Web Development, PHP and ASP Data Collection and Retrieval one page paragraph

 

  1. Identify the topic for this week.
  2. Find three high-quality sources of related information on the Internet. 
  3. Read your chosen high-quality sources of related information.
  4. state your three sources of information.
  5. DESCRIBE each of the three sources of information within a few sentences providing EXAMPLES.
  6. SUMMARIZE with three things about the topic that you want to remember forever.

Discussion : Global Wireless

We looked at networks in general; however, in this discussion we’re looking at wireless networks, mostly focusing on mobile networks.  Mobile networks in a global economy can be a challenge for multiple reasons.  First, governments in other countries control the mobile networks.  Second is the technology.  Mobile networks in other countries might not be as good as the mobile networks within the US.  As a global company, how can we deal with this?  With a big push for 5G, which has speeds well over 2Gbps, how does that change the way you do business?  What are some things you need to think about when it comes to doing business globally, using a wireless mobile network? 

note minimum of 250 words.  At least one scholarly source should be used 

SQL DATABASE SECURITY (CYBERSECURITY)

 For this week’s discussion, talk about why a database needs to be secured. In your initial post, answer at least two of the items in the bulleted list below:

  • Identify three actions that can be applied to a database environment to manage user access.
  • Is there such a thing as “overkill” with security? If so, how? (Provide an example)
  • Explain who should be in charge of making the security decisions for an organization’s database? Why?
  • Define and explain the difference between the authentication modes of at least two of the three database vendors mentioned in the chapter (SQL Server, MySQL, and Oracle).
  • Identify at least five best practices when adding and removing users.
  • Explain the principle of least privilege and how it should be applied within a database environment.

Discussion and Assignment

 

WEEK 7 – DISCUSSION

In no less than 250 words, describe the difference between a fat AP and a thin AP. What is needed to deploy a thin AP? Are there any security considerations to think about between the 2 different APs?

Week 7 – Discussion

Have you or someone you know ever received a chain letter, phishing message, or some other fraudulent message via email? If so, please share this experience. Explain what type of message it was and what you did to get rid of it.(250 words)

Week 7 Assignment

  • 7.1 What is the basic building block of an 802.11 WLAN?
  • 7.2 Define an extended service set.
  • 7.3 List and briefly define IEEE 802.11 services.
  • 7.4 Is a distribution system a wireless network?
  • 7.5 How is the concept of an association related to that of mobility?
  • 7.6 What security areas are addressed by IEEE 802.11i?
  • 7.7 Briefly describe the five IEEE 802.11i phases of operation.
  • 7.8 What is the difference between TKIP and CCMP?

Access control Assignment 8

Discuss the best practices for access control for information systems and how implemented by business.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

Querries

  

1. please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies (300 Word).

2. Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence?  Why or why not? (300 Word)

Health Informatics & Inform System – Assignment 6

Questions:

1.      Discuss the changes in home health devices over the past 10 years

2.       Research a mobile health app of your choice and discuss its potential impact on healthcare

3.       Discuss the pros and cons of using electronic communications between providers and patients

I expect 3 pages of fact-based material to answer these questions.

Paper should be APA formatted with citation.

Discussion 8

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 8  (Jamsa, 2013). Chapter 8 topics:

  • Define and describe virtualization.
  • Defend the following statement: Virtualization is not a new concept within computer science.
  • Describe the various types of virtualization.
  • List the pros and cons of virtualization.
  • Discuss the attributes of applications that are not well suited for virtualization.
  • List reasons why companies should virtualize.
  • List the benefits of blade servers.
  • Define and describe the hypervisor.
  • Define and describe green computing.
  • Describe the concept of the desktop on-demand, and include the benefits of such a system.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

Professional ethics in computing

 In a COVID-19 situation identify the guidelines for ethical use of the computers and networks in any organisation. 

Please discuss the NETIQUETTE technique and explain how it can help professionals to embrace ethical use of networks in the current pandemic situation. You need to use some cases in the discussion to add value to your discussion. 

discussion 11/14

 

Review the Video below, and discuss what tips, or procedures your organization has planned to use or those from the video that they should incorporate into their plan.

Cybersecurity Protections Following a Disaster (Youtube.com)