mysql and database (MySql WorkBench)

Show the results (using screenshots) of executing each SQL statement against the database you created for assignment #1. Do not highlight your SQL statement in MySQL Workbench before taking the screenshot (this makes it difficult to read the output).

also show the results of executing a SELECT * … statement against the VIEW. All screenshots and text must be submitted as a single Word document.

python

 

Write a Python program to hold information on a course

  • Program should have a main class
  • Variables are: Teacher name, Credits, Course Name
  • Add a method to enter teacher name and a method to enter credits
  • Use a try catch block to verify that credits is an “int”
  • Add a method to report on the variables  
  • Use _init_ method to create attributes
  • Use def main method to start class
  • Create at least two instances 
  • Add data and print using the methods defined in the class.

Need Response 2 to below discussion

Please read the below discussion post and provide response in 75 to 100 words for each discussion post

Post#1

 

DAC is the way people can control their own content. This may sound obvious, but DAC, for example, is really useful for online users who have access to their information. It enables people to quickly and automatically remove or deny privileges. Reactive access control, More display and file sharing Laissez-faire provide users with good examples of DAC science.

A framework that uses DAC allows the resource owner to determine which subjects can access particular resources. This model is referred to as discretionary as access control is focused on the owner’s discretion. There is a different word, which is mostly used for modeling. This is the List of Access Control. A file ACL will list all licensed users and/or groups who have access and unique access to the file.

Although all in the DAC world seems fine, this model has some problems. While this model has the best versatility of any model, it is its weakest point. For instance, when a user opens a virus-infected attachment, code can be installed on the background without the user being conscious. In general, this code inherits all of the user’s rights and permissions and can perform all user-related operations on the device.

A user is only permitted in the system by placing them on the system-associated Access Control List ( ACL). You need to realize that an entry in the ACL of a resource is known as the ACE. For the test, research this. These permissions are activated when a user or group owns an object within the DAC model, and when the user group og allows other users and groups within the same structure. The DAC model is focused on ownership of resources, which is essential for the review.

RBAC is a form of access control that, as you said, is capable of separating responsibilities in a system that fulfills multiple roles. Obviously in companies (such as Brewer, Nash or MCS), this is true but can also be used in a single operating system to enforce the less privileged principle. By letting users choose the positions they need for a particular task, RBAC is optimized for separating tasks.

If a user is allocated a task by an administrator that includes some predetermined system rights and privileges, the player will be able to access only certain system resources and perform certain functions that have to be allocated under the rules. Please note that RBACK is also known as the Non Discretionary Access Control because it is necessary for the review. The user functions are handled centrally by the system administrator.

If your Customer Service Representative is calling the cable provider to collect your pay-per-view, I would say I am sorry that you have been sent to Billing so that you can pay your expired bill they know that you have an outstanding bill. You pay your bill and inform me that I will get my service when you are moved to the bill. I see you want this service but that isn’t my role. They say let me pass you back.

MAC itself is vague, for many systems there are various ways of implementing it. You will also use a mixture of multiple paradigms in operation. For example, most DACs are used by UNIX and DAC privileges are bypassed by the root account. In an organization you can allow some DAC for employees to exchange information about your corporate file system in addition to separating the various divisions and teams with the MAC / RBAC.

A construction of control is one of the main elements that only occurs in the MAC. No amount of approval will get you to see a Top Secret Document if you have secret level clearance. It’s unusual that you need this building in commercial organizations. However, the second point, which is special to MAC, is that if you can not do an operation, you can not do it in particular.

Post#2

 

In the technological organizations, it is the security which most of the organizations are looking to perform their operations. There are opportunities within the an organization which sometimes slip away due to security concerns and the threat possibilities therefore a robust framework is required to mitigate all the threats. An information a system which can help in the mitigation of threats and keeps check on confidential information of the organization. This can be ensured by the three types of models of security in cloud computing technology. These systems are well implemented and built to perform access control modes. These are MAC, DAC and RBAC. “To implement get to  control,  it  has  been  said  that  all  the  accompanying customary  models  can  be  utilized  as  a  part  of  distributed computing: required access control (MAC), optional access control (DAC) (for instance, get to control records or ACLs), and nondiscretionary get to control (for instance, RBAC or assignment based access control” (Niranjan, 2018).

