Module 1 covered the fundamentals of data, databases, and database management sy

Module 1 covered the fundamentals of data, databases, and database management sy

Module 1 covered the fundamentals of data, databases, and database management systems (DBMS). Databases are everywhere and whether we realize it or not, we use them in almost all our daily activities. We know that some companies collect terabytes of user data every single day. But did you know that there are organizations that have collected massive amounts of data and are making that data available to the general public for free? One benefit of using these public databases is that queries can be made with a simple input form or two! As you learn more about databases throughout this course, you will begin to appreciate the skill and knowledge required to develop and populate these types of databases.
Below are some large public databases. For this discussion, you may use one of these or any large public database you find.
Annotated Human Genome Data: This is a large database (310 GB) of genome information for humans and about 50 other species. The database has several different methods to access the data, including a simple web interface, export via FTP, MySQL server queries, Perl API, and even a data-mining tool.
Historical Weather Datasets: The National Oceanic and Atmospheric Administration (NOAA) provides time series data and climatological data in several different databases. The various databases provide different series of data. The data can be accessed via a browser interface as well as via specific tools that are provided by the administration.
The Library of Congress: This massive database contains 133 Terabytes of compressed data. A single search could take up to 24 hours to complete. The Library of Congress also has numerous interesting databases containing information on a variety of subjects. Although there is extensive information, it is available through website interfaces rather than through specialized tools or APIs.
The CIA World Factbook: This massive database provides information on history, people, societies, government, economy, energy, geography, communications, transportation, military, and transnational issues for 267 world entities. It includes a variety of world, regional, country, oceanic, and time zone maps; flags of the world; and a country comparison function that ranks country information and data in more than 75 Factbook fields.
Pew Research Center: Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes, and trends shaping the world. They conduct public opinion polling, demographic research, content analysis, and other data-driven social science research.
US Labor, Economic, and Census Data: Various departments of the US government provide large datasets containing information about the US economy, plus labor, commerce, housing, and census data. These databases can be accessed through a browser as well as customized APIs and downloads. Various departments include:
The U.S. Bureau of Labor Statistics website
The United States Census Bureau website
Instructions
For this discussion you will be selecting a large public database and doing some research. Your initial posting should at least include the following, but feel free to add any other interesting things you discover. (Please note the examples are just to get you started, your answers should be more substantial.):
The name and link to the database (e.g., The U.S. Bureau of Labor Statistics at https://www.bls.gov/data/ )
What kind of data does this database collect? (e.g., This database collects data about employment, compensation, living and working conditions….)
Why did you choose this public database? (e.g., I am thinking about a job change and .…)
What were you trying to find out? (e.g., I wanted to find out the average salary of a private archivist.)
Provide keywords or query text you used in your search
OR if you are just clicking on links
Provide a breadcrumb trail to where you found the information: (below is an example of a breadcrumb)
Bureau of Labor Statistics > Publications > Occupational Outlook Handbook > Education, Training, and Library
Provide the results of your search or an explanation why you think you were not able to get the results you expected. (e.g., A private archivist makes an average of $60,050 per year.)

For this assignment, you will be diagramming a simple relational database, somet

For this assignment, you will be diagramming a simple relational database, somet

For this assignment, you will be diagramming a simple relational database, sometimes called a database schema. This assignment will be the first step in understanding how data is organized in a relational database.
Background
We have learned that the most common type of database is the relational database. No matter what area of Information Technology or Cybersecurity you work in, you will encounter a relational database at some point. This assignment is not intended to make you professional database designers. Rather, it will help you to recognize a relational database so that later in the course, you understand how a relational database can be protected.
Instructions
NOTE: The schema you complete in this assignment will be used in Lab 1.
Use the following Set of Requirements to create your schema. After each field name, enter the data type you think would be correct for the data that will be entered (e.g., for the field ‘HireDate’ show it in your diagram as HireDate (Date):
Two tables: Person and CourseInstructor
Person will have the following fields:
ID (primary key) (Note: Lab 1 uses this fieldname, however PersonID might be better for understanding.)
FirstName
LastName
HireDate
EnrolmentDate
PersonType (Note: values would be Student, Instructor, or Staff)
CourseInstructor will have the following fields:
CourseID (primary key)
InstructorID (Note: Lab 1 uses this fieldname, however PersonID might be better for understanding.)
Be sure to identify the primary key and the relationship line in your diagram!
Using the given set of requirements, create your relational database schema using any application you are familiar with (Access, Word, PowerPoint, Visio, Draw, etc.) [Note: Consider creating a free account at drawSQL (https://drawsql.app). It is easy to create tables and it allows students to show data types/attributes, primary keys, and relationship lines, etc.]
Convert your final one-page schema into PDF format.

