Week 8 Assignment 2 Create an ERD

 Week 8 Assignment 2 Create an ERD

Create an ERD

Preparation

In this assignment, you will be drawing an Entity Relationship Diagram (ERD) or Database Design Diagram. The following videos and documents will assist you:

Entity Relationship Diagram (ERD) Tutorial – Part 1.

Entity Relationship Diagram (ERD) Tutorial – Part 2.

Ultimate ER Diagram Tutorial (Entity Relationships Diagrams).

Scenario

Suppose a local college has tasked you to develop a database that will keep track of students and the courses that they have taken. In addition to tracking the students and courses, the client wants the database to keep track of the instructors teaching each of the courses.

Instructions for the Database Design Diagram

Use any drawing package or any other application you know such as Visio, Word, PowerPoint, or another tool to create the Database Design Diagram. Otherwise, you may draw the diagram by hand with a pen and paper. If you draw the diagram by hand, then take one or more pictures of the diagram with your cell phone or laptop camera, place the images into a Word document, and submit the document. Otherwise, if you use software to create the Database Design Diagram, then take one or more screen captures of the diagram, place the screen captures into a Word document, and submit the document. Submissions that are not in .doc or .docx format will not be graded.

Include the following in the document:

Draw the entities of the database and the attributes of each entity, based on your research and/or common knowledge of a college and the information tracked by a college.

Create the appropriate relationships between each entity within the diagram.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

Draw a database design diagram that depicts the attributes and relationships of the entities.

Note: All Assignments must be submitted into Blackboard. The whole Assignment (e.g. Assignment 1, 2, and 3) which includes both required images and written portion must be submitted into “one” MS Word document. All images pasted/copied into the MS Word document must contain an image label as to what the image represents. Assignments not submitted into “one” MS Word document will not be graded. Students must apply labels to their Database individual screen shots for Assignment 3.

This Video will help you understand “Assignment Two’s” challenge:

Watch Media

By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Institution Release Statement

Networking

1.How many valid host addresses are on the network 172.16.41.0/27? (2 points)

a. 65,534

b.30

c.14

d.254

and so on

please open attached file to see rest of the question

4s week 12 S assignment EH

 Each 150 words.

Assignment Questions:

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication.

Include references.

Strictly no copy-paste. Plagiarism results in course termination.

Multi-Touch Screens Versus Mouse-Driven Screens

 

Multi-Touch Screens Versus Mouse-Driven Screens

Resources

The following resources may be helpful when completing this assignment.

Scenario

Computer applications that run on desktop and laptop computers  have, for a long time, been designed to be driven by dragging and  clicking a mouse. With the introduction of tablet personal computers,  the trend has shifted toward using touch-based screens. We now have  access to touch-based TVs, touch-based monitors, touch-based laptops,  and touch-based tablets. Touch and multi-touch devices provide end users  with the ability to interact physically with an application much more  naturally.

Imagine that you are the Information Technology Director of a  major chain restaurant, and you have been assigned to design a menu  ordering application that can run on all devices. Examine whether using a  touch-screen monitor, a tablet, or a mouse to select menu items to  place an order would be most efficient. Speculate how employees would  interact with these devices and the type of emotional reaction that  customers and employees will experience while placing a beverage,  appetizer, or entrée order.

Instructions

Write a 4–5 page paper in which you:

  1. Differentiate between the interaction types and styles that apply to multi-touch screens and applications running on them.
  2. Determine the conceptual model that you would use when designing a product for your restaurant.
  3. Describe the key analogies and concepts these monitors expose  to users, including the task-domain objects users manipulate on the  screen.
  4. Determine one utility or tool in an application for touch-based  and mouse-driven screens that should be designed with memory retention  or recall. Provide a rationale for your response.
  5. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. You may use the resources above or others of your choosing.

This course requires the use of Strayer Writing Standards. For  assistance and information, please refer to the Strayer Writing  Standards link in the left-hand menu of your course. Check with your  professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Analyze the functionality required to allow an application to run on multiple types of devices.

Internet Privacy

In order to complete assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #1). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Privacy is a concept that is rapidly evolving in relation to the most public of mediums, the Internet, which became even more super-charged with social networking websites. In a recent California election, one ballot measure, Proposition 8, asked voters a question on marriage. Donors to the Prop 8 campaign found that their names, addresses, and amount of contribution were masked up with Google Maps and thus rendered into a format showing the world a map image of donors’ names, street addresses, and dollar contributions. All this data is public record information already, but still quite inconvenient to access. What are the side effects of this action?

Business Intelligence – End-of-Chapter questions

Chapter 5 – Discussion question #1, #2, #3, & #4 and
                   Exercise #6 and
                   Internet Exercise #7 (go to   neuroshell.com  click on the examples and look at the current examples.  The Gee Whiz example is no longer on the page.)

Chapter 6 – Discussion question #1, #2, #3, #4, & #5 and
                   Exercise 4

– Each answer must be at least 100 words

– 2 references apa format

– no plagiarism

– write only answers, do not mention questions

Week 8 Assignment

 

Complete the following assignment in one MS word document:

Chapter 14–discussion question #1, #3, #4 & exercise 2

APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

  

Discussion Question:

1. Some say that analytics in general dehumanize managerial activities, and others say they do not. Discuss arguments for both points of view. 

3. What are some of the major privacy concerns in employing intelligent systems on mobile data?

4. Identify some cases of violations of user privacy from current literature and their impact on data science as a profession.

Excercise:

2. Search the Internet to find examples of how intelligent systems can facilitate activities such as empowerment, mass customization, and teamwork.

Elliptic Curve Cryptography

 1 page discussion

  • Perform research on Elliptic Curve Cryptography. Define what  Elliptic Curve Cryptography is and identify the associated benefits and  the associated negatives.
  • Would the implementation of Elliptic Curve Cryptography be a good  option for the HU Investment Firm? Fully explain your comments.

ARTIFICAIL INTELLIGENCE

You will argue that health care’s increasing reliance on artificial intelligence will have a negative effect on health and society.

Present your assigned case against artificial intelligence in a PowerPoint presentation with speaker notes

At minimum, address each of the following elements.

· Explain how artificial intelligence is used in health care.

· Analyze how artificial intelligence and related technologies are effecting change in health care.

· Compare and contrast clinical decision support systems in terms of implementation of artificial intelligence.

· Examine the legal and ethical considerations of the use of artificial intelligence in health care.

· Summarize the key points supporting your point of view within your slides, adding additional detail within your speaker notes.