Week 10 Assignment – Case Study

Read the following articles and incorporate them into your paper. You are encouraged to review additional articles as well.
An Introduction of NoSQL Databases Based on Their Categories and Application Industries.
Software Development Lifecycle for Energy Efficiency: Techniques and Tools.
First Things First: Adopting a Holistic, Needs-Driven Approach to Improving the Quality of Routinely Collected Data.
Approaches to Speed Up Data Processing in Relational Databases.
Instructions
Write a 2–3 page paper in which you:
Recommend at least three specific tasks that could be performed to improve the quality of data sets using the software development life cycle (SDLC) methodology. Include a thorough descriiption of each activity per each phase.
Recommend the actions that should be performed to optimize record selections and to improve database performance from a quantitative data quality assessment.
Suggest three maintenance plans and three activities that could be performed to improve data quality.
Suggest methods that would be efficient for planning proactive concurrency control methods and lock granularities. Assess how your selected method can be used to minimize the database security risks that may occur within a multiuser environment.
Analyze how the method can be used to plan out the system effectively and ensure that the number of transactions does not produce record-level locking while the database is in operation.

Computer Organization and Architecture Final Project

Concept Map(Powerpoint)
Using the presentation concept map you created in Weeks 1 to 4 in the course, add the final component you worked on in Week 5. Based on the feedback you received on your concept map in the previous weeks, refine your concept map where you identify the basic components of modern computers; describe different categories of instructions, operations, operands, and number representations for a machine instruction set; interpret machine-level arithmetic operations; describe the various memory technologies and the levels of the memory hierarchy; and explain the principles and aspects related to instruction execution.
The Paper(Word Doc)
Utilizing the content of your refined concept map, revise your interactive assignment initial posts from Weeks 1 through 5 in a Word document as follows:
Review the feedback from your Week 1 interactive assignment, Computer Technology and Instructions. Revise your post based on the feedback from your instructor and peers, adding any refined elements concerning the five classical computer components, performance, and the measure of computer performance. Using credible sources, research and provide an example of a computer system’s instruction set and/or operands.
Review the feedback from your Week 2 interactive assignment, Arithmetic for Computers, in which you interpreted machine-level addition and subtraction operations of the arithmetic and logic unit (ALU) of the computer, multiplication and division operations, and example algorithms to perform these operations. Revise your post based on the feedback from your instructor and/or peers. You also summarized the arithmetic operations using floating-point representation. Revise your summary based on peer and/or instructor feedback
Review the feedback from your Week 3 interactive assignment, The Processor, in which you provided an example of a pipelining approach, examined the basic implementation of a processor, and explained the functionality and interaction of datapaths. Revise your post based on the feedback from your instructor and peers, adding any elements that may enhance your initial post.
Review the work you completed and comments you received in the Week 4 interactive assignment, Exploiting Memory Hierarchy, in which you defined the basics of caches and measuring and improving cache performance and summarized the concepts of dependable memory hierarchy, virtual machines, and virtual memory. Revise your post based on the feedback from your instructor and peers, adding any elements that may enhance your initial post.
Summarize your initial post from the Week 5 interactive assignment where you discussed the goals and principles of computer architecture parallelism; explained the challenges of creating parallel processing programs; and reviewed the concepts of SISD, MIMD, SIMD, and SPMD and Vector processing.
Explain the fundamental concepts that influence computer organization and architecture. Predict how organizations will use these concepts about future computer organization and design.
Submit your completed paper and presentation concept map to Waypoint for grading. (If you choose to utilize a web-based presentation software, insert the URL to your presentation in your Word document.)
The Computer Organization and Architecture Project
Must be two to three double-spaced pages (600 to 900 words in length), not including title and references pages, and formatted according to APA style as outlined in the Writing Center (Links to an external site.).
Must use at least five screenshot images to zoom in on sections of the concept map and illustrate your statements.
Must include a separate title page with the following:
Title of paper
Student’s name
Course name and number
Instructor’s name
Date submitted
Must use at least three scholarly, peer-reviewed, and/or credible sources in addition to the course text.
The Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.
Must document all sources in APA style as outlined in the Writing Center (Links to an external site.).
Must include a separate reference page that is formatted according to APA style as outlined in the Writing Center (Links to an external site.).

