a rectangle
Data analysis
Develop an APA-formatted paper that presents a detailed analysis and research-based information pertaining to ALL the following topics:
- Describe the two key abilities brought by the data discovery technology.
- List and explain types of data flaws and techniques and methodologies used to mitigate the risks that may be introduced by the flaws of the data and make data more meaningful to organizations.
- List and demonstrate the types of the data applicable to different industries by looking at successful case studies of well-known organizations.
Discussion question
Discuss what is Network capacity Planning and how do you measure/determine the capacity of your network? Are there any tools to assist you in network capacity planning?
DSRT topic
Information technology in the workflow of business processes is the topic
In a minimum 5-pages, develop an introduction where you clearly explain the overall research topic, literature gathering process, and the scope and organization of the literature review. The introduction should conclude with a paragraph that describes the sequence of the literature you will include and the literature analysis process. After the introduction, you should incorporate possible headings/subheadings that you plan to cover and include at least 20 scholarly references.
Deadline is in 3hrs
everything should be in apa format
and can i have turnitin report
Executive Summary on Risk Mitigation
Given the information presented in Lesson 1 and the materials from “Assignment: Executive Summary on Risk Analysis,” your task for this assignment is to:
- Identify at least five risks to the IT resources.
- Write an executive summary report that describes:
- The importance of a security policy
- Methodology to implement the policies to mitigate the identified risks
Required ResourcesMaterials from Assignment: Executive Summary on Risk AnalysisSubmission Requirements
- Format: Microsoft Word
- Font: Arial 10-point size, Double-space
- Citation Style: Follow your school’s preferred style guide
- Length: 500 words minimum
Evaluation Criteria and Rubric
- Incorporate the risk analysis executive summary from Lesson 1
- Support the importance of a security policy in the executive summary
- Suggest methodology to implement the policies to mitigate the identified risks
scheduler of a computer system
This Assignment is an implementation of a small simulation program. It is a simulation of a process scheduler of a computer system. This simulated scheduler is a very small, simplified version, which reflects some of the basic operations of a typical process scheduler.
To successfully finish the program, you are expected to:
know how to define and use a user-defined comparator
knowhow to use Java’s PriorityQueue.
know how to write a small simulation program.
Database Management ER Diagram and SQL workbench.
Part 2: – Project Implementation – due Nov 20st @ 11:00 pm:
Report 2 Contents:
1) Project goals.
2) Database description: A general description of the database, what data is stored in the database.
How the database will benefit the users.
3) Data model & design:
o Completed ER/EER diagram; 8 tables
MUST use https://www.draw.io to draw the ER diagram, and then take a
snapshot.
Include a snapshot of the diagram in the report.
o Business rules.
o Data dictionary: For each one of the tables, list columns, data types, column restrictions,
column descriptions.
4) Implementation:
o Use MySQL Server and MySQL Workbench to create the database/tables.
Include a snapshot of the SQL code in your report
o Populate the each table with a minimum of 20 rows of sample data. Make sure the
entered data is descriptive (not just random numbers and letters.
Include a snapshot of the SQL code in your report.
o Use MySQL Server and MySQL Workbench to write/run the SQL queries below. For
each query, provide the following in Report 2:
Snapshot of the code and the output in the report.
In about 2 lines, explain what the query returns.
Queries:
1 trivial query. Simple select with ordering.
2 medium difficulty queries. Queries that use composite condition for selection,
computations, aggregate function and grouping.
1 query that uses subquery.
2 queries that uses join (1 inner join, 1 left or right outer join).
1 view (query must use join – hint: you can use one of the queries from the
previous question).
1 query that uses union.
1 custom stored function.
1 custom stored procedure.
Need the Assingment
Please find the attachement
Jaba programming
Ship, CruiseShip, CargoShip Classes, and Displayable Interface
Design an abstract Ship class that has the following members:
• A field for the name of the ship (a string).• A field for the year that the ship was built (a string). • A constructor and appropriate accessor and mutators.• A toString method that displays the ships name and the year it was built.
Design a CruiseShip class that extends the Ship class. The CruiseShip class should have the following members:
• A field for the maximum number of passengers (an int).• A constructor, a copy constructor, and appropriate accessors and mutators.• A toString method that overrides the toString method in the base class. The CruiseShip class’s toString method should display only the ship’s name and the maximum number of passengers.
Design a CargoShip class that extends the Ship class. The CargoShip class should have the following members:
• A field for the cargo capacity in tonnage (an int).• A constructor, a copy constructor, and appropriate accessors and mutators.• toString method that overrides the toString method in the base class. The CargoShip class’s toString method should display only the ship’s name and the ship’s cargo capacity.
In a driver program (shipDemo.java)
• Demonstrate the classes in a Ship array. Assign various CruiseShip and CargoShip objects to the array elements. The program should then step through the array, calling each object’s display method. (polymorphism)• Create an ArrayList of Ship objects and add various CruiseShip and CargoShip objects to the array list. The program should then step through the array list, calling each object’s toString method. (polymorphism)• Test your copy constructors in both CruiseShip and CargoShip in shipDemo.java
Interface to your lab 3 (Ship implements Displayable).
public interface Displayable
{
void display();
}
Resource:
• UML• Sample Program (OOP_example_2)
Deliverables:
• Displayable.java (10%)• Ship.java (20 %)• CargoShip.java (15%)• CruiseShip.java (15%)• ShipDemo.java (30%)• Screenshot (10%)
Note: Sparingly comment your java source code, save all the files in your_lastname_lab_3 folder, zip it, and upload for grading.
Thank you!
How companies or organizations use digital or social media to effectively communicate ideas, information, arguments, and messages to achieve a specific goal.
The use of digital and social media can have a profound effect on society. This project requires you to research and report on an organization or company who has used or is using digital or social media to create a profound effect, impact, or influence on others.