Respond to at least two of your colleagues by addressing the following in each response:
Follow the references to the examples they chose and compare the original code to the rewritten code.
Decide whether the improvements posted make the source code easier to understand. Be specific and explain your answers.
Return to this Discussion to read the responses to your initial posting. Note what you have learned and/or any insights you have gained as a result of the comments your colleagues made.
Be sure to use APA formatting throughout and support your work with specific citations from this week’s Learning Resources and any additional sources.
Category: Technology
-
Improving Code Readability Response 1: Colleague 1: In their post, colleague 1 chose the example of a for loop to demonstrate the concept of code readability. They provided an original code and a rewritten code, where the
-
Title: Exploring the Seven IT Infrastructure Components through AWS Cloud Computing Resources Introduction Cloud computing has revolutionized the way businesses manage their IT infrastructure. With the rise of cloud service providers like Amazon Web Services (AWS), organizations can now access a
Review the cloud computing resources available at https://aws.amazon.com
Write a short paper (500-1,000 words) relating those resources with some of the Seven IT Infrastructure Components identified in Chapter 5.
Computer hardware platforms 2. Operating system platforms 3. Enterprise software applications 4. Data management and storage 5. Networking/telecommunications platforms 6. Internet platforms 7. Consulting system integration services
Provide examples, including URLs on the aws.amazon.com site
Use your name and assignment number as “File Name”.
Add your name and assignment number at the top of first page for example: // Make sure you send the file in DOCX format only;
Hand written/drawn and scanned files are not acceptable and will not be graded.
Only electronic submissions are acceptable. -
Designing and Building a Company Database EER Diagram: [INSERT EER DIAGRAM HERE] CREATE TABLE Statements: CREATE TABLE employees ( employee_id INT NOT NULL AUTO_INCREMENT, first_name VARCHAR(50) NOT NULL, last_name
This lab focuses on the design, build, and use of a relational database. You are to chose a database of your choice (the labs use MySQL, but you can use MS Access or other database) and complete the following:
Complete an EER diagram of the company database described in chapter 4. You may use Visio, PowerPoint, MySQL Workbench, or gliffy.com
Create the database based on your design. Write the Create table statements (even if you create the tables in MS Access, you need to provide the Create Table statements). Keep in mind keys and referential integrity requirements
Under Course Lab files you will find lab documents. Under chapter 4 use the data files provided to load the database.
Prepare the following queries:
Select * from each table
Complete a query with at least 2 joins
Complete a query with 2 joins and the use of an aggregate function like average or sum
Complete a query using an outer join
You should submit your EER diagram, DDL statements, Load DDL, and queries in a single document by the end of the course
The lab is worth 12% of your grade -
“HFA BYOD Registration Form Submission”
I will attach my HFA BYOD Registration form below as well as the instructions and anything other needed documents for this assignment. The form I submit will not be fully filled out but it has majority of the information that you will need.
-
Title: “Revolutionizing Manufacturing: Designing and Implementing a Robotic Arm for Automated Production”
Development of a robotic arm for automated manufacturing.
Important Info
The order was placed through a short procedure (customer skipped some order details).
Please clarify some paper details before starting to work on the order.
Type of paper and subject
Number of sources and formatting style
Type of service (writing, rewriting, etc) -
“Exploring Windows: A Hands-On Investigation”
PLEASE READ THE INSTRUCTIONS!!!
I’ve attached screenshots of the instructions. You will be answering questions about Windows and providing screenshots of the answers as well as writing them on the paper. -
“The Love Bug Virus: A Look Back at its Impact and Lessons Learned” Slide 1: Introduction – Title: The Love Bug Virus: A Look Back at its Impact and Lessons Learned – Brief overview of the Love Bug Virus and its
Looking to have 5 slides created about the “Love Bug Virus” also known as the “I love you” virus. This was a computer virius that ffected many people.
The slides should just talk about:
Challenges:
– Challenges that emerged
– Perspectives of various actors
– Decisions taken
– Actions or changes made
Here are some resources to help.
https://www.wired.com/story/the-20-year-hunt-for-the-man-behind-the-love-bug-virus/
https://www.techtarget.com/searchsecurity/definition/ILOVEYOU-virus
https://en.wikipedia.org/wiki/ILOVEYOU
https://www.scmagazine.com/perspective/how-the-iloveyou-worm-exposed-human-beings-as-the-achilles-heel-of-cybersecurity -
Title: Forensic Examination and Report on a Network Intrusion at JLA Enterprise
When completing the case study you must have a minimum of 3-5 outside sources cited and referenced in the paper. Your references page must be written in APA citation style.
Case Study
You are hired by JLA Enterprise to conduct a Forensic Examination after a network intrusion occurs at their corporate office. Your job is to determine the source of the network intrusion and provide as much information regarding the attack as possible. Here are some things to consider when explaining what happened during the network intrusion:
What time did the attack happen?
How did the hacker get into the network?
What computers were compromised?
What computers were accessed?
What data was extracted from the network?
What type of attack was conducted?
How long did the attacker have access to the network?
Is there any persistence on the network for future attacks?
You are asked to conduct a forensics examination of the network and provide a forensic report explaining what happened during the attack and what corporate data was compromised. The report should cover the above information, as well as create a timeline that shows the attack from the initial stages of the attack to when the data was extracted from the network.
Your submission should be about 3 to 5 pages (not including the title page and the references page) long in APA format with proper citations and references if you are using them. It will be subjected to checking against plagiarism. The final product must follow acceptable originality criteria (no more than 15% max total, and 2% per individual source match are allowed). -
Proposal for Software Testing Methods and Strategy for Down Town Repair Application Introduction Software testing is a crucial step in the development process of any application. It ensures that the application meets the requirements and functions as intended. In this proposal, we will discuss
Read the down town repair case study pdf.
For your written assignment, you will apply what you’ve learned to compose a proposal that describes software testing methods and explains the testing strategy you will use. Tim is concerned about the quality of the application you are proposing. He works hard to make sure the services he provides exceeds customer expectations, so he also wants to ensure the application you are proposing exceeds his expectations. As part of the proposal, Tim wants you to conduct research and explain specific kinds of testing (see below for details) and how they affect the quality of the proposed application.
Compose a proposal that is a minimum of 700 words (double-spaced) in length. Use your research to explain the following:
The difference between:
Functional and non-functional testing White box and Black box testing
How you will use these approaches (1a and 1b) in your testing strategy to ensure the quality of the application you are proposing. -
“Hardware Solutions for Two Clients: A Proposal for Enhanced Efficiency and Productivity”
You will select 2 clients and provide them with hardware proposal.
PLEASE READ THE INSTRUCTIONS!!!
I’ve attached screenshots of the instructions.
I tried to upload them in order but they might not be.