wireless convenience and risk

please respond to this post.
Almost everywhere you go has wireless connections today. Whether it is to the grocery store, restaurant, movies, or someone’s home. Most people have been told the dangers of public wireless networks, but many people ignore this risk. It makes you wonder what the risks actually are though.
Public networks are typically unsecured. They don’t require a password and anyone can access them. This means hackers have such an easy way to connect to your devices. “Wireless networks are even more susceptible to hacking than wired networks because the signals of most wireless networks extend beyond the walls of your home. Neighbors may unintentionally (or intentionally) connect to the Internet through your wireless connection and hackers may try to access it” (Micro B Life, 2022). Whether it is intentional or not, your data can be easily accessed.
You can protect yourself though. If, and I still don’t recommend it, you decide to connect to unsecure networks, you can utilize some common practices to protect your data. A Virtual Private Network (VPN) “is the most secure option to surf on public networks” (Micro B Life, 2022). Another common practice is to turn off network sharing and auto connect. This will prevent your device from inadvertently connecting to the network and giving out your information. “File sharing is usually pretty easy to turn off from the system preferences or control panel, depending on your operating system” (Baig, 2018).
Personally, I use my own wireless “hot spot” when I need to conduct work away from work or home. My own wireless connection is password protected, prohibits any devices that I do not allow from connecting, and has a password to access the device itself. I also like to utilize the practice of a VPN and keep my cameras covered as an added precaution. The military taught me a lot of vulnerabilities!
I used to think that laptops were more secure than phones when connecting to wireless networks due to the amount of information we keep on them. Oh how wrong I was! Smartphones really are smart and have built in safety features to help the end user. “Unlike on PCs, each app on your smartphone creates a separate user. That means that if an app infects one user, it can’t infect anybody else’s phone unless that person gives the app permission” (PSafe, 2017). This means that if an app tries to infect your device, it will only infect that one device and not everyone who downloaded the app. Additionally, it still will not be able to gain information from your other apps, as they only allow certain permissions as well. This is perfect for those that keep a lot of information in their apps.
Some ways you can protect yourself is to use different passwords for each app or account. This will prevent a hacker from being able to access everything with one password. As someone who has had to change almost every password due to this, it is well worth it. Luckily, nothing vital was taken and my sensitive information was secured by other means, but still an awakening.
Next time you are out and about, maybe you’ll think twice before connecting to an unsecured, public network. Always be aware of the dangers and double check your security settings to ensure you have no issues. Even connecting for a second can make you vulnerable.

References:
Baig, A. (October 19, 2018). 5 Tips for Staying Safe on Public Wi-Fi Networks.
https://www.globalsign.com/en/blog/staying-safe-using-public-wifi

Micro B Life. (July 18, 2022). What Risks And Safeguards Are Associated With Wireless Communication?

What Risks And Safeguards Are Associated With Wireless Communication?

PSafe Newsroom. (June 19, 2017). Internet Security: Is Your Smartphone Safer Than Your PC?

Internet Security: Is Your Smartphone Safer Than Your PC?

Critical Infrastructure Security

For this assignment, you will take on the role of a network security employee for a brand-new power plant. It is your responsibility to develop a plan to safeguard against a breach of critical infrastructure and set up responses to likely breaches. This plan should include the initial network setup, proactive preventative security measures, and contingency plans for when something goes wrong, like part of the network going down or an attack on the system.
This new power plant has 50 employees, all of whom can work remotely at least one day per week so they must be able to VPN into the network remotely. Each employee needs quick connectivity and advanced systems to monitor the processes at the plant. Consider the above information when making your design decisions and establishing your security measures and contingency plans; you must justify your decisions based on what you’ve learned in the course and external sources, explaining why and how certain structures will safeguard the system and prevent attacks.
Your written plan should be between 2,000 and 2,500 words long, including a 300 word executive summary that addresses the main points of your plan. You must write your plan as if you were proposing it to the head of the security who is looking for network security options for the new plant.

TOPIC: GAMING (significance of gaming in technology) You are given the option t

TOPIC: GAMING (significance of gaming in technology)
You are given the option to work on any topic related to the theme of the course. Your project can either be an implemented project, purely research based, or a combination of both. All topics must be approved via the project proposal.
Individual Research based projects must be at least 12-15 pages in length and conform to APA citation style. Any implementation / coding that is part of your project, may reduce the amount of writing (which also needs to be approved). Title pages, images, graphics, bulleted lists, references, code samples, and large citations do not count toward page length. All projects will be run through plagiarism detection software. Your project needs to be supported for scholarly sources and written at a high level.
Project proposals can be a short paragraph/ a few sentences, briefly describing your topic idea.
All final projects must be submitted on the last day of class.

Google Assignment 1 will consist of the following: Read carefully through chapte

Google Assignment 1 will consist of the following:
Read carefully through chapters 4 and 5 to complete the map codes presented. For each map, you will end up with 3 files: an HTML file (.html), a JavaScript file (.js) file and a CSS file (.css). You can use any text editor (like notepad++) to create the files. Your map should show up generally like the book if everything is correct for each map. And be sure to code each map separately, don’t try to combine them all together. I’m attaching the files for chapter 3 (in the content tab) so you can get an idea. Be careful with file and directory names! That causes the most problems with this assignment. With Chapter 4 you will end up with 1 Map, but in the other chapters you will end up with a few, depending on how you go through the examples. Chapter 5 you should end up with about 4 to 5 maps.
You will need to submit all of the code for the maps in Chapters 4 and 5 (HTML, js, and CSS files) (in the Labs & Projects tab). You may want to zip them all in one file to make it easier to attach.
Note***Just a note on the code for the Google Maps labs that we will be working on….. As the idea of the course is to experiment with many technologies over the semester to give students a breadth of technology exposure, we are treating the Google API 3 book as a tutorial. While a bit tedious, going through the book example by example will help you understand the Google map API better. That being said, I do realize that you can find some completed code online for the text pre-written….. however, if I find anyone submitting this online code (or from other students) as their work and not actually doing their own work by typing and testing out the examples themselves, you will receive a 0 for all the Google Lab Assignments and very possible… failure for the course.
3.2 We will continue working through the google Map files for the other chapters. You may end up with several separate map files for each chapter. Try your best on these. There are some sample image files if you need them for chapter 6 located in the Labs/projects tab.
Google Assignment 2 will consist of submitting the code for Chapters 6 and 7. In chapter 6 you will end up with four maps. In chapter 7 you will end up with four maps.
PDF to book attahed below (ALL CHAPTERS ARE IN PDF) (chapters3,4,5,6,7,etc..)