I need help with a course project. I need it done by the middle of next week.
Discussion Board
The bike shop that you outfitted with hardware, software, and operating system back in an earlier assignment has grown. Now the owners need you to use your knowledge of data storage and databases to manage this growth. Prepare a report in which you explain to the owner the options for data storage, database development, and data security and recommend an overall solution for the organization.
In your report, address the following:
- Explain the differences between in-house data storage and cloud storage.
- Describe the advantages of each storage method for a business organization.
- Explain the differences between databases and spreadsheets.
- Be sure to discuss what makes a database relational.
- Recommend a solution for data storage and system development.
- Support your recommendation based on a critical analysis of alternatives. For example, how would a database help to better manage the bike shop’s inventory, payroll, pricing, and expenses over spreadsheets?
- Describe best practices for database security and data backups.
- Cite authoritative sources to support assertions.
- Organize the report so ideas flow logically with smooth transitions.
IT470: Computer Security Fundamentals
Discussion 1
22 unread replies.22 replies.
After reading the assigned chapter please answer the following questions. Make sure you ask a question and answer another student question as well.
1) How is personal information safeguarded? Provides some standard procedures mainly used by businesses to safegaurd their data. 2) What are the vulnerabilities? Provides some examples. 3) What do we mean by secured system? Name some of the best practices for securing your personal computer.
Please, with 300 words plus, elaborate on each of these attacks and provide genuine examples and with supporting facts.
To Ensure Getting a Full-Grade, check the Rubric as I will be using it to grade you!!!
Anything copied from the internet or copied from another student will result in ZERO grade for both students. I will be checking all work against plagiarism.
Research Paper
Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.Your paper should meet the following requirements:
- Be approximately four to five pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Activity to do
Learn About Learning Styles.
Barbara Soloman and Richard Felder at North Carolina State Universityhave researched different learning styles. They created an instrument to assess learning styles on these 4 dimensions:
1. Active/reflective
2. Sensing/intuitive
3. Visual/verbal
4. Sequential/global
Find out more about each of these learning styles at their website (www.engr.ncsu.edu/learningstyles/ilsweb.html (Links to an external site.)). Answer their Index of Learning Styles (ILS) questionnaire (there are no right or wrong answers) to learn more about your learning style. PrtScn/ snapshot your results( I attached two Screen Shots for me and my friend Martin). Compare your scores on the ILS questionnaire with the scores of 1 coworker(attached file Martin use it ). Write a summary paragraph (10 sentences) of the results you observed and what the results mean for you as a trainee.
In your summary, INCLUDE (in the 10 sentence paragraph) the answer this question: “Does any one of the training methods described in this chapter meet the needs of all the different learning styles that Felder and Soloman describe on their website?” Why or Why not (explain in 1 paragraph/5 sentences).
Apply: Control Assessment
Assignment Content
- You are the auditor in charge of the Gail Industries audit. It is your responsibility to prepare a control table that will be used to evaluate all controls and the associated policies and processes for the company. Provide information for an accurate review of the monitoring that protects the areas within the control.
Read the Gail Industries Case Study.
Create a table that lists the 8 controls from the Gail Industries case study. Determine the applicability of each control based on the elements provided. Identify how the control (e.g., door security, entry log file) functions in the case study. Support the applicability of the controls to perform the tasks assigned with at least 2 outside sources to validate the controls.
Format your citations according to APA guidelines.
Submit your assignment.
discussion 2
due tonight by 11:59 PM EST…200 words
What are three important online discussion lists or bulletin boards read by people in the cybersecurity field? How did you find them? What major issues are being discussed in each? Which of them do you consider to be most useful? Please provide links to the discussion lists.
discussion
refer to the attached document:
Some thoughts to help you understand:
Think about the basic features of Facebook. Facebook develops features to maximize the amount of social interaction on its site by connecting users to one another whether they want to be connected or not. Review the list of marketing tools currently being used by Facebook (Table 7.2 in the text). Consider the following questions about Facebook and other Social Marketing platforms.
- Which Facebook marketing tools do students find are the most effective in their personal lives?
- Do students pay attention to Facebook ads?
- Are students interested in what their friends buy?
- Do students trust their friends to recommend products?
- What kinds of products would their friends’ choices impact?
In C Program. Write functions for the four basic mathematical
In C Program. Write functions for the four basic mathematical operations addition, subtraction, multiplication and division. Each function has two numbers as parameters and returns the result. use integers. You do NOT have to do rounding for the division.
Write a program that asks the user for numbers a and b, and then use these numbers as arguments for your functions and print the result on the screen.
The output has to be as follows:
Give a: 11
Give b: 5
11+5= 16
11-5 = 6
11*5 = 55
11/5 = 2