Literature Review

Submit one report file with four referred papers/articles on Blackboard.

  • Submit 5 files, respectively: your report (a Word or pdf file) and 4 references (pdf files). Do NOT compress them to a single file.
  • Format requirements are the same as for assignment report.  (APA Format, Use citations and follow APA Citation format).
  • Read at least four recent papers/articles on cloud computing related topics and have at most ONE to be review/survey paper/article. 
  • Write a 10-page (double spaced) review paper integrating and expanding the selected research paper subjects with the course topics (Excluding Cover and Reference Pages).
  • This will not be a paper report (to review the references), rather a thoughtful discussion of the research papers content pertaining to the material we have covered in the course. 
  • Papers and articles from IEEE Transactions on Computers, and the Communications of the ACM; or other journals or proceedings approved by the instructor. 

One example for review/survey article,

  1. M. Shahin, M. Ali Babar and L. Zhu, “Continuous Integration, Delivery and Deployment: A Systematic Review on Approaches, Tools, Challenges and Practices,” in IEEE Access, vol. 5, pp. 3909-3943, 2017.

One example of non review/survey reference paper/article,

  1. D. Gonzales, J. M. Kaplan, E. Saltzman, Z. Winkelman and D. Woods, “Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds,” in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 523-536, 1 July-Sept. 2017.

Logical Modeling Design & Relational Schema

 

work on the Logical Modeling Design and to specify the entries, columns and their relationship. Use an entity-relationship ER diagram to visualize the database. 

Your schema should include some attributes that make it possible to include some transactions that involve aggregate functions. For example, a school schema would allow for queries to calculate enrollment in each section of the average enrollment in courses for a given department, or the total courses being taught by each instructor, etc. This should also make interesting constraints and triggers possible. Review this basic example of a requirements document and Conceptual Data Model.

Turn your ER diagram into a normalized relational database design for the (subset of the) domain (i.e. a set of tables, each with appropriate attributes, a primary key, and appropriate foreign keys. The database should be based on the ER diagram, but one-to-one and one-to-many relationships may be implemented by appropriate attirbutes in the “one” entity, rather than as separate tables. You relational database must be at least in 3NF. Remember to determine the cardinality of the relationships. You may want to decide on cardinality when you are creating an Entity–relationship diagram ERD relationship table.

see sample below

PRO1

 

A  template for this assignment  is provided using the format in  NIST Special Publication 800-18 . In addition to the NIST documentation that is linked throughout the course and in the document sharing area, you can locate SSP information in the Howard text on page 105.

Scenario:
To create the SSP for this project, you will be using your home computer system, as if it were used for a home-based business, whereby it may contain customer data and business applications critical to your operations. Although this is a home computer system, it is not completely shielded from many risks that can impact a large corporate business. Interruptions or breaches would place your business in jeopardy. For the purposes of this project, categorize this system as a Federal System in the “HIGH” risk category as defined in FIPS 199 and  FIPS 200.

Project Deliverable 1:SSP Expanded Outline and Potential Vulnerabilities Report 

SSP Expanded Outline
Using the SSP template (also found in Doc Sharing), complete the expanded outline by inserting a brief statement below each of the 15 sections which:

  • identifies the applicability of the section to your home system
  • describes the importance and purpose of the data provided in the section.

Potential Vulnerabilities Report 
Utilizing your experience, classroom resources, outside references and industry tools, analyze and generate a comprehensive overview identifying the specific potential vulnerabilities of the system.  

Insert this comprehensive overview into the SSP template as Appendix 1.

Submit this assignment to the dropbox no later than the date identified above

Excel_Introductory_Capstone1_Year_End_Report

Send me message I will make It Perfect for you 

Excel_Introductory_Capstone1_Year_End_Report 

  

Excel_Introductory_Capstone1_Year_End_Report 

Project Description: 

In this project, you will work with multiple worksheets and enter formulas and functions to calculate totals, averages, maximum values, and minimum values. Additionally, you will create a summary sheet, format cells, insert charts, insert sparklines, and create a table in a workbook. 

Question

1. Write a program that takes a string of someone’s name and prints it out last name first.  Your program must use pointers, not array subscripts.  You may use the available string manipulation functions if you find an opportunity.  Example:
“XXXXX XXXXX”  
“XXXXX, XXXXX”

 
 

2. Write a program that will take a string of someone’s full name, and break it into separate strings of first name and last name, as well as capitalize the first letter of each.  Again, use pointers and string manipulation functions only.  Example:
“joseph smith”
“Joseph”  
“Smith”
 

3. Write a program that has the user enter two Strings. Display whether the first String is less than (comes first), equal to, or greater than (comes after) the first.