Given the ERD in this document, write the CREATE TABLE statements to construct the tables for this database.

Lab: Structured Query Language (SQL) Queries Data Definition Language (DDL) Create Table Assignment Instructions

Instructions          

In SQL Server, create a new database called University.

Given the ERD in this document, write the CREATE TABLE statements to construct the tables for this database.  Be sure to use reasonable data types and create all tables, attributes, primary keys, foreign keys, and “not null” constraints in your statements where appropriate.

To receive full credit for this assignment, your CREATE TABLE statements must be executed in SQL Server.

In a new Word document, copy the ERD and type your CREATE TABLE statements below the ERD.  Then, in SQL Server, after you execute each CREATE TABLE statement, issue these two statements:

SELECT * FROM [table name]

exec sp_help [table name].

Note:  exec sp_help [table name] is a built-in stored procedure that you run to easily see your table structure, including fieldnames, data types, primary keys, foreign key constraints, etc.  It’s a very useful tool. 

Take a screen shot of your queries and their results and paste the screenshot below each CREATE TABLE statement.  Put each table on a separate page of your word document.

To illustrate, the Campuses table has been created for you on the page following the ERD and Narrative Description section.

Start with an opening line that catches the eye of the admissions committee. Highlight the most prominent reason why you have chosen to pursue MS in CS in particular. Mention what you aspire or aim to achieve through the program.

Statement of Purpose for masters of Computer Science Application

Introduction SOP for MS in CS?
The first paragraph should be smart and creative. Here are the major elements you should definitely consider while writing your SOP for MS in CS:
• Start with an opening line that catches the eye of the admissions committee.
• If you have noticed the sample SOP for MS in CS, we have begun with an interesting introductory line and then connected it to the aspirations of the candidate.
• Highlight the most prominent reason why you have chosen to pursue MS in CS in particular.
• Mention what you aspire or aim to achieve through the program.

Second Paragraph for SOP for MS in CS
For the second part of the SOP for MS in CS should talk about your academic milestones and achievements.
• A brief and concise representation of your academic quest.
• Mention that through your previous academic degree you have learnt how to apply knowledge to practical situations that aren’t restricted to written examinations and the marks that go with them.
• Talk about their projects and work experience to highlight what they have learned during the four years in their respective colleges.

Third Paragraph of SOP for MS in CS
If you see our sample SOP for MS in CS, the third paragraph talks about the extracurricular activities of the student. The elements of this section are as follows:
• Any kind of volunteer work, internship, research activities or training programs the student was involved in should be mentioned.

Fourth Paragraph of SOP for MS in CS
For the fourth paragraph of your SOP for MS in CS, you must start focusing on what you are aiming to fulfil in your career journey.
• It mention the goals and aspirations of the student.
• Making an effort to understand the university or college and mentioning the core subjects is a good way to show the institute how interested you are in attending their course.
• Research about the professors of CS in the university and their projects for additional references as adding your knowledge about the institution is another good idea since the admissions committee will appreciate your enthusiasm and see how their teachers and the overall program inspire you

Conclusion
The last and concluding paragraph of an SOP for MS in CS should be just as impressive as the first one. In this paragraph of the SOP for MS in CS, you can talk about how the institute will gain a capable and outstanding student, who will give their all to maintain the stature of the university and succeed.

Discuss how a web site and a web page are related as well as how the World Wide Web has impacted how individuals live and how companies conduct business. Explain briefly how hypertext markup language (HTML) is used to create web pages and include some of the programs that can be used to create web pages in your discussion.

 Computer Science Illuminated

Chapter 16

In Chapter 16 we learn about some of the underlying technologies of the Web that make it a productive tool for a variety of applications. You will show your knowledge of the topics by answering the following questions.

1. Discuss how a web site and a web page are related as well as how the World Wide Web has impacted how individuals live and how companies conduct business.

2. Explain briefly how hypertext markup language (HTML) is used to create web pages and include some of the programs that can be used to create web pages in your discussion.

3. Describe how online social networks are utilized in our society currently as compared to social networks that existed before the Internet and online versions of social networks. Discuss how these types of networks are similar.

Chapter 17

In Chapter 17 we learn about computer security from the standpoint of techniques for preventing unauthorized access to information, types of malicious code used to circumvent security measures, and security issues related to social media. It is important to understand how to properly develop and implement a comprehensive security plan. We will focus on the fundamental aspects of a security plan. You will show your knowledge of the topics by answering the following questions.

4. Discuss the importance of the CIA triad as it relates to information security.

5. Explain the purpose of a company completing a risk analysis as well as the concept of separating the available data management privileges so that no single individual has too much authority over key activities.

6. Discuss some of the methods that are utilized to prevent unauthorized access to information and include the three general types of authentication credentials in your answer.

The purpose of the Exercise is to help you better understand the key points. It is not sufficient to state your opinions alone; you must be able to back up your responses by applying concepts and topics from the text with the information that supports your findings. The expected response length is 3-5 sentences per question.

