DQ

Think about the last time you utilized a mobile application or attempted to build your own mobile website.  What planning process did you go through before you began your project?  You may have considered the steps or tasks you needed to perform.  You may also have considered the resources and platforms needed for your outcome.  For example, which model fits your business domain needs?  Do you have time constraints that will make completing the web application/site difficult within a reasonable period of time?  You may also have considered the myths that surround developing mobile apps and the difficulties generally associated with mobile app development.

  • Why is mobile development difficult?  Explain
  • How does design & utility make a difference between good vs great websites? Explain
  • How is deciding between a mobile application vs a mobile website an important consideration by developers? Explain.

cloud

Use only 50-words per topic to discuss and present your answer.   

The discussion questions this week are from Chapter 9  (Jamsa, 2013).You are required to use at least two sources (besides your textbook) to answer the above questions.

  • List the security advantages of cloud-based solutions.
  • List the security disadvantages of cloud-based solutions.
  • Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
  • Lit and discuss an AWS security service.

Presentation on Enterprise System and Enterprise Architecture Considerations

PowerPoint 

Thesis statement 

• 3-6 slides that provide an evaluation of what each organization did right and what it did wrong; and compare and contrast the organizations

• 1-4 slides on positioning of these case studies for their ability to enable the architecture (i.e. are the “hooks” in place to enable EA?) Very important!

And make sure to not make the slides too detailed as the professor instructed to have the majority of the info added as a note in the slide

1 page of text

 

  1. Problem statement: what kind of problem is presented by the authors and why this problem is important?
  2. Approach & Design: briefly describe the approach designed by the authors
  3. Strengths and Weaknesses: list the strengths and weaknesses, in your opinion
  4. Evaluation: how did the authors evaluate the performance of the proposed scheme? What kind of workload was designed and used?
  5. Conclusion: by your own judgement.

Exp19_Access_App_CapAssessment – Student Loans 1.0

Exp19_Access_App_CapAssessment – Student Loans 1.0

  

Exp19_Access_App_CapAssessment – Student Loans 1.0

Project Description:

Quill Financial Services has recently started working with student loans. You will build the company’s database. The initial set of financed student loans are stored in an Excel spreadsheet. You have already compiled the list of colleges and universities into an Access table. You will use your expertise to import the information from Excel, modify the table, create relationships, create queries, create forms, and create reports.

     

To   start, you have been provided with a database the Information Technology   department created. The database has one table. You will be importing an   Excel spreadsheet into a table   and creating a primary key. 

Start Access. Open the   downloaded Access file named Exp19_Access_Ch03_CapAssessment_Student_Loans.accdb.

 

Import the exploring_acap_grader_a1_Clients.xlsx Excel workbook into a table   named Clients. While importing the data, make   sure to select the option First Row Contains Column Headings, and select   ClientID as the primary key field.

 

Now that you have imported the   data from the spreadsheet, you will modify the field properties in the   Clients table and demonstrate sorting.

Open the Clients table in Design   view. Change the ClientID field size to 6 and remove the @ symbol from the ClientID format   property. Change the ZIP field size to 5. Change the ExpectedGraduation field to have 0 Decimal Places. Delete the   Comments field. Add a new field named LastContact as the last field in the table.   Change the data type to Date/Time, and change the format to Short Date. Switch   to Datasheet View, and apply Best Fit to all columns. Sort the table on the   LoanAmount field in descending order, then save and close the table.

 

Now that the table is imported   and modified, you will create a relationship between the Colleges and Clients   tables.
 

  Open the Relationships window. Add the Clients and Colleges tables to the   window, and create a one-to-many relationship between the CollegeID fields in   the Clients and Colleges tables. Enforce referential integrity between the   two tables and select the cascade updates and cascade delete options. Save   the changes, and close the Relationships window.

 

Polly Esther, a financial   adviser, would like your assistance in helping her find certain information.   You will create a query for her and demonstrate how she can change information.
  Create a new query using Design view. From the Clients table, add the   LastName, FirstName, Email, Phone, and ExpectedGraduation fields, in that   order. From the Colleges table, add the CollegeName field. Sort the query by   LastName and then FirstName, both in ascending order. Set the criteria in the   ExpectedGraduation field to 2019. Run the query. Save the query as 2019 Graduates and close the query.

 

Now that you have created the   query, you will create a second query for Polly that will calculate the loan   payments for which each student will be responsible (assuming monthly   payments).
 

  Create a copy of the 2019 Graduates query. Name the copy Loan Payments and open the query in Design   view. Remove the criteria from the ExpectedGraduation field. Create   calculated field named MonthlyPayment that determines the estimated monthly student loan   payment. The loan will have a fixed rate of 5% interest, paid monthly, for 10   years. Using the Pmt function, replace the rate argument with 0.05/12, the num_periods argument with 10*12, and the present_value argument   with the LoanAmount field. Use 0 for the future_value and type arguments. Format   the field as Currency. 

Run the query. Ensure the   payment displays as a positive number. Add a total row to Datasheet view.   Average the MonthlyPayment field and count the values in the LastName column.   Save and close the query.

 

Stann Dupp, the director of   finance, needs to summarize information about all of the student loans Quill   Financial Services offers based on each college. You will create a totals   query for him to summarize the number of loans, average loan amount by   college.

