Stuck with your technology & it assignment?

Get answers from academic experts to any study-related questions.

Assume you are part of a multi-disciplinary investigation team, the IIC has asked you to analyse the rapid growth of Valujet as it may have played a role in the accident Valujet 592. Assume there is pressure from the highest office to not explore growth any further. Based on your analysis the IIC asks you if you’re ok dropping this and moving onto another part of the investigation. How would you respond to that?

If there is pressure from the highest office to not explore ValuJet’s growth any further, I will not resist. However, I will let the leadership know that its rapid growth could offer significant clues on what may have contributed to the flight 592 accident. The information that could help other...

What factors determine the dimensions of an airport’s catchment area?

The location of an airport is an extremely important business endeavor for any company. Indeed, according to Blachut, transportation, while being a primary revenue domain for an airport, is not exclusive in terms of service provision. Hence, the modern perception of airports is closely associated with the additional services presented...

Identify three good reasons why a Tier 2 data center would not meet Facebook’s needs.

Facebook is a social media channel of communication that allows users to share information through the internet. Since the company needs a large computational capacity to process all of its customers’ requests, data center investment is one of its most critical expenses. A data center is a climate-controlled structure (or...

Tour project sponsor is concerned about the risks associated with this website migration and what he believes could be a customer satisfaction nightmare. Identify and discuss the top three risks for this project and how you will prioritize tackling each one.

The risks associated with website migration include the following: Broken internal links can be one of the possible issues. This can happen because some historic pages were not redirected, and some links may lead to the old versions of URLs. All links should be updated immediately to solve the problem,...

Analyse the CVR data and the crews actions during the Alaska Airlines 261 accident.

Cockpit voice recorder (CVR) transcripts indicate that although the ill-fated Alaska Airline Flight 261 was diverted to Los Angeles Airport, the flight dispatcher wanted to have the plane continue to San Francisco. The dispatchers believed that diverting the plane would lead to schedule (flow) issues. Starting at 00:19 UTC, the...

Assume you are part of a multi-disciplinary investigation team, the IIC has asked you to analyse the rapid growth of Valujet as it may have played a role in the accident Valujet 592. From the data available do a high-level analysis of Valujet’s growth, and how rapid growth affects safety in general for the IIC to decide if this is an area worth exploring.

ValuJet’s growth in the early fall of 1995 was impressive, and Lewis Jordan – the company’s president and chief operating officer – wondered about the next step to consider to sustain the company’s remarkable performance. Launched in October 1993, the company had shown consistent profitability since its second month of...

It has been argued by many experts that the “culture” at NASA was to blame for the accident. One of the investigators was quoted as saying “Challenger all over Again” analyse the information available via reporting systems that could have prevented this accident.

Some information available through the reporting system could have helped to prevent the accident. For example, the day after launch, the Intercenter Photo Working Group personnel received pictures that revealed a debris strike at 81.9 seconds after launch. The group did not notice this bit of information while reviewing videos...

It has been argued by many experts that the “culture” at NASA was to blame for the accident. Critically analyse the culture at the time of the accident.

When the accident occurred, cultural norms at the National Aeronautics and Space Administration (NASA) tended to be fairly resilient, having bounced back into shape after being altered a bit. The agency’s powerful human space flight culture and institutional practices remained intact despite the appointment of new directors at the Marshall,...

Regarding the Alaska Airlines 261 accident, why would the NTSB allow the board member statements to be included towards the end of the report?

The National Transportation Safety Board (NTSB) allowed the inclusion of the board member statements towards the end of the report for various reasons. First, they had learned that in the 1997 inspection of flight 261 aircraft, the mechanics of Alaska Airlines found that the plane’s jackscrew needed replacing as it...

Critically evaluate the features of a “Global Village” as you have studied. Also, explain the meaning of ‘The Digital Divide’ and its impact.

The “global village” refers to the spread of technologies providing instant communication. People’s lives are close and interconnected, despite the distances and time differences. Although such a phenomenon can simplify interaction, it can violate personal space since the inhabitants of the “global village” penetrate each other’s lives. Such cross-penetration is...

End users have expressed some concern about completing their day-to-day tasks on Linux. How would activities such as web browsing work? How would they work with their previous Microsoft Office files?

The transition from the Windows environment to the Linux environment can pose a challenge of adaptability and portability of files between the two environments. In this case, the Ubuntu desktop and Ubuntu server have been chosen as the preferred Linux distros. Ubuntu desktop provides a graphical user interface that closely...

The current Windows administrators are unsure about administering Linux systems. How are common tasks, such as process monitoring and management, handled in Linux? How does logging work? Do we have event logs as we do in Windows?

Just like in Windows, Linux provides various ways through which system administrators can be able to monitor and manage the system. Logging works by storing system log files on the /var/log directory. This location is used to store information that is useful to a system administrator, such as boot logs,...

Some folks in IT raised questions about the Linux flavor that was recommended. They would like to see comparisons between your recommendation and a couple of other popular options. What makes your recommendation the best option?

There are several Linux kernel options to use, with each of them providing different merits and demerits. In this case, we considered Linux Mint and Ubuntu as they offered the highest level of security while at the same time providing an easier interface for Windows users. Therefore, the main factors...

How does software installation work on Linux?

