2 assignments
Assignment
Titanium lets you develop cross-platform native mobile applications and build great mobile experiences using JavaScript. Write a one page minimum (250 words) paper on Titanium. Must be APA formatted with Title page and References page. You may discuss why Titanium was/is used, who uses it, or other interesting facts that you find in your research.
Module 6: Course Project – Encapsulating Data and Writing to a File
Encapsulating Data and Writing to a File
This part of the project involves creating a form to input Employees. The employee information will then be written to a file. Read the Project guide provided and the project video link for instructions and details to help guide you through your efforts.
Project Files
python mrjob
In this assignment, you are going to find the words that share the same letters using MRJOB, e.g. (act, cat)
The data file is stored in data.txt (MRJOB will read the data from the file and send it to the mapper). Note that not all the words have a match.
The following is what you need to do
- Convert all words to lower case
- Sorted all the letters and use it as a key and the word will be your value
- Gather the values from the reducer
Input Text
act
takes
big
cause
Tames
expel
dog
dig
listen
vase
flow
race
stressed
cheater
meats
tofu
desserts
kitchen
silent
night
maple
teams
knee
heart
mates
baker
care
thicken
part
Earth
keen
wolf
break
study
save
God
builder
mining
thing
tofu
trap
sauce
read
dare
stake
cat
dusty
data
learning
teacher
rebuild
Expected Output
“Output”
[“baker”,”break”] [“cheater”,”teacher”] [“race”,”care”] [“cause”,”sauce”] [“act”,”cat”] [“read”,”dare”] [“heart”,”Earth”] [“takes”,”stake”][“Tames”,”meats”,”teams”,”mates”]
[“vase”,”save”] [“part”,”trap”] [“builder”,”rebuild”]GO19_AC_CH02_GRADER_2G_AS – Concerts and Sponsors 1.0
#GO19_AC_CH02_GRADER_2G_AS – Concerts and Sponsors 1.0
#GO19 AC CH02 GRADER 2G AS – Concerts and Sponsors 1.0
Project Description:
In this project, you will use a database to answer questions about concerts in the local college area. You will create a relationship between two tables, create a query from an existing query, and create queries using text, numeric, compound, and wildcard criteria based using the fields in one or both tables. You will create calculated fields, group data when calculating statistics, create a crosstab query, and create a parameter query.
Start Access. Open the file Student_Access_2G_Concerts_Sponsors.accdb downloaded with this project.
Using Sponsor ID as the common field, create a one-to-many relationship between the Sponsors table and the Concerts table. Enforce referential integrity and enable both cascade options. Create a relationship report with normal margins, and save it as a3 Relationships. Close all open objects.
In the last record of the Sponsors table, change the Sponsor ID from SPONSOR-108 to SPONSOR-100, and then close the table. (The related records in the Concerts table will automatically update.)
Copy the Concerts $1000 or More Query to create a new query with the name Jan-Apr Concerts Query. Redesign the query to answer the question, What is the Date, Concert Name, Concert Location, and Box Office Receipts for concerts between 1/1/22 and 4/30/22 sorted in ascending order only by the Date field? Run the query (five records display). Close the query, saving the changes to the query.
Create a query in Query Design view based on the Concerts table to answer the question, What is the Date, Concert Name, Concert Location, and Box Office Receipts for a concert location of Georgetown Community Theater or Austin City Center and for box office receipts that have an amount that is greater than 1000 sorted in ascending order by the Date field? Run the query (four records display). Save the query as GCT OR ACC Over $1000 Query, and then close the query.
Create a query in Query Design view based on both tables to answer the question, What is the Sponsor Name, Concert Name, and Concert Location for a sponsor name that has radio anywhere in its name and for a concert name that ends in festival sorted in ascending order by the Concert Location field? Run the query (two records display). Save the query as Radio Festivals Query, and then close the query.
Create a query in Query Design view based on the Concerts table to answer the following question, What is the Concert ID, Concert Name, Concert Location, Sponsor ID, and Date for records that are missing the date? Run the query (two records display). Save the query as Missing Concert Date Query, and then close the query.
Create a query in Query Design view based on both tables to answer the question, What is the Concert ID, Sponsor Name, Box Office Receipts, and a new field named Sponsor Donation that will calculate and display the donation amount when the Sponsor donates an amount equal to 50 percent (0.5) of each box office receipts amount to the Music Department. Sort the records in ascending order by the Concert ID field. a. Run the query (the second record—EVENT-102—has a Sponsor Donation of 287.5).
Display the query in Design view. In the fifth column of the design grid, create a new field named Total Donation that will calculate and display the total donation when the box office receipts amount is added to the sponsor’s donation amount. Run the query (the second record—EVENT-102—has a Total Donation of $862.50).
Display the query in Design view. Use the Property Sheet to format the Sponsor Donation field as Currency with 2 decimal places, and then close the Property Sheet. Run the query, apply Best Fit to the fields, save the query as Sponsor Donation Query, and then close the query.
Create a query in Query Design view based on the Concerts table to answer the following question, What are the total Box Office Receipts by Concert Location sorted by the Box Office Receipts field in ascending order? Use the Property Sheet to format the Box Office Receipts field with 0 decimal places, and then close the Property Sheet. Run the query (for the Concert Location of Georgetown Community Theater, the sum of the box office receipts is $7,850). Apply Best Fit to the fields, save the query as Receipts by Location Query, and then close the query.
Use the Query Wizard to create a crosstab query based on the Concerts table with the Sponsor ID field as row headings and the Concert Location field as column headings. Sum the Box Office Receipts field, and name the query Sponsor and Location Crosstab Query. Display the query in Design view. Use the Property Sheet to format the last two columns with 0 decimal places. Run the query, apply Best Fit to the fields, save the query, and then close the query.
