If any item is missing, you will suffer severe penalty in the grade for this ass

If any item is missing, you will suffer severe penalty in the grade for this ass

If any item is missing, you will suffer severe penalty in the grade for this assignment.
Why this assignment is important.
We learn better when we know why we must know about a topic.
Databases are literally everywhere and the need for people to operate
and administrate them has never been stronger. Databases touches most
IT operations and all business operations and is one of those areas you
will never be able to avoid. How would you use your cell phone or the
Internet if there were no databases?
What Types of Jobs are Available in Database?
There are a lot more jobs in database other than a database administrator. The following is a partial list of the jobs in DB
– Database Designer/Developer
– System Analyst
– Application Developer/Programmer
– System Designer and Implementer
– Tool Developer
Note for your first exam, you will be asked questions on what duties each of the above jobs perform so be forewarned.
First, I would
like you to find four roles (jobs) someone having database skills in
can perform in the workplace. To find these roles, you should initially
go to bls.gov and type into the search bar database jobs. At BLS.gov you
can find the knowledge, skill and abilities as well as wages by area
and occupation under the find National wage data and the tab labeled for
over 800 occupations.
Next go to
O*Net (http://online.onetcenter.org and type in the names of these roles
and look over the wages and employment trends. You also should go to
the office of career services who can assist you as well. (Hint, they
have a lot of resources). Another source you should use is interviewing
people in the field. If you know no one in the field, go to LinkedIn and
find people in the field. Reach out to them and ask questions. You will
be surprised how much help you will get plus you are networking at the
same time.
You will be placing all of this in a paper you will submit. I would
suggest much of this information go into a table that summarizes your 4
different database jobs. In that summary include the job title,
starting salary, knowledge, abilities and skills required and future
prospects for the job and what job duties are performed by that
position.
Next write
a paragraph on which one of these areas interest you most. You will go
to the Candid Corner and listen to people who are in the field talk
about the work they do. You will cite in your paper who you listened to
and what they said that influenced you in your decision have interest in
this job. From the information you received in the bls.gov site your
will tell me what knowledge, skills and abilities you will need to take
such a job. Additionally you will include an assessment of your
knowledge skills and abilities which you will get from Focus2.. Both
Candid Corner and Focus2 which are available on the Career Services
Webpage. If you need assistance, you can (and should) consult the
representatives in Career Services for assistance. with both of these
tools.
Next, go and
find a real job or internship offering this role and apply for it. You
will post evidence ofyour submission to this assignment including the
job posting and evidence you applied for the job or internship. (You may
use Handshake to find the job or any of the Jobsite companies, Your
application must be for a position with less than 2 years experience.
The submission should look professional in appearance and be no less than 2 pages long double spaced.

Use the network diagram and do not plagiarize!!!!!!! 1. Briefly describe the thr

Use the network diagram and do not plagiarize!!!!!!!
1. Briefly describe the thr

Use the network diagram and do not plagiarize!!!!!!!
1. Briefly describe the threat, including its medium, delivery mechanism, type, typical targets, et cetera. Describe where and how it is likely to breach the identified network. Consider importing the network diagram into Visio (or other appropriate tool) and marking the incursion points that you describe. You will need to do this to achieve the distinguished level for its associated criterion. Paste the updated diagram into your assessment document. Describes where and how it is likely to breach the identified network and shows it on a diagram.
2. Defense Attack – [Name of attack]
Describes a typical defense against this type of attack in detail that demonstrates a solid understanding of the attack.
3. Policy to Prevent [Name of attack] Attack
Describes why a policy is an effective deterrent for preventing a specified network attack and includes a specific supporting example. Found via an Internet search.
4. Practices to Effectively Enforce Security Policy
Describes practices that would effectively enforce a security policy and includes supporting references from professional sources.
5. Characteristics of [Name of network security threat]
Describes the characteristics of a specified network security threat in great detail that includes specific perils that it poses.
6. Conclusion
Provides a fully convincing logical argument in support of conclusions or recommendations.
Assignment 2 Short do not plagiarize!!!!
1. Database Query
Runs a successful database query, as evidenced by a screenshot with a brief annotation
identifying it and explaining what it depicts.
2. Database Uses
Brief description of databases.
3. Relational
Describes appropriate uses for relational databases and provides specific examples to
illustrate. Identify two appropriate uses for each type of database with a brief explanation of why
each is appropriate.
4. Non-relational
Describes appropriate uses for non-relational databases and provides specific examples to
illustrate. Identify two appropriate uses for each type of database with a brief explanation of why
each is appropriate.
Database Stores and Retrieves Data
1. Relational
Explains how relational databases store and retrieve data and includes references from
professional resources for support.
2. Non-relational
Explains how non-relational databases store and retrieve data and include references from
professional resources for support.
3. Database Best Practices and Maintenance
Describes critical best practices for database maintenance and the risks associated with
not applying them. Describe three critical best practices for database maintenance.

