Relational Algebra and SQL

 

After studying the required materials on relational algebra and conducting your own research, discuss:

  • What is relational algebra?
  • What is the connection between relational algebra and SQL. Use at  least two examples to compare the syntax of relational algebra and SQL  statement.

Please be sure to have a minimum of 200 words or more in your discussion.

Create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company

  

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Easy Own words

Chapter 7 – Read the Running Case at the end of the chapter.
Each team member will complete the 3 tasks for this case project and submit individually.

Running Case Chapter-7:

You and your team are continuing your work on the Global Treps Project. Your project sponsor,

Dr. K., has asked you to refine the existing cost estimate for the project so you can evaluate

supplier bids and have a solid cost baseline for evaluating project performance. Recall that

your schedule and cost goals are to complete the project in six months for under $120,000.

You planned to use up to $50,000 total to pay yourself and your team members, and your initial

estimates were $30,000 for travel expenses, $20,000 for hardware and software, and $20,000 for

organizing four events, including consultants, legal/business fees, etc.

Tasks:

1. Prepare and print a one-page cost model for the project, similar to the model provided in

Figure 7-2. Use the following WBS or the WBS you developed in Chapter 5, and be sure to

document your assumptions in preparing the cost model. Assume a labor rate of $20/hour

for yourself (the project manager) and team members (Kim, Ashok, and Alfreda). You will pay

Bobby, your IT guy, $30/hour. The project will fund refreshments for the four shark tank like

events and prizes for the winners, at a cost of $1,000 for each event.

1.1 Project management

1.2 Hardware (3 laptops and Internet access for Kim, Ashok, and Alfreda)

1.3 Software

1.3.1 Outsourced

1.3.1.1 Domain name and site hosting

1.3.1.2 Donation acceptance feature of website

1.3.1.3 Video creation for website

1.3.2 In-house Development

1.3.2.1 Guidelines and templates for events

1.3.2.2 Acceptance of ideas for needed new products or services

1.3.2.3 Custom site for 20 events

1.3.3 Testing

1.4 Business Plan

1.4.1 Internal labor

1.4.2 Legal information/assistance

1.5 Travel

1.6 Events

1.6.1 Internal labor

1.6.2 Consultant labor

1.6.3 Refreshments

1.6.4 Prizes

2. Using the cost model you created in Task 1, prepare a cost baseline by allocating the costs

by WBS for each month of the project.

3. Assume that you have completed three months of the project. The BAC was $120,000 for

this six-month project. You can also make the following assumptions:

PV $60,000

EV $55,000

AC $50,000

a. What is the cost variance, schedule variance, cost performance index (CPI), and

schedule performance index (SPI) for the project?

b. How is the project doing? Is it ahead of schedule or behind schedule? Is it under budget

or over budget?

c. Use the CPI to calculate the estimate at completion (EAC) for this project. Is the project

performing better or worse than planned?

d. Use the SPI to estimate how long it will take to finish this project.

e. Sketch an earned value chart using the information from your answers to parts a through

d. Use Figure 7-6 as a guide.

Chapter 8 – Read the Running Case at the end of the chapter.
Each team member will complete tasks 1 and 2 for this case project and submit individually.

Running Case Chapter-8:

Part 5: Project Quality Management

The Global Treps Project team is working hard to ensure they meet expectations, especially

for the people who will be holding and participating in the four events. The team has a detailed

scope statement, but you want to make sure you are not forgetting requirements that might affect

how people view the quality of the project. You know that the project’s sponsor and other key

stakeholders are most concerned with getting people to use the new website, having successful

events, and helping promote entrepreneurship across the globe. You also know that various

geographic and cultural issues will need to be addressed.

Tasks:

1. Develop a list of quality standards or requirements related to meeting the stakeholder

expectations described in the running case. Provide a brief description of each requirement.

For example, two requirements related to the new website might be that users can read

the content in several different languages and that users provide good ratings for the online

video training.

2. Based on the list you created for Task 1, determine how you will measure progress on

meeting the requirements. For example, you might have people take a survey after they view

the online training videos to collect feedback.

