Database – Discussions

Create a discussion thread (with your name) and answer the following question(s):

Discussion 1 (Chapter 15): What is meant by the closure of a set of functional dependencies? Illustrate with and example.

Instructions:  Your response to the initial question should be 250-300 words.  Next respond to two postings provided by your classmates. The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often. You are require to create your initial thread in order to view and respond to the threads posted by other students.  There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post as needed.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Qualitative Data Collection and Analysis

 

1(100 WORDS). What is discourse analysis? Give an example of how this could be used in a research study.

For example, using discourse analysis to study the social interaction of Pokemon Go users. One could collect conversations of user discussing community event days to understand what motivates them to join in on those days.

2(WORDS). What is data collection? What types of qualitative data do you think you could collect and why? (choose just 1-2 to discuss)

3(WORDS). What is the purpose of coding your data? Select one type of coding strategy mentioned in this week’s materials and describe how it can be used in a (or your) research study. 

short answer

 In order to be an effective developer, one must be able to write applications for both the Web and for local devices. Web development comes with its own unique set of issues and problems. After doing some research on the Internet, describe three coding issues that you, as a developer, feel are the most important to overcome. 

Cryptography

In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  

The writing assignment requires a minimum of two written pages to evaluate the history.  

You must use a minimum of three scholarly articles to complete the assignment.  

The assignment must be properly APA formatted with a separate title and reference page.

How Secure are VPNs? ((Research paper)) ( 8 pages not including reference and cover page and with 8 references)

 Topic ((How Secure are VPNs?))

  • Identify the problems associated with the topic you selected.
  • Identify a company/organization that is/has dealt with these problems with the topic you have selected. 
  • Select the major problems with the topic that is selected.
  • Suggest all possible solutions to these major problems.
  • Recommend the best solution to be implemented.
  • Detail how this solution should be implemented.

Use the following outline to complete your Project:

1. Synopsis/Executive Summary

  • Outline the purpose of the Project (What are you trying to solve?)
  • Outline the issues and findings of the project without specific details.
  • Identify the theory that will be used.
  • Note any assumptions made (you may not have all the information you’d like so some assumptions may be necessary e.g.: “It has been assumed that…”, “Assuming that it takes half an hour to read one document…”).

2. Findings

  • Identify the problems found in the project by: 
    • analyzing the problem, supporting your findings with facts given in the case, the relevant theory, and course concepts.
    • searching for the underlying problems
  • This section is often divided into sub-sections.

3. Discussion

  • Summarise the major problem/s.
  • Identify alternative solutions to this/these major problem/s.
  • Briefly outline each alternative solution and evaluate its advantages and disadvantages.
  • There is no need to refer to theory or coursework here.

4. Conclusion

  • Sum up the main points from the findings and discussion.

5. Recommendations

  • Choose which of the alternative solutions should be adopted.
  • Briefly justify your choice explaining how it will solve the major problem/s.
  • This should be written in a forceful style as this section is intended to be persuasive.
  • Here integration of theory and coursework is appropriate.

6. Implementation

  • Explain what should be done, by whom, and by when.
  • If appropriate include a rough estimate of costs (both financial and time).

7. References

  • Make sure all references are cited correctly.

Assignment

 Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 2-3 paragraphs, briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.