ITCO331 – Unit 2 Individual Project

Using the Northwind database, write a SQL SELECT statement that will retrieve the data for the following questions:

•.Display the character constant ‘Greeting’ with a column heading of ‘Hello.’

                           1 row returned.

•.Display all data from the categories tables without specifying the names of the table columns. Order the results by CategoryName.

                           8 rows returned.

•.Display all employees’ names, last name first, and then first name, hire date and home phone number. Order the results by employee name, last name first, and then first name.

                           9 rows returned.

•.Modify query 3 so that the column headings are as follows: ‘Last Name,’ ‘First Name,’ ‘Date of Hire,’ and ‘Home Phone Number.’

                           9 rows returned.

•.Display the product name and quantity per unit, units in stock, and unit price for all products that have a unit price greater than $50. Order the results by unit price in descending order.

                           7 rows returned

•.Display the Name of all U.S.-based suppliers. Order the results by Name in ascending order.

                           4 rows returned.

•.Display the Order Id, ShipName, Order Date, and Freight of all orders that have a freight >/= 50 and </= 100; a ship country of Austria, Brazil, or France; and a Ship City that starts with an ‘S.’ Use, BETWEEN, IN, and LIKE for the WHERE clause conditions. Order the results by ShipName in ascending order.

                           13 rows returned.

•.Rewrite query 7 to remove the use of BETWEEN and IN, and replace with the equivalent use of =, <, >, </=, >/= and AND and OR expressions.

                           13 rows returned.

•.Select the Employee’s First Name, concatenated to the Last name, separated by a space. Call the column ‘Employee Name,’ the length of this employee name Length, the location of the first ‘a’ in the name ‘A Location,’ and the 5–9 characters from the name ‘Substring.’ Order the results by the Employee Name using the alias.

                           9 rows returned.

•.For each customer, show the number of orders placed, and the largest, smallest and total freight ordered. Only show those customers who have placed more than 15 orders.

 

9 rows returned.

week 8 case study

Assignment 4: Services in Your Area 
Due Week 8 and worth 80 points

Research DSL and cable modem services available closest to your community. You may use neighboring communities or regions if your community does not have access to DSL or cable modem services. Researched material must be focused on the technical aspects of DSL and cable modem services. Marketed documents, white papers, or other advertisements may not be used for the completion of this assignment.

Write a three to four (3-4) page paper in which you:

  1. Identify the DSL and cable modem services referenced in this assignment and the region(s) in which they operate.
  • Create a diagram of the DSL and Cable Modem connections to your ISP, cable organization, and telecom to your home router using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length.
  1. Compare and evaluate the speeds of DSL and cable modem that you researched.
  2. Compare and evaluate the cost of DSL and cable modem that you researched.
  3. Compare and evaluate the reliability of DSL and cable modem that you researched.
  4. Recommend DSL or cable modem based on the previous comparison and evaluation of services available closest to your region. Explain your recommendation.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

  • Compare and contrast among local area and wide area network technologies and architectures.
  • Use technology and information resources to research issues in communication networks.
  • Write clearly and concisely about communication networks using proper writing mechanics and technical style conventions.

Click here to view the grading rubric.

week 10 term paper plagiarism free with abstract

Term Paper: Networking
Due Week 10 and worth 160 points

Select one (1) of the following topics in which you will base your responses in the form of a term paper:

  • Network Neutrality
  • Web2.0
  • Wireless Technology
  • Broadband Convergence
  • U.S. Telecommunication Policy
  • Internet Security
  • IPv6
  • WWAN
  • WLAN
  • DNSSEC
  • WAN

Write a ten to fifteen (10-15) page paper in which you:

  1. Compose an executive summary highlighting the paper’s contents and reasoning for your chosen topic.
  2. Conduct a SWOT analysis by analyzing the strengths, weaknesses, application opportunities, and threats from competitors of the chosen topic.
  3. Evaluate the current ethical and legal concerns surrounding your topic.
  4. Select one (1) ethical or legal concern surrounding your topic, take a position on the issue, and provide rationale.
  5. Analyze the improvements over the last two (2) years to your communication technology topic, and suggest an improvement based on its current usage.
  6. Predict the future role of the communication technology you’ve selected for both personal and commercial use.
  7. Create a diagram that illustrates the communication structure of your chosen technology in Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length.
  8. Use at least eight (8) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

  • Evaluate the ethical concerns that communication networks raise in a global context.
  • Use technology and information resources to research issues in communication networks.
  • Write clearly and concisely about communication networks using proper writing mechanics and technical style conventions.

