Topic/Thesis Proposal Remember, any information technology topic is fine! What do you find interesting in the information technology industry? Take Case Study assignment help

Topic/Thesis Proposal Remember, any information technology topic is fine! What do you find interesting in the information technology industry? Take a look at the Gartner link and other interesting links provided in the COURSE MATERIALS area in the CONTENT section for some ideas. Review IT-based literature. These websites will give you some thoughts regarding technology. Also, what are you experiencing in your day-to-day operation in technology? Note the following hot topics: Cloud computing Social networking Internet of Everything Mobile computing Cyber Security Network security Data security Data analysis Big Data Electronic Ware Wireless technologies Software technologies Privacy Computer collaboration Instructions: Keep in mind, you will NOT conduct an actual study in this course; however, you will in your Capstone course. You will use the paper in this course to gain a better understanding of the format and process involved in completing various components of your capstone paper! In this course you will complete the following for one comprehensive paper- : Topic Proposal – APA Exercise (Week 2) Introduction (Week 3) Literature Review (Week 5) Hypothesis and Research Design (Week 6) Abstract and Final Research Paper (rewrite) (Week 8)[supanova_question]

discussion 1 Essay Python essay help

Please this is IFSM 495 Trends and Practical Applications in Information Systems Management. I need an expert to work on this not anybody. Please the writer should send me the topic he will chose so i can post it as required by the class instructions. select from the materials i attach to this order. Please let me know the topic you chose as soon as possible so i can post before someone takes it. This link is also part of the materials.
https://www.gartner.com/en/information-technology/insights/top-technology-trends

An important aspect of this class is the consideration of emerging issues and trends. We will approach this topic area by considering both technology trends and IT strategy/management trends. First, you should read the article “Gartner Top 10 Strategic Technology Trends for 2022” and review the list of “IT TOPICS” (both located in Content>Week 1>Activities>IT Trends and Topics) and select one of the topics listed and that has not already been chosen by a classmate, and post your selected topic in response to this discussion. If you will put the topic in the “subject/title” area for your response, we can all see at a glance what has been chosen. If there are no remaining topics in which you have an interest, you may propose one for my approval. Once the selections have been made, I will post a schedule of when each of the topics should be presented as a student-led discussion.

It will then be your responsibility to research the topic and create a 3-4 paragraph “report” on what the trend is, why it is important and how it relates to what we are doing in class or to the IFSM major area of study in general, and pose some thought-provoking questions. Be sure to give credit to your sources. Each student will lead one discussion during the remaining weeks of class; the rest of the class will respond to the discussion, and the discussions will count as a significant part of your participation grade each week. The leader of the discussion is responsible for responding to other students’ postings and continuing the conversation much as if we were in a classroom together discussing the topic.[supanova_question]

instructions below and answer questions. Use APA format and no plagiarism! use at least 100 words not including the reference. If assignment is not done how instructed I will have to cancel after giving you another chance to fix it.

Computer Science Assignment Help The IoT has become a new conversation within the IT world, describing how more smart devices can communicate with each other and interface with humans. Naturally, this would mean networking challenges become increasingly sophisticated. Find an article covering some technologies discussed in this module and share with your classmates how it applies to the IoT.[supanova_question]

Assignment: Introduction to Privacy, Security and Confidentiality

Complete the following tasks. Type the answers in a Word document using proper spelling and grammar. Cite any sources. Submit the answers to this questions to the assignments link in Brightspace.

1. Write a health care policy based on a topic within the privacy or security regulations.
2. List five data elements that should be included in the user access audit trail.
3. Provide a list of five recommended audits for the security officer to run routinely. Explain what the security officer should look for in each of the audits.
4. Develop an outline of topics to include in an educational presentation for employees on privacy, security, and confidentiality. Include enough detail that a PowerPoint presentation can easily be developed from this outline.[supanova_question]

CRM Solution Essay

COMPETENCIES
4020.4.1 : Introduction to Software Engineering
The graduate applies software engineering core principles, the generic process framework, and introductory software engineering concepts to a software project.

4020.4.2 : Software Engineering and Process Models
The graduate recommends a software engineering process model for a project.

4020.4.3 : Requirements Engineering
The graduate interprets requirements refined through the software engineering process.

4020.4.4 : Software Design Concepts, Including Architecture
The graduate designs requirements-based software solutions using software engineering design concepts and patterns.

4020.4.5 : Quality Concepts, Software Quality Assurance, and Software Testing
The graduate integrates software quality testing and assurance throughout the software development process.

INTRODUCTION
In this assessment, you will review a requirements document and then propose a software solution. Your submission will showcase what you’ve learned in the course through the creation of a design and test plan, which is a deliverable for the waterfall methodology. Review the scenario, requirements, and rubric below for additional guidance as you complete this assessment.

SCENARIO
You are a member of a software development team for a project, which includes business analysts, solution analysts, developers, quality assurance professionals, and a project manager, among other team members. You have been tasked with completing a solution proposal and design and test plan with the help of your team to support the software development process. The American Video Game Company has provided a high-level requirements document to aid you in identifying an appropriate solution.

The project is to implement a customer relationship management (CRM) system for the sales force of a medium-sized company. The initial requirements document has been provided for you to use in determining a solution. You may choose to implement a customizable/commercial off-the-shelf (COTS) system, or you may decide to have the system custom built. When making this decision, ensure all requirements are considered and can be implemented if choosing a COTS system. If you decide to build the system, consider the additional resources that will be needed. Review the attached “CRM Requirements” document provided with the assessment to gain an overall understanding of the system the American Video Game Company is looking for.

REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

Review the attached “CRM Requirements” to gain an overall understanding of the system that American Video Game Company is looking for. Then propose a software solution for American Video Game Company by doing the following:

A. Introduce your proposed system, including a purpose statement, overview of the problem, goals and objectives for the project and solution, prerequisites, scope, and environment, as outlined in the attached “Design Template.”

B. Explain how your software solution addresses five distinct requirements from the attached “CRM Requirements.”

C. Discuss the waterfall method by doing the following:

1. Compare the advantages and disadvantages of the waterfall method to those of another development method of your choice.

2. Evaluate whether the waterfall method or the development method you chose in C1 is better suited to the solution for American Video Game Company, including specific examples to justify your claims.

