Location sorted by the Box Office Receipts   field in ascending order? Use the Property Sheet to format the Box Office   Receipts field with 0 decimal places, and then close the Property Sheet. Run   the query (for the Concert Location of Georgetown Community Theater, the sum   of the box office receipts is $7,850). Apply Best Fit to the fields, save the   query as Receipts by Location   Query, and then close the query.

20

 

12

Use the Query   Wizard to create a crosstab query based on the Concerts table with the   Sponsor ID field as row headings and the Concert Location field as column   headings. Sum the Box Office Receipts field, and name the query Sponsor and Location Crosstab Query. Display the query in Design view. Use the Property Sheet to format   the last two columns with 0 decimal places. Run the query, apply Best Fit to   the fields, save the query, and then close the query.

20

 

13

Create a query in Query Design view based   on the Concerts table to answer the following question, What is the Concert   Name, Concert Location, Box Office Receipts, and Sponsor ID. Sort the records   in ascending order by the Concert Name field? Set the criteria so that when   you run the query you are prompted to Enter   the Sponsor ID in the format SPONSOR-###. Run the query,   and when prompted, enter SPONSOR-101 as the criteria (six records display). Display the query in Design   view and hide the Sponsor ID field from the results. Run the query again,   entering SPONSOR-101 when prompted. Save the query as Sponsor   ID Parameter Query, and then close the query.

20

 

14

Save and close the database, and then submit for   grading.

0

  

Total   Points

200

Computer Forensics – Assignment

   

download the .ova file. download and install the virtual box tool.

open virtual box and import the ova file .

In this assignment you will work on the first steps of seizing and imaging an evidence disk. And create a well-organized report that has documentation with Text and Pictures about your work. 

Objectives:

– Learning how to seize a digital evidence found on the scene of the incident

– Being aware of the Dos and Don’ts when handling the evidence

– Filling the chain of custody and Learning its importance.

– Identifying the tools, both hardware and software, required for imaging the evidence data

– Preforming the imaging process which can be cloning or just imaging

– Validating the created image of evidence data

Context: [Fictional]

Scenario: The XYZ security team received a notification that suspicious cyber activity is taking place in Wilson Building. Surveillance cameras showed that a person, who could be the suspect, was seen in room Wilson 106 and then he left. When the team arrived at the scene, they only found a USB drive that could have been used in implementing the suspicious activity. They decided to seize it so they can perform the needed analysis to identify its content. 

Scene Location: Wilson 106 

· [For pictures, you can use your own place if you cannot access Wilson 106] 

Evidence: A USB drive 

· [a please have/use your own USB blank flash drive for this work. For faster performance you can use 8GB or less drives. Also, you can use SAU machines in case your machine is not powerful enough.]

Please follow all the steps/guidelines/phases below, as much as possible, however points in green only will be considered while grading.

· Will a warrant be needed in this case? Justify your answer and Add legal references [ 5 pts] [Based on: Scientific Working Group on Digital Evidence.]

· General Instructions: [Seizing the Evidence] 

1- Ensure the safety of all individuals at the scene. [X]

2- Protect the integrity of evidence. [X]

3- Evaluate the scene and formulate a search plan. [X]

4- Identify potential evidence. [The USB drive given to you]

5- All potential evidence should be secured, documented, and photographed. [ 5 pts ]

a. For this assignment No need to secure; just document and photograph.

i. In the report, the caption for photos/figures is required.

6- Conduct interviews. [X]

7- Any item to be removed from the scene should be properly packaged and secured. [X]

 

· For Removable Drives: 

1- Document in writing the location and condition of all removable media [ 2 pts]

a. For this assignment: The only the USB drive.

2- Remove any connected external media (e.g. external drives or thumb drives) after the computer has been powered down. [X]

 

· Creating the image: 

1- Document the tools you plan to use. [ 5 pts ]

a. For this assignment: 

i. Hardware [X]

1. Tableau Forensic USB 3.0 Bridge

2. T8u: 

a. Firmware:1.5.0.1, Date: 10/31/2016 , Time: 11:47:27

b. Serial: 000ecc13 0008415f

ii. Software.

2- List clearly the steps/work plan for creating the disk image. [ 3 pts ]

3- Use snapshots for each step while creating the disk image using the Parrot Security Linux distribution. [10 pts]

a. Using hashing, Verifying the disk and the image are important [5 pts]

4- Use the Chain-Of-Custody (COC) document to describe the item and fill required information. [ 5 pts]

a. Assume that the evidence was released to another person on the team, and fill the necessary information.

