Daily Archives: February 17, 2021

Include at least 250 words in your posting and at least 250 words in your reply.  Indicate at least one source or reference in your original post. Please see syllabus for details on submission requirements.

Module 5 Discussion Forum

Include at least 250 words in your posting and at least 250 words in your reply.  Indicate at least one source or reference in your original post. Please see syllabus for details on submission requirements.

Module 5 Discussion Question

Search “scholar.google.com” or your textbook. Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences? If so, why; if not, why not. What factors typically influence the end-user decision to report (or not report) a potential incident?

Reply-1(Suresh)

 

The end user will always play a very crucial role in reporting the incidents. IT service management will be considered for the complete the services will be provided by the end user service management (Smith & Wenger, 2007). Most of….

send a copy of the files over an internet platform to an offsite server.

Back up strategies

Back up strategy is the planned and well-organized data protection using a backup policy that authorizes the backup responsibilities to the most appropriate and right persons or offices and also sets the duplication time cycles. In other words, it is the action of copying physical or virtual documents or files into a secondary data file to act as a security or bank of preservation to ensure that even if the original file gets lost, their data will be restored. Every IT officer ion any company understands the vitality of having a backup for all the necessary information and data in the office. He also understands the necessity of ability to retrieve or restore the data (Hutchinson Et al, 1999). Our computers and systems may experience….

How does the business intelligence system (BIS) at CKE add value to the business?

Chapter 11 of your textbook, Managing and Using Information Systems: A Strategic Approach, provides an overview of knowledge management and business intelligence as they relate to organizational decision making. Read Case Study 11-2, “Business Intelligence at CKE Restaurants,” on pages 348–349 in the textbook and answer all three questions regarding CKE Restaurants’ (Hardee’s Restaurant parent company) decision to promote and distribute the Monster Thickburger based on insights derived from their business intelligence system:

How does the business intelligence system (BIS) at CKE add value to the business? What are some tips for developing and using the BIS described in this case? Was the introduction of the Monster Thickburger a good idea or an example of information leading to a wrong decision?

Create a visualization for your second management question.

 8) Write the SQL that will be needed to answer the three most important questions using your data warehouse. This requires writing 3 SQL statements. (10 points)

9) Create a visualization for your first management question. (Note: Figures P13.3.2G (page 615) and P13.3 (page 616) show single fact tables with multiple dimensions.

11) Create a visualization for your second management question. (Note: it must be different than the first and ideally use different fact or dimension tables).

12) Create a third visualization, it must be different than the first two and should use different fact or dimension tables

Assessment Your submission document will be checked for correctness and completeness. Connecting Assignments This milestone takes the populated database for the DW from milestone 2 and uses it to produce….

use the LiveHTTPHeaders extension for Firefox to inspect the HTTP requests and responses (available under the “Tools” menu in Firefox).

Cross-site scripting (XSS) Attacks

 

Cross-site scripting (XSS) is a type of vulnerability commonly found in web applications. This vulnerability makes it possible for attackers to inject malicious code (e.g. JavaScript programs) into victim’s web browser.

Using this malicious code, the attackers can steal the victim’s credentials, such as cookies. The access control policies (i.e., the same origin policy) employed by the browser to protect those credentials can be bypassed by exploiting the XSS vulnerability. Vulnerabilities of this kind can potentially lead to large-scale attacks.

To demonstrate what attackers can do by exploiting XSS vulnerabilities, we have set up a web application named Elgg in our pre-built Ubuntu VM image. Elgg is an open-source web application for social networking, and it has implemented a number of countermeasures to….

Create an Relational Data Model to show how you would track this information.

A manufacturing company produces products. The following product information is stored: product name, product ID and quantity on hand. These products are made up of many components. Each component can be supplied by one or more suppliers. The following component information is kept: component ID, name, description, suppliers who supply them, and products in which they are used.

Create an Relational Data Model to show how you would track this information.

Show entity names, primary keys, attributes for each entity, relationships between the entities and cardinality.

ASSUMPTIONS

·        A supplier can exist without providing components.

·        A component does not have to be associated with a supplier.

·        A component does not have to be associated with a product. Not all components are used in products.

·        A product cannot exist without….

discuss why Kirk states it will impact my critical thinking and shape my ambition.

Initial Post

Kirk (2016) tells us that all requirements and restrictions of a project must be identified.  Select 1 key factor below and discuss why Kirk (2016) states it will impact your critical thinking and shape your ambitions:

People: stakeholders, audience. Constraints: pressures, rules. Consumption: frequency, setting. Deliverables: quantity, format. Resources: skills, technology

Reference: Kirk, Andy. Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications

first student post

 

I chose “Resources: skills, technology” to discuss why Kirk states it will impact my critical thinking and shape my ambition. Skills, you must take inventory of the available capabilities on the team. You may take inventory of yourself, on the personal capabilities that you possess. Not only offer what skills you have and what skills you don’t,….

Review the entire document for any changes and improvements you would like to make.

You will select an organization, and apply your research to the analysis and development of a network design that would be appropriate for the organization and the needs that it has for its network. Additional information and the deliverables for each Individual Project will be provided in the assignment description for the project. This is the course’s Key Assignment that you will make contributions to each week.

Project Selection:

The first step will be to select an organization as the target for your network design and architecture proposal document. This organization will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:

Nontrivial: The selected organization should be large enough to allow reasonable exercise of the network design….

Discuss in 500 words or more why Oracle 12c has introduced two new roles – AUDIT_ADMIN and AUDIT_VIEWER.

Discuss in 500 words or more why Oracle 12c has introduced two new roles – AUDIT_ADMIN and AUDIT_VIEWER. Include a discussion of what database auditing is and what it does. Consider why these new roles were introduced and what problem they are meant to resolve. Do not simply define the roles. Explain why they are useful.

Cite your sources in-line and at the end. Provide a URL for your citations.  Write in essay format not in bulleted, numbered or other list format. Do not copy without providing proper attribution. Be aware of your Safeassign score. Over 30 is too high. Use quotes to indicate where you have used other’s words.

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes cited in-line and….

Introduction to Computers Assignment

C10; Introduction to Computers Assignment 8; Business Consulting C10; Introduction to Computers Assignment 8; Business Consulting Remember Bill? He was the gentleman that you helped to start up his business in week 4. Well his business is doing well, but he has come to you with some questions and concerns. You discuss each of these with Bill and promise to send him a written report with your suggestions and recommendations. Submit your written response to Bill’s questions and concerns below. 1. Bill has set up a spreadsheet in Excel that will help him keep track of expenses. So far, he has this: Tell Bill how to do the following tasks: • What formula or function does he put in Column F that will show the total expenses for….