D. Create two visual representations of your software solution (e.g., storyboard, flowchart, UML diagram, ERD) that illustrate how the system process or workflow aligns with and supports the business process for American Video Game Company.

E. Create a test plan with test cases for three different functional aspects of your software solution, including the following:
• preconditions for each test case
• steps for each test case
• expected results for each test case

F. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

G. Demonstrate professional communication in the content and presentation of your submission.[supanova_question]

The instructions below include sources to use for the research paper but still require 1 more outside source. Research

The instructions below include sources to use for the research paper but still require 1 more outside source.

Research Report #1: Data Breach Incident Analysis and Report
Scenario
Padgett-Beale Inc.’s (PBI) insurance company, CyberOne Business and Casualty Insurance Ltd, sent an audit team to review the company’s security policies, processes, and plans. The auditors found that the majority of PBI’s operating units did not have specific plans in place to address data breaches and, in general, the company was deemed “not ready” to effectively prevent and/or respond to a major data breach. The insurance company has indicated that it will not renew PBI’s cyber insurance policy if PBI does not address this deficiency by putting an effective data breach response policy and plan in place. PBI’s executive leadership team has established an internal task force to address these problems and close the gaps because they know that the company cannot afford to have its cyber insurance policy cancelled.
Unfortunately, due to the sensitivity of the issues, no management interns will be allowed to shadow the task force members as they work on this high priority initiative. The Chief of Staff (CoS), however, is not one to let a good learning opportunity go to waste … especially for the management interns. Your assignment from the CoS is to review a set of news articles, legal opinions, and court documents for multiple data breaches that affected a competitor, Marriott International (Starwood Hotels division). After you have done so, the CoS has asked that you write a research report that can be shared with middle managers and senior staff to help them understand the problems and issues arising from legal actions taken against Marriott International in response to this data breach in one of its subsidiaries (Starwood Hotels).
Research
1. Read / Review the readings for Weeks 1, 2, 3, and 4.
2. Research the types of insurance coverage that apply to data breaches. Pay attention to the security measures required by the insurance companies before they will grant coverage (“underwriting requirements”) and provisions for technical support from the insurer in the event of a breach. Here are three resources to help you get started.
a. https://woodruffsawyer.com/wp-content/uploads/2019/06/40842_Woodruff-Sawyer-Cyber-Buying-Guide_Final.pdf
b. https://www.travelers.com/cyber-insurance
c. https://wsandco.com/cyber-liability/cyber-basics/
3. Read / Review at least 3 of the following documents about the Marriott International / Starwood Hotels data breach and liability lawsuits.
a. https://www.insurancejournal.com/news/national/2018/12/03/510811.htm
b. https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/07/statement-intention-to-fine-marriott-international-inc-more-than-99-million-under-gdpr-for-data-breach/
c. https://www.bbc.com/news/technology-54748843
d. http://starwoodstag.wpengine.com/wp-content/uploads/2019/05/us-en_First-Response.pdf
e. https://www.consumer.ftc.gov/blog/2018/12/marriott-data-breach
f. https://news.marriott.com/2019/07/marriott-international-update-on-starwood-reservation-database-security-incident/
4. Find and review at least one additional resource on your own that provides information about data breaches and/or best practices for preventing and responding to such incidents.
5. Using all of your readings, identify at least 5 best practices that you can recommend to Padgett-Beale’s leadership team as it works to improve its data breach response policy and plans.
Write
Write a three to five (3-5) page report using your research. At a minimum, your report must include the following:
1. An introduction or overview of the problem (cyber insurance company’s audit findings regarding the company’s lack of readiness to respond to data breaches). This introduction should be suitable for an executive audience and should explain what cyber insurance is and why the company needs it.
2. An analysis section in which you discuss the following:
a. Specific types of data involved in the Starwood Hotels data breaches and the harm
b. Findings by government agencies / courts regarding actions Starwood Hotels / Marriott International should have taken
c. Findings by government agencies / courts regarding liability and penalties (fines) assessed against Marriott International.
3. A review of best practices which includes 5 or more specific recommendations that should be implemented as part of Padgett-Beale’s updated data breach response policy and plans. Your review should identify and discuss at least one best practice for each of the following areas: people, processes, policies and technologies. (This means that one of the four areas will have two recommendations for a total of 5.)
4. A closing section (summary) in which you summarize the issues and your recommendations for policies, processes, and/or technologies that Padgett-Beale, Inc. should implement.
Submit for Grading
Submit your research paper in MS Word format (.docx or .doc file) using the Research Report #1 Assignment in your assignment folder. (Attach your file to the assignment entry.)
Additional Information
1. To save you time, a set of appropriate resources / reference materials has been included as part of this assignment. You must incorporate at least five of these resources into your final deliverable. You must also include one resource that you found on your own.
2. Your research report should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings to organize your paper. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use.
3. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
4. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).
[supanova_question]

Research Project Details You will demonstrate an understanding of the course and Academic literature or preview review journal review by Essay