MAC is the Mandatory Access Control which uses a combination of different paradigms to implement security in many systems. MAC is a vague access control model which allows some DAC for coworkers to share data and manage the corporate file systems in the organization. Security labels are assigned to resource objects within the system which contain information based on two pieces and classify the confidential information. User attempts to access resource under MAC is assessed with the security labels.

DAC is the discretionary access control which allows users to control and access their own information and data. This type of access control systems is used for the desktop operating systems. DAC is assigned a Access control list which contains information about the groups and users who has permitted the access and the level of access given in the system to the user of the group. There are control access systems which are utilized within the system to provide security to the organization. “The organizations are adapting to cloud networks at a rapid pace due to the benefits like cost-effectiveness, scalability, reliability and flexibility” (Indu, 2018).

RBAC is the role based access control which is based on the mechanism which is the job oriented function and places as the user within the organization. It is the computer system which belongs to the system access control and performs all the necessary actions. The RBAC access model is also known as the non discretionary access control. RBAC introduces the absurdness within the system which allows the user to set a number of rules which is defined within the system administrator. It is the system and the situation which is based on the network connection and also permits the user to a particular time frame. “As the number of roles increase, the complexity is increased. To get rid of limitations of RBAC, the attribute base access control model has been introduced which has more flexibility” (Soni, 2019).

Excel, statistics, pivot tables, V-Loopup, correlation tables, box plots

 

Crosstabs

Using the Supermarket data set, create crosstabs for Marital Status and Annual Income expressing the counts as percentages. Then, create a stacked 2D column chart. (Select the crosstab table and insert stacked 2D column chart). If you need to swap the x and y values, then right click on the chart, click select data, and switch row/column).

Box Plots

Using the Supermarket data set, create a box plots of Annual Income and Revenue. Which of the following income brackets appears to have the least variation in revenue (purchase amounts)?

Correlations

Using the Beta Employees data set, create a table of correlations between the variables Age, Prior Experience, Beta Experience, Education, and Annual Salary. (Look at Figure 3.18 in the example 3-3 document in Module 5 (Attached Image file for illustration purposes only). It shows a table of correlations like what you would need to produce. The bottom of the table shows the formula you would use to calculate the correlations for each cell.)

Pivot

Using the Supermarket data set, create a pivot table to find how many units were sold in total in the non-consumable category.

Complete explanation via a word document and completed Excel files using the given datasets and worked solutions in separate tabs on each applicable dataset file. Visual image instruction preferred

BI_Assignment_1

 

Complete the following assignment in one MS word document:

Chapter 1 –discussion question #1 & exercises 9 and 15 (limit to one page of analysis for question 15)

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

Discussion question #1:

Survey the literature from the past six months to find one application each for DSS, BI, and analytics. Summarize the applications on one page, and submit it with the exact sources

Exercise 9:

Go to microstrategy.com Find information on the five styles of BI. Prepare a summary table for each style.

Exercise 15:

Visit the Million Song Dataset(http://millionsondataset.com/), search the collection, and download a few titles. How are the songs indexed, and how would you download the entire database?
 

Mobile Security

 

Mobile devices are always in the workplace and being used for both personal and company business. You have been asked to create an informative poster to display throughout the office that highlights ways to secure mobile devices and safety precautions. This poster will be seen by the entire company in hopes of empowering employees to protect themselves and the company from mobile breaches. 

Create a visual poster or infographic to display in the company’s break room.  

Include the following information: 

  • At least 2 mobile device threats 
  • List of ideal mobile security settings to defend against threats 
  • Brief instructions for setting up at least 2 security settings 
  • An explanation on what happens when mobile devices are not secured from these threats 
  • Appropriate images and graphics 
  • 2 resources for more information on mobile security with appropriate citations 

Format your assignment according to APA guidelines.