Remember to be clear about what action you are recommending. Executive managemen

Remember to be clear about what action you are recommending. Executive managemen

Remember to be clear about what action you are recommending. Executive management will want to understand not only what you discovered, but also what you propose as a solution. The company’s leaders will want to know what decisions they need to make based on your findings. Give them the actionable information they need to decide.
You may want to review these presentation resources to help you with your narrated presentation. You will provide voice annotation for all slides in the following format:
five to 10 slides maximum; limit bullets to no more than six per slide
voice annotation for every slide (excluding the reference slide)
a reference slide with one to two quality sources
How Will My Work Be Evaluated?
As you progress in your cybersecurity career, you may find yourself making presentations to customers, client audiences, and management. By summarizing your results and recommendations to management in an effective presentation, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your recommendations to provide information for decision makers in a format that uses the right mix of technical detail in a business context is an important workplace and career skill.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
2.1.3: Explain the significance of the issue or problem.
12.3.2: Describe the implementation of controls.
12.8.1: Recognize the process to obtain approval from the business process owner.
13.2.1: Evaluate vendor recommendations in the context of organization requirements.
If you haven’t already downloaded it last week, download the Presentation to Management Template now and follow the instructions in the document.
Remember to delete the instructional text from the template before you submit.
When you are finished, click “add a file” to upload your work, then click the Submit button.

What are the political implications that arise from the cybersecurity policy/str

What are the political implications that arise from the cybersecurity policy/str

What are the political implications that arise from the cybersecurity policy/strategy you have selected (from Paper 1 attached about Comprehensive National Cybersecurity Initiative CNCI)? Attention should be given to how politicians or policy makers have addressed the policy/strategy, why those politicians or policy makers came to those conclusions, and the ramifications of those decisions.

python script files (or ipynb) with the code for your analysis. Use proper forma

python script files (or ipynb) with the code for your analysis. Use proper forma

python script files (or ipynb) with the code for your analysis. Use proper formatting and commenting for readability. All Data files, or links to the data files, used for the analysis Title Slide: Title of the project, course, student name, and date. Problem description: Short description of the problem Data Overview: Explain how you gathered data; explored the data; discuss aspects of the dataset. Hypothesis: Based on your data exploration result, clearly state your hypotheses for prediction. Approach for solving: How you decided to approach the problem Results: Include at least two visualizations and explain what each means. Give results in relation to your hypothesis. Conclusion: Were you correct in your prediction? What lessons can you draw from this? References NO PLAGIARISM!

The Linux operating system is widely used in industry, especially for servers. W

The Linux operating system is widely used in industry, especially for servers. W

The Linux operating system is widely used in industry, especially for servers. Why do you believe this is the case?
If you’ve worked with Linux previously, share your experiences. How would you compare it with other operating systems—like Windows?
If you have little or no experience with it, what are your perceptions?
In addition to your primary forum response, post at least two follow-up responses to your classmates