Computer Science Assignment Help Research Project Details You will demonstrate an understanding of the course and Academic literature or preview review journal review by completing the Final Research paper. You are required to complete one final research paper. The research paper provides you with an opportunity to apply competencies gained in the course and conduct research by reviewing different academic journals and peer-reviewed journals to select your topic, write the abstract, and develop a complete paper. It is highly recommended to submit the Abstract/paper at different conferences. It is required to submit your Grammarly report along with your Draft and Final Paper. Grading: The final grade for the Research Paper will be a composite of the scores on the following deliverables due at these Weeks: Week 4: Abstract and Outline (7%) – 100 points Week 7: Draft (10%) – 120 points Week 10: Final paper (11%)- 130 points Promoting Originality One or more of your course activities may utilize a tool designed to promote original work and evaluate your submissions for Plagiarism. More information about this tool is available in Grammarly. Phase 1: Assignment: Research Paper Abstract and Outline: Throughout this course, you will work on a research paper on a course-related topic of your choice and approved by your instructor. This research paper is an opportunity for you to personalize the concepts you are learning in this course. Ensure to pick a topic that you can find substantial research papers and articles to support your research paper. Through the course, you will complete the following: In Week 4, you will submit the research title after approval of your instructor and submit the abstract with the outline In Week 7, you will submit an intermediate draft of the research paper. In Week 10, you will submit the final draft of your paper In week 4, select a topic for your research paper and get it approved by your instructor. Then, submit an abstract on your paper topic. The abstract is an executive overview of your paper. Develop an outline along with references It should be a 150-300 words summary that would be appropriate to give your instructor so that they would know the essence of your project without reading the paper in its entirety. Please identify the external sources you will use for further research. Outline Overview: Provide a brief outline of your project (approximately 1–2 paragraphs, including your intended thesis statement) along with an outline of the proposed project (introduction, key points, and conclusion, etc.) Add main topic headings with appropriate subheadings (2–4 subheadings are suggested). The outline might be modified as needed for your topic. Ensure your choices of headings and subheadings are appropriate, given the literature that is available on your chosen topic. Your outline will likely be modified by the discovery of additional research on your topic. Include at least one reference appropriate for each main section of your paper. References must be primarily concerned with that specific topic and not simply report on the topic as part of its introduction or discussion. Include a Reference page following the APA format (6th Edition). Use the APA writing guidelines for all submissions related to this assignment. Detail any issues or challenges you foresee related to the final project along with any assistance that your instructor can provide in the coming weeks. Your outline should demonstrate a clear understanding of the topic to be studied, the methodologies involved, the challenges that need to be resolved, and the appropriate resolution strategy. Note: Use the Talladega College Library to find different articles Rubric For: Abstract, Draft and Final Paper Criteria Rating 15 Pts 12 pts 10 pts 5 pts 0 pts Topic [supanova_question]

Create a class Square with attribute Border_length, with default value = 1. Provide member functions that calculate the perimeter and

Create a class Square with attribute Border_length, with default value = 1. Provide member functions that calculate the perimeter and the area of the square. Also, provide set and get functions for the Border_length attribute. The set functions should verify that Border_length is a floating-point number larger than 0.0 and less than 15. Define a square object on the main and find the perimeter and the area of the square with 6 border length[supanova_question]

of artificial intelligence concepts and methods to advertising and marketing activities.

I Have feedback from my professor and I need to modify the proposal the Most important part is to find the data

It is clear you have not looked at the data to understand what it represents. I should not be doing this work for you, but I had a look at the data and can give you a hint: you should research libsvm data format in relation to the data you say you want to use.

Without understanding of the data, you have of course also not defined the research problem: what are your inputs and what output is your ML system going to try and extract from it.

It would be good to say which approaches you are going to compare in your investigation.
Saying “supervised, unsupervised and reinforcement learning” is too generic and I don’t think you intend to compare all three.
You talk about comparing user-centric and content-centric approaches – but as far as I can see you do not have the data to do this comparison. Once again, analyse what you’ve got first – make sure you understand the data fully and convince yourself it is sufficient for your problem. Otherwise, either change the problem to suit the data or find more suitable data to suit the problem. (also note that your Kaggle test data (https://www.kaggle.com/c/cs420-2019-ctr-prediction/data) does not appear to have groundtruth. I think they may want you to submit the solution to get the performance score. I am not sure it is still possible to submit as the competition is closed. Think about how you would get around this issue)

In your proposal you talk about measuring things like cost per click and average order value, investigating ways to maximise profit etc. Once again, you don’t have data to investigate all this as far as I can see (if I am wrong, tell me how you want to do this).

Reminder: research is not literature survey.

Your proposal still does not have a list of deliverables.

About your resources:
Jupyter notebook is too generic, are you planning to use any python ML libraries?
I am also concerned about you listing GitHub as a resource. You cannot just use other people’s code for this project. I hope you understand.
Finally, the text of your proposal is still not in your own words and consists of plucked out sentences with marginal modifications. You have been warned that this is not acceptable.

there are some points we need to address to avoid problems down the line.

1. Problem definition: make it explicit in the proposal. You say it is targeted advertisement. So, your problem can be defined as that of prediction of some behaviour output X (e.g. click or no click) based on the input of content and user profile (you will need to discuss how you can represent/quantify “user profile” and “content type”).
2. Data: “Kaggle advertisement database” is vague. The availability of specific data will dictate the problem formulation to a large extent.
3.Novelty: it looks like you are doing an investigation/experiment type dissertation where you are comparing different methods to solve a specific well-defined problem (as discussed above). The methods compared should be qualitatively different and not just tweaking of the same pipeline.
Please note: solutions to the Kaggle competitions related to the data are available . However, you must not base your investigation exclusively on the existing implementations. You must devise and implement a solution to the problem yourself or adapt some existing method to the problem. The method in the core of your implemented approach should be different from the implemented approaches presented on Kaggle but not necessarily better performing. Then you compare your solution to the results for the method(s) published on Kaggle and analyse the differences in performance. Always make it explicit when you quote the results obtained by somebody else. If you run existing implementations for comparison yourself, make it explicit your used somebody’s else solution and implementation.
4. Scope: we will need to narrow down to a set of qualitatively approaches you are going to test as potential solutions to the defined problem (see above) and make it clear which one(s) are your own design and implementation (and if there is any novelty in the algorithm you propose) and which one(s) are third-party. Don’t try to do too many, rather try to find maybe 3 that are fundamentally different (“quality over quantity”). The set must be exactly defined after you have done your literature survey. At this stage however, you can discuss scope definition in more generic terms in your objectives, similar to the way I describe it here.

Further, I have made comments in the pdf of your proposal. See the document attached (hover the mouse over the highlighted text to see my comments).
NB! Apart from the technical issues listed above, my biggest concern is the way you write by plucking out sentences from different sources with minimal paraphrasing. This is bordering on plagiarism and could result in very serious consequences if you write your dissertation like that. I must warn you about it now because I don’t want you to get problems later on. Believe me, it is immediately clear to the reader when you do it as the style of writing is evidently not your own and very eclectic with references to things not mentioned anywhere else in the text. In the pdf I give some tips how to approach this in a better way while still using the sources. I think you need to re-write your proposal introduction in your own words based on my feedback. Also review your sources as many of them are not academic.

To summarise, using the suggestions above and my comments in the pdf, develop your proposal further. Here are the key points:
Content-wise you need to include points 1-4 listed above in the objectives/deliverables section of the proposal to make it better defined and also write a project plan with a timeline.
Presentation-wise you need to re-write the introduction in your own words.

