Cryptography

in our technological world, cryptography is all around us. Examine your everyday connections to technology for evidence of cryptography.  Provide detailed examples of how cryptography exists in your world.  Next, explore the level of security for two of your examples and offer your opinion on whether the current security is strong enough.  

2 pages papers

IT 244 – database design

1-Write the relational algebra expressions for the following (using Ç):
branch (branch_name, branch city, assets)
customer (customer_name, customer street, customer city)
loan (loan number, branch_name, amount)
borrower (customer name, loan number)
account (account_number, branch name, balance)
depositor (customer_name, account number)
a) Find the names of all customers who have a loan and an account at bank. 
b) Find all customers who have an account from at least the “Downtown” and the “Uptown” branches. 
2- University schema
Classroom (building, room number, capacity)
Department (dept name, building, budget)
Course (course id, title, dept_name, credits)
Instructor (ID, name, dept_name, salary)
Section (course id, sec id, semester, year, building, room number, time slot id)
Teaches (ID, course id, sec id, semester, year)
Student (ID, name, dept_name, tot cred)
Takes (ID, course id, sec id, semester, year, grade)
Advisor (student ID, instructor ID)
Time slot (time slot id, day, start time, end time)
Prereq (course id, prereq id)
Write the following queries in SQL, using the university schema
a) Find the names of all students who have taken at least one Comp. Sci. course; make sure there are no duplicate names in the result
b) Increase the salary of each instructor in the IT department by 15%. 
c) Insert every student whose tot cred attribute is greater than 75 as an instructor in the same department, with a salary of $15,000. 
3- Refer to the university schema used in Q.2 and write the following queries using Nested subqueries.
a) Find the average instructors’ salaries of those departments where the average salary is greater than $50,000. (Hint: use subqueries in the From Clause)
b) Delete all courses that have never been offered (that is, do not occur) in the section relation. 
4- Deleting a record can be costly to an organization if not done in the right way. Let us assume you are working as a DBA (database administrator) and you used the delete command without specifying a condition in the where clause. What do you think will happen to the record in the database? And in case a record was deleted, is there a way to recover the lost data? Answer should be in your own words.

Assignment #020

elect a company that has violated an HR law.
Imagine that you are an HR manager within that organization. You have been tasked with developing training to help prevent future violations of the HR law. 
Compile research and information to include in your training. 
Address the following in 900 words from your research:
Summarize the situation, explaining key HR law considerations should take place and the impact on the organization by explaining objective details.
Discuss the law’s requirements. Include information regarding what the law does, how it is executed, and the execution gaps of your selected organization.
Recommend three steps that organizational leadership should take in order to avoid challenges such as this one from happening in the future.
Cite your sources with APA formatting. Provide at least two terms, or concepts or best practices per page; Provide at least two citations per page; Provide two peer-reviewed references from the weekly reading only, that support citation.

Discussion

  

Security Architecture and Design 

  

1. What does an assessor need to understand before she or he can perform an assessment?

2. How active is each threat agent? How might a successful attack serve a particular threat agent’s goals?

Health Informatics & Inform System – Assignment 4

1.       Discuss at least 3 reasons for using CPOE (computerized patient order entry) (Refer to Article 1 and 2 of the resources. Consider both when building your arguments. feel free to use your own or researched examples if needed).

2.       There are many different EMRs available in the marketplace. What attributes of an EMR make it more suitable than the others for each of the following sizes of practice (a set of attributes for each size practice below):

  • small practices,
  • large multi-specialty groups or community hospitals, and
  • multi-hospital systems?

I expect 3 pages of fact-based material to answer these questions.

Paper should be APA formatted with citation.

Internet Programming

Internet programming 

 

This is an open book exam. However, each student is expected to work on it alone. Students whose solutions are the same or similar will get a grade of zero!!!

Exam time is 7:30pm to 10:50pm. Read instruction in “CPSC8720FinalExam.pdf”. Submit entire solution in zip file on blackboard before 10:50pm! Exam link will close and you wont be able to submit after that. Wrap up, zip, submit at least 5 minutes before 10:50pm! Submission passed due time will not be accepted! No Exception!

ERM

  

Enterprise Risk Management Integrating with Strategy and Performance Executive Summary. (2017, June). Retrieved from https://www.coso.org/Documents/2017-COSO-ERM-Integrating-with-Strategy-and-Performance-Executive-Summary.pdf

Do, H., Railwaywalla, M., & Thayer, J. (2016). Integration of ERM with Strategy (p. 35). Retrieved from Poole College of Management, NCSU website: https://erm.ncsu.edu/az/erm/i/chan/library/Integration_of_ERM_and_Strategy_Case_Study.pdf

  • Which case study in the paper was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources . Use proper citations and references in your post.

Enterprise Architecture

 Question A

  • Explain what the enterprise architecture entails, and what is an attack surface?

Question B

Each week, research a unique news story or article related to Information Security/Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.

500 words

APA format references needed.