Categories
Internet technology (IT)

“Designing a Database for Book and Author Relationships” a. Entities: 1. Book 2. Author b. Attributes: 1. Book: – ISBN (primary key) – Title – Publication Date – Genre – Publisher

Consider the relationships between Books and Authors. A book can have a number of authors
and an author can have many books to his/her name. Taking into account this particular 
example, you are required to carry out the below tasks to design a database: 
a. Identify all the ENTITIES. Give each ENTITY a suitable name. 
b. Identify all the ATTTRIBUTES associated with each ENTITY. Make sure that each
ENTITY has a      proper PRIMARY KEY which is underlined. A minimum of 3 attributes is
required for each 
ENTITY. 
c. Draw an ENTITY RELATIONSHIP DIAGRAM (ERD) clearly stating the relationships
between the      ENTITIES, the CARDINALITIES and ATTRIBUTES with correct notations. 
d. Convert the ERD (drawn in “c”) into a relational schema. The PRIMARY KEY and
FOREIGN KEY       must be clearly shown for each relation. 
e. Produce sample records (3 records at least per ENTITY) to represent the relational 
schema.
The records can be presented in the form of a table for each entity.   

Categories
Internet technology (IT)

Title: Enhancing Cloud Management with Lab Experience In the Week 4 labs, I had the opportunity to perform various tasks related to cloud management, such as creating a cluster, restoring files, configuring account lockout policies, and verifying RAM usage

In the Week 4 labs, you performed tasks such as creating a cluster, restoring files, configuring account lockout policies, and verifying RAM usage.
Note: Ensure you have completed all lab exercises from Week 4 before completing this assessment.
Assessment Details
Write a 350- to 700-word summary on your experience completing these labs. Include the following in your summary:
Explain how knowledge gained from the labs can be used for cloud management in a real-life environment.
Describe a situation in which these tasks can be used for security and performance purposes.
Discuss how monitoring disk capacity and RAM usage contributes to achieving optimal performance in a cloud environment. Provide a workplace example where proactive monitoring and management might be essential.

Categories
Internet technology (IT)

“Using Data Ethically: Improving Representation and Accuracy in the Modern World” Introduction In today’s data-driven society, we are constantly bombarded with information and statistics from various sources, including scientists, researchers, the media, and social media users

You will write a position paper addressing the following questions: How can we better use data to represent the world around us accurately? What should scientists, researchers, the media, and social media users do to present a more accurate picture of the truth?  
Your paper will summarize and analyze what you have learned about how data is used and misused this quarter. Complete a critical analysis of some of the challenges with data that we have covered in this class and suggest improvements. 
You are welcome and encouraged to address the points brought up in Chapters 12 and 13 of The Art of Statistics: How to Learn from Data. If you use the class textbook as a source in your paper, list the book on the reference page and cite it properly using an in-text citation (Spiegehalter, 2019).  
Lastly (and this is the most essential part of this paper), you should include three recommendations about presenting data ethically in the workplace and beyond. Outside sources must support each recommendation.
You must include at least five sources, three of which support your recommendations. Ensure each source listed on your reference page has at least one corresponding in-text citation within the paper.
The paper should be 5-8 pages and follow APA 7th edition Student format. The page count does NOT include the title, abstract, or reference pages.  

Categories
Internet technology (IT)

Creating an Audience Persona for DataNanny Software Design Project

Please follow the uploaded guidelines instructions and rubric.  The acitivity is to create an audience persona in 500 words single space.  Check the uploaded Defining Audiences and Creating Personas PDF and the uploaded software design document PDF.  The software design project I choose is S/W Project 1: DataNanny. I am providing the picture in a jpg format. i do appreciate your help.
Mr. Castillo

Categories
Internet technology (IT)

Title: The Impact of Mobile Computing on Multimedia Consumption and Creation: A Case Study of Multimedia Content and Mobile Applications 1. The Impact of Mobile Computing on Multimedia Consumption and Creation The rise of mobile computing has greatly influenced the way in which multimedia

As mobile devices have grown in popularity and general use, the demand for mobile 
computing has increased, necessitating the availability of desktop features on these devices.
Multimedia is one sort of content that can be accessed or created using a mobile device.
Smartphones with cameras, wireless content streaming, and the capacity to play back 
videos
and music are the only instances where mobile computing in multimedia has 
become mainstream. 
Discuss the following information: 
1. How does mobile computing affect the consumption and creation of multimedia
content? Support your discussion with RELEVANT and RECENT journal articles. 
2. Provide one example of multimedia content AND one mobile application. Discuss
how the multimedia content and application offered are designed to meet the unique
requirements and restrictions of mobile computing. 