How about including your code development environment? Are you going to code in python? Which libraries are you going to use?

Any hardware needs? A GPU?

A lot of your references are from non-academic sources. You should stick to papers from reputable venues. A random webpage is not an academic source.[supanova_question]

write literature on HAR, various features from the data set (the data sets often consisting of raw accelerometer data

write literature on HAR, various features from the data set (the data sets often consisting of raw accelerometer data together with some participant demographic data) .
1- features can be used directly
2- constructed features.
Focusing on recent literature, what kinds of features are generally used, and what justification/evaluation do authors provide for using them, Ideally, you should give an overview of both the
1- important categories of features
2- the feature selection methods used.
the paper will have
abstract
I. introduction that introduces the need of features extraction and selection in Human activity recognition
II. Features are divided into several representation domains
1- features can be used directly
2- definition , 2-main features – 3-technology, algorithms, methodology do they use to use these 4- results5- strength and weaknesses of these features and the reasons

3- constructed features.

Time-domain features
Frequency-domain features
Wavelet transforming
deep learning feature
in each type you will talk about 1-definition, 2-main features – 3-technology, algorithms, methodology do they use to extract these features 4- results5- strength and weaknesses of these features and the reasons
including general Diagrams and tables that summary the main ideas group each type of features extractions (not from the papers

III. features selection in Human activity recognition
(in each way of selection you will talk about – 1-technology, algorithms, methodology do they use to select 2- data 3- results4- strength and weaknesses of these features and the reasons
including general Diagrams and tables that summary the main ideas group each type of features selection (not from the papers)
V. Dissection
based on the research, to what extent are the features chosen based upon preexisting work in the literature, and to what extent is it based on empirical evaluation? In your survey of the literature, find category of feature or feature selection technique which might be useful in further experiments
VI. conclusion
[supanova_question]

Q1 W1: What is Risk? Discussion Questions: In your own words, define risk. How does your definition align with the

Computer Science Assignment Help Q1 W1: What is Risk? Discussion Questions: In your own words, define risk. How does your definition align with the term in security management? What are some of the fundamentals in risk management? Also, what are the appropriate framework(s) and legislative acts that define risks in security risk management? How does the Department of Homeland Security assist policymakers and leaders to understand the purpose of risk management? NOTE: 500 words APA 6th edition format 2 Reference and 2 citation No Plagiarism Q2 W2: America’s Critical Infrastructures Discussion Questions: Identify the nation’s 16 critical infrastructures. Choose one infrastructure, discuss what agency is responsible, and why it was identified as the lead agency responsible for that particular CI. Also, include what government agency you feel should be included in the responsibilities of maintaining and preserving the CI, and why. Finally, discuss companies within the private and public sector and its responsibility and role(s) in working with government agency for the CI chosen. NOTE: 500 words APA 6th edition format 3 Reference and citation No Plagiarism Q3 W3: Are Acceptable Risks…Acceptable? Discussion Questions: Discuss the meaning of “acceptable risks,” as it relates to critical infrastructures, and how acceptable risks differ among different government entities and stakeholders. Is it beneficial for agencies to have external stakeholders? If so, should stakeholders be involved in risk management policies? Why or why not? If not, why not? NOTE: 500 words APA 6th edition format 3 Reference and citation No Plagiarism[supanova_question]

Write a four-page essay describing agile technologies, join application development, and rapid application development. Discuss how you can apply Essay

Write a four-page essay describing agile technologies, join application development, and rapid application development. Discuss how you can apply these techniques in your capstone project.

Project Instructions: Berkeley Elementary School is a small private school that has retained your services as a systems analyst to assist in the development of a new information system for the school’s administrative needs.

The essay must include a cover page, an abstract, a table of content, an introduction, a descriiption of Agile technologies, JAD, and RAS, conclusions, and a list of references. A minimum of five references are required and they must be cited in the body of the essay.

The references must be from reliable sources such as academic books, peer-reviewed journals, or peer-reviewed industry magazines. The entire essay must be formatted and written following the recommendations of the 6th edition of the APA Manual of Style.

This essay will be graded based on its quality, writing, and format.[supanova_question]

Part 1: Write a Pseudocode for Part II Part II: Create an automobile class that will be used by

Part 1: Write a Pseudocode for Part II

Part II: Create an automobile class that will be used by a dealership as a vehicle inventory program. The following attributes should be present in your automobile class:

private string make
private string model
private string color
private int year
private int mileage.
Your program should have appropriate methods such as:

default constructor
parameterized constructor
add a new vehicle method
list vehicle information (return string array)
remove a vehicle method
update vehicle attributes method.
All methods should include try..catch constructs. Except as noted all methods should return a success or failure message (failure message defined in “catch”).

Create an additional class to call your automobile class (e.g., Main or AutomobileInventory). Include a try..catch construct and print it to the console.
Call automobile class with parameterized constructor (e.g., “make, model, color, year, mileage”).
Then call the method to list the values. Loop through the array and print to the screen.
Call the remove vehicle method to clear the variables.
Print the return value.
Add a new vehicle.
Print the return value.
Call the list method and print the new vehicle information to the screen.
Update the vehicle.
Print the return value.
Call the listing method and print the information to the screen.
Display a message asking if the user wants to print the information to a file (Y or N).
Use a scanner to capture the response. If “Y”, print the file to a predefined location (e.g., C:TempAutos.txt). Note: you may want to create a method to print the information in the main class.
If “N”, indicate that a file will not be printed.

