Create a database model according to the following steps:
- Create a simple class diagram containing three classes: Vehicle, Car, and Truck. Provide two attributes for each of these three classes.
- Create a rough sketch of a relational table that will store the objects belonging to the aforementioned three classes.
- Ensure you have tried all three options—single table, two tables, and three tables—in your database design.
- Enter two objects per table, corresponding to the classes.
- Use the two-table design to recreate a Car object.
- Repeat the preceding step to recreate a Truck object.
- Create a simple association relationship in a separate class diagram showing Driver and Car.
- Apply a multiplicity of 1 on the driver side and N on the Car side.
- Add/modify your table designs to handle storing of two objects belonging to Car and two belonging to Driver.
- Modify the multiplicity on the Driver side to N. This makes it a many-to-many multiplicity.
- Modify your table designs to handle this multiplicity and show where and how the KEYS or IDs will have to be placed.
- Create a class diagram corresponding to the tables you have designed. Stereotype all classes on that class diagram as <
>.
code into Eclipse
Need help entering code into eclipse
Discussion
theoritical basis
draft
Part-1
In your paper, you will review and include many of the areas you have studied in you degree program. Your paper should examine in detail many of the aspects of creating a great cybersecurity implementation. This examination needs to be comprehensive.
Prepare a Word Document that contains the following:
- A thesis statement (Clearly indicating the type as per example)
- State your topic by way of a thesis statement.
- Expand on the topic with a one paragraph explanation of what you hope to accomplish with your paper. Understanding the purpose of your writing is an important step in writing well.
- A preliminary list of research references indicating your research
- Your paper should be 2–3 pages in length. It will include 10 – 15 research items, a thesis statement, and an explanatory paragraph.
Part-2
You will already have developed a working thesis statement and some research on the topic in the previous unit. Outlining is the process of developing the paragraph structure and the actual paragraphs that will make up your paper.
The following steps outline a suggested process for creating an outline:
- Create an informal list of topics to be covered in the essay.
- This list can be a list of words or short phrases which will be refined during the creation of the full outline.
- Try not to list subtopics at this point.
- Most short essays have at least three to five main topics plus the introduction and conclusion paragraphs.
- Take the topics from the informal list and use those as main topics (i.e., Roman numeral level).
- Rewrite the phrases from the informal list to be more complete so that the main topic is easily understood even when read a week or two later.
- You might need to add more topics or combine like topics as you develop the outline.
- Analyze each main topic, determining what information needs to be presented.
- At this point, start developing the subtopics for each main topic.
- Subtopics may include examples, logic/arguments, details/descriptions, and definitions of key terms.
- Sort your sources and research to see which topics/subtopics they fall under.
- As you decide what research to use, put the information into the outline as subtopics.
- Be sure to note the source of the information in your outline so you can easily cite the information in the essay.
- Review the outline, looking for logical ordering of the topics.
- Organization options include chronological, building on the previous point, least important to most important, or argument/counterargument.
- Consider adding transitional words or phrases as subtopics in each section to realize the overall flow of the essay.
- Rely on the outline while writing the essay.
- If new ideas develop during the writing process, try keeping track of those ideas in a separate document, and then add them after the initial draft is complete if they are still relevant.
- If you encounter writer’s block, refer to the outline to help initiate the writing process with your original ideas.
- Using an outline allows you to write paragraphs out of sequence, such as when research or ideas become available, and then piece the paragraphs together in the order dictated by the outline.
- Your paper should be 2–3 pages in length. It will include 10 – 15 annotated references and a substantial outline of the eventual paper.
Part-3
Purpose
- Continue your research.
- Update your annotated reference list.
- Develop a first draft for your final paper using the outline developed in the previous unit as your guide.
Assignment Instructions
Update your reference list to include any new material and to trim out any references that will not be part of your final paper. Write an initial draft of your paper; take note of organization and flow as well as the necessary comprehensive nature of the material presented.
Assignment Requirements
Your paper (draft) should be 8–10 pages in length. The organization of the paper should be directly related to and influenced by the outline provided in the previous part-2. It does not need to be in APA format at this time, but it is helpful and will save you time in your final rewrite.
Part-4
Purpose
The purpose of this Assignment is to revise your draft to create your final paper.
Assignment Instructions
- Review and closely read your first draft.
- Identify areas where flow, organization, evidence provided, and clarity can be achieved.
- Update your first draft paper to your final version by making all appropriate changes.
- Make sure full APA guidelines are followed and that the reference list reflects the actual content of the paper.
- Ensure that inline evidence, quotes, and paraphrased material (no more than 20%) are fully referenced.
Assignment Requirements
Your paper should be 8–10 pages in length. The organization of the paper should be directly related to and influenced by the outline provided in the previous Unit. The final paper is noticeably improved from the first draft submitted in the previous Unit.
the paper should be 8–10 pages in length with APA format
week-15 discussion
Do you feel the benefits of cloud computing are worth the threats and vulnerabilities? Have we arrived at a point where we can trust external agencies to secure our most precious data? Please explain your answer.