Create a query in Query Design view based on the Concerts table to answer the following question, What is the Concert Name, Concert Location, Box Office Receipts, and Sponsor ID. Sort the records in ascending order by the Concert Name field? Set the criteria so that when you run the query you are prompted to Enter the Sponsor ID in the format SPONSOR-###. Run the query, and when prompted, enter SPONSOR-101 as the criteria (six records display). Display the query in Design view and hide the Sponsor ID field from the results. Run the query again, entering SPONSOR-101 when prompted. Save the query as Sponsor ID Parameter Query, and then close the query.
Information governance discussion
With your industry in mind, identify and discuss these concerns and address how this can be effectively handled. Support with references and do your usual critical review of at least 2 other students’ posts.
Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
- Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post
Usability Tests – design a usability test to conduct usability testing on a device or equipment used on daily basis
Usability Tests – design a usability test to conduct usability testing on a device or equipment used on daily basis ( It can be: a tape recorder, TV, Desktop, Automatic Washing Machine, Fax/Scanner/Copy Machine, Electrical Panel 20 Am, 110V, Food Mixer, or Dishwasher.
NOTE:
1.- Make sure that the device has the following component: Electrical Charger or electrical connection to charge, Control Panel to input a task, and Programmable Device to accomplish a task. Make sure that you can obtain an electronic and electrical diagram for the device, and if the device requires any program to run the process.
2.- This is the first phase of your project, you will be using the same device for phases 2 and 3.
Pick a specific device to evaluate and design a usability test for this device.
Reference Chapter 5 Evaluation and the User Experience for assistance in designing the test. Design your test to accommodate the Eight Golden Rules of Interface Design from section 3.3.4. Explain how your test will evaluate the user experience in regard to the Eight Golden Rules.
There should be 5 -7 pages in the body of the paper with a minimum of 10 references. 7th Edition APA formatting and required with appropriate headings to each section. The section must be the same as presented in the table of content.
Paper structure:
1.- title page
2.- Abstract
3.- Table of Content
4.- Body:
4.1.- Introduction
4.2.- Literature Review
4.3.- Analysis
4.4.- Recommendation
4.5.- Conclusion
5.- List of References
NOTE: Use the APA-Sample-Formatted-Paper to submit your work.
Security
- Objectives
- To practice the formal procedure of system/network security analysis and planning.
- To examine the vulnerability and security needs of a private organization.
- To devise strategies to overcome potential malicious attacks, threats, and risks.
- Target Network
You have just been hired as an Information Security Officer (ISO) for a mobile app development company. The organization network structure is identified in the below network diagram and some services may inadequate and absent.
The network specifically contains:
- 2-Switches
- 1-Web/FTP server with Linux operating system using port 80 and port 21
- 1-Email Server with Exchange 2010 using port 25
- 2-Active Directory Domain Controllers (DC) with Windows Server 2016 operating system
- 2-Domain Name Service (DNS) Servers with Windows Server 2016 operating system
- 2-Windows file servers using port 21
- 3-Wireless Access Points (WAP) encrypted with WEP protocol.
- 100 – Desktop/Laptop computers with Windows 10 operating system
- 2- Multifunction printers (print, copy, scan, fax)
- 1- Voice Over IP (VOIP) telephone system with 100 IP phones
The company is in a single, two story building with no fencing. The entire building is accessed using a permanent 4-digit pin. A single security guard is located on the second floor of the building. The security guard works Monday – Friday, 8AM to 5PM. Users are in open area cubicles on the first floor of the building. The employee work area is an open floor with no wall separating areas. The data closet is also located on the first floor of the building near the front entrance and the HVAC system in the middle of the first floor. The data closet is accessible by anyone who knows the 4-digit permanent pin that is distributed to all employees. The facility maintenance generally cleans the building on the weekends when building with no employees or security personnel present.
- Assignment Details
The Chief Information Officer (CIO) has seen reports of malicious activity increasing and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first work assignments with the company, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. In addition, the CIO would like you briefly explain each item and potential impact it could have on the organization.
Write a four to six (4-6) page paper in which you:
- Analyze five (5) or more specific potential malicious attacks and/or threats that could be carried out against the network and organization.
- Explain in detail the potential impact of the five (5) or more selected malicious attacks.
- Propose at least nine (9) – 3 of each type of security controls (administrative, logical/technical, and physical) that you would consider implementing to protect against the selected potential malicious attacks.
- Analyze three (3) or more potential risks for data loss and data theft that may exist in the documented network and applications.
- Explain in detail the potential impact of the three (3) or more selected risks for data loss and data theft.
- Propose at least three (3) – 1 of each type of security controls (administrative, logical/technical, and physical) that you would consider implementing to protect against the selected risks for data loss and data theft.
- List and provide a product overview of only two (2) alternatives for each logical/technical security control for both data loss/theft and malicious attacks. Include web links to the products and why those products should be considered.
Expectations
- Use at least five credible and quality resources. Your external resources should not be more than two to three (2-3) years old.
Note: Wikipedia and similar websites do not constitute as credible and quality resources.
- Single Word document
- Double spaced
- Times New Roman, size 12 font
- One-inch margin on all sides
- Citations and references must follow APA format
- Include a cover page containing:
- Title of the assignment
- Student’s name
- Professor’s name
- Course title
- Assignment due date
Note: The cover page and reference page are not included in the assignment page length requirement.
question
MPEG 21 is organized into several independent parts to allow various slices of the technology. Discuss this issue and provide five different examples of such components.