Provide Source code and //comments on code[supanova_question]

1 page: Security Proverb 2 is about Humans being the weakest link. Think about the brand marketing of Apple

1 page: Security Proverb 2 is about Humans being the weakest link. Think about the brand marketing of Apple and the iPhone as relates to security and privacy. Do you think that this incident has had an impact on how various groups with differing security / privacy needs view Apple and iPhone? What does this mean in the context of individual users (not enterprise users) who have a need for high privacy and security – think investigative reporters, political dissidents in repressive regimes, [supanova_question]

The instructions are attached in the pdf Question E, G, H will require references from the book in chapter Essay

Computer Science Assignment Help The instructions are attached in the pdf
Question E, G, H will require references from the book in chapter (4 and 5) that I will provide to you below

https://www.philadelphia.edu.jo/academics/lalqoran/uploads/A-Gift-of-Fire-4thEd-2012.pdf

if you have any problems accessing the book or you have any questions about the assignment, please contact me at[supanova_question]

This is a continuation of the previous work you have done I will attach all the required files. This Essay

This is a continuation of the previous work you have done I will attach all the required files. This is also the feedback on the previous work just do you have an idea (Each table can only store data relevant for a type of information – such as a table to track Student demographics or Faculty demographics. Never ask someone when they want a database or other project. You will tell them based on estimates after requirements are fully known. You are the business systems analyst. You don’t care about programmer schedules – you should care about customer data.
) if you need any information let me know thanks.[supanova_question]

a very strict senior seminar class that all we will focus on and DO is this class

We are building a piece of the websit every week and there is something due once a week no matter what. We have to strategize and do planners how we will do it for example a flow chart and essay first two things than once approved we will build the website on how the professor requested syallbus I have attached is the schedule and what we will be doing exactly and what the professor wants and expects nothing less. The last day for this is April 25,2022 I am from the states and communication is HUGE with me for the next month I need strong. If done good will give very nice bonus.[supanova_question]

of this work is to create an object to encapsulate a program. You must write a class that will be used in another Python script to manipulate the chosen program

The goal of this work is to create an object to encapsulate a program: Seqgen: http://tree.bio.ed.ac.uk/software/seqgen You must write a class that will be used in another Python script to manipulate the chosen program. We will use the Seqgen program as an example in this statement.Seqgen is a programmer used to simulate the evolution of nucleic acids or amino acids along a phylogeny. you are going to create a RunProg class that will manage the execution of this program. It is very important to understand how to run the Seqgen program from the command line. The diagram below describes the different services offered: RunProg __init__( paramsFile ) run() status() reset() view() read( file ) validparameters() __init__( self, paramsFile ): The constructor takes as a parameter a configuration file indicating the execution parameters of the Seqgen program. run( self ): Starts the execution of Seqgen with the parameters provided to the constructor. Execution should not be blocking. status (self): returns the execution status: (0) not started / (1) in progress / (2) completed successfully / (3) completed with failure reset ( self ): Allows you to interrupt the execution and erase all traces of it. view (self): returns the list of generated files RunProg you are free to define your attributes – __init__( paramsFile ) – run() – status() – reset() – view() – read( file ) – parametersValides() read (self, file): returns the contents of the file (if it exists). validparameters(): indicates if there is at least one bad parameter in the configuration file.[supanova_question]

For this assignment, you must develop a data analysis strategy for your research study. You must then present your Essay

Computer Science Assignment Help For this assignment, you must develop a data analysis strategy for your research study. You must then present your design in a presentation.

Your presentation should include the following:

Title Slide
Introduction
Problem Statement
Research Purpose
Research Questions
Definition of Key Terms
Review of the Literature
Validity of Research Topic
Hypothesis
Research Design
Proposed Data Collection Strategy
Proposed Data Analysis Strategy
Resources
150-200 words of speaker notes for each slide to assist with the delivery of the presentation
Recording of your presentation of each slide using the recording feature in PowerPoint

References: Include a minimum of 5 scholarly resources.

USE THE ATTACHMENT TO GUIDE YOU. ITS THE FINAL PAPER THAT THE PRESENTATION SHOULD BE ON.[supanova_question]

Reflective Essay Task: Explain how the process of completing your research project has affected your understanding of an issue

Reflective Essay

Task: Explain how the process of completing your research project has affected your understanding of an issue or event in society.

Length: At least 1200 words

Sources: No minimum number of sources. Cite any sources you use in APA format.

Due date and grading: This assignment is due by the end of Week 8. It is worth 10% of your course grade and will be graded with a rubric. To view the rubric, access the assignment from the Assignments area of the classroom.

Outcomes you should achieve by completing this assignment

Organize information clearly in an explanatory essay (Course outcomes 3 and 4)
Use an introduction paragraph with a thesis statement and a concluding paragraph to frame an essay (Course outcomes 3 and 4)
Demonstrate accurate grammar and mechanics in writing (Course outcome 5)
Topic

You began your research project by reading an article from the news about a current issue or event in society. Your goal in this essay is to explain to your professor how the research and writing you have done for your research project changed your understanding of that issue or event. You will explain what changes occurred in your understanding and how those changes occurred.

Here are some questions you can consider in developing ideas for your essay:

What changes occurred in your understanding?
Do you know more about the issue/event now than you did before? (Probably!)
Do you look at the issue/event from a different perspective following your research?
Have you reconsidered opinions or assumptions that you held at the beginning of the semester?
How did those changes occur?
Which sources from your research had the greatest effect on your understanding?
Did the process of writing about your topic affect the way you thought about it?
What role did interaction with your classmates and/or professor play in your understanding of your topic?
Organizing and supporting your essay

Your essay must include an introduction, body paragraphs, and a conclusion.

The introduction should gain your reader’s attention, orient the reader to your topic, and state your thesis.

The body of the essay should include focused body paragraphs in support of your thesis statement. There are various ways you might choose to organize information in the body of your essay. Here are some suggestions you can consider:

You might focus each body paragraph on a step of the research process and how that step affected your understanding of the issue/event.
You might focus each body paragraph on your understanding at a particular time relative to the research process (before, during, after).
You might focus each body paragraph on a particular aspect of the issue/event and explain how your understanding of that aspect developed during your research.
The essay’s conclusion should answer the question “So what?” by placing the essay’s explanations into a larger context. To accomplish this, you can consider addressing one or more of these questions:

Will your current understanding of your event/issue affect your future actions or decisions? If so, how?
What lessons—about interpreting current events, about your field of study, about the research process—can be drawn from the experience of completing the research project?
Is research of the sort done in WRTG 112 a worthwhile activity? Why or why not?
Point of view

First person (I/me/my) is appropriate in this assignment, but second person (you/your) should be avoided.