Click here to view the grading rubric.

IT

 

 

 

General Guidelines.


CMPT641 IT for Managers Assignments Assignment 1


 

·       Read the questions through and make sure you understand them. The questions are open- ended, and you are expected to do your own research on each topic to answerthem.

·       Make sure you don’t simply list or copy and paste information from your sources. I expect you to synthesize your findings with you own words. All papers are submitted to Turnitin.

·       Use a maximum of 2 pages (double space) per question to answer them. [Title & references pages excluded]. Use Times Fonts (12), leftaligned.

·       Upload your assignments to the course website according to the deadlinesposted.

·       Remember, I am looking for your insight not other sources’ opinions. Ensure that cite and list the references you use (max. 10% of paper content) usingAPA.

 

 

HINTS:

DO NOT REPEAT the question – paraphrase it as a heading.

INCLUDE and Introduction and a Conclusion for each part (question). Hint: introduce the reader to the content of your paper.

 

1.     Question:E-Business

 

How does an e-Business differ from a regular business in terms of value perceived by customers? What can e-businesses do to increase this value and consequently increase sales and profitability?

 

2.     Question: ITGovernance

 

What is IT governance referring to? Why is it important? How does one implement it? Answer these question using a brief (two-page memo) to your boss – the president of your company.

 

3.     Question: ITOutsourcing

 

Describe the advantages and disadvantages of IT outsourcing. Find specific examples support your arguments.

information security

Grumheed Corporation

Dallas/Fort Worth Facility

 

Grumheed Corporation (GC), a world leader in advanced tactical drones, plans to open a facility in the Dallas-Fort Worth metroplex.  While having not settled on an exact location, ideally the facility will be within two miles of the Dallas-Fort Worth International Airport via major highway. While maintaining our original facility in Boston, the new campus will become the primary location for research and demonstration of equipment and sales.  Since our company produces state-of-the-art military equipment, this new complex must have all possible security measures.  Visitors, potential customers, current customers, support staff, design engineers and demonstration staff will all be housed in this 100,000 square foot facility. For BC/DR purposes the data warehouse will be duplicated to the Boston facility nightly.

 

This is a list of requirements facility:

·         Controlled access to the building for everyone.

·         A lobby, conference area, and sales area that needs controlled access

·         A highly secure area for system designers

·         An extremely secure area to house the data center.

·         Secure transfer of archival data between Dallas and Boston

·         Secure access to the Internet for employees

 

 

Please present a detailed proposal of your recommendations for physical, technical and administrative security measures for our new facility. In your proposal please recommend categories of countermeasures and the associated risks that the countermeasures mitigate. You are not expected to recommend a specific brand/model of a countermeasure. Please include a section detailing additional risks that have not been mitigated by your proposal.  Your proposal should be a minimum of 1500 words and properly site all references.

Disussion

1Q)

 

What concerns should be understood about data communications being sent over wireless networks? Discuss the pros and cons of one method of transmission, such as Wireless Application Protocol (Search the Internet for help in wireless networks). 

I need 250 words without plagarisms.

2Q)

 

In the business environment, most companies or businesses rely on the computers wireless networks. This allows them to communicate vital information either to their clients, investors, suppliers or even internally between the manager and his subordinates or subordinates to subordinates. Information system security aims at protecting this information or information systems from unauthorized access, disruption, modification, disclosure, usage and destruction (Hossain et al., 2015).

The concerns that should be understood by individuals and companies about data transfer are the data security and data privacy as they try to send data via air through the wireless networks. Hackers have tried to penetrate network connections to spy, tamper and steal the information about companies, products, and customers and they can also change the information or make software’s dysfunction (Hossain et al., 2015).

