Please follow instruction as mentioned in attach doc and work on that.
Database – Discussions
Create a discussion thread (with your name) and answer the following question(s):
Discussion 1 (Chapter 25): How do you define big data? What are the implications from the three industry trends (Three V’s), presented in the textbook, by the Gardner Group? Three V’s presented in the textbook are as follows: Volume, Velocity, and Variety.
Instructions: Your response to the initial question should be 250-300 words. Next respond to two postings provided by your classmates. The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often. You are require to create your initial thread in order to view and respond to the threads posted by other students. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post as needed. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.
importance of data in organization
Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper. Your paper should meet the following requirements:
- Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
- Follow APA 7 guidelines. It should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
- Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Successes of Knowledge Management Systems
The research paper must be at least 15 pages supported by evidence (citations from peer-reviewed sources).
• A minimum of four (4) peer-reviewed journal citations are required.
1. Chapter 1 illustrates the document details of the research report and constitutes Background/Introduction, Problem Statement(s),
Goal(s), Research Question(s), Relevance and Significance, Barriers and Issues related to topic chosen.
2. Chapter 2 should consist of student paraphrasing the cited research material (i.e. what happened in case study x).
3. Chapter 3 should be the reasoning for doing a basic compare/contrast or
advantages/disadvantage of what was stated in Chapter 2 (do not state because the professor said so).
4. Chapter 4 is a complete analysis, synthesis, and evaluation of what was stated in chapter 2. In effect, chapter 3 is a statement of what will be done
and chapter 4 is what was done and what the findings were. Again, thus far the writing is objective and must not contain student opinion.
5. Chapter 5 states results, conclusion, and future work recommendations.
week3 journals: continuous to week1 & week2. Please find the attached documents
I already had 2 journals for this topic, and this is the continuation of those two journal documents.
Please reflect on dissertation progress.
Min 2 pages
Deadline 12 hours from now
No plagiarism
Apa format
Can I have Turnitin report as well.
And here my topic: The topic for the research is “Impact of Information technology on productivity.
A mesh network is a local network topology in which the infrastructure connect directly, dynamically and non-hierarchically to as many other nodes as possible and cooperate with one another to route data throughout the local network
A mesh network is a local network topology in which the infrastructure connect directly, dynamically and non-hierarchically to as many other nodes as possible and cooperate with one another to route data throughout the local. network. 1) Discuss the advantages and disadvantages of a Mesh Network AND 2) comment on the its topology comparing it to STAR, RING, and BUS Topology.
Should be more than 350 words
Exp19_Excel_Ch04_Cap_Tech_Support
Exp19_Excel_Ch04_Cap_Tech_Support
Exp19 Excel Ch04 Cap Tech Support
Project Description:
You have been hired as a student assistant in the IT department of your University. As part of your responsibilities, you have been asked to enhance the Excel workbook used to analyze the departments performance. The workbook contains records of all support issues resolved over the past year. You will convert the data to a table, format the table, sort and filter the table, insert calculations to evaluate key performance indicators, and prepare the worksheet for printing
Download and open the file named EXP19_Ch04_Cap_TechSupport.xlsx. Grader has automatically added your last name to the beginning of the filename.
Freeze Panes so the first row containing column headings (Row 5) on the SupportCalls worksheet will remain static when scrolling. Ensure that Rows 1-4 are visible.
Convert the data to a table, name the table SupportCalls, and apply the Gold, Table Style Medium 12.
Remove duplicate records.
Add a new column to the table named Duration.
Create a formula using unqualified structured references to calculate the days required to resolve the incident (Date Resolved – Date Created).
Add a total row to display the Average days required to resolve an issue.
Sort the table by Agent Name in alphabetical order, add a second level to sort by Description, and create a custom sort order as follows: Will not power on, Virus, Printing Issues, Software Update, Forgotten Password. Add a third level to sort by Duration smallest to largest.
Mac users, to create the custom list, from the Excel menu, click Preferences. In the dialog box, click Custom Lists.
Filter the table to only display closed incidents as indicated in the status column.
Use Quick Analysis to apply the default Data Bars conditional formatting (Solid Blue Fill) to the Duration column (range I6:I85). Mac users, on the Home tab, click Conditional Formatting, point to Data Bars, and under Solid Fill, click Blue Data Bar.
Create a new conditional format that applies Red fill and bold font to incident (range A6:A85) that required 30 or more days to resolve. Be sure to use relative cell references in the conditional format formula.
Change page breaks so page 2 begins with the Computer ID column (column E).
Set the print scale to 85%.
Add a custom footer with your name on the left side, the sheet name code in the center, and the file name code on the right side.
Save and close the workbook. Submit the workbook as directed.
INT 2240 Lab 1
Lab ONE
Problem Statement: Given four non-negative integers, display the integers using the IPv4 address format.================================================================================================
Input Data:
- Have the user enter 4 non-negative integers at the keyboard
- Each integer must be between 0 and 255
- If any of the integers is less than 0 or greater than 255,
- display an error message
- have the user do the
- inputting again, until the data in the proper range is entered
Proessing:
- Set up a set of nested loops
- The outer loop should control whether the user wants to continue or not
- If the user wants to continue with the processing,
- Set up the inner loop(s)
- Have the user repeatedly enter 4 integers, one at a time
- If an entered integer is not in the proper range,
- display an error message and have the user do the inputting again,
- until the data in the proper range is entered
- Display each of the non-negative integers, along with an appropriate message
- Display the integers formatted as an IPv4 addressad
- Have the user repeatedly enter 4 integers, one at a time
- Set up the inner loop(s)
Output Data:
- Display each of the non-negative integers, along with an appropriate message
- Display the integers formatted as an IPv4 address
Lab 1 – Sample Program 1.pdf Lab 1 – Sample Program 1.pdf – Alternative Formats
================================================================================================.
Your lab will be graded on whether it’s been set up as a complete and workable solution.
For your solution to be complete, your program must be able to
- Set up code to do the following:
- prompt the user for the input data asked for (as explained above within the Input Data section)
- If the data is not valid, then let the user know and try again
- Once valid data is entered, set up the entered data, formatted as an IPv4 address
- Repeat the above process as needed
- compile (ie, no syntax error(s))
- run (ie, no run-time error(s))
- provide the output data (as explained above within the Output Data section) to the user
For your solution to be workable,
- Your solution should be free of any type of errors (syntax, run-time, logic)
- you may want to develop an algorithm first, using pseudocode
- you do NOT need to turn in any algorithm
==========================================================================================================================Grading rubric:
- You’ll receive full credit, if
- your program
- compiles and runs with no problems
- produces the expected output
- your program
- You’ll receive partial credit, if
- your program
- compiles and runs with no problems
- produces partial output (that is, incomplete output)
- your program
- You’ll receive 25% of the points, if your program will not compile
- You’ll receive 30% of the points, if your program compiles but has a run-time problem
- You’ll receive 40% of the points, if your program produces logic error(s)
Write a function called
Write a function called strcmp373, which compares two strings in precisely the same way that strcmp does in the C library
int strcmp373(char *string1, char *string2);