Categories
Internet technology (IT)

Title: Network Security Assessment: Methodology and Tools

The key to this assignment is to demonstrate your understanding of the topics, not to re-word the text or reference material. Please see Appendix A for the grading rubric on all written assignments.
Please complete the scenario below following these guidelines for your deliverable.
Your assignment must be a minimum of 2 pages double spaced, plus a title page 
and a reference page for a total of 4 pages.
Make sure you are using at least two (2) academic references.
There is a 10 point penalty for late submissions (See Syllabus for Details).
You have been hired as a consultant to perform a network security assessment for a large firm.  You will utilize network Footprinting and automated vulnerability scanning to assess the organization.  Footprinting and vulnerability scanning apply to an IT infrastructure or network.  Footprinting (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools (ex. Nmap) and technologies to scan a network to acquire IP addresses, computer names, etc.  This information is very useful to a hacker who is trying to crack a whole system.  Scanning refers to security scans of a network. A security or vulnerability scan uses a variety of automated software tools (ex. Nessus Tenable, Retina, etc.), typically performing hundreds of routine tests and checks.  These tools identify vulnerabilities or weaknesses in the network that may result in unauthorized access such as lack of up-to-date patches.  
1. Describe the methodology and tools you would use to conduct your assessment.
2. Give a rationale for each step in your methodology.
******(Note: You are not limited to following the methodology/tools described in your textbook. If there are additional steps you would take in conducting your assessment, please list them and explain why you are taking them.)
Submission Instructions:
This submission should be created following APA 6th edition guidelines.
The paper is to follow the APA style guide, Sixth Edition (available via bookstores).
Also refer to APA’s online resources
and the APUS web site
Submit your assignment as a MS Word attachment.
The assignment will automatically be checked by TurnInIn.
Rubric for grading:
Methodology and Tools 50%
Rationale for Each Step 30%
Writing Conventions (Grammar and Mechanics)10%
Source 10%

Categories
Internet technology (IT)

“Exploring the Intersection of Theory and Practice: A Creative Capstone Project” Abstract: This paper presents a creative capstone project that aims to explore the intersection of theory and practice in the field of [insert discipline]. The project focuses on [insert

Creative Final Project Paper. It is mainly written. There is more to add. I have my rough draft I turned in, and my professor left detailed comments on what I am missing. I want everything fixed to his conditions and the instructions for the paper.
—> Sections of a Creative Project Capstone Paper:
Master’s creative/applied projects are generally expected to contain the following elements, but vary somewhat due to disciplinary standards. Please see the specific guidelines in your Capstone course:
Abstract: Includes the following components: purpose of the research, methodology, findings, and conclusion. The body of the abstract is limited to 150-200 words.
Introduction: This section identifies the student’s specific creative/applied project and sets the general context for it.
• Provide a clear and lucid description of the creative/applied project including the goal and intent of the project.
• Discuss the schedule and objectives for the work to be completed.
Literature Review: The literature review focuses on how the creative/applied project experience fits into the discipline. Specifically, it introduces the project and places it in a larger context that includes a discussion of how this experience helps the student meet the program objectives. It provides the current state of accumulated knowledge as it relates to the project.
• Describe how completing this project is consistent with the course of study.
• Articulate the objectives the student hopes to achieve through the completion of this project.
• Provide a short conclusion and transition to the next section.
Project Design: This section describes the design of the applied/creative project and situates the project within an issue, question, or problem within the discipline.
• Discuss how the project questions, contradicts, or reinforces existing theoretical knowledge relative to the student’s professional practice and/or discipline.
• Introduces a critical lens or theoretical framework that informs the project, including appropriate citations and context for this framework.
• Describes the expected contribution of the project to knowledge or professional practice within the discipline.
• Discuss the limitations of the project’s scope and generalizability. The Project: This section is where the student includes their project, which must comport with discipline standards for rigor, original contributions to the practice or knowledge of the field, creative expression within a specific theoretical lens, or application of theory to a specific context. The project often includes the following elements:
• Identification of an appropriate problem, issue, or question within the practice or application of the discipline.
• Analysis of current tools available to solve the problem or improve professional practice, comparing and contrasting to identify benefits and issues.
• Rigorous justification of the tool or process selected to address the problem, with support from the academic and professional literature.
• Contextualization and application of the chosen tool or process within professional practice.
• Analysis of the effectiveness and efficiency of the chosen tool or technique, and discussion of other possible ways the problem could have been solved.
• Rigorous discussion of how this method of solving the problem will benefit others.
Reference List: This section should reference the works cited (direct quotes or paraphrases) in the text. This list must be formatted according to the school’s prescribed style guide.

