chapter 3

 There are hundreds of database types and numerous database classes (relational, graph, NoSQL, flat file, etc.). Why do you believe technology firms keep on re-inventing the wheel and coming up with a new medium for data management (virtually every day). Please cite at least three examples and elaborate with business use cases.  

DQ

Q1:

We live in a society where there are many forms of presence. Most recently, we have had to resort to telepresence and virtual presence. What do you feel are social and emotional interaction dynamic consequence for users when they are limited in their abilities express themselves at a distance. Use scholarly research sources to justify your responses. 

Final project

 

The purpose of this assignment is to pick a topic for your research project. The topic should be of graduate level not a survey. Investigate an important question. 

Your Research Project will be a presentation on some aspect of the surveillance state.  Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey. Make use of academic references such as you can find in the Danforth LIbrary research databases 

Use at least five sources.

network administration

The Audit Response Committee would like to know in what ways Windows Server 2016 can provide audit information, because no auditing is currently in use. The committee would like you to create a report that provides examples of what can be audited. Also, the IT director wants you to create a set of general instructions for how to set up auditing changes to files.

Create a set of UML and Data Flow diagrams.

Create a set of UML and Data Flow diagrams.
This is a required assignment, worth 170 points, and must be submitted by the due date.  Late assignments will not be accepted.
Details on the Project: Systems Diagrams Specifications v2.pdf
When references and citations are included, you must apply and use the basic citation styles of APA. Do not claim credit for the words, ideas, and concepts of others. 
Use in-text citation and list the reference on your supporting source following APA’s style and formatting. 
Do not copy and past information or concepts from the Internet and claim it as your work. It will be considered Plagiarism and you will receive zero for your work.
Submit your solution here.

operating system vulnerability (windows and linux)

what to do

  1. Security Assessment Report (SAR): T
  2. 8 set PowerPoint 

  1. Explain the user’s role in an OS.
  2. Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
  3. Describe the embedded OS.
  4. Describe how the systems fit in the overall information system architecture, of which cloud computing is an emerging, distributed computing network architecture.
  5. explain Windows vulnerabilities and Linux vulnerabilities;
  6. explain the Mac OS vulnerabilities, and vulnerabilities of mobile devices;
  7. explain the motives and methods for intrusion of the MS and Linux operating systems;
  8. explain the types of security awareness technologies, such as intrusion detection and intrusion prevention systems;
  9. describe how and why different corporate and government systems are targets; and
  10. describe different types of intrusions such as SQL PL/SQL, XML, and other injections.

You have been asked by

  

You have been asked by a tax return preparer to create a program which will help him calculate taxes. This preparer will at most have 100 clients. For each client, he has to keep track of the client’s first name, last name, gross income, and number of children. Use parallel arrays to store this information for him.

A taxpayer’s federal tax due is calculated as follow. First, the taxpayer gets a dependency exemption deduction of $2,000 for each child. So, if a taxpayer has two children, he or she will get a dependency exemption deduction of $4,000. A taxpayer gross income is reduced by the amount of the dependency exemption deduction to determine his taxable income.

The amount of tax due is a percentage of taxable income. If taxable income is greater than or equal to $100,000, the tax due is 30% of taxable income. If taxable income is greater than or equal to $50,000, but less than $100,000, the tax due is 20% of taxable income. If taxable income is less than $50,000, tax due is 10% of taxable income. A taxpayer cannot have a negative tax due – if his taxable income is less than 0, his tax due is 0.

Present the user with a menu of the following four choices

1. Add taxpayer info (This will allow the user to enter the info (first name, last name, gross income, number of children for ONE taxpayer )

2. View info for all taxpayers (This will allow the user to view info for all

taxpayers: first and last name, gross income, number of children, tax due.)

3. Find and display the total owed for all taxpayers

4. Exit the program (If the user choices 4, the program will exit. If the user

chooses 1, 2 or 3, the program will do what the menu item says it will do,

and then the menu will appear again.