What is IT governance referring to? Why is it important? How does one implement it? Answer these questions using a brief (two-page memo) to your boss – the president of your company.
In: Computer Science
A good security system must be secured at multiple layers such as 1) database, 2) computer and 3) network. Compare the differences among these three layers. Provide one security example for each and one scenario that involves all of them.
In: Computer Science
PostgreSQL
1. Write a query to join two tables employees and departments to
display the department name, first_name and last_name, hire date,
and salary for all managers who have more than 15 years of
experience.
2. Write a query to join the employees and departments table to find the name of the employee including the name and last name, department ID and department name.
3. Write a SQL query to join three tables of employees, departments, and locations to find the names, including first and last name, job title, department name and ID, of employees working in London.
4. Write a query to concatenate the two tables of employees and yourself to find the employee id, last_name as Employee, and their manager_id and last name as Manager.
5. Write a query to connect to the employee table and to yourself to find the name, including first_name and last_name, and the hiring date for those employees who were hired after employee Jones.
6. Write a query to combine the two employee and department tables to get the department name and the number of employees working in each department.
7. Write a query to find employee ID, title and number of days he worked, who worked in department with ID 90.
8. Write a query to combine the two employee and department tables to display the department ID, department name, and manager name.
In: Computer Science
1- Write a c++ program that asks the user to enter
his/her name using one variable only. The name must
be then printed out in capital letter with the family name first
and the last name second.
In: Computer Science
# columns are [0]title [1]year [2]rating [3]length(min) [4]genre
[5]budget($mil) [6]box_office_gross($mil)
oscar_data = [
["The Shape of Water", 2017, 6.914, 123, ['sci-fi', 'drama'], 19.4,
195.243464],
["Moonlight", 2016, 6.151, 110, ['drama'], 1.5, 65.046687],
["Spotlight", 2015, 7.489, 129, ['drama', 'crime', 'history'],
20.0, 88.346473],
["Birdman", 2014, 7.604, 119, ['drama', 'comedy'], 18.0,
103.215094],
["12 Years a Slave", 2013, 7.71, 133, ['drama', 'biography',
'history'], 20.0, 178.371993],
["Argo", 2012, 7.517, 120, ['thriller', 'drama', 'biography'],
44.5, 232.324128],
["The Artist", 2011, 7.942, 96, ['drama', 'melodrama', 'comedy'],
15.0, 133.432856],
["The King\'s Speech", 2010, 7.977, 118, ['drama', 'biography',
'history'], 15.0, 414.211549],
["The Hurt Locker", 2008, 7.298, 126, ['thriller', 'drama', 'war',
'history'], 15.0, 49.230772],
["Slumdog Millionaire", 2008, 7.724, 120, ['drama', 'melodrama'],
15.0, 377.910544],
["No Country for Old Men", 2007, 7.726, 122, ['thriller', 'drama',
'crime'], 25.0, 171.627166],
["The Departed", 2006, 8.456, 151, ['thriller', 'drama', 'crime'],
90.0, 289.847354],
["Crash", 2004, 7.896, 108, ['thriller', 'drama', 'crime'], 6.5,
98.410061],
["Million Dollar Baby", 2004, 8.075, 132, ['drama', 'sport'], 30.0,
216.763646],
["The Lord of the Rings: Return of the King", 2003, 8.617, 201,
['fantasy', 'drama', 'adventure'], 94.0, 1119.110941],
["Chicago", 2002, 7.669, 113, ['musical', 'comedy', 'crime'], 45.0,
306.776732],
['A Beautiful Mind', 2001, 8.557, 135, ['drama', 'biography',
'melodrama'], 58.0, 313.542341],
["Gladiator", 2000, 8.585, 155, ['action', 'drama', 'adventure'],
103.0, 457.640427],
["American Beauty", 1999, 7.965, 122, ['drama'], 15.0,
356.296601],
["Shakespeare in Love", 1998, 7.452, 123, ['drama', 'melodrama',
'comedy', 'history'], 25.0, 289.317794],
["Titanic", 1997, 8.369, 194, ['drama', 'melodrama'], 200.0,
2185.372302],
["The English Patient", 1996, 7.849, 155, ['drama', 'melodrama',
'war'], 27.0, 231.976425],
["Braveheart", 1995, 8.283, 178, ['drama', 'war', 'biography',
'history'], 72.0, 210.409945],
["Forrest Gump", 1994, 8.915, 142, ['drama', 'melodrama'], 55.0,
677.386686],
["Schindler\'s List", 1993, 8.819, 195, ['drama', 'biography',
'history'], 22.0, 321.265768],
["Unforgiven", 1992, 7.858, 131, ['drama', 'western'], 14.4,
159.157447],
["Silence of the Lambs", 1990, 8.335, 114, ['thriller', 'crime',