Wireless Application Protocol

The wireless Application protocol is defined as a protocol in communication mostly for the purposes of data access wirelessly using networks of mobile wireless (Sarkar et al., 2016).

Pros

Wireless application protocol has enhanced the efficiency of data transfer since most of the of the network operators, hardware manufacturers and software application developers have worked to in co-operating WAP in their worldwide products in the bid of reaching as many users as possible. WAP has managed to add features like personalization and wireless telephony application which has improved the privacy level and users can even make calls using the application without needing to enter the telephone number. WAP is easier and cheaper to install especially in business setup since there is no need to buy and install internet cables. WAP offers a higher level of flexibility since the workers in an office-based wireless setup can network without sitting in a dedicated computer and be productive even while away from the office (Sarkar et al., 2016).

Cons

WAP is more exposed to attacks from unauthorized users who may tend to access information of individuals or companies requiring more expenses in security installations. WAP is slower and less efficient compared to wired networks and will, therefore, require a wired backbone network. WAP usually have a network coverage problem resulting in black sports where there are no signals for example in buildings with steel reinforcements. WAP has installation problems especially in areas where other wireless technologies are in use or radio interference exists which slows down the wireless communication (Sarkar et al., 2016).

REFERENCES:

Hossain, M. M., Fotouhi, M., & Hasan, R. (2015, June). Towards an analysis of security issues, challenges, and open problems in the internet of things. In Services (SERVICES), 2015 IEEE World Congress on (pp. 21-28). IEEE.

Sarkar, S. K., Basavaraju, T. G., & Puttamadappa, C. (2016). Ad hoc mobile wireless networks: principles, protocols, and applications. CRC Press.

I need  a response of above post with 150 words.

Thanks

week 2 assignment 1

Assignment 2: Database Systems and Database Models
Due Week 2 and worth 90 points

The Strayer Oracle Server may be used to test and compile the SQL Queries developed for this assignment. Your instructor will provide you with login credentials to a Strayer University maintained Oracle server.

Imagine that you have been hired as a consultant to assist in streamlining the data processing of an international based organization that sells high-end electronics. The organization has various departments such as payroll, human resources, finance, marketing, sales, and operations. The sales department is the only department where employees are paid a commission in addition to their yearly salary and benefits. All other departments compensate their employees with a yearly salary and benefits only. Commission is paid by multiplying the employee’s commission rate by the total amount of product units sold. You have access to the following data sets:

  • Employee (EmpNumber, EmpFirstName, EmpLastName, CommissionRate, YrlySalary, DepartmentID, JobID)
  • Invoice (InvNumber, InvDate, EmpNumber,  InvAmount)
  • InvoiceLine (InvLineNumber, InvNumber,  ProductNumber, Quantity)
  • Product (ProductNumber, ProductDescription, ProductCost)
  • Department (DepartmentID, DepartmentDescription)
  • Job (JobID, JobDescription)

Write a two to three (2-3) page paper in which you:

  1. Design a query that will allow the finance department to determine the commissions paid to specific employees of the sales department for the month of December. Note: You will need to generate the tables described above (Employee, Invoice, InvoiceLine, Product, Department, and Job) in order to compare and validate your code. Validated query code must be part of your paper.
  2. Compare the code of the query you designed in Question one (1) to one that would show how much total compensation is paid to each employee for the same month.
  3. Determine and explain the factors necessary to ensure referential integrity.
  4. Create an object-oriented model to show how the tables are interrelated through the use of graphical tools. Make sure that you are able to show the relationship types such as 1:M, 1:1, or M:1. Additionally, remember to include the determined factors from the previous assignment requirement. Note: The graphically depicted solution is not included in the required page length.
  5. Identify which data components are the entities and attributes, and the relationship between each using an object representation diagram through the use of graphical tools. Note: The graphically depicted solution is not included in the required page length.
  6. Describe how Big Data could be used to assist in the productivity and forecasting of the organization’s products and resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Describe the role of databases and database management systems in managing organizational data and information.
  • Design and implement a database solution to solve a proposed business problem.
  • Use technology and information resources to research issues in the strategic implications and management of database systems.
  • Write clearly and concisely about topics related to the strategic planning for database systems using proper writing mechanics and technical style conventions.