Be as thorough as possible when writing your responses, and remember, this is an academic assignment, so no “text-talk,” no conversational tone, and ABOVE ALL OTHER THINGS… don’t plagiarize!! Lastly, spell-check and proofread your work! Failure to follow these steps will negatively impact your grade.

 

Class book: Computer Science Illuminated (Ed. 7)
by Dale, Nell, Lewis, John (chapters 16 and 17)

Develop your designing skills, practice your mind to have an eye for what could help lead to a good user experience by changing your way of thinking from a developer to an analysis and UX designer.

HCI Project Description

Free Ideas

This course project aims to develop your designing skills, practice your mind to have an eye for what could help lead to a good user experience by changing your way of thinking from a developer to an analysis and UX designer. In this project you’re going to go through a number of phases to produce your final interface design. Phases such as: Observation and inspiration, Paper prototyping, Dynamic prototyping, Feedback, Usability Evaluation, ..etc. .

As for the project description, you have the freedom to choose your project idea, scope, and features with only few constraints:

The targeted users should be within college students age, for usability testing reasons.

Project features should not be less than the number of team members.

All ideas must be approved by your instructor before starting.

As a designer, think about the perfect website/application which will help you solve the suggested problem. Your project can contain any features that would help you be productive, achieve great results, and deliver a good user experience.

Just remember to be creative and unique. Enjoy every step throughout this project.

 

Write down a paragraph giving an abstract view of your project including the main goal of your project, the device that it is going to run on, and the targeted users.

Project Description and Specification:

Write down a paragraph giving an abstract view of your project including the main goal of your project, the device  that it is going to run on, and the targeted users.

Ex. This project is aiming to design a user interface and a user experience for….

Main Features of the project:

List the main requirements/features of your app/website. Notice that it should NOT be less than the number of team members, however can be more.

The objectives are met through a series of assignments.

1: Prepares the project idea and the groundwork.

2: Create a paper prototype.

3: Create interactive  prototype using

4: Synthesize feedback on your design.

5: Usability evaluation.

6: Editing dynamic prototype after usability evaluation.

7: Final project presentation.

Provide details of the malware. Identify the exploited vulnerability and its attack vector. Analyze the vulnerability to determine 2 risks of this malware.

Playbooks, sometimes known as Standard Operating Procedures (SOPs) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, or diagrams, all of which make it easy to follow troubleshooting instructions.

Throughout the next 4 weeks, you will develop a playbook for a fictional company that hired you to write their playbook and manage the team. The first portion of the playbook is a response to malware found at the company.

Outline a 2- to 3-page playbook to address a malware attack of your choice.

Complete the following in your playbook:

Provide details of the malware.
Identify the exploited vulnerability and its attack vector.
Analyze the vulnerability to determine 2 risks of this malware.
Outline step-by-step instructions on how to resolve the malware attack.

Remember, numbered or bulleted steps or guidelines make the document easy for others to follow under potentially stressful situations. Paragraphs can be used to help support the steps and guidelines.

 

Note: You will use content from this assignment as part of the Summative Assessment you will submit in Week 3.

What are best practices in technical techniques to detect and limit wireless network footprinting? What are best practices in technical techniques to detect and limit web services footprinting?

Assignment Details CSIS461: Technical Aspects of Computer Security (D01)

Description
After reviewing the information in the Learn section for this Module: Week, discuss all of the following:

• What are best practices in technical techniques to detect and limit wireless network footprinting?

• What are best practices in technical techniques to detect and limit web services footprinting?

• What are the methods to leverage social engineering outcomes to technical wireless and web hacking methods?

• Provide a Christian worldview perspective on why to defend against web service hacking.

Review the iscussion Assignment Instructions prior to posting. You may also click the three dots in the upper corner to Show Rubric.
Post-First: This course utilizes the Post-First feature in all Discussions. This means you will only be able to read and interact with your classmates’ threads after you have submitted your thread in response to the provided prompt.

After reading summary postings from other students post at least two responses to those summaries.

Module 5 Discussion

Execute a Web search on JavaScript Arrays or JavaScript Objects or any other topic discussed in the chapter readings using a search engine such as Google. Locate a Web page that discusses the topic and post a summary including the link (URL). After reading summary postings from other students post at least two responses to those summaries.

Create a trend chart showing the trend over the entire period in total sales revenue, total expenses and net profits. Create a pie chart showing the proportional distribution of expenses in December.

CIS 2200 – INTRODUCTION TO INFORMATION SYSTEMS AND TECHNOLOGIES

Excel Group Project

Introduction

“NYP,” New York Paper Co., is using its financial results for August 2019 (Table 1) as a base for projecting the company’s budget for the remaining four months of the year .