Formatting your assignment

Incorporate these elements of APA style:

Use one-inch margins.
Double space.
Use an easy-to-read font between 10-point and 12-point.
Include a title page with the title of your paper, your name, and the name of your school.[supanova_question]

Refer to the “Sports Physical Therapy Case Exercises” in Chapter 1 of the textbook. Discuss the following in the Essay

Refer to the “Sports Physical Therapy Case Exercises” in Chapter 1 of the textbook. Discuss the following in the Discussion Board:

The Sports Physical Therapy database does not include a field for the hours that the therapist is working. For example, doing any sort of treatment requires set up and break down of equipment, reading patients’ charts, etc. In which table would you put the hours worked? What might be a better way to record when therapists begin their work and end their work?
What table might the database need to help determine the balance field in the Patient table? Would you want to record when a bill is paid and the amount? How would the insurance part of the bill be recorded?

Textbook
Concepts of Database Management
Lisa Friedrichsen; Lisa Ruffolo; Ellen Monk

More book options
[supanova_question]

This is the premise: Design a tourist kiosk that can be utilized to provide tourists with city information and

This is the premise:
Design a tourist kiosk that can be utilized to provide tourists with city information and reservation capability for categories such as attractions, activities, lodging, restaurants, and so on. It is your mission to determine at least 6 functional categories that you will present in the tourist user interface.

This is the Deliverables:
Select 2 of the Eight Golden Rules of interface design and give 3 examples of how you will apply these 2 principles to your overall design for the tourist interface.
What diversity accommodations, for potential users visiting your selected city, will you design for in addition to skill levels and age demographic?
What design modifications will need to be considered for this to be developed as a mobile application for use by city tourists?
Include an introductory paragraph as well as a conclusion paragraph.
[supanova_question]

Papers should be 2000 words-long each (endnotes and bibliography are not included in this count). 2. In addition to the

Computer Science Assignment Help Papers should be 2000 words-long each (endnotes and bibliography are not included in this count). 2. In addition to the cover page, a paper will consist of the following parts: introduction, body, conclusions, endnotes, and annotated bibliography. The endnotes and the annotated bibliography will be printed on separate pages. 3. Each term paper will have a cover page. Please, note that the title of your paper must be identical to the one approved by the instructor. 4. Each paper will be double-spaced using 12 p. size Times New Roman fonts. 5. Except for the cover page, all other pages should be numbered. 6. All notes and references should appear as endnotes (as opposed to footnotes). 7. In addition to the endnotes, you should also have an Annotated Bibliography section explaining in a few lines why you have chosen to rely on each of the sources referred to in your essay. Are they really relevant to your essay? Are they very reliable? Please, note that reliability is very important when TOPIC you will be writing about – This is the topic I choose. The present and future of the self-driving car. Several big companies are trying to build the first reliable self-driving car. In pursuing this goal, they are adopting, with variable degrees of success, different strategies. At the same time, many people are very critical of those initiatives because of their possible social impacts. Does the self-driving car have a future?[supanova_question]

Proposal::Why is Cloud Computing Important in the 21 Century.

This is a research Topic Proposal.
Format: Use Standard, Single-spaced memo Format
I will be sending this research topic proposal for approval from my Professor.

Audience: Your audience should be a professional audience within your field of study. (My field of Study is Computer Science)

Attached are two papers.

1) Research Proposal guide
2) Sample Research Proposal Paper.

This Paper is not the final paper. Its the research proposal.

Please, if you do need any more information, Do not hesitate to ask.
[supanova_question]

Database

This assignment relates to the following Course Learning Requirements:

CLR 2: Develop Advanced Database Design and Normalization
Objective of this Assignment:

This assignment simulates a real-world project where data comes from another system and is used to determine the design for a new database system. You will take denormalized data from extracts and take business reports (queries) and use them to create a data model and database design. You will use PowerPoint to create the data model and database designs for your solution in Oracle DBMS. You will submit a report explaining your approach, assumptions, models, and SQL used. This assignment simulates the work environment of a Canadian based company.[supanova_question]

must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide. You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course. Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt). To work on this task, please follow the link in the Web Links section below to the LoDs Postgre

Plan for and compose the sections of a real-world business report that can be created from the DVD Database on Labs on Demand (see link below), and demonstrate the functionality of the supporting SQL code by doing the following: A. Summarize one real-world business report that can be created from the attached Data Sets and Associated Dictionaries. 1. Describe the data used for the report. 2. Identify two or more specific tables from the given dataset that will provide the data necessary for the detailed and the summary sections of the report. 3. Identify the specific fields that will be included in the detailed and the summary sections of the report. 4. Identify one field in the detailed section that will require a custom transformation and explain why it should be transformed. For example, you might translate a field with a value of ‘N’ to ‘No’ and ‘Y’ to ‘Yes’. 5. Explain the different business uses of the detailed and the summary sections of the report. 6. Explain how frequently your report should be refreshed to remain relevant to stakeholders. B. Write a SQL code that creates the tables to hold your report sections. C. Write a SQL query that will extract the raw data needed for the Detailed section of your report from the source database and verify the data’s accuracy. D. Write code for function(s) that perform the transformation(s) you identified in part A4. E. Write a SQL code that creates a trigger on the detailed table of the report that will continually update the summary table as data is added to the detailed table. F. Create a stored procedure that can be used to refresh the data in both your detailed and summary tables. The procedure should clear the contents of the detailed and summary tables and perform the ETL load process from part C and include comments that identify how often the stored procedure should be executed. 1. Explain how the stored procedure can be run on a schedule to ensure data freshness. G. Provide a Panopto video recording that includes a demonstration of the functionality of the code used for the analysis and a summary of the programming environment. Note: For instructions on how to access and use Panopto, use the “Panopto How-To Videos” web link provided below. To access Panopto’s website, navigate to the web link titled “Panopto Access,” and then choose to log in using the “WGU” option. If prompted, log in using your WGU student portal credentials, and then it will forward you to Panopto’s website. To submit your recording, upload it to the Panopto drop box titled “XXX.” Once the recording has been uploaded and processed in Panopto’s system, retrieve the URL of the recording from Panopto and copy and paste it into the Links option. Upload the remaining task requirements using the Attachments option. H. Record the web sources you used to acquire data or segments of third-party code to support the application if applicable. Be sure the web sources are reliable. I. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized. J. Demonstrate professional communication in the content and presentation of your submission. File Restrictions File name may contain only letters, numbers, spaces, and these symbols: ! – _ . * ‘ ( ) File size limit: 200 MB File types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z[supanova_question]

Define the e-waste problem. What is happening and why is this an issue? What can manufacturers do to improve

Computer Science Assignment Help Define the e-waste problem.
What is happening and why is this an issue?
What can manufacturers do to improve the situation (raw materials, by-products, hazardous materials, health, recycling, refuse, etc.)?