Click here to view the grading rubric. 

Discussion

1Q)

 Describe and discuss at least two backup strategies. Discuss the use of cloud backup strategies, as well? 

I need 250 words.

2Q)

 I Need a 150 words response of below post.

 

Data backup is of critical importance and it comes to play in the events of hardware failure, system outage, data loss or any natural disasters. Two of the backup strategies which can be used are Incremental Data base backup and complete database backup (D C. & Y H., 2010). A complete database backup takes the whole database which includes entries from all the transaction logs. This restoration process overrides the present database and creates a database if it is not present (D C. & Y H., 2010). At the time of backup completion, the restored database state matches with the state of database. Incremental database backup captures and records the data that has changed from the last incremental database backup that was done. During this restore process, incremental database backups can be used to restore to a point to which the incremental backup is done (D C. & Y H., 2010). Complete database backup takes more storage space for backup compared to the incremental backup. Incremental backups are usually smaller compared to complete database backups and also they are relatively faster. It is good to make frequent incremental backups as it will decrease the risk of data loss.

Cloud based backup strategy is a most popular process of data backup which involves sending a database copy to a remove server over the internet (Lo, 2018). Hybrid clouds are used for back up processes and the advantage of using hybrid clouds is that a secondary data center is not needed for the enterprises (Lo, 2018). Cloud to cloud backup is one other strategy that involves copying the data from one cloud to another cloud. Cloud disaster recovery is growing trend in backup strategies as this involves storing copies of company’s data in a cloud environment. This allows clients and users to run applications from cloud hosted virtual servers. The main advantage of cloud based strategy is that the copies of data stored over cloud can be isolated from the data centers (“Server Virtualization using Cloud Environment for Data Storage & Backup,” 2016). Hence data is backed up and is protected from the events of data loss. Though there may be disadvantages like large recovery times due to internet bandwidth, cloud is a growing key trend which is expected to solve backup related issues in future.

Disaster Recovery Team

Consider a scenario where the contingency planning management team (CPMT) of your organization has designated you as the disaster recovery team leader, and the preparation and planning of this component of the security program is now under your purview with a team of 11 employees including yourself.

Write a two to three (2-3) page paper in which you:

  1. Detail the DR team roles, responsibilities, and sub teams that would be implemented, and construct an organizational chart for the team through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
  2. Describe the proper procedures and policies that would be implemented specific to the DR team personnel as well as special equipment that would be required.
  3. Draft an executive summary to the DR plan and explain the purpose of the plan and high-level specifics for upper management.
  4. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Develop a disaster recovery plan for an organization.
  • Compare and contrast the methods of disaster recovery and business continuity.
  • Develop techniques for different disaster scenarios. 
  • Use technology and information resources to research issues in disaster recovery.
  • Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions

Help With Discussion question In Telecommunications and Network Subject

 

Discussion Requirements

Refer to the handout to begin the discussion.

Tasks

Discuss the roles and motivations for developing and enforcing VPN-related policies. Consider the types of users and groups that might use VPN services. Discuss how they are permitted to use those services, and what misbehaviors should be observed by answering the following questions:

  • What defines acceptable use?
  • How can policy violations be identified and handled?
  • Why can some VPN users have greater privileges or better access than others?

Summarize your thoughts in a Microsoft Word document checking for spelling and grammar, then submit it directly (cut & paste) into the discussion thread. Respond to at least two other students’ views to engage in a meaningful debate regarding their posts or to defend your post.

Required Resources

Submission Requirements

  • Format: Please enter directly into the Discussion Question window
  • Citation Style: Follow APA
  • At least 300 words
  • Spelling and Grammar count so I suggest you first type your post into MS Word and check for spelling and grammar. You can then cut & Paste into the Discussion Question thread.

Self-Assessment Checklist

  • I explained acceptable and unacceptable forms of use.
  • I explained how policy violations can be identified and handled.
  • I explained why some VPN users can have greater privileges or better access than others.
  • I responded to at least two other students’ views to engage in a meaningful debate regarding their choices or to defend my choices.