Table 1: Financial results for August 2019 (000)

REVENUE August

Wedding Invitations 4,507

Birthday Party Invitations 3,841

Business Party Invitations 2,652

Total Sales Revenue 11,000

EXPENSES

Printing Costs 4,400

Salaries 3,500

Administration 550

Advertising 1,544

Legal Fees 788

Shipping 928

Total Expenses 11,710

Net Income before Taxes -710

Taxes 0

Net Profit (loss) -710

Enter the figures for August of 2019 in your worksheet “BUDGET” in the workbook “GROUP ## EXCEL GROUP PROJECT SPRING 22”. Make sure that you use formulas where appropriate for this base month. All figures should be expressed in thousands of dollars (000), amounts should be formatted with commas and no decimals.

Assumptions/Assignments

Following are the assumptions/assignments about how expenses relate to revenues and the growth assumptions for the next four months. These assumptions/assignments are unique for each group. Using wrong assumptions/assignments will cause zero 0 grade for the project.

Table 2 below presents a partial example of the assignments. The complete table is found in the worksheet “GROUP ASSIGNMENTS” in the workbook “GROUP ## EXCEL GROUP PROJECT SPRING 22”.

Table 2 Group Assignments

Group Wedding Invitations Birthday Party Invitations Business Party Invitations Advertising Legal Fees Shipping December

Goal Increase

# A B C D E F G

1 5.44 8.42 3.06 4.19 4.41 6.96 20.54

2 5.03 7.15 4.73 6.60 2.89 5.96 20.20

Projected Growth Per Month

Use VLOOKUP to copy group’s individual assignments/growth assumptions to your worksheet. Place them all together in the lower left corner of your “BUDGET” worksheet with a boxed outline.

Table 3 Individual Assignments

Projected Growth Per Month %

  • Wedding Invitations 4.51
  • Birthday Party Invitations 8.65
  • Business Party Invitations 4.11
  • Advertising 4.99
  • Legal Fees 2.80
  • Shipping 6.74

December Increase Goal 20.08

  1. Sales revenue from wedding invitations, birthday party invitations and business party invitations will grow at A%, B% and C% per month, respectively.
  2. Printing costs are calculated as 40% of Sales Revenue for the month, and Administration expenses are calculated as 5% of the Sales Revenue for the month.
  3. Salaries are fixed for the period. Please create an assumption table.
  4. The other expense items will grow at the following rates (per month): Advertising will grow at D% per month, Legal Fees will grow at E% per month, and Shipping will grow at F% per month.
  5. The tax rate is 28% on profits for the month. Assume that taxes are calculated and paid each month. Note that when the company loses money, it does not pay taxes.
  6. Conditional Formatting. If any of the numbers for Net Income before Taxes, Taxes and Net Profit (loss) is greater than 0, then the font for that cell should be green. If any of the numbers for Net Income before Taxes, Taxes and Net Profit (loss) is less than 0, then the font for that cell should be red; otherwise, the font for that cell should be orange.

There are several parts to this project:

  1. Forecast the budget for the next four months of 2019 (Sept-Dec) in a worksheet “BUDGET” in the workbook “GROUP ## EXCEL GROUP PROJECT SPRING 22”. Include a footer on this sheet with names of all group members.
  2. Create a trend chart showing the trend over the entire period in total sales revenue, total expenses and net profits. Be sure to select the right graph type and label the chart in order to indicate that you are displaying the results in thousands of dollars. Save the chart in a worksheet “BUDGET” in the workbook “EXCEL GROUP PROJECT SPRING 22”. The chart should not be “embedded” , but on a new sheet clearly, large and presentable with all proper labels. Similar to the one below.
  3. Create a pie chart showing the proportional distribution of expenses in December. Be sure to label the chart well. Save the chart in a worksheet “DISTRIBUTION” in the workbook “GROUP ## EXCEL GROUP PROJECT SPRING 22”.The chart should not be “embedded” (which looks copied with gridlines in the background), but on a new sheet clearly, large and presentable with all proper labels – similar to the one below:
  4. After you finished the budget calculations copy the entire worksheet “BUDGET” to a new worksheet “SOLVER”. To copy OPEN the PASTE option. When it opens up click the icon in the top row, second from the left.

 

At the beginning of this course, what did you expect to learn? Did it require more effort than you thought it would? What did you like most about the course? What did you like least about the course?

Reflection Paper

CIS 4101, Internet and Network Security

At the beginning of this course, what did you expect to learn?
Did it require more effort than you thought it would?
What did you like most about the course?
What did you like least about the course?
What could you have done to improve your grade in this course?
What was something unexpected that you learned?
What risk management approach(es) might you now employ based on what you have learned?
What was the most valuable thing that you learned?
What professional security skills will you use moving forward, and what research sources will you compile for future work?
How did this course help you with your career and/or major decisions for the future?
Would you recommend this course to another student?
What advice (about this course or about college in general) would you give to an incoming student?

Adhere to APA Style when constructing this assignment, including in-text citations and references for all sources that are used. Note that no abstract is needed, although you should be sure to include an introduction and conclusion. reference, though references are not required for this assignment unless you are paraphrasing from the textbook or other materials.