Write a 2-page paper discussing the timeline and changes throughout the years of Crypto Currency. Explain the trends you see about Crypto Currency in your paper. Where is this timeline going? Where are all these particular events heading? What is the trend?

Crypto Currency

For this assignment, write a 2-page paper discussing the timeline and changes throughout the years of Crypto Currency. Explain the trends you see about Crypto Currency in your paper. Where is this timeline going? Where are all these particular events heading? What is the trend?

What would be your preferred data transmission technique? Synchronous or Asynchronous transmission. What kind of Error Detection method you would use to make sure you will detect most of the communication errors? Explain your answer

Communication errors

QUESTION 1: The final destination of the communication ( i.e. Your computer) , received the following digital/ binary signal sequence. Now, your computer should cover the binary data set to the text so you would be able to see and read it on your computer screen. Assume, received binary code was generated based on ASCII. You should write the text that will appear on your computer screen

01010111 01010101 01010011 01010100 00100000 01001001 01010100 00100000 00110101 00110000 00110101 00100000 00100000 01010011 01110101 01101101 01101101 01100101 01110010 00100000 00110010 00110000 00110010 00110010 00100000 01000100 01110010 00101110 01001101 01110101 01110100 01101100 01110101 00100000

HNIT: Do your web search and find (Binary to Text Translator) to convert the binary to back to text.

QUESTION 2: The user would like to save the incoming binary that you decoded in the question 1. Therefore, the user would like to make sure if there is enough memory space in his/her computer. What would be minimum memory space (Bytes) required to save the incoming data?

QUESTION 3: Develop the Manchester Code for the first section of digital data stream in question 1. You should develop Manchester Code for 01010111 . Your name must on the digital signal code diagram

QUESTION 4: In an airport, two computers in two different terminals will be in communication based on the requirements below;

User in terminal 1 and the receiver terminal 2 can operate on different clock frequencies.

The speed of the communication is not a concern; however, quality of the communication is important.

The terminals are more than 100 meters apart. There is a heavy external electrical noise which would impact and disrupt the communication and cause miscommunication (corrupted message) between terminals

4a) What would be your preferred data transmission technique? Synchronous or Asynchronous transmission. Explain your answer

4b) What kind of Error Detection method you would use to make sure you will detect most of the communication errors? Explain your answer

 

QUESTION 5: There are three given different communication cases. Where, a user would like to access to a database.

CASE 1: Both computers are in the same building. User computer in the second Floor and the database in the third floor.

  1. a) What type of communication (digital or analog) would you use between given to communication points?
  2. b) If it is digital then write the cable type you would use, if it is analog the write the wireless communication type you would use?

CASE 2: The computers are in different cities. User computer is in the Los Angeles and receiver (the database) is in NYC. This has to be fast and secure communication

  1. a) What type of communication (digital or analog) would you use between given to communication points?
  2. b) If it is digital then write the cable type you would use, if it is analog the write the wireless communication type you would use?

CASE 3: User computer is on transatlantic cruise ship and receiver (the database) is in NYC.

  1. a) What type of communication (digital or analog) would you use between given to communication points?
  2. b) If it is digital then write the cable type you would use, if it is analog the write the wireless communication type you would use?

 

BUSINESS CASE: The Hospital information system has been in use to furthering the Hospital Network’s efforts to become more competitive.

Main Parameters of the Hospital system :

There are three buildings are in three different cities

Hospital Building in City 1 : 150 Patients Room , and 25 offices (Main Building has the all Databases)

Hospital Building in City 2 : 95 Patients Room, and 15 offices

Hospital Building in City 3 : 80 Patients room, and 30 offices

All buildings have their own IT Data center.

IT system Hardware: Personal PCs , Server, Cables, Memory , Printer , X-ray , Big screen monitors , card readers , Scanners

IT system Software: MS Office, Financial /Accounting,

IT system Databases: Database for Patients, Database for Doctors, Database for Building, Database for Employees

IT system Network: Internet and Dedicated data communication lines between all four Buildings.

Dedicated data communication lines between all Buildings are private fiberoptic communication lines

Supplier Companies: Blood Test Lab, Bank, Medical Equipment Supplier, Medication Supplier.

QUESTION 1 : You were given the following LAN in one of the hospitals . You should list the device and TCP/IP layer(s) that has been in used in each device on this network

You would write the name of device and the TCP/IP layer(s)layer in that device ( Client Computer, Server , Switch , and router ).

QUESTION 2: Develop a network diagram illustrate the key elements that of the Hospital IT network that include following two different connections types.

  1. a) Each Building has the Internet communication from local Internet service provide (ISP) . So it will communicate with local supplier companies and local patients
  2. b) There is a dedicated data communication lines (fiber) among all three Buildings to prove access to all databases from each hospital.

This private connection is not open to public to use.

QUESTION 3:

The hospital IT system has dedicated Fiber data communication lines among all three Buildings. On Monday morning, one of the fiber optic cable was damaged by a construction company. Telcom Company informed the Hospital that, it will take a week to repair the fiber cables. But the Hospital cannot wait one week to do business-to-busses transactions among all three Buildings. No fiber communication one week is a big problem.

