SECURE CLOUD ARCHITECTURE

Business case:  White & Bule Sky Airport Miami FL.

As an IT Manager, you were tasked to improve the performance of the local White & Bule Sky Airport Passenger Processing system.  This is to make the airport more efficient and more secure. 

There are three databases in the Airport Passenger Processing IT system:

1-Passenger database will record and authenticate each passenger in the airport

2-Employee database will record and authenticate each employee in the airport

3-Flight database will record each flight in the airport

Answer the airport owners’ questions about this IT system:

QUESTION 1. At the airport, there is a risk of data storage disk failure (fire, smoke, or flood) which will also damage the disk backup in the Airport IT system data center. What can you do to reduce data storage disk failure?

QUESTION 2 It was decided to move Passenger Database to the cloud.  How can you provide Security for the Passenger Database? Here you should address the questions

  1. a) Security Devices that access the Passenger Database
  2. b) Security of Passenger Data -at-rest
  3. c) End user security. Where the user would be accessing the Passenger Database from the airport  

QUESTION 3 Assume that Passenger Database is already moved on the cloud side. And the airport has fast and reliable network connections.  If the cloud service provider devices fail to operate, then the Passenger Database would be not reachable (Loss of Control).  That will have a huge impact on Airport operations.  

What would you do to Minimize Loss of Control, so the impact would be less?

Assignment Overview

  

Assignment Overview
This assignment will give you more experience on the use of both loops and if statements. You are going to write a program that asks the user for two numbers to create and print a Latin Square.

Background
A Latin Square is an n*n table filled with n different symbols in such a way that each symbol occurs exactly once in each row and exactly once in each column (see http://en.wikipedia.org/wiki/L… ). For example, two possible Latin Squares of order 6:
1 2 3 4 5 6
2 3 4 5 6 1
3 4 5 6 1 2
4 5 6 1 2 3
5 6 1 2 3 4
6 1 2 3 4 5
3 4 5 6 1 2
4 5 6 1 2 3
5 6 1 2 3 4
6 1 2 3 4 5
1 2 3 4 5 6
2 3 4 5 6 1
Obviously, the top-left numbers are 1 and 3 respectively.

Project Description / Specification
Your program will ask user to input two numbers. The first number is ***** order of square; the second one is the top-left number of the square. Note that the second number should be between 1 and the first number, so your program should check this situation. Then, your program will print the corresponding Latin Square. Here is some example output:

Deliverables
program3.py — your source code solution (remember to include your name, the date, program number and comments).Getting Started
Break the problem down into smaller parts. For example:
The range function and the % (modulus) operator are both useful for this project.
Can you generate a sequence beginning with 1 of the appropriate order? A sequence of order 5 would be 1 2 3 4 5
Can you generate a sequence of the appropriate order beginning with a number other than 1? For a sequence of order 5 starting with 3 would be 3 4 5 1 2
Can you generate the second in the Latin sequence? For example, starting with 1 2 3 4 the next sequence would be 2 3 4 1second program
Python Program 4Assignment Overview
This assignment will give you more experience with while loops and if statements, and give you an opportunity to work with strings.
The Problem
Scientists measure how closely related a species is by looking at the DNA sequences for key proteins and seeing how similar/dissimilar they are. If the two sequences of DNA are essentially the same, the two species are considered to be evolutionarily closer since there is a relationship between changes and time. This process is called sequence alignment.Consider the two strings of DNA below (completely made up, miss matches in red):Species 1: AATAACGAAA
Species 2: AAAACGAAAAA scientist can change the alignment by assuming that an insertion or deletion, of one of the bases has occurred. They could make such a change, called an indel for short, to see if it improves the alignment:Species 1: AATAACGAAA-
Species 2: AA-AACGAAAAAssuming two indels, marked as two dashes(-), the alignment is greatly improved. The scientist would assume that two changes happened, one change in each species.While complex algorithms exist to do sequence alignment, it is also useful to support a researcher and allow them to do an alignment by hand.

Program Specifications::
1. You will prompt for two strings. The strings can have any characters you like, but to be “biological” it should consist of: “A”, “T”, “C”, “G”. The strings do not have to be of the same length.
2. You will then prompt for one of 3 commands:
a. “a” for add. Add an indel
b. “d” for delete. Delete an indel
c. “s” for score. Score the present alignment
d. “q” for quit. Stop the process.
3. Adding an Indel. When you add an indel, you must prompt for two pieces of information:
a. which string to change
b. at what index (starting at 0) do you wish to place the indel (placement is before the given index, Error if the index is out of range).
The string should then be modified and a dash(-) added.
4. Delete an Indel: If you can add an indel, you should be able to delete it if it doesn’t do what you want. Again, you must prompt for two pieces of information
a. which string to change
b. the index (starting at 0) to delete the indel. It is an Error to delete a character that is not an indel.
5. Scoring. You will report the number of matches and the number of mismatches.
a. Any indel is automatically a mismatch.
b. If one string is shorter than the other, the shorter string is filled out with indels.
c. After you score, you print both strings.
i. Matching characters are printed in lower case. If the user entered upper case letters, you convert them to lower case on a match.
ii. All mismatches are printed in upper case.
iii. Indels are printed as dashes.Deliverables
Turn in proj04.py be sure to use the specified file name, i.e. program4.py. Make sure to include your name and the assignment number as well as the date in the comments. Be sure to add necessary comments to explain what you are doing.

