To determine the exact name

  

To determine the exact name of fields used in the tables for these exercises, refer to the tables in the Just Lee Books database, or use the DESCRIBE table name command to view the table’s structure.

4. List the customer number for each customer in the CUSTOMERS table, along with the city
and state in which they reside.
 

5. Create a list containing the name of each publisher, the person usually contacted, and the
telephone number of the publisher. Rename the contact column Contact Person in the displayed
results. (Hint: Use the PUBLISHER table.)
 

6. Determine which categories are represented by the current book inventory. List each category
only once.
 

7. List the customer number from the ORDERS table for each customer who has placed an
order with the bookstore. List each customer number only once.
 

8. Create a list of each book title stored in the BOOKS table and the category in which each
book belongs. Reverse the sequence of the columns so the category of each book is
listed first.
 

9. List the first and last name of each author in the AUTHORS table.
 

10. Create a list of authors that displays the last name followed by the first name for each author.
The last names and first names should be separated by a comma and a blank space.
tables are the following:

The Cloud WWW Issues

 

Research and learn about the three topics listed below. 

1.  Dataveillance 

2.  Distributed Denial of Service Attacks

3.  Internet Parental Control Software  

4.   Internet Anonymity 

5.  Cryptography

6.  Biometrics

7.  Big Data (Data Analytics)

8.  Artificial Intelligence (AI – deep learning applications)

9.  Browser fingerprinting  

10. Facial Recognition

11. Virtualization

12. Blockchain  

13. Machine Learning

14. Application Security 

15. Cryptojacking

16. Cyber-Physical Attacks

17. Autonomous Vehicles

18. Smart Medical Devices

19. Electronic Medical Records

20. Smart Systems/Devices

Create a slide presentation detailing the information on your chosen topics. Upload your presentation in the assignment box. (Refer to rubric)

Requirements:

Slide #1-Title, Your Name, INF Section, Date

Slide #2,3-Choice #1

Slide #4-5-Choice #2

Slide #6-7-Choice #3

Slide #8-Work Cited

Answer for each choice the following:

1. What it is (description)?

2. What are the security problem or issues?

3. How to reduce or eliminate the threat? How the security issue(s) could be prevented or protected?

Additional Presentation Requirements:
Images/diagrams/background/animation

Upload your presentation in the assignment box.

Additional Sources: 
https://onlinedegrees.sandiego.edu/top-cyber-securitythreats/ 
https://www.fbi.gov/investigate/cyber
https://staysafeonline.org/
Ransomware Attacks Take On New Urgency Ahead of Vote 

4/1 Devotional

Read: We are given a great responsibility when asked to manage. In Christianity, even God says we must take responsibility seriously. 1 Corinthians 4:2 (link) tells us, “A person who is put in charge as a manager must be faithful” (New Living Translation). Consider your definition of “faithful” from the perspective of your worldview. Why should we be “faithful” in carrying out our duties in managing? Consider the responsibility to others as you implement technology.

https://www.biblegateway.com/passage/?search=1+Corinthians+4&version=NLT

Question: 

  1. Be sure to address the following prompts in your paper:
    1. Discuss why there is a higher expectation of managers in general but even more so in the technology field.
    2. What adjustments do you need to make in your current management or leadership role to enhance your faithfulness to your employer, coworkers, or direct reports?
  2. Your paper should be at least 250 words in length.
  3. Submit your assignment by the end of the workshop.

my sql

1.Write a SELECT statement that returns InvoiceId and Total from the Invoice table.  Use the CONCAT function to insert a ‘$’ in the front of  the total value

— 2.Write a SELECT statement that returns CustomerId and average Total from the Invoice table grouped by customerId. Use the CONCAT function to insert a ‘$’ in the front of  the average total and the FORMAT function to to display it with commas and 2 decimal places. 

— 3.  Use the CHAR and CONCAT functions (for the first and last names), to format the the address for each customer in the customer table – the formatted output should look like this

— Gary Hernandez

— 3829 Broadway Ave

— New York, NY 10012 

— note ***** the output will not look like this in the workbench the CHAR functions will place columns in each row of the results *****

— 4. Display the first initial, last name, and email address of each customer in the customer table.

— 5. Return these columns from the customer table, customerid, email and Phone. Use the substr and lpad functions to render the phone number like this: ************9999

— 6. use the concat_ws function to render to display the customer lastname and firstname in this manner: Lastname, Firstname. Also display the customer’s email address but only list the customers whose email addresses have more than 20 characters 

— 7.Display the customerId and the phone for all customers who live in the USA, format the phone numbers so that they look like this 123-456-7899

— 8. For every track in the track table, return the track name and the album title. The album title should be in all uppercase letters. 

— 9. For each track, display the unitprice, unitprice rounded to 1 decimal place, unitprice truncated to 1 decimal place, smallest integer >= unitprice and largest integer <= unitprice. 

— 10. For each track, display the trackId and a random number between 1 and 10 using the trackId as a seed. 

Executive Program Practical Connection Assignment

Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have observed these theories and knowledge being applied to an employment opportunity in your field of study.  

I am not working I am a full-time student. please write the assignment in according to student environment.

Unit 2 Assignment

 

In this assignment, you will describe the Standish Group and the CHAOS Report.

Refer to the attached document for full assignment details and grading rubric.

week 9

Read the Innovation at International Foods Case Study on pages 234-238 in the textbook. Answer the Discussion Questions at the end of the Case Study. Your responses must be complete, detailed and in APA format. See the sample assignment.  Please view  APA Template File in the “Getting Stated” Folder. 

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

Chapter 6, 7, & 8 Journal articles

requirements of project management

  

1. Clearly define the main problem and list all sub problems

2. Make a direct connection between major sub problems and the main problem. Use a Fish Bone diagram.

3. Identify all stakeholders by title and association (i.e. department, outpatient etc.) and connect them to the main problem or a sub problem. Use the stakeholder template and the Problem template.

4. Which Elicitation tools would you use to gather additional information and gain a better understanding of the problem (List two 2). Give specific examples. (for instance if you are using ethnography which stakeholders  will you observe (at least two), and what you are looking for. If you are using an Interview provide the stakeholders (at least two) you will interview and sample questions)

5. Include a Glossary of all specialty terms

6. You do not need to solve the problem or propose solutions 

Building an Information Security Risk Management

Review the workflow steps for the security risk review in Chapter 12 in Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. What is the overall objective of the questionnaire that is distributed to primary contacts? How important is ethics when answering the various questions in the questionnaire? Provide an example of an unethical response and its impact to a company’s security posture.