Access

Using Access, you will create a NEW database, including creating tables, queries, forms, reports, and advanced formatting tools.

Some sample Access ideas include (1) inventory of technology at work, (2) inventory of your home/possessions for insurance purposes, (3) a list of all contact information you have on others.

1. Three tables that are linked (a minimum of 10 records per table).
2. Two types of queries.
3. Two types of forms.
4. Two types of reports.
5. Advanced formatting tools.
6. Organized, formatted, and professionally presented Access file, including grammar items (correct spelling, etc.).

Peer Review Article

 

Find a peer reviewed article pertaining to Blockchain and HR. Write a critical review of the article. Your review should  be at least 3 pages long from introduction to conclusion. Be sure to provide in-text citations when you paraphrase or directly quote from the article. Also include a reference page with an APA style citation of the article. Follow the writing requirements for this course when preparing the paper. Use the following format for the paper:

1.  Introduction, including the purpose of your paper and a preview of your paper. Be sure to also provide the article’s title and author(s)’ name(s) in the introduction of your paper.

2. Discuss the purpose and problem the article is addressing.

3. Elaborate on the content of the article.

4. Discuss the findings and conclusion(s) drawn by the article’s author.

5. Discuss the author’s point of view and assumptions. Indicate whether unsubstantiated assumptions were made and whether there is bias that exists in the article.

6. Discuss the significance of the article. Why it is important? On what do you base your assertions?

7. Conclude your paper. Summarize the important aspects of the review.

8. References

Your paper should include 8 centered and bolded headings that correspond to each of the required sections (Introduction, Article’s Purpose and Problem, Content, Article’s Findings and Conclusions, Point of View and Assumptions, Significance, Conclusion, References).

Research Paper & Discussion

1. •• Research paper **

 Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

What is penetration testing

Testing Stages

Testing Methods

Testing, web applications and firewalls

Your paper should meet the following requirements:

Be approximately four to six pages in length, not including the required cover page and reference page.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

2. ** Discussion post **

 There is much discussion regarding Data Analytics and Data Mining.  Sometimes these terms are used synonymously but there is a difference.  What is the difference between Data Analytics vs Data Mining? Please provide an example of how each is used. Also explain how you may use data analytics and data mining in a future career. Lastly, be sure to utilize at least one scholarly source from Google Scholar. 

Please make your initial post and two response posts substantive. A substantive post will do at least two  of the following:

Ask an interesting, thoughtful question pertaining to the topic

Answer a question (in detail) posted by another student or the instructor

Provide extensive additional information on the topic

Explain, define, or analyze the topic in detail

Share an applicable personal experience

Provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources. Use proper citations and references in your post.

Growth of digital retail sector

This week’s journal articles focus on the digital retail sector and how it is constantly growing each year. The case study/article reviews the top four digital retail company’s financial performance. After reviewing the reading, please answer the following questions:

  1. Present an overview of the top four digital retail companies.
    1. Note who they are and how they became the top four digital retail companies.
  2. Please review at least two other digital retail companies that are new in the market, note what you think they would have to do to obtain market share based on what you’ve learned this week.
    1. In response specifically list at least three key factors that would influence the success of the digital retail company, please be specific.
    2. Note a specific market that would thrive given the current market conditions and why.
    3. Discuss how innovation technology will influence the success of this new business.

The paper should meet the following requirements:

· 5-7 pages in length (not including title page or references)

· APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

· A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

computer science

 

c++ program

Part A

use any web site and provide number of Dentists using the following format:

area codes included:

909

714

949

310

818

for each area code get 4 doctors to include the following data:

License number up to 5 digits

Name (last, first )

Specialities (General, surgeon)

Distance

write a menu to allow the user to search for

    Enter 1 to search by area code

     Enter 2 search by distance

   Enter 3 search by speciality

Store data in a text file called “indata.txt”

store the result in a text file “outfile.txt”

Read data from text file

Write a function to search by area code, when the user enter the area code, such as 909, all Dentists with area code 909 will come up ( all data).

Write another function to search by distance ( in this function display all the data and smallest distance with data belong to smallest distance)

Write a search function to look for dentist with specialty ( if the user searches for surgeon), all dentists  with surgeon specialty and its all data including, license number ,names, distance show up

Last function search by license number.

Write a function to display the result(s)

Use Binary search  as a backbone search Function

Discussion

Discussion: 1. Some people say that chatbots are inferior for chatting. Others disagree. 

Discussion:2. Discuss the financial benefits of chatbots.

Milestone assignment

 

In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  Look at reasons  why cryptography was used and how it developed over the years.  Was it used or implemented differently in varying cultures?  

The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  Be sure to view your SafeAssign score. You may submit your paper twice. The assignment must be properly APA formatted with a separate title and reference page. 

System Architecture & Authentication System

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.(600 Words)

System architecture is the descriptive representation of the system’s component functions and the communication flows between those components. 

My definition immediately raises some important questions.

• What are “components”?

• Which functions are relevant?

• What is a communication flow?

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.(600 Words)

What happens when we place the authentication system in our demilitarized zone (DMZ)—that is, in the layer closest to the Internet? 

What do we have to do to protect the authentication system? Does this placement facilitate authentication in some way? 

How about if we move the authentication system to a tier behind the DMZ, thus, a more trusted zone? 

What are the implications of doing so for authentication performance? For security?