 

Identify the primary keys for each table. Identify the foreign key. What is the relationship between these 2 tables?

1. Read chapters 2 and 3 textbook and review reputable IGU online library resources and journals and discuss: Advantages and Disadvantages of Relational Model.

2. Read chapter 3 and reputable journals/articles and IGU online library resources and describe the following relational operators: Union, Project, Intersect and Join. Provide a real-world application example for each of these operators.

3. Read chapter 3 of textbook and review reputable IGU online library resources and journals and discuss:

What does it mean to say that a database displays both entity integrity and referential integrity? And why entity integrity and referential integrity important in a database? Provide an application example to support your discussion.

100 points

Type your answers on this document and submit this document.

  1. 1. Suppose that you are using the Database composed of the two tables shown in the following figure.  Use these tables to answer part A,B,C (40  points)

 

Theater Database Tables

  1. Identify the primary keys for each table. ( 15 points )
  2. Identify the foreign key. ( 15 points )
  3. What is the relationship between these 2 tables? (10 points)
  4. Use the following Tables  to answer questions A-C . ( 60 Total points )

 

PRODUCT and vendor Database Tables

  1. For each table, identify the primary key and the foreign key(s). If a table does not have a foreign key, write None in the assigned space. ( 20 points )

 

TABLE PRIMARY KEY FOREIGN KEY(S)
PRODUCT

 

VENDOR    

 

  1. Do the tables exhibit entity integrity? Answer Yes or No,  and then explain your answer. ( 20 points )

 

TABLE ENTITY INTEGRITY?

Type Yes or No here

EXPLANATION

Explain the reason here

PRODUCT  
VENDOR  

 

  1.  Do the tables exhibit referential integrity? Answer Yes or No, and then explain your answer. Write NA (Not Applicable) if the table does not have a foreign key. ( 20 points )

 

TABLE REFERENTIAL INTEGRITY EXPLANATION
PRODUCT  
VENDOR

 

Create an Excel Spreadsheet with your Annual Budget. Information can be fictional.

Sims Annual Budget

Create an Excel Spreadsheet with your Annual Budget. Information can be fictional. Use the rubric below for the specific details to complete this assignment.

1. Title the Assignment with your last name + Annual Budget (example: Smith Annual Budget)

2. Use that title in a field of the first row that is “Merged and Centered”

3. Use the rows for the Month and column A to list your outgoing bills.

4. Change the font style and size of the header text

5. Display all grid lines in the area being used with the “All Borders” tool.

6. Use a horizontal bold line to separate the month titles across the top below the page header (Jan., Feb., March, etc.) and make all Column Headings and Data Row titles in bold font.

7. Use a Thick Box Border to separate the item list on the left from the sheet data (column A)

8. Enter data into the fields with numbers.

Highlight all data in spreadsheet and right-click and format cells. Format the cell numbers for Number and select comma for 1000 separator and 2 decimal places and for Currency use default dollar sign $ symbol. This sets formatting for all data cells at once in one place for 2 decimal places,comma for 1000 comma and dollar sign. Under page layout, you may have to lower scale % to fit and see all of the data on one sheet. The data in this sheet can be made up information.

Why is it important to incorporate security throughout the SDLC instead of just in one phase or another?Discuss. What role do DevSecOps and Continuous Delivery/Continuous integration play?

Incorporate security

  1. Why is it important to incorporate security throughout the SDLC instead of just in one phase or another?Discuss.
  2. What role do DevSecOps and Continuous Delivery/Continuous integration play?

Part 1A. Explain in your own words what the DIKW Pyramid means to you.

Part 1. Mrs. Beasley would like you to briefly explain the secure design principles (S&S)

She also understands that NIST SP 800-160V1 may provide some recommended security design principles. Review these principles and the similarities and differences between the two principles.

Part 2. Mrs. Beasley is not sure what to do. Mr. Scott called and asked her for her help. Techworx wants to get into the autonomous vehicle industry. Recall we now work at a company called “Software is Us”. They need “Software is Us” to develop the software for their vehicles. She has to call Mr. Scott back later today.

What do you want Mrs. Beasley to tell Mr. Scott and what 3-5 design principles will be the most critical in this project?

 

Determine the issues in the following code and rewrite the correct one? You are required to take a screenshot of your output? Explain all the different ways of attaching the styles to the document with examples for each one?

Question One

Create font.html according to the followings:

  • Font: Times New Roman, Times, serif
  • Heading: Web Design, color: red.
  • The first paragraph output must be “I learned how to use font-family”
  • The second paragraph output must be “Your name and your SEUID”

Note: You must use the following properties and decorations:

  • The heading must be underline
  • The first paragraph must be underline overline dotted blue
  • The line of the first must have letter spaces like 5px
  • The second paragraph must have a shadow like red

 

You are required to take a full screenshot of your code and the output.

