DSBDA W 1 D
In this week’s reading, the concept of 3-F Method is introduced. Discuss the purpose of this concept and how it is calculated. Also perform your own research/analysis using these factors and provide your assessment on whether the United States need to introduce top talents in the field of big data and cloud computing by using bibliometrics.
Week 8 Assignment 2 Create an ERD
Week 8 Assignment 2 Create an ERD
Create an ERD
Preparation
In this assignment, you will be drawing an Entity Relationship Diagram (ERD) or Database Design Diagram. The following videos and documents will assist you:
Entity Relationship Diagram (ERD) Tutorial – Part 1.
Entity Relationship Diagram (ERD) Tutorial – Part 2.
Ultimate ER Diagram Tutorial (Entity Relationships Diagrams).
Scenario
Suppose a local college has tasked you to develop a database that will keep track of students and the courses that they have taken. In addition to tracking the students and courses, the client wants the database to keep track of the instructors teaching each of the courses.
Instructions for the Database Design Diagram
Use any drawing package or any other application you know such as Visio, Word, PowerPoint, or another tool to create the Database Design Diagram. Otherwise, you may draw the diagram by hand with a pen and paper. If you draw the diagram by hand, then take one or more pictures of the diagram with your cell phone or laptop camera, place the images into a Word document, and submit the document. Otherwise, if you use software to create the Database Design Diagram, then take one or more screen captures of the diagram, place the screen captures into a Word document, and submit the document. Submissions that are not in .doc or .docx format will not be graded.
Include the following in the document:
Draw the entities of the database and the attributes of each entity, based on your research and/or common knowledge of a college and the information tracked by a college.
Create the appropriate relationships between each entity within the diagram.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
The specific course learning outcome associated with this assignment is:
Draw a database design diagram that depicts the attributes and relationships of the entities.
Note: All Assignments must be submitted into Blackboard. The whole Assignment (e.g. Assignment 1, 2, and 3) which includes both required images and written portion must be submitted into “one” MS Word document. All images pasted/copied into the MS Word document must contain an image label as to what the image represents. Assignments not submitted into “one” MS Word document will not be graded. Students must apply labels to their Database individual screen shots for Assignment 3.
This Video will help you understand “Assignment Two’s” challenge:
Watch Media
By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
Institution Release Statement
Networking
1.How many valid host addresses are on the network 172.16.41.0/27? (2 points)
a. 65,534
b.30
c.14
d.254
and so on
please open attached file to see rest of the question
4s week 12 S assignment EH
Each 150 words.
Assignment Questions:
- What is multifactor authentication and what are some examples?
- Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim. Explain how multifactor authentication works.
- List 5 reasons to turn on multifactor authentication?
- Provide at least two additional links to articles related to multifactor authentication.
Include references.
Strictly no copy-paste. Plagiarism results in course termination.
Multi-Touch Screens Versus Mouse-Driven Screens
Multi-Touch Screens Versus Mouse-Driven Screens
Resources
The following resources may be helpful when completing this assignment.
- Human-Centered Design Considered Harmful.
- Activity-Centered Design: Why I Like My Harmony Remote Control.
Scenario
Computer applications that run on desktop and laptop computers have, for a long time, been designed to be driven by dragging and clicking a mouse. With the introduction of tablet personal computers, the trend has shifted toward using touch-based screens. We now have access to touch-based TVs, touch-based monitors, touch-based laptops, and touch-based tablets. Touch and multi-touch devices provide end users with the ability to interact physically with an application much more naturally.
Imagine that you are the Information Technology Director of a major chain restaurant, and you have been assigned to design a menu ordering application that can run on all devices. Examine whether using a touch-screen monitor, a tablet, or a mouse to select menu items to place an order would be most efficient. Speculate how employees would interact with these devices and the type of emotional reaction that customers and employees will experience while placing a beverage, appetizer, or entrée order.
Instructions
Write a 4–5 page paper in which you:
- Differentiate between the interaction types and styles that apply to multi-touch screens and applications running on them.
- Determine the conceptual model that you would use when designing a product for your restaurant.
- Describe the key analogies and concepts these monitors expose to users, including the task-domain objects users manipulate on the screen.
- Determine one utility or tool in an application for touch-based and mouse-driven screens that should be designed with memory retention or recall. Provide a rationale for your response.
- Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. You may use the resources above or others of your choosing.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
The specific course learning outcome associated with this assignment is:
- Analyze the functionality required to allow an application to run on multiple types of devices.
Internet Privacy
In order to complete assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #1). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.
Privacy is a concept that is rapidly evolving in relation to the most public of mediums, the Internet, which became even more super-charged with social networking websites. In a recent California election, one ballot measure, Proposition 8, asked voters a question on marriage. Donors to the Prop 8 campaign found that their names, addresses, and amount of contribution were masked up with Google Maps and thus rendered into a format showing the world a map image of donors’ names, street addresses, and dollar contributions. All this data is public record information already, but still quite inconvenient to access. What are the side effects of this action?
Business Intelligence – End-of-Chapter questions
Chapter 5 – Discussion question #1, #2, #3, & #4 and
Exercise #6 and
Internet Exercise #7 (go to neuroshell.com click on the examples and look at the current examples. The Gee Whiz example is no longer on the page.)
Chapter 6 – Discussion question #1, #2, #3, #4, & #5 and
Exercise 4
– Each answer must be at least 100 words
– 2 references apa format
– no plagiarism
– write only answers, do not mention questions
Week 8 Assignment
Complete the following assignment in one MS word document:
Chapter 14–discussion question #1, #3, #4 & exercise 2
APA in-text citations) to support the work this week.
All work must be original (not copied from any source).
Discussion Question:
1. Some say that analytics in general dehumanize managerial activities, and others say they do not. Discuss arguments for both points of view.
3. What are some of the major privacy concerns in employing intelligent systems on mobile data?
4. Identify some cases of violations of user privacy from current literature and their impact on data science as a profession.
Excercise:
2. Search the Internet to find examples of how intelligent systems can facilitate activities such as empowerment, mass customization, and teamwork.