 

Create a new query using Design   View. From the Colleges table, add the CollegeName field. From the Clients   table, add the ClientID and LoanAmount fields. Display the Total row, and   group by CollegeName. Show the count of ClientID and the average LoanAmount.

 

Change the caption for the   ClientID field to Num Loans, and the caption for LoanAmount to Avg Loan. Format the LoanAmount field as   Standard. Run the query. Save the query as Loan Summary by College and close it.

 

Jay Walker, one of the company’s   administrative assistants, will handle data entry. He has asked you to   simplify the way he inputs information into the Clients table. You will   create a form based on the Clients table.

 

Create a Split Form using the   Clients table as the source. Change the height of all of the fields and   labels to .25 collectively. Reorder the fields in the bottom half of the split   form so the FirstName displays before the LastName field. Switch to Form view   and click the row for Riya Gonzalez. Change her expected graduation date to 2022. Save the form as Client   Information and   close it.

 

Stann is hoping you can create a   more print-friendly version of the query you created earlier for him to   distribute to the executives. You will create a report based on the Loan   Payments query.

   Create a report using the Report Wizard. From the Loan Payments query, add   the LastName, FirstName, Email, ExpectedGraduation, CollegeName, and   MonthlyPayment fields. Do not add any grouping or sorting. Ensure the report   is in Landscape orientation. Save the report as Loans by Client and view the report in Layout   view. Adjust the width and position of the fields and labels so that all of   the values are visible. Save the report.

 

Now that you have included the   fields Stann has asked for, you will work to format the report to make the   information more obvious.

   Apply the Integral theme. Group the report by the ExpectedGraduation field.   Sort the records within each group by LastName then by FirstName, both in   ascending order. Switch to Print Preview mode and verify that the report is   only one page wide (Note: it may be a number of pages long).

Computer Science IT 505 assignment 8

QUESTION 1: Present the location of the new data center on the given Intranet Diagram. Update the diagram and show how and where you place the new data center in the network diagram. Provide the new (updated) network diagram with the new data center on it. Meet Patel name must be on the diagram.

QUESTION 2:  Police department managers are worrying about

  1. a) Exposure of data in the data center to entities not authorized access to the information
  2. b) Unauthorized Modification of data in the data center
  3. c) Complete Destruction of the data kept in the databases

List the primary goals in providing security for all sections of the given Police IT system.

QUESTION 3: List the IT Assets of all Police departments. You should consider the INTRANET of the police IT system

QUESTION 4: Prepare the Control Spreadsheet (Table), which covers

Enter the IT assets in the intranet (that you prepared in question 3)

Cover Disruption, destruction, and disaster cases

Cover possible Intrusion (both external and inertial)

Use the given List of control measures to protect the IT system

Complete Control Spreadsheet

You should be using the following control measures while answering question 4

  1. The disaster recovery plan and education/training
  2. Halon-type fire system & sprinklers
  3. Not on or below ground level
  4. UPS (uninterruptible power source)
  5. Virus-checking software present and updated
  6. Strong password policy
  7. Extensive user training about cybersecurity policy and practices

Firewalls for data

Develop a  control table in an MS Word document. 

Meet patel name must be on the table.

I have a deadline by tomorrow 11 AM. let me know soon.

    

1) Assume you have a 5 number bike lock of the form where you roll each key. Each key is hexadecimal (yes we’re geeks) and you have learned 3 of the keys (not in any order though). What is max number of attempts to open the lock? Please show all math. (Hint, first show how many tries for 4 keys and one unknown).

2)  For this use a Windows based machine…use the lab machines if you don’t own one. Locate the Windows Event Viewer and open it

  1. How many warnings in (list the first      10 and describe what the warnings are):

Answer here: list at least 10 warnings and give context of these warnings if necessary (i.e. add a minimum of 100 words for describing what they are)

  1. Do the same for System (list the first      10 and describe what the warnings are).

Answer here: list at least 10 warnings and give context of these warnings if necessary (i.e. add a minimum of 100 words for describing what they are)

  

3)Research and describe, w/diagrams, how AES and DES algorithms work.

total minimum of 900 words split up as follows: 450 words for AES and 450 words for DES. Also include detailed technical diagrams 

Operatinal planning and policy

  

Assignment #2 PESTEL & Five Forces.

Read Chapter 3 and view the required videos on PESTEL Analysis and the Five Forces Framework. 

Select one of the cases from Part 2 of the Thompson (2022) textbook to analyze the six components of the Macro-Environment and the Five Forces Model.

For this assignment:

  • Prepare      a brief PESTEL Analysis for your selected case from Part 2 of our Thompson      (2022) text.  You must address all six elements.
  • Prepare      a brief Five Force Analysis as presented in our Thompson (2022) text for      your selected case. Address all five forces.

Videos:

· PESTEL Analysis EXPLAINED 

https://www.youtube.com/watch?v=bYn4CyL3r5w&t=7s 

· Porter’s 5 Forces EXPLAINED | B2U | Business To You

https://www.youtube.com/watch?v=Dfp23xSqpdk 

Submission Details: 

  • Your analysis      must be driven by facts, research, and data.
  • Your analysis      should be between 1000 and 1500 words.
  • Incorporate at least our course text and one non-course      scholarly/peer reviewed source in your paper.
  • Create Leve1,      2 and Level 3 APA headings for each portion of the analysis.  
  • All written      assignments must include a coverage page, introductory and concluding      paragraphs, reference page, double-spaced and proper in-text citations      using APA guidelines.