 

Point Description Marks
1 Font 0.25
2 Heading 0.25
3 First paragraph 0.25
4 Second paragraph 0.25
5 Underline 0.25
6 Overline dotted blue 0.25
7 Letter-spacing 0.25
8 Shadow 0.25

 

Question Two

  1. In your own word, explain what are the differences between hover and active?
  2. Using hover, create a code that has the followings:

Note: you are required to take a full screenshot that shows the hover when you move the mouse

Question Three

Determine the issues in the following code and rewrite the correct one? You are required to take a screenshot of your output?

(You are allowed to use any video on your device)

 

Question Four

Explain all the different ways of attaching the styles to the document with examples for each one?

 

 

 

 

Redraw the following class diagram into the equivalent E-R diagram. Convert the following E-R diagram, which represent a manufacturing system into relations. Identify all foreign keys in relations you identified in Question 3 and justify your decisions.

 E-R diagram

Draw the preliminary class diagram for the system described in the following requirements (the cardinality of the relationships is optional).

Question Two

Redraw the following class diagram into the equivalent E-R diagram.

Question Three

Convert the following E-R diagram, which represent a manufacturing system into relations. Make sure to specify all the primary keys.

 

Question Four

Identify all foreign keys in relations you identified in Question 3 and justify your decisions.

 

 

Write a 2-page paper discussing the timeline and changes throughout the years of Crypto Currency. Explain the trends you see about Crypto Currency in your paper. Where is this timeline going? Where are all these particular events heading? What is the trend?

Crypto Currency

For this assignment, write a 2-page paper discussing the timeline and changes throughout the years of Crypto Currency. Explain the trends you see about Crypto Currency in your paper. Where is this timeline going? Where are all these particular events heading? What is the trend?

Identify the most important process(es) based on this description, label it/them with a properly structured name and identify the actors for each process.

a) Identify the most important process(es) based on this description, label it/them with a properly structured name and identify the actors for each process.

b) Create a UML activity diagram for each business process workflow.

c) For each actor, develop a Use Case Diagram.

 

Describe the foundational role of algorithms as 4 relates to computing and the purpose of usng pseudocode to write algorithms Include the rote of variables n pseudo code and how assignments are used in conjunction with variables in your description.

Computer Science Illuminated Nell Dale; John Lewis

Summary: For the %leek 2 Exercises. you will complete and submit the following ems.

Chapter 6

In Charter 8 we earn about low-level programming languages and pseudo code. It is important to understand the purpose of algorithms and how to write algorithms using pseudo code as a prekminary step to writing programs in a programing language. In addition to witting algorithms in pseudo code. an m-pennant next step is testing the algorithms for correctness. You will show your Imo ledge of the topics by answering the following questions.

1. Explain how assembly language can be more beneficial than machine engage for the programmer?

2. Describe the foundational role of algorithms as 4 relates to computing and the purpose of usng pseudocode to write algorithms Include the rote of variables n pseudo code and how assignments are used in conjunction with variables in your description.

3. Create the following variables that can be used to store values. Use the naming conventions as °mined in the Algonthms Psedocode Guidelines document in the course resources section of the course.

  1. test grade for student test
  2. total of al test grades added together
  3. the average foe the test grade

4. Create an assignment statement that sets the value of the variabe you created to axe the value of al test grades added togeo`er to zero. You may refer to Table 8.1 in Chapter 8 for examples.

5. Create an input statement to input the value for the first test grade for the variable you created.

6. Create an algorithm that will obtain the test grade for three students. add the test grades together. calculate the aveage of the test grades. and output the average. Use a count-controlled loco to create the algorithm. Use the information eon your arinvers to questions 3.4. and 5 in the creation of your algorithm.Also use information and examples from Chapter 5 and Chapter 7 to he you create the algorthin

7. Create a test to check the agorhm that is in a format similar to the following.

Reason for Test Case
Assumpoon: Input values are between 0 and 100. Input three values greater than 0. Input three values Wei one being a grade of 0. Input three values wilt one being a grade of 100
Input values Expected Observed Output Output

Chapter 7

In Chapter 7 we continue learning about algorithms twit a focus on solving problems. The purpose of writing algrothms is to solve problems. Mile there are many ways to write an algorithm to correctly solve a problem. some structures are more efficient than others. IA% take a lock at different structures used in writing algorithm and the strategies utilized. You wit show your knowledge of the topics by answering the Waning questions.

8. Explain why an algorithm with a repetition control structure with a count-controlled loop is a better choice than a repetition with an event-controlled loop for the algorithm you created in question 8. 0. Explain how a sequential search algorithm weds as compared to a binary search algorithm. The purpose of the Exercise S to help you better understand the key points. It is not sufficient to state your opintos abre you must be able to back up your responses by apotyng concepts and topics from the text with the information that supports your findings. The expected response length is 3-5 sentences per question. Be as thorough as possible when writing your responses. and remember. this is an academic assignment so no ‘tert-talc.’ no conversational tone. and ABOVE ALL OTHER THINGS… don’t plagiarize!! Lastly. spell-check and proofread your work! Failure to follow these steps will negatively impact your grade.