'mystery', 'drama', 'horror'], 19.0, 272.742922],
["Dances with Wolves", 1990, 8.112, 181, ['drama', 'adventure',
'western'], 22.0, 424.208848],
["Driving Miss Daisy", 1989, 7.645, 99, ['drama'], 7.5,
145.793296],
["Rain Man", 1988, 8.25, 133, ['drama'], 25.0, 354.825435],
]
def column_sum(data, column):
result = 0
for row in data:
result += row[column]
return result
def column_mean(data, column):
total = column_sum(oscar_data, 6)
mean = total / len(data)
return mean
# < write code here >
mean_score = column_mean(oscar_data, 2)
print('Average rating: {:.2f}'.format(mean_score))
mean_length = column_mean(oscar_data, 3)
print('Average length: {:.2f} min.'.format(mean_length))
mean_budget = column_mean(oscar_data, 5)
print('Average budget: ${:.2f} mil.'.format(mean_budget))
mean_gross = column_mean(oscar_data, 6)
print('Average revenue: ${:.2f} mil.'.format(mean_gross))
In: Computer Science
Question 1
Given two integers x and y, the following recursive definition
determines the greatest common divisor of x and y, write gcd(xy).
Write a recursive function, gcd, that takes two integers as
parameters and returns the greatest common divisor of numbers. Also
write a program to test your function. Write a recursive function,
reverseDigits, that takes an integer as a parameter and returns the
number with the digits reversed. Also write a program to test your
application.
In: Computer Science
A course consists of many subjects, but each subject can only be associated with one course. Each subject is co-ordinated by a lecturer and each lecturer can co-ordinate many subjects. Subjects and courses are identified by subject and course codes, and have a name. Lecturers are identified by an ID and have a name, room number and telephone contact number
.a. Using Enterprise Architect, create an ERD representing the above scenario. You need to include the cardinality of the relationships.
b. Transform the ERD to a set of relational tables.
In: Computer Science
Write an ALP to control the different direction of rotation of stepper motor
Stepper motor has the following specifications
Stepper motor has 4 windings
Speed =12 rpm
No of teeth =200
In: Computer Science
In: Computer Science
Game worlds require an environment and a dimensional space.
In: Computer Science
Write a program to compute the total time and average speed it will take a runner to run 10 miles with the following pace segments:
they run the first mile at a pace of 7 minutes per mile, the following 4 miles at a pace of 8.5 minutes per mile, the next 4 miles at a pace of 9 minutes per mile and the last mile at a pace of 3.5 minutes per mile.
Performs the computations and prints the results in a single nice message
Language PYTHON3
In: Computer Science
Overview
Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please review a description of ABC Corporation’s network resources and how they are allocated.
You may find the following Floor Plan helpful in completing this lab.
ABC Corporation’s Network Description
ABC Corporation is a small business in the heart of Central Pennsylvania. They provide services to their clients all over the region. The three-story main office building is where all of the employees report to work each day. There are no remote users. ABC Corporation is a very traditional business. While they have a computer network and are connected to the Internet, they aren’t very fancy and don’t yet have a need for telecommuting, wireless networks, or smart phones. All of their computers are desktop machines and are connected with wired Ethernet connections. All of the network wiring is CAT-6 twisted pair wiring that goes from the office location to a wiring closet. There is one wiring closet on each floor. Each closet is connected to the basement wiring closet via fiber.
There are several departments of the company. The administrative office has ten employees including the CEO, executive Vice-President, a human resources manager, and several assistants and secretaries. The finance office has fifteen employees. Both of these divisions are on the third floor.
The second floor has the Sales and R&D departments. There are a total of twenty employees in the Sales Department and includes sales executives and assistants. All of the sales department personnel have laptop computers, but they are still connected via the wired network. The R&D department has ten engineers who have two computers each – one in their office and one in their lab spaces.