Categories
Internet technology (IT)

Title: Matching Research Titles to Appropriate Periodicals for Journal Submission Keywords/Key Phrases Used: COPPA, children’s privacy policies, parental perspectives, transparency, accountability, web crawler, machine learning, image detection, online privacy 1

I have one completed document and two draft titles ready for
journal submission. After reviewing the content and titles, please find the
best two periodicals for each, ensuring a close match to the designated topics.
Additionally, the submission to publication time on like  IEEE Xplore should exceed 12 weeks, and the
“Aims & Scope” must adhere to specific standards.
Research Titles:
1.   Evaluating the Impact of COPPA Implementations
on the Effectiveness of Children’s Privacy Policies: Insights from Parental Perspectives
(check the attachment)
2.     Transparent
Frameworks: A Web Crawler and Machine Learning Exploration of Accountability
and Transparency in Children’s Privacy Policies
3.   Parental
Perception and Privacy Protection: An Image Detection Study on the Impact of
Perceptions on Managing Children’s Online Privacy
Here’s the format I am looking for:
·      
Enter keywords, key phrases, or article title
used:
·      
Name of specific periodical:
·      
Explain in one or two sentences how it fits:
·      
Purpose of this requirement:

Categories
Internet technology (IT)

“The Impact of Artificial Intelligence: An Analysis of Key Points from Kate Crawford’s Atlas of AI”

Write a 5-8 page essay explaining and analyzing the significance of at least five key points from Kate Crawford’s Atlas of AI.
• Read the Book: Read at least five chapters of Crawford.
• Five Key Points: Identify at least five key points, issues, or questions, discussed by
Crawford. Explain and discuss significance each of these five key points. How did
they help you understand a critical issue relating to artificial intelligence?
• Five Section Headings: Your essay should have five sections. One for each key
point. Number and use a descriptive section heading for each of your five key
points.
• Five Additional Sources: In addition to using Crawford as your major source, you
must clearly and explicitly quote, link, and cite at least five other sources of information for your assignment. Use journalistic, academic, or governmental sources found online from major news publishers, institutions, or organizations. Use your student subscription to the New York Times and the Wall Street Journal to find sources. Essays that do not quote or make significant use of credible source material will not be accepted. You will be graded on the quality and the quantity of the source materials you use to write your essays.
Things to remember:
• Essays that do not make significant use of Atlas of AI and at least five other news sources will not be accepted. Use your own words and brief quotations and key points from the Atlas of AI as much as possible.
• Do not plagiarize, use quotation marks, and cite your sources clearly using a standard form of citation: Chicago, MLA, APA. Cite page numbers for Crawford (no matter which form of citation you choose.)
• Use links in the text if you refer to online sources.
• Do not

Categories
Internet technology (IT)

Title: Proposal for Research Project on [Topic]

Here’s a rough breakdown of what you might include
in your proposal:
1.    
Introduction (approximately
300-500 words): Provide an overview of the research topic, its significance,
and the research questions you aim to address.
2.    
Literature Review (approximately
600-1000 words): Summarize relevant scholarly literature that informs your
research topic, identifying gaps or areas for further exploration.
3.    
Research Objectives and
Hypotheses (approximately 200-300 words): Clearly state the objectives of your
research and any hypotheses you plan to test.
4.    
Methodology (approximately
400-600 words): Describe the research methods you plan to use, including data
collection methods, sampling techniques, and data analysis procedures.
5.    
Proposed Timeline (approximately
100-200 words): Outline the proposed timeline for completing your research,
including key milestones and deadlines.
6.    
Potential Contributions
(approximately 200-300 words): Discuss the potential contributions of your
research to the field, including any practical implications or applications.