Use the network diagram and do not plagiarize!!!!!!! 1. Briefly describe the thr

Use the network diagram and do not plagiarize!!!!!!!
1. Briefly describe the thr

Use the network diagram and do not plagiarize!!!!!!!
1. Briefly describe the threat, including its medium, delivery mechanism, type, typical targets, et cetera. Describe where and how it is likely to breach the identified network. Consider importing the network diagram into Visio (or other appropriate tool) and marking the incursion points that you describe. You will need to do this to achieve the distinguished level for its associated criterion. Paste the updated diagram into your assessment document. Describes where and how it is likely to breach the identified network and shows it on a diagram.
2. Defense Attack – [Name of attack]
Describes a typical defense against this type of attack in detail that demonstrates a solid understanding of the attack.
3. Policy to Prevent [Name of attack] Attack
Describes why a policy is an effective deterrent for preventing a specified network attack and includes a specific supporting example. Found via an Internet search.
4. Practices to Effectively Enforce Security Policy
Describes practices that would effectively enforce a security policy and includes supporting references from professional sources.
5. Characteristics of [Name of network security threat]
Describes the characteristics of a specified network security threat in great detail that includes specific perils that it poses.
6. Conclusion
Provides a fully convincing logical argument in support of conclusions or recommendations.

use the data contained within the attached Excel file, to create a Power BI data

use the data contained within the attached Excel file, to create a Power BI data

use the data contained within the attached Excel file, to create a Power BI data model using industry best practices to solve the question. Here are the specific details & requirements of the mission:
Please recreate the screenshotted legacy REPORT FOR REPLICATION from the Excel file in power bi desktop in a tabular form.
create Dax functions in power query editor to help create the report
send the work to me in .pbix file and also in a work document add explanation on the dax functions used in getting the table right

use the data contained within the attached Excel file, to create a Power BI data

use the data contained within the attached Excel file, to create a Power BI data

use the data contained within the attached Excel file, to create a Power BI data model using industry best practices to solve the question. Here are the specific details & requirements of the mission:
Please recreate the screenshotted legacy REPORT FOR REPLICATION from the Excel file in power bi desktop in a tabular form.
create Dax functions in power query editor to help create the report
send the work to me in .pbix file and also in a work document add explanation on the dax functions used in getting the table right

use the data contained within the attached Excel file, to create a Power BI data

use the data contained within the attached Excel file, to create a Power BI data

use the data contained within the attached Excel file, to create a Power BI data model using industry best practices to solve the question. Here are the specific details & requirements of the mission:
please find attached data in the excel file to create tabular report in power bi desktop
send the work to me in .pbix file and also in a work document add explanation on the dax functions used in getting the table right
when you create the tabular report these are the measures am looking up for: Month when customers made first purchase, customers, pct who returned within 90 days of first purchase(%), pct who returned with following 3 month (%)

Complete problem #8 & #9 in Chapter 13 of the Mannino text. (NOTE: the diagram i

Complete problem #8 & #9 in Chapter 13 of the Mannino text. (NOTE: the diagram i

Complete problem #8 & #9 in Chapter 13 of the Mannino text. (NOTE: the diagram is FIGURE 13.P1). You can use a design tool, draw it by hand or any method that you choose. Discuss why you chose one design over the other? Provide responses to the questions in the problems.
3. Apply the flatten transformation for a policy item fact table. The auto insurance database uses a two-level representation of policy transactions. The data warehouse schema should contain a single fact table with 1-M relationships from dimension tables to the fact table. Ignore the InsuredParty entity for this problem.
8. Design a star or snowflake schema to extend the schema from Problem 3. Your schema should use resolutions to summarizability problems you notice.
9. For each dimension table in the schema for Problem 8, list the independent and hierarchical dimensions. Analyze each hierarchical dimension for summarizability problems. Propose alternative representations to resolve any summarizability problems.