The first floor has the shipping/receiving department, manufacturing department and the receptionist. The receptionist shares a computer with the night watchman, since they work opposite shifts. There are 20 people in manufacturing, but they only use three computers to enter their production details into the company’s ERP system. The shipping/receiving department has six people, each with a computer that connects to UPS, Fedex and USPS systems, prints packaging labels and shipping documents. There is also a conference room/training room on the first floor with a multimedia system that includes a podium computer, projector, and all of the bells and whistles.
The basement houses the maintenance department, information technology, and the mail room. The mail room clerk doesn’t use the computers at all. The two maintenance workers have computers at their desks that they use to enter reports of work performed. The IT Department has seven employees, each with a desktop computer. They also manage the server farm, which includes two domain controllers, one print server, one mail server, one database server, one internal web server, one external web server (on the DMZ interface of the firewall), a file server, a special server for the ERP system, and a backup server.
Add Wireless Network Access Points
Each floor, with the exception of the basement (the basement does not need wireless), needs to have two wireless access points, one for the north end of the building, and the other for the south. However, the wireless access points will overlap in the middle of the building, so you need to pick different wireless network channels for each end. On the first floor, there should be an additional wireless access point in the conference room for guests.
The “guest” network should have a different SSID than the company’s wireless network. It should be configured to allow anyone to connect with a password. The password will be provided by the receptionist to any visitors and will be changed each week. The company wireless network should be configured to have the same SSID on all of the wireless network access points (but different from the “guest” network). It should be configured with WPA-2 Enterprise with AES and should be connected to the company’s servers for authentication (Windows Server with RADIUS server enabled for the Active Directory).
Note: You might want to review this informative webpage to see how to configure Windows Server to handle the authentication for the access points.
Place your network access points on your network diagram you did for Homework #2. Segment the wireless network separately from the wired network so that it is on its own subnet. Segment the visitor wireless network so it’s on its own subnet, separate from both the wired network and the company wireless network.
Label each access point with its own IP address and basic configuration. Each device should have its own name, IP address and should list its configuration in terms of encryption protocol (TKIP, AES, 3-DES or None) and authentication protocol (WPA, WPA-Enterprise, WPA2-Enterprise, WPA-2, WEP, etc, none, etc). Identify the SSIDs that are used for each device.
Place the wireless access points in the building. You may use the floor plan provided in the attached PDF.
Create a Network Diagram
Your network diagram needs to include the following elements:
Network Documentation
Your network design document needs to explain each of the elements in your wireless network design. Explain how you segmented your wireless network from other parts of the network. Describe what security settings you might want to implement in your router. Describe the reason for the number of access points that you need on each floor.
What to Turn In
For assignments that require you to submit Visio work, please
export your file and submit as a PDF. Also, please submit your
original Visio file.
You also need to turn in a Word document (.doc or .docx) file that
explains your network diagram elements. Include snapshots from your
network diagram in your Word doc file – and annotate your diagram
snapshots to better help your explanation of your network.
I want the answer in Microsoft VISIO screenshot
In: Computer Science
Around the world, governments are introducing laws which either limit or prohibit the availability of cryptography for their citizens, require key escrow (c.f. the Clipper chip), or require telecommunications and Internet service providers and software developers to somehow break or weaken cryptography in their products, perhaps by introducing 'back doors' or other vulnerabilities (e.g. the Assistance and Access Act (Cwlth) 2018).
Take a position for or against government intervention in cryptography, for government, the business sector and private individuals. In each case, you should briefly describe and weigh up the positive benefits of cryptography as well as the threats it poses. Should governments have the power to prohibit or break encryption?
There are obvious implications for confidentiality and privacy, but what about the other security properties such as integrity, entity authenticity, integrity, anonymity, fairness, etc.?
What are the implications of any weakening of protocols or the introduction of back doors? Are there other, perhaps more important, threats to democracy and individual liberties in cyberspace?
Take into account:
In: Computer Science
Explain turbidity,turbidity rod,turbimeters,jackson turbidimeter and baylis turbidimeters with example and explain in details.(50marks)
Need own answer and no internet answers r else i il downvote nd report to chegg.Even a single is wrong i il downvote.its 50marks question so no short answer minimum 10page answer required and own answer r else i il downvote.
Note:Minimum 10page answer and no plagarism r else i il downvote and report to chegg.Minimum 10 to 15page answer required r else dnt attempt.strictly no internet answer n no plagarism.
its 50marks question so i il stricly review nd report
Need own answer for 50marks.
In: Computer Science
discuss the challenges presented by the covid-19 pandemic when it comes to database management/ administration
In: Computer Science