Notes: 

· Deliver The above work in a very well formatted and organized report that you will submit, in PDF format. [5 pts]

o Poorly formatted report will badly affect your grade regardless of the accuracy of your work, i.e. > 50% of the grade.

§ Have to have: Title Page, TOC, Pictures with Captions, Divide text into Sections…etc. 

· The COC document should be the last page of the report.

EVIDENCE CHAIN OF CUSTODY TRACKING FORM

Case Number: ________________________ Offense: ______________________________

Submitting Officer: (Name/ID#) _______________________________________________

Victim: ______________________________________________________________________

Suspect: _____________________________________________________________________

Date/Time Seized: __________________Location of Seizure: ______________________

  

Description of   Evidence

 

Item   #

Quantity

Description of Item (Model, Serial #, Condition, Marks, Scratches) 

 

 

 

 

 

 

 

 

 

  

Chain of Custody

 

Item #

Date/Time

Released by
(Signature & ID#)

Received by
(Signature & ID#)

Comments/Location

 

 

 

 

 

 

 

 

 

APD_Form_#PE003_v.1 (12/2012) Page 1 of 2 pages (See back)

EVIDENCE CHAIN-OF-CUSTODY TRACKING FORM
(Continued)

  

Chain of Custody

 

Item #

Date/Time

Released by
(Signature & ID#)

Received by
(Signature & ID#)

Comments/Location

 

 

 

 

 

 

 

 

 

 

 

  

Data visualization discussion

Composition deals with the overall readability and meaning of the project.  As noted by Kirk (2016), the topic of composition is divided into project-level and chart-level composition. Select one component of either project composition or chart composition and discuss.

– 1 page

Requirements Document

  

Requirements Document

Application title:  Mobile Phone Purchase

Purpose:  This windows application calculates the cost for a mobile phone from the Mobile Phone Store.

Program 

Procedures:  From a windows application, a buyer selects a mobile telephone for purchase. The buyer also can elect to buy a charger for the particular phone. A buyer is either in the store or is buying over the internet. The program calculates the cost of the phone and charger purchased.

Algorithms, Processing, and conditions:

1. The consumer enters their last name, street address, and zip code. If buying over the internet, the buyer also enters an email address.

2. The buyer selects a phone from a list of phones.

3. The user can select the type of charger from the list of chargers.

4. Based on the phone and charger selected, the program calculates the total cost.

5. The total cost for a store purchase must include 7.75% sales tax. No sales tax is included for internet sales.

6. An internet sale generates a shipping charge of $28.00.

7. The types of phones an their costs are: Blasstur 451: $279.81; Elecque 9801: $193.71; Gainlet 3: $328,44; Nomadic 2900: $253.72; Querta 332: $479.36.

8. Three types of chargers are available: Auto: $63.92; Mobile: $42.66; Desktop: $27.31.

9. Write a comma-delimited text file to record each sale. The text file should contain the user last name, zip code, phone choice, charger style, and total cost.

Notes and Restrictions:

1. Validate data the user enters using accepted standards.

2. In-store is the default of buyer.

3. The Email label and text box does not display unless the user is an Internet buyer. An Internet buyer must enter an email address.

Comments:

1. The picture shown in the application has been inlcuded. Its name is cell phone.jpg.

2. The program should use a three-tiered structure with presentation, business, and persistence classes.

USE CASE DEFINITION

1. The user views the opening screen

2. the user enters last name, street address, and zip code

3. The user selects a phone from the phone choice list and, if desired, a charger from the charger style list.

4. The user selects either In-store or Internet as the type of buyer. If an Internet buyer, the user must enter an email address.

5. The user clicks the Calculate Cost button.

6. The program displays the cost of the sale.

7. The program writes a record of the sale in a text file.

8. The user can click the clear form button to enter another sale.

Other notes: I need an event planning document and the entire VB project

cryptography

compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organizations security posture.

SIEMENS SIMATIC

I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA) 

There are all the requirements for the term paper alongside the template for the term paper.
Please help and thank you 

Cybersecurity

                                   

Discussion -wk13 Performing Forensic Analysis and Techniques

There are a number of Digital forensics tools available.  Do some research on both software tools and  hardware tools.  Choose one of each to present in your Discussion essay.  Describe each tool and it’s capabilities and the advantages of having it in your Forensics Toolkit.  Considerations should include, functionality, ease of use, reliablity, reputation cost and other factors.
Notes: Your essay should be unique, do not duplicate your other classmates selection. (First come first served) If you must write on a tool that another classmate has chosen, be sure to approach your essay from a different angle.
These consideration very important in the course functionality, ease of use, reliability, reputation cost and other factors.

REFERENCES OR WORKS CITED SHOULD BE INCLUDED.