FINAL PROJECT – FINAL Project Submission FINAL PROJECT The final project must b

FINAL PROJECT – FINAL Project Submission FINAL PROJECT
The final project must b

FINAL PROJECT – FINAL Project Submission FINAL PROJECT
The final project must be an Access database that contains a minimum of 10 tables with 5 relationships, in 3rd normal form. Each table should have a minimum of 10 rows of data.You must also have four queries defined to perform CRUD from one table. There should be a total of 4 saved queries minimum.We’re asking for the four basic CRUD queries for one table.
For example, if you had a table called Customers, with FirstName and LastName, the four queries would be:–CREATEREPLACE INTO Customers (FirstName, LastName) VALUES (‘John’, ‘Doe’);–READSELECT * FROM Customers WHERE FirstName = ‘John’ and LastName = ‘Doe’;–UPDATEUPDATE Customers SET FirstName = ‘Jane’, LastName = ‘Smith’ WHERE FirstName = ‘John’ and LastName = ‘Doe’;–DELETE DELETE FROM Customers WHERE FirstName = ‘Jane’ and LastName = ‘Smith’;

You run a small antique store that sells antique furniture to local customers. A

You run a small antique store that sells antique furniture to local customers. A

You run a small antique store that sells antique furniture to local customers. All your records are on paper, and you have been maintaining a simple spreadsheet to keep track of your orders as well. The spreadsheet looks like the one below. However, the business is expanding and the spreadsheet is getting unmanageable. Currently, there is considerable redundant data, and more redundant data will be added with every new customer order. So the first step is for you to normalize the data in the spreadsheet (In other words, identify different themes in this spreadsheet and break it down to several tables). You will need to set up a well-designed database to effectively keep track of the information.

Deliverable:
In a text/word file, write out the “Model” (i.e., relation schema) of your database based on the normalization process covered in class, i.e., break the list down to smaller, well-formed tables with each table only covering a single theme. You might want to add extra fields to make your database make more sense.
The relationship schema should use the following format:
YourInitials_TABLE_NAME (Primary Key, other Elements, etc.) (if there is a foreign key, italicize it)
Prefix each attribute (including PKs and FKs) with your initials (10 points will be deducted from your grade if without your initials prefixed for each table name and each attribute name).
Denote Primary Key, Foreign Key, and relationships. For each relationship, draw a directional arrow pointing from foreign key attribute towards its “parent” primary key.

You are managing a school’s sports event data. The dataset includes information

You are managing a school’s sports event data. The dataset includes information

You are managing a school’s sports event data. The dataset includes information about each participant, such as their ID, the events they’re participating in, and their scores in each event.
Task:
Create a single Excel sheet with the following structure and use formulas to perform calculations:
Participant Data:Columns: Participant ID, Name, Event 1 Score, Event 2 Score, Event 3 Score.
Tasks: Enter data for at least 10 participants with scores for three different events.
Calculations:Add columns to calculate the Average Score for each participant across all events, using the Averageformula.
At the bottom of the sheet, calculate the following using formulas:Total number of participants.
Highest average score among all participants.
Lowest average score among all participants.
second part: powerpoint B.
By using MS PowerPoint:Create a PowerPoint presentation for a hypothetical new product launch. The product is a smartwatch named “TimeTech”.
Features to Use:1. Slide Design & Layout:· Use a professional and modern design template.· Ensure a consistent layout across all slides.
2. Graphics & Images:· Include relevant images of the smartwatch on slides.· Use graphic elements (like shapes or icons) to enhance visual appeal.
3. Animation & Transition:· Apply subtle animations to bullet points or images to make the presentation dynamic.· Use smooth transitions between slides.