Save this APA Example Template (DOCX) Download APA Example Template (DOCX)to your computer and use it for your essay.
The length of the response should be 4-5 paragraphs (about 400 words or up to 1.5 pages maximum). Do not write more than 1.5 pages of text.
Use 1″ margins.
Use Times New Roman, 12 pt. font.
Double line space.
Indent the first line of each new paragraph by .5″.
One space follows the closing punctuation of each sentence.
Cite a minimum of two references in the body of the essay using the APA Style:

Longer quotes need to be avoided in this short 1.5-page paper. Use your words to make your points.
The file submission will be screened for originality and plagiarism.

A TEMPLATE WILL ALSO BE PROVIDED[supanova_question]

readings from OWASP Testing Guide (Chapter 4: Input Validation, Chapter 4 Business Logic, and Chapter 5 Reporting) as a baseline provide the following test and analysis descriptions or discussions. This assignment has 6 parts which must be completed and documented according to the rubric. Please review the attached documents, including the rubic for more guidance.

Overview: This homework will demonstrate your knowledge of testing security controls aligned with Input validation and business logic. You will also use the recommended OWASP testing guide reporting format to report your test findings. Assignment: 1. Testing for Reflected Cross site scripting (OTG-INPVAL-001) ? The OWASP site list multiple approaches and examples for blackbox testing reflected XSS vulnerabilities. In your own words, describe Reflected Cross Site scripting. Then, List and describe 4 different examples that could be used for testing. Be sure to conduct additional research for each example to provide your own unique test example. This most likely means you will need to conduct some research on Javascript to make sure your syntax is correct. 2. Testing for Stored Cross site scripting (OTG-INPVAL-002) ? The OWASP site list multiple approaches and examples for blackbox testing Stored XSS vulnerabilities. In your own words, describe Stored Cross Site scripting. Then, List and describe 2 different examples that could be used for testing. Be sure to conduct additional research for each example to provide your own unique test example. This most likely means you will need to conduct some research on Javascript to make sure your syntax is correct. 3. Testing for SQL Injection (OTG-INPVAL-005) ? SQL Injection remains a problem in applications yet could easily fixed. The following SQL statement is in an HTML form as code with the $ variables directly input from the user. SELECT * FROM Students WHERE EMPLID=’$EMPLID’ AND EMAIL=’$email’ Would a form or application that includes this code be susceptible to SQL Injection? Why? What specific tests would you perform to determine if the applications was vulnerable? How would you fix this problem? Be specific be providing the exact code in a Language of your choice. (e.g. Java, PHP, Python …) 4. Test business logic data validation (OTG-BUSLOGIC-001) ? While reviewing some Java code, an analysis provided the following code snippets that contain logic errors. For each example, describe the issue and provide code that would fix the logical error: a. int x; x = x 1; System.out.println(“X = ” x); b. for (i=1; i d) ; { System.out.println(“Z is bigger”); } d. String m1=”one”; String m2=”two”; if(m1 == m2) { System.out.println(“M1 is equal to M2”); } e. The formula for the area of a trapezoid is: A = (b1 b2)/2 * h The following Java code is the implementation. Fix the logical error double area; double base1 = 2.3; double base2 = 4.8; double height = 12.5; area = base1 base2/2.0 * height; Demonstrate your fixed code work as anticipated with a couple different test cases. 5. Test integrity checks (OTG-BUSLOGIC-003) ? Conduct some additional research on Business Logic errors related to OTG-BUSLOGIC-003. In your own words describe and provide 2 unique examples of integrity checks. For your examples, provide specific testing methods for each case. 6. Test defenses against Circumvention of Work Flows (OTG-BUSLOGIC-006) ? Conduct some additional research on Business Logic errors related to OTG-BUSLOGIC-006. In your own words describe and provide 2 unique examples of circumvention of work flow. For your examples, provide specific testing methods for each case. You should document the results for the tests and your comments, and recommendations for improved security for each security control tested in a word or PDF document. Discuss any issues found and possible mitigations. Deliverables: You should submit your document by the due date. Your document should be well-organized, include all references used and contain minimal spelling and grammar errors.[supanova_question]

1. Review the videos and resources available online. 2. Select an Operating System you will research. 3. Select 1

1. Review the videos and resources available online.
2. Select an Operating System you will research.
3. Select 1 aspect of the operating system to provide additional information to share with the class. This may be an area of interest for you, something you want to know more about or something you are already an expert in and would like to share with the class.
5. Research this area using the resources available on BlackBoard or the Internet.
6. Create a BlackBoard Discussion Group Posting thread. Then post the following:
Name of the Operating System
Name of Area of Focus
Descriiption including items such as what it is, why it is used, why it is important, how to use it, etc. You need to post a complete response based on these suggestions. The posting length will be determined based on what is needed for you to express these points clearly but is expected to be a minimum of 1 to 1.5 typewritten pages.

Remember to include references for your information. This posting is part opinion and part research.
You should read a minimum of 2 other students’ postings and comment on their writings. Your comment must be more than yes, no, I agree, I disagree. It must be a thoughtful addition to the conversation around operating systems. For example, consider comparing and contrasting your own work with that of other students.[supanova_question]

Based on the results and analyses you produced for your Clifton Strengths Assessment coupled with the topics strategic leadership,

Based on the results and analyses you produced for your Clifton Strengths Assessment coupled with the topics strategic leadership, write a reflection piece to include how your assessment and the topic you have learned and engaged in this course have shaped and influenced you to be a better/effective IT leader.[supanova_question]

Case Study – Professional Issues in IT IT407

Computer Science Assignment Help This is the Instructions for the Assignment – PLEASE READ THEM CAREFULLY:
Please give me a unique answer (don’t copy and paste) because there is plagiarism.
Must Provide appropriate references you studied to prepare your answers
Use Times New Roman font for all your answers.
The Assignment must be submitted in WORD [supanova_question]

