Portfolio Assignment – Business Intelligence

 

Portfolio Project: This week discuss a current business process in a specific industry. 

Note the following:

-The current business process itself.
-The industry the business process is utilized in.
– After explaining the current situation, take the current learning from the course and:
– Explain a new technology that the business should deploy. 

– Pros and cons of the technology selected.

Be specific, don’t only note the type of technology but the specific instance of technology.  (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).

– 4-5 pages with minimum of 4 references

Networking Question

 Answer the following questions

  • What is the difference between IPv4 and IPv6? 
  • Why do we have both?  Which is better? 
  • What is a subnet mask? 
  • What is a hostname? 
  • What is a domain name? 
  • What is a FQDN?  What is DNS?  mDNS? DNS-SD?  Dynamic DNS/DynDNS? 
  • What are packets? 
  • What are datagrams? 
  • What are frames?
  •   What is packet switching? 
  • Packet forwarding? 
  • IP forwarding? 
  • Port forwarding? 
  • What is NAT?  ARP?  RIP? 
  • What is the difference between dynamic and static routing? 
  • What is routing? 
  • What are routing tables? 
  • What is a default gateway? 
  • What is TCP? 
  • What is UDP? 
  • How do TCP and UDP matter on networks?
  • What is a 3-way handshake in networking?

Discussion Board, Programming Logic

For this Discussion Board, please complete the following:

Decision-making statements are used to control the flow of the program. For example, you may use a decision-making statement to write a program to determine if a student passes the class based on his or her score. If the score is equal to or greater than 60, the student passes the class. Otherwise, the student fails. Assume that you are the programmer hired by a bank to write a program for its automated teller machines (ATM). Give an example that makes use of a decision-making statement in the program, and answer the following questions:

  • Which decision-making statement will you use, (e.g., if, if-else, or switch) for that example?
  • Why do you use that decision-making statement for that example?

Exp19_Access_Ch09_Cap – Trading Cards 1.0

 Exp19_Access_Ch09_Cap – Trading Cards 1.0

 #Exp19_Access_Ch09_Cap – Trading Cards 1.0

Exp19 Access Ch09 Cap – Trading Cards 1.0

Project Description:

You and your partner Stann Dupp have a small business selling  baseball cards online through eBay. As the more computer-savvy partner;  you created an Access database with records of the cards you have in  stock. As it turns out, Stann was attempting to manage the card  inventory and ended up modifying crucial aspects of the database that  impact the general operation of the database. You will reverse those  changes and create other safeguards to protect from this happening again  in the future. The database tables may already be normalized; however,  you will examine the tables to verify.

Start Access. Open the downloaded   Access database named Exp19_Access_Ch09_Cap_Trading_Cards.accdb.  Grader has automatically added   your last name to the beginning of the  filename. Save the file to the   location where you are storing your  files.

You   will first establish relationships between the Cards, Brands,  and Rarity   tables based on the common fields that they share.
 

  Open the Relationships window. Add the Cards,   Brands, and Rarity tables to the layout.

After   creating a relationship between two tables, you will enforce  referential   integrity, which ensures that the relationship will remain  intact if/when   data is updated in either table. Furthermore, you will  ensure that all   changes to the primary key in your Cards table will  be reflected in the foreign   keys that exist in the Rarity table by  selecting the Cascade Update Related   Fields option.
 

  Create a relationship between the Cards   and Rarity tables tables, ensuring   you check the Enforce Referential   Integrity and Cascade Update   Related Fields options for the relationship.

After   also establishing the relationship between the Cards and  Brands tables, in   the same manner, you will analyze the database to  identify any flaws in the   design as well as suggested low-risk  improvements that can be made to your   database.
 

  Create a relationship between the Cards   and Brands tables, ensuring you   check the Enforce Referential   Integrity and Cascade Update   Related Fields options for the relationship. Save, and close the   Relationships window. Open the Performance   Analyzer dialog box, under All Object Types, click Select All, and then click OK.   Note the idea to relate the Cards table to the others in the database. Close   the Performance Analyzer.

You   will now provide your users with a simple and intuitive way to add and edit   cards by creating a form.
 

  Create a new form based on the Cards   table using the Form tool. Save   the form as Add or Edit Cards.   Close the form.

Now   that you have the Add or Edit Cards form created, you can add  that and the   remaining forms to a Horizontal Tab navigation form. By  doing this, you will   create a one-stop-shop for your users to view and  edit the trading cards in   the database.
 

  Create a navigation form based on the Horizontal   Tabs template. Drag the Add or   Edit Cards form to the first tab position.

Drag   the All Player Cards report to the   second tab position.

Drag   the Bowman Cards report to the   third tab position.

Drag   the Donruss Cards report to the   fourth tab position.

Drag   the Fleer Cards report to the   fifth tab position.

Drag   the Topps Cards report to the   sixth tab position.

Switch   to Form view and test the navigation form. Save the navigation form with the   default name and close it.

You   will finalize the interface for your users by hiding the  Navigation Pane so   that it is out of their way, and setting the  navigation form you created to   open automatically when the database  opens. This ensures that the user’s   experience is seamless and  straightforward.
 

  Set the database to hide the Navigation Pane and open the  navigation form   when the database opens. Close the database and reopen  it observe that the   form opens automatically.

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

OWASP business function operations

 Target the senior-level executives in your organization. • Provide a paper about one of the three Security Practices in the OWASP SAMM 2.0  Business Function “OPERATIONS”: o Incident Management o Environmental Management o Operational Management • Provide the importance of these items and why SAMM assessment needs to be conducted. Instructions: • Write a summary on the Security Practice that you selected of the three in the  OPERATIONS OWASP SAMM 2.0 Business Function. o Describe in full detail. o Also answer these two questions in full detail, clearly demonstrating  understanding with no detail missing:  The importance of these items, AND  Why SAMM assessment needs to be conducted Requirements: • 2–3 page APA paper excluding title and reference pages  • Provide at least two references and in-text citations in APA format (these will preferably  be in addition to the main text)  • College-level writing  • Should be your own work in your ow