TCP/IP Protocol Suite and the OSI Model
When you use your home network (or any network for that matter), there are many TCP/IP services that you use on a daily basis such as email and browsing the Web. In your week one reading, you were introduced to the TCP/IP protocol suite (this is also called the TCP/IP model) and the OSI model. They may look very different. For starters, the number of layers and some of the names differ between the two, but they both are used to represent how a network functions. This week we are taking a “deep dive” into both TCP/IP protocol suite and the OSI model, focusing on the different layers and their functionality.
Learning about the TCP/IP protocol suite and the OSI model will help you build a great networking foundation- they are not only used to help teach how a network functions but are also used today in the field to help aid in network troubleshooting.
- In your own words, what occurs at each layer?
- What kind of equipment is used at each level? (You may use the textbook and additional resources to help you answer).
- Compare and contrast the TCP/IP protocol suite and the OSI model.
- How are they similar? How are they different?
data visualization discussion
There are various languages, some are better for data visualization than others. Please review the basics of Python, SAS, R, and SQL. What are the qualities of each language regarding data visualization (select at least two to compare and contrast)? What are the pros and cons of each regarding data visualization (select at least two to compare and contrast)?
Reply post:
When replying to peers, note your opinion on their thoughts. Add your thoughts and continue the conversation regarding the languages (Python, SAS, R, and SQL) and other visualization tools as well.
Please reply in 250-300 words at least. Please include the references in APA format.
Whatsapp Plus Rojo Apk Review
Whatsapp Plus Rojo Apk is the latest version of the popular messaging application that combines enhanced privacy, performance, and chat features. Users can enjoy this new app for free without risking their privacy. It is also easy to install, requires no updates, and works seamlessly. In addition, it can handle up to two accounts at the same time, making it an ideal way to stay in touch with friends and family while on the go.
WhatsApp Plus is known by many names, including WhatsApp+ and Wasap plus. It was first introduced in 2012, but it has since undergone numerous updates. The main developer of this application, Rafalete, has modified the code and created this new application. However, it has faced several problems since its introduction in the Google Play Store. This is the reason why WhatsApp Plus is now available in different colors.
WhatsApp Plus Rojo also solves these issues by using a built-in translator. Unlike other WhatsApp alternatives, this app can translate messages for you and automatically switch back to the original app. Moreover, WhatsApp Plus Rojo apk can be installed on many Android and iOS devices. Apart from being free, this application is also a safe download. Its antibaneo character ensures that users can continue using the original WhatsApp app.
WhatsApp Plus Rojo also comes with an option for users to disable the internet for a particular app. This option is present in the main interface, so users do not have to go through the Ajustes section to find it. In this case, users need to click on the icon for WiFi and continue using other apps. The process takes a couple of seconds, so the user can start using the app without any interruption.
computer architecture
onduct research on the IEEE or ACM journal articles or conference proceedings, published within the last one-year period, about the pipelining concepts. Submit a total of two-page summary for three important publications (along with the original paper complete reference information only).
2. This problem aims to investigate the major perspectives of RISC and CISC architectures in both a written report and a fun mock debate format.
a. There are different hypothetical real-life roles: a.1) Local City Mayor, a.2) Tier-1 Research University Biology Professor, a.3) Industrial Businessman, a.4) Hardware developer, a.5) Software developer, and, a.6) NASA Director.
b. Conduct research on major journal articles, conference proceedings, or real-life implementations about the RISC and CISC concepts and develop at least three fact-based debate arguments for both to defend and to destroy each architecture for each of the hypothetical roles. (You need to find strong as well as convincing arguments that go well beyond the fundamental class coverage)
c. Submit the report including your arguments for and against each architectural approach (as part of the project-2).
d. During the project due date, the hypothetical roles for RISC and CISC teams (to perform each role one at a time) and groups to promote each architecture will be randomly assigned in the class. (Satisfactory performance at each role is required for successful project completion)
3. Conduct research and explain the following concepts (with proper references): Gelsinger- Hennessy debates, SPEC benchmarks, Spectre and meltdown vulnerabilities (concise concepts and most recent developments), Blue gene supercomputers and corresponding architectures, Top-6 most powerful supercomputers, and Macro-op fusion.
4. Conduct research on recent processors from Intel, IBM, and ARM. Describe their specifications, obtain their figures, and compare their pipeline operations in terms of strengths/weaknesses, etc. Also, propose one new idea to improve the existing pipeline operations (make sure to include original source complete references).
150/s2
- What are the components of a security education, training, and awareness program?
- How can organizations create and manage these programs?
- A thesis statement (Clearly indicating the type as per example)