For this project, you will apply the CompTIA 6-Step Troubleshooting Process to e

For this project, you will apply the CompTIA 6-Step Troubleshooting Process to e

For this project, you will apply the CompTIA 6-Step Troubleshooting Process to explain how you would tackle Hudson Fisher Associates Help Desk Tickets. There are three groups of tickets, Level 1, Level 2, and Level 3. You will pick two tickets from each group. As you prepare to analyze and hopefully solve these typical IT help desk tickets, keep in mind that for this course, it is more about the process and less about finding the “correct” answer. You may not always find an exact answer from the information given. The problems are structured to approximate what you will find in the workplace. Use a logical and repeatable process (e.g., the CompTIA 6-Step Troubleshooting Process) and eliminate the improbable as you work your way through each scenario. CompTIA 6-Step Troubleshooting Process: Identify the problem. Establish a theory of probable cause. Evaluate the theory to determine the actual cause. Establish a plan of action to resolve the problem and implement the solution. Verify full system functionality and if applicable implement preventative measures. Document findings, actions, and outcomes. How Will My Work Be Evaluated? As you progress in your information technology and cybersecurity career, you may find yourself making presentations to customers, client audiences, and management. For this assignment, you should articulate your findings from the six support cases. But the challenge you face is in expressing a technical solution to a nontechnical audience. Avoid jargon and acronyms. Find a way to relay your solution (and challenges) in language that your audience will find easily relatable. Communicating in this manner will not always be easy. You may struggle to find the right analogy or metaphor. But if you can master the skill of summarizing your results and recommendations to management in an effective presentation, you will demonstrate how you use your technical knowledge to convey your ideas to others in a professional setting. You will also earn the respect and trust of your peers, your supervisor, and upper management as an effective communicator. You will be viewed as an employee ready for advancement. The following evaluation criteria aligned to the competencies will be used to grade your assignment: 1.1.1: Articulate the main idea and purpose of a communication. 1.1.3: Present ideas in a clear, logical order appropriate to the task. 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas. 2.1.1: Identify the issue or problem under consideration. 2.3.1: State conclusions or solutions clearly and precisely. 12.7.2: Explain the process of analyzing IT incidents. 13.1.1: Create documentation appropriate to the stakeholder. Your deliverable for the project is an annotated PowerPoint Presentation covering the following: List of the six tickets you selected (two each from Level 1, Level 2, and Level 3) One to two slides for each ticket, in which you: State the problem. Describe the steps taken to troubleshoot/analyze the problem. Propose a brief resolution. One summary slide: What did you find challenging or interesting about one or two of the support cases (opinion-based)? One reference slide (two to six IEEE references). Include references for materials you consulted in TestOut or on the internet. If you haven’t already done it last week, download the Support Queue Case Study Presentation Template to get started. Delete the instructional text from the template before you submit. Select two help desk tickets from each level and explain in the PowerPoint template how you would solve them. Level 1.1 Ticket 1002: subject mouse not working Assignee: Open Raised by: Irene Fredericks, Human Resources, 10 min ago Category: Mouse?peripherals Priorty: Med Message: My mouse has stopped working. I checked the Windows device manager, and the mouse entry is not there. I need my mouse! Level 1.2 1003 ticket subject black computer screen Assignee: Open Raised by: Todd Schneider, Payroll, 05 min ago Category: Video issue Priority: Med Message: My computer screen is black. I turned the computer off and on and the lights are on the front PC, but that did not resolve the issue. Level 2.1 ticket subject Dell machine making clicking sounds Assignee: Open Raised by: Juan Delarosa, Human Resources, 11 min ago Category: Booting Issue Priority: Med Message: My Dell OptiPlex 9020 Mini Tower will not go to the Windows desktop. I heard a series of audible sounds, like Morse code?!? I think the pattern is one, followed by three, then two. What does that mean? Level 2.2 ticket subject cannot connect to online share drive Assignee: Open Raised by: Blake Chaudhary, Sales Inventory Analyst Category: Network Connectivity Issue Priority: High Message: I need to access my sales projections on the shared drive. I could access them yesterday afternoon, no problem. My boss is really leaning on me to get those figures in and he needs access right away. Follow-Up from Help Desk Associate Jen: When I had Blake do an IPCONFIG for me, he read his IP address as 169.254.2.8. The network address for his unit is 10.20.30.x. I am not sure why it is different. What do you think is going on? level 3.1 Ticket 3003: subject frozen computer Assignee: Open Raised by: Bettina Müller, Fashion Design Category: Computer Crashing Priority: Med Message: My computer is totally frozen. All I see is an error message that says, “controller has failed.” I have a short deadline to pitch for a new line of bags to be show at the Fashion Goods and Accessories Exposition in Osaka. I tried rebooting my machine, but the problem comes back after a few minutes. I have an OptiPlex GX240. LEVEL 3.2 Ticket subject Restart/Update Loop Assignee: Open Raised by: Marci Wallace, Buyer, Tokyo Office Category: Windows Update Priority: High Message: When I turned on my PC at the office today, it started to boot, and then started doing a Windows 10 update. But it keeps trying to reboot and update. It is on the sixth try and still won’t boot up; it’s just the same Windows update install over and over. What should I do? Follow-Up from Help Desk Associate Jen: Windows update is not completing, sending Marci’s PC into an endless loop. From my experience, there can be several underlying issues that may cause Windows Update to fail. You may need to try several different things to resolve the issue. I recommend consulting Microsoft’s knowledge base. https://www.support.com/how-to/how-to-fix-a-windows-pc-that-keeps-rebooting-12992 (File 1 : Presentation slides to use for the template of assignment)

You have learned a great deal about the Internet Protocol (IP). IP is a set of r

You have learned a great deal about the Internet Protocol (IP). IP is a set of r

You have learned a great deal about the Internet Protocol (IP). IP is a set of rules for how data is sent across networks and arrive at the intended destination. An IP address is a numeric identifier assigned to each device on an IP network. Unfortunately, the internet has finally run out of IPv4 addresses. The good news is that everyone knew this would eventually occur and there is a solution: IPv6.
For this discussion, compare the characteristics of IPv4 and IPv6. Discuss any benefits one provides over the other.
Both IPv4 and IPv6 have the option to subnet. Some of the reasons to subnet a network is to improve network performance and speed, reduce network congestion, control network growth, and ease administration.
Next, select a Class A, B, and C IP (v4) address for input into the subnet calculator.
Class A: 1.0.0.1 – 126.255.255.254
Class B: 128.1.0.1 – 191.255.255.254
Class C: 192.0.1.1 – 223.255.254.254
Take a screenshot and post each of your results to include in your post.
If you want to increase the number of subnets, you simply change the Maximum Subnets field input to your desired number. When you increase this number, what happens to the Host per Subnet field and why?
link
https://www.subnet-calculator.com/#google_vignette