Business Intelligence

1. Compare the IoT with regular Internet.

2. Discuss the potential impact of autonomous vehicles on

our lives.

3. Why must a truly smart home have a bot?

4. Why is the IoT considered a disruptive technology?

5. AT&T is active in smart city projects. Investigate their

activities (solutions). Write a summary.

Be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) 

legal network topics

reference

https://money.cnn.com/2005/06/27/technology/grokster/

https://money.cnn.com/2014/03/18/technology/google-viacom-lawsuit/

question

Do you feel that the court’s decision was right in both cases? Use the course textbook or any other credible resources to support your views.
What are your personal feelings about sharing intellectual property over the Internet?
2 pages

Biometrics

Using the Internet and other sources, research the topic of biometrics. What type of biometrics is the most accurate? The lease accurate? Are specific biometric devices more realistic than others? 

Computer Program Design

 

I want you to create something based on what you’ve learned so far in this course

Visit https://corallanguage.org/simulator/ and write a program using:

variables

branches

loops

arrays

functions

Come up with your own program that contains your own user-defined functions and variables. Be creative. No need to be too complicated but be a useful program with a function and array.

Exp19_Access_Ch08_Cap – Performance 1.0

Exp19_Access_Ch08_Cap – Performance 1.0

Exp19_Access_Ch08_Cap – Performance 1.0

Access Chapter 8 Capstone – Performance 

EX19_AC_CH08_GRADER_CAP_AS

  

Project Description:

You have been asked to modify an Employees database that tracks employee data, company locations, and performance and bonus information.You will import a spreadsheet from Excel and a text file into the database.You will add a Hyperlink field that will store a URL for each city where the company has a location.You will also add an Attachment field that will store employee photos.You will then use imported data to enhance a query in the database, create a report, and then export it to a PDF document.

     

Start   Access. Open the downloaded Access file named Exp19_Access_Ch8_Cap_Performance.accdb. Grader has automatically   added your last name to the beginning of the filename. Save the file to the   location where you are storing your files.

 

Create   a new table in the database by importing the downloaded workbook named a08c2Location.xlsx. Use the first row   of the worksheet as column headings, set LocationID as the primary key, and   import the table as Location.   Accept all other default options. Do not save the import steps.

 

Create   a table in the database by importing the downloaded text file named a08c2Titles.txt. Use the first row of   the file as field names, TitleID as the primary key, and name the table Titles. Accept all other default options. Do   not save the import steps.

 

In   the Employees table, add an Attachment field named Photo as the last field. Save the table.

 

Add   the downloaded image file KFleming.jpg   for EmployeeID 3 to the Employees table.

 

Add   the downloaded image file PBrumbaugh.jpg   for EmployeeID 17 to the table. Close the table.

 

In   the Location table, add a Hyperlink field named CityInfo   as the last field. Save the table.

 

Add   the URL http://en.wikipedia.org/wiki/Atlanta   as the CityInfo value for Atlanta in the Location table.

 

Add   the URL http://en.wikipedia.org/wiki/Pittsburgh as   the CityInfo value for Pittsburgh. Close the table.

 

Add   the Location and Titles tables to the Relationships window. Join Location and   Employees by their common field, enforcing referential integrity. Join Titles   and Employees by their common field, enforcing referential integrity.

 

Open   the Performance query in Design view (right-click the query in the Navigation   Pane, and select Design View). Add the newly imported Titles table to the   query window. Drag and drop the Title field from the Titles table over the   Performance field in the query design grid so that it is placed to the left   of the Performance field. The query calculates raises for the employees based   on data in the Titles table.

 

Add   the Photo field from the Employees table to the last position in the query.   Run the query.

 

Set   the criteria in the query so that only employees on probation will display   and then run the query. Note that these employees will receive no bonus.   Modify the criteria to display employees who are not on probation. Employees   whose performance is good or excellent will receive a bonus. Run, save, and   then close the query.

 

Create   a simple report based on the Performance query. In Layout view, delete the   Probation and PercentIncrease fields. Adjust the column widths so that they   all fit within the page, but the data is still visible.

 

In   Design view, move the page numbering control to the left so that its right   edge is just inside the 7.5-inch mark on the horizontal ruler. Drag the right   edge of the report to the left so that it is just inside the 8-inch mark on   the ruler. View the report in Print Preview; the report should consist of two   pages.

 

Modify   the report title as Performance Reviews   and delete the logo to the left of the title.

 

Save   the report as Employees in Good   Standing   and close the report. Export the report as a PDF document using the same name   and publish the report. Open the report in your reader program and close the   report. Do not save the export steps.

 

Open   the Performance query in Design view. Add the newly imported Location table   to the query window. Drag and drop the Location field from the Location table   over the LastName field in the query design grid so that it is in the first   field position. Sort the records by Location in ascending order. Run, save,   and then close the query.

 

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

paraphrase 270 words

 The purpose of the virtual lab is to provide a hands-on learning experience of Wireshark and to analyze IP Protocols without compromising our own personal workstations or the workstations of others. The importance of this lab to cybersecurity is that, we as individuals who want to enter the profession of cybersecurity, knowing these protocols and getting familiar with their purpose is conducive to doing that job effectively. These tools are what makes a Cybersecurity Professional who they are. In this lab, we explored Wireshark and learned how to capture information between a source and a destination. The source can differ as you can see in my findings of frame 546 compared to frame 545. For Frame 546, the source was IntelCor while for Frame 545 the source was HonHaiPr, taking screenshots of both for reference. We learned how to identify a MAC address and what codes the IEEE assigns to a manufacturer which are the first 6 hexadecimal characters that are the representation of the source. This OUI (Organizationally Unique Identifier) is important cause it identifies the location of which the interaction occurred. We also got a glimpse of how to run a Command Prompt, though it was only to ping the IP address of the computer, it was nice start because it was the first time I have ever had the opportunity to do that. We also accessed the Flow Graph, in order to identify the handshake and the time that it occurred, between the IP Host and Google. Lastly, we used the Filter Box to filter out all DNS-related packets and screenshotted it for reference. 

Please provide turnitin report

12a

Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Policy Framework

  • Vision Statement: Develop a vision statement for the policy and IT ethics outlining its purpose and strategic goals.
  • Key Terms: Define key terms, acronyms and abbreviations used in the policy and in IT ethics.
  • Roles and Responsibilities: Define roles and responsibilities in developing, approving and maintaining the policies and IT ethics.
  • Process: Define the process used in developing and maintaining IT policies and ethics.
  • Scope: Define the policy and ethics and their scope.
  • Risks and Mitigators: Develop a list of ranks, ordered risks, and mitigators for those risks.
  • Relevance to Goals and Policies: Analyze and document how the policies and ethics fit the company’s goals and policies.
  • Change Management Plan: Develop a change management plan for maintenance of the policies and ethics, including roles responsibilities and signoff procedures.
  • Implementation Plan: Develop a roll out timeframe and implementation strategy.
  • Approvals: Sign off blocks for each level of management for the document.

Create a professional business document template, table of contents and appendices (if needed).

The framework should be a detailed outline of topics that will potentially be in the final product. You may want to include multiple approaches for critique that can be reviewed by the CEO. Think of this as building a template that you will fill in with details after continuous critique.