 ***I attached text book for reference. Question is from Chapter-7 & Chapter-8***** 

Need to complete given Tasks in both cases. Please take care of Plagiarism.

Use case

Implementation of AI in the business transaction of software monitoring

1.  Drivers

2.  Study details (One paragraph of each)

  a.  Provide a breakdown of the 5 W’s (Who, What, When, Where and Why)

3.  Recommendations & results

———-

Overview of the Use-Case:

In recent years, software applications have evolved to be more complex, dynamic, and distributed in nature. Our company houses a large number complex applications distributed across its ecosystem. Therefore, monitoring these applications have become a tedious, complex and costly task. Having a real time end-to-end business transaction monitoring solutions is very important, as this will help proactively identify any issues related to its services and expedite its resolution. 

Gartner defines Application Performance Monitoring (APM) as “a suite of monitoring software comprising digital experience monitoring (DEM), application discovery, tracing and diagnostics, and purpose-built artificial intelligence for IT operations”. APM is the practice of proactively monitoring the many aspects of an application environment in order to identify and mitigate issues before they become major problems.

Our goal in this use-case is to study how the company can leverage Artificial Intelligence (AI) in APM to detect abnormalities or future issues in business transaction and proactivity resolve them.

banner

Concept paper

 

Week 4 Concept Paper

Hide Assignment InformationInstructions

banner

Week 4 Concept Paper In week 4 for students will write a concept paper to support their reasoning for choosing their topic for their final project in week 7.

In other words, in week 4 you are going tell the reader (the instructor) why you think your topic for your final project is worth doing. You are going to justify this as a proposal. Here is the purpose of writing a concept paper:

Purpose of a concept paper

The topic for your week 4 concept paper will be the same as your final project; they are linked together. The week 4 concept paper justifies the writing of your final project.
Requirements

Submit a 3 page concept paper IAW APA format on an approved topic (see pre-approved topics in the syllabus). Paper organization will include (use as headings):
 

  • Coversheet
  • Introduction.
  • Problem Statement.
  • Relevance and Significance.
  • References (at least five).

Pre-approved research topics: 

  • Authentication/Digital signatures
  • Data collections tools (hardware & software)
  • E-business/e-commerce security
  • End user security issues.
  • Government vs. commercial organization security issues.
  • HIPAA
  • Identity Theft
  • ID&IH Management and Legal Issues
  • Instant Messaging security.
  • Intrusion detection.
  • Sarbannes Oxley
  • Security Threats & Vulnerabilities
  • Wireless technology security

Computer Architecture Report (7 pages research paper)

Write a research paper on ‘RISC-V’ microprocessor in a simplified ACM format using the guidelines provided in the attached documents. There are 3 attached files in this assignment. Make use of the project abstract and include it in the paper, follow the ACM template for writing the research paper, and other requirements mentioned in the file ‘Computer_Architecture_Report’. Plagiarism is NOT ACCEPTABLE for this task and turnitin report will be checked. Feel free to ask any questions regarding the project.

PowerPoint Presentation (40 SLIDES) & Academic Script

DUE in 15 HOURS!! STRICT DEADLINE

Make a professional PowerPoint Presentation (40 SLIDES) & Academic Script of the presentation.

NO PLAGIARISM WILL BE TOLERATED!

Submission:

1 Microsoft PowerPoint Presentation file (pptx) (40 Slides)
1 Microsoft Word Document Script file (docx) see attached – “Script Template Presentation” – YOU NEED TO COMPLETE THIS AS WELL.

“PLEASE SEE ATTACHED WRITTEN REPORT & USE THAT TO MAKE THE PRESENTATION”

Microsoft Access

 

  1. a query and report that shows the total number of pets at the animal shelter and how many pets by type example how many cats, dogs etc  discussed in class.
  2. a query and report that shows the youngest and oldest pet show the number of oldest and youngest.
  3. a query and report that shows total count of how many M and F pets are in the animal shelter.

* young and old pets is total count* 

 

penetration testing

Do a bit of research on penetration testing techniques. Investigate and document the following

  • Five network penetration testing techniques
  • Advantages and disadvantages of each
  • One notable social engineering test
  • Possible negative implications of penetration tesing

Please write between 200 and 300 words