Mobile Application

Answer the below question with 300 words and two replies with 150 words each. You should have a total of 3 posts.
Think about the last time you utilized a mobile application or attempted to build your own mobile website. What planning process did you go through before you began your project? You may have considered the steps or tasks you needed to perform. You may also have considered the resources and platforms needed for your outcome. For example, which model fits your business domain needs? Do you have time constraints that will make completing the web application/site difficult within a reasonable period of time? You may also have considered the myths that surround developing mobile apps and the difficulties generally associated with mobile app development.
Why is mobile development difficult? Explain
How does design [supanova_question]

CIS 558 Identify three challenges organizations face when implementing

CIS 558. Identify three challenges organizations face when implementing change and patch management processes for the first time. Make suggestions to address these challenges.
Suggest the elements of change and patch management that are most difficult to audit in a large corporate environment with multiple IT issues and changes occurring every day. Provide a rationale for your suggestions.
2222222222222222222222222222
Create a list of at least five auditing best practices for organizations to follow when implementing their quality assurance auditing programs.
Select the auditing best practices you feel are most difficult to implement and offer means of addressing them.
[supanova_question]

Please follow all the requirements and complete the work as is requested. Gimme a high quality work with zero plagiaris

I have to answer this part of a group project.
Part 3: Wireless Security and Mobile Devices
Consider the security of mobile networks. Discuss specific policy and ethical issues for mobile devices.
Discuss the importance of wireless security and techniques to improve.
Present privacy and ethical issues related to the use of mobiledevices used by employees.
Argue for or against the legal rights of employers to monitor company-issued mobile devices.
Ties in concepts and theories from text and assignments to YOURBUSINESS with appropriate citations, i.e., not generic but tied to the fictional business described in your introduction.
[supanova_question]

Please follow all the requirements and complete the work as is requested. Gimme a high quality work with zero plagiaris

Computer Science Assignment Help I have to answer this part of a group project.
Part 3: Wireless Security and Mobile Devices
Consider the security of mobile networks. Discuss specific policy and ethical issues for mobile devices.
Discuss the importance of wireless security and techniques to improve.
Present privacy and ethical issues related to the use of mobiledevices used by employees.
Argue for or against the legal rights of employers to monitor company-issued mobile devices.
Ties in concepts and theories from text and assignments to YOURBUSINESS with appropriate citations, i.e., not generic but tied to the fictional business described in your introduction.
[supanova_question]

Please solve this question

Create a Windows Forms application using Visual Basic.
New Product: [text box] Add button
Existing Products: [combo box]
Current Order
[list box]
Selecting an existing product automatically adds that product to the current order (captured in the list box).
Clicking the Add button next to the text box will add the new product named in the text box to the combo box with the existing items.
Upload a zip file containing your entire project. Zip the project folder (and all subfolders and files) under C:Userssourcerepos
[supanova_question]

Database App

Exercise 12.25: Convert the example of

GEOMETRY_OBJECTs given in Section 12.1.5 from the functional notation to

the notation given in Figure 12.2 that distinguishes between attributes

and operations. Use the keyword INHERIT to show that one class inherits

from another class.
Exercise 12.26: Compare inheritance in the EER model (see Lesson 4) to inheritance in the OO model described in Section 12.1.5.
Exercise

12.28: Consider the COMPANY ER schema in Figure 3.2. Think of what

operations are needed for the entity types/classes in the schema. Do not

consider constructor and destructor operations.
Exercise

13.7: Create part of an XML instance document to correspond to the data

stored in the relational database shown in Figure 5.6 such that the XML

document conforms to the XML schema document in Figure 13.5.
Exercise 13.8: Create XML schema documents and XML DTDs to correspond to the hierarchies shown in Figures 13.14 and 13.15(c).[supanova_question]

Database Application2

Exercise 12.25: Convert the example of

GEOMETRY_OBJECTs given in Section 12.1.5 from the functional notation to

the notation given in Figure 12.2 that distinguishes between attributes

and operations. Use the keyword INHERIT to show that one class inherits

from another class.
Exercise 12.26: Compare inheritance in the EER model (see Lesson 4) to inheritance in the OO model described in Section 12.1.5.
Exercise

12.28: Consider the COMPANY ER schema in Figure 3.2. Think of what

operations are needed for the entity types/classes in the schema. Do not

consider constructor and destructor operations.
Exercise

13.7: Create part of an XML instance document to correspond to the data

stored in the relational database shown in Figure 5.6 such that the XML

document conforms to the XML schema document in Figure 13.5.
Exercise 13.8: Create XML schema documents and XML DTDs to correspond to the hierarchies shown in Figures 13.14 and 13.15(c).[supanova_question]

Database Application2

Computer Science Assignment Help Exercise 12.25: Convert the example of

GEOMETRY_OBJECTs given in Section 12.1.5 from the functional notation to

the notation given in Figure 12.2 that distinguishes between attributes

and operations. Use the keyword INHERIT to show that one class inherits

from another class.
Exercise 12.26: Compare inheritance in the EER model (see Lesson 4) to inheritance in the OO model described in Section 12.1.5.
Exercise

12.28: Consider the COMPANY ER schema in Figure 3.2. Think of what

operations are needed for the entity types/classes in the schema. Do not

consider constructor and destructor operations.
Exercise

13.7: Create part of an XML instance document to correspond to the data

stored in the relational database shown in Figure 5.6 such that the XML

document conforms to the XML schema document in Figure 13.5.
Exercise 13.8: Create XML schema documents and XML DTDs to correspond to the hierarchies shown in Figures 13.14 and 13.15(c).[supanova_question]

File Management

Part 1
Some

organizations are utilizing cloud computing storage. Discuss the

public, private, and hybrid types in relationship to file management and

backups with examples. Indicate the client operating systems that are

supported.
What are the security considerations and protection methods?
Part 2
After

working with traditional databases and methods through the last few

weeks, we’ll switch gears to look at another way to work with data in

relation to web forms and other needs. As we’ve seen, XML is a markup

language just as HTML and XHTML. What does it mean to be a markup

language as opposed to a programming or scripting language? A markup

language is human readable and uses plain language within markup tags to

direct a browser in what to do.
After

doing this week’s readings, explain your understanding of how XML can

be used to read/write data. Looking back at your plan for a website last

week, would it make a better choice than your original selection? Why?
[supanova_question]