Assignment Notes:
1. As before, try to do this in pieces:
a. get the command loop working
b. get individual commands to work (scoring is the most work, save it till last)
2. Printing the string is best done by creating

Autobiography jan 20

  1. Autobiography: Write a 3 paragraph, 500-word autobiography (written in 1st person) that describes:
    • your life to this point including where you were born and an interesting fact about where you were born;
    • your education and experience in your major area of study;
    • and the goals you set for yourself after you obtain your masters in computer science 

methods and arrays where appropriate

  

using methods and arrays where appropriate, create a program that calculates how much it costs to fill up a gas tank. It should ask how much a gallon costs and assume that the gas tank capacity is 20 gallons. The amount should be printed in dollars and cents.

/*

using methods and arrays where appropriate, create a program that

calculates how much it costs to fill up a gas tank. It should ask how much a gallon costs

and assume that the gas tank capacity is 20 gallons.

The amount should be printed in dollars and cents

Unit 4 Assignment: Develop Security Controls and Constraints for a Database Design

 

Purpose

Bike Stores is a successful small chain of stores selling a wide range of cycling equipment. The company currently has stores in Texas, New York, and California. The owners are looking to expand the business to additional locations where cycling is popular. The database currently leveraged by the company tracks bike sales and inventory. It is very basic in design and limited in what it can provide for the company. For example, the database does not store customer payment, supplier transactions, or employee financial details. The owners are seeking to expand the company’s database capabilities to store these details. Download the design diagram for the current database state below.

The database capability expansion desired by the company’s owners comes with significant concerns. The current database maintains a minimal security posture since it does not contain any customer, supplier, or employee financial data. The security requirements for the database change dramatically with the inclusion of these data.

You have been tasked to develop a white paper describing the security features that need to be applied to the Bike Stores database to maintain proper protection of sensitive financial details. Research the security features of Microsoft SQL Server, which is the relational database management system (RDBMS) leveraged by the company. Describe how specific Microsoft SQL Server security features will protect sensitive Bike Stores data. Also, denote challenges or issues associated with security measure implementation. Delineate regulatory requirements that need to be satisfied by the database’s security design.

Assignment Instructions

First, navigate to the Academic Tools area of this course and select Library then Required Readings to review the Unit 4 videos covering facets associated with database security. It is very important that you watch the Unit 4 videos before completing the assignment.

Generate a 3- to 5-page white paper addressing the application of Microsoft SQL Server security features on the Bike Stores database. This page requirement only includes the body of the paper containing the researched content. The paper must adhere to APA formatting requirements, which includes one-inch margins, use of 12-point Times New Roman font, and double-spacing. A separate title page must be provided showing the paper title, course name, and student name. A separate reference page must be provided with a minimum of two reputable sources for the paper.

Assignment Requirements

The paper must comply with the following:

  • Minimum of three full pages of researched content
  • Minimum of four Microsoft SQL Server security features that can be applied to the Bike Stores database
  • Minimum of three challenges or issues associated with security measure implementation
  • Minimum of two regulatory requirements that need to be satisfied by the database’s security design
  • Title page with paper title, course name, and student name
  • Reference page with a minimum of two reputable sources
  • Paper adheres to APA requirements

visual logic console

 

Directions: Use Visual Logic Console for all inputs and outputs.  If you are not familiar with Visual Logic, a flow chart can be used instead of a program to answer the questions that require Visual Logic.

Choose any 4 out of 5 Questions.

1. Write a Visual Logic program that calculates the following.    

a) The user enters an amount

b) The program calculates the interest at 5%. Write a procedure to calculate the interest earned and the total amount which includes the interest.

c) Write the output using format currency to display the interest earned and the total amount calculated in b).

Copy and paste the program and the output for credit and upload the program file.

2. Write a Visual Logic program where the user rolls two dice and the program displays the sum of them. Each dice contains numbers from 1-6.

a) Use random for the first dice. Display the first dice.

b) Use random for the second dice. Display the second dice.

c) Add them together as the sum.

Copy and paste the program and the output for credit and upload the program file.

If the highest subscript in an array is nine and the subscripts start at zero, what is the size of the array?

Think about arrays that they use in everyday life situations. What are the advantages of using these types of arrays? Are there any disadvantages?

5.       a) Write a Visual Logic program to declare and populate an array to hold five student test scores.  

           b) Write a Visual Logic program to calculate the student’s average for the test scores. Output the average test score.

discussion

 Of the seven elements in project closeout management, which do you view as being most important? Why?  (you may use an example or case to illustrate) 

 • Book- Project Management: Achieving Competitive Advantage (5th ed.) Jeffery K. Pinto  

Define TAM and the components

This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age. Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:· 3-5 pages in length (not including title page or references)· APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.· A minimum of five peer-reviewed journal articles.The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

R language part 1

There are various languages, some are better for data visualization than others.  Please review the basics of Python, SAS, R, and SQL.  What are the qualities of each language regarding data visualization (select at least two to compare and contrast)?  What are the pros and cons of each regarding data visualization (select at least two to compare and contrast)?

Reply post:

When replying to peers, note your opinion on their thoughts.  Add your thoughts and continue the conversation regarding the languages (Python, SAS, R, and SQL) and other visualization tools as well.