Installation of new software on the chosen Ubuntu Linux installations will be definitely different compared to the Windows platform, which was in use by the organization. Linux distros tend to provide thorough software repositories which resemble app stores on the smartphone. This means that the software to be installed can...

How can Linux work together with the systems that will continue to run Windows?

For the case of software and systems that are fully dependent on the Windows environment, they can be maintained in the Windows environment, and the two systems will work side by side. Furthermore, popular windows application packages can be installed on most Linux distros, including Ubuntu, through an application called...

Define the violations caused by Dirty read and Phantom.

A dirty read is a situation in a database system where a data item that has been updated by transaction A and not yet committed is read by transaction B. If a transaction B performs an update and commits the changes, it can cause a violation of some transaction rules...

Define a Database transaction. Discuss all desirable properties of transactions.

A database transaction is a unit of work done within a database management system against a specific instance of a database. A complete database transaction should not violate the integrity of the database and should leave the data in a reliable and consistent state. Properties of Transactions Database transaction supports...

It has been argued by many experts that the “culture” at NASA was to blame for the Space Shuttle Columbia accident. Critically analyse the culture at the time of the accident. Analyse the information available via reporting systems that could have prevented this accident.

The Space Shuttle Columbia catastrophe occurred on 1 February 2003, when the shuttle descending through the atmosphere had a piece of protective foam break off and damage the heat-resisting plating of the wing, resulting in the shuttle losing control and breaking apart. All 7 crew members perished in the crash....

Assume you are tasked with an investigation of British Airways Flight 268. Analyse the crew’s decisions from the time of the fire to the eventual landing. Do you think the Captain should have been charged by the FAA? Explain.

The British Airways Flight 268 incident occurred on February 20, 2005, and involved the flight’s engine being caught in flames shortly after they have left the airport in Los Angeles. The fire was, reportedly, caused by an engine surge, almost immediately after takeoff, with flames visibly coming from it. The...

Assume you are part of a multi-disciplinary investigation team, the IIC (Investigator in Charge) has asked you to analyse the rapid growth of Valujet as it may have played a role in the accident. Assume there is pressure from the highest office to not explore growth any further. Based on your analysis the IIC asks you if you’re ok dropping this and moving onto another part of the investigation. How would you respond to that?

Valujet 592 Flight crashed on May 11, 1996, taking the lives of 110 passengers and crew on board. The crash was prompted by a fire in the cargo container, which happened because of violations of storage and packaging rules by the subcontractor performing the packaging. Valujet’s cost-cutting policies in combination...

Analyse the CVR data and the Alaska Airlines 261 crews actions. Analyse the FAA’s oversight of Alaska Airlines. Why would the NTSB allow the board member statements to be included towards the end of the report? What recommendation would you make to the FAA?

Alaska Airlines Flight 261 crashed on January 31, 2000, while flying from Puerto Vallarta to Seattle, crashing in the Pacific Ocean due to a loss of pitch control. Everyone on board, including two pilots, three cabin crew members, and 83 passengers perished in the crash. The initial analysis of CVR...

Considering the Japan Airlines Boeing 787 accident, critically analyze the role of the manufacturing process for the 787. What recommendation would you make to the FAA? Explain.

The incident involving Japan Airlines Boeing 787-8 JA829J happened on 7 January 2013 and was caused by a fire coming from underneath the lid of an auxiliary power unit battery case. The incident prompted an investigation and a suspension of the battery units pending the evaluation of the incident. The...

Why is there a “heightened reliance on endpoint protection software”?

There is an increase in reliance on endpoint protection software because they are very reliable. The endpoint protection software can understand the type of information that needs protection and can tell those who have access to it and those who do not have it. The protection software can make out...

How will security be implemented in the Linux systems—both workstations and servers?

The Linux kernel provides security within itself for workstations and servers. This means that security has been designed into the Linux kernel. Furthermore, the Ubuntu Linux distribution features reliable antivirus and firewall systems which are also built into the operating system itself. Therefore, security controls are already implemented within the...

New technologies emerge, they have a significant impact on our culture and our lives. Choose two new technologies that you currently use often (try going without your cell phone) and explore the positive and negative effects these technologies have on society. If you grew up in your parents’ generation—without computers, e-mail, texting, Facebook, the Internet, and cell phones—how would your daily life differ from the one you lead today? Would your life be slower paced? How would you interact differently with people having direct contact, (e.g. visit, phone conversation vs. texting, Facebook)? Would this be a better form of communication or more difficult.

Technology is embedded in everyone’s life in this information commodity. Emails and cell phones have had significant effects, both positive and negative, on day-to-day lives. The communication media deliver information to many recipients faster than traditional methods. Emailing and texting are cheap, especially when using broadband that allows free mail...

Due to the outbreak of the virus, many countries have been imposing lockdown policies; millions of people are using Zoom as communication media for business, education, and leisure. The high number of people using Zoom has caused a new phenomenon of “Zoombombing,” in which uninvited guests join or hijack meetings, often with hate-filled or pornographic content. For privacy and security reasons, companies like SpaceX banned their staff from using Zoom for business meetings. If you were a hijacker of the meeting, discuss your moral responsibility, legal liability, and accountability for the incident. As an IT professional, discuss the proper actions required to mitigate the risk of Zoombombing in the future.

The idea of hijacking an encounter (intention) belongs to the cyberbully; he plays a direct role in this action (causality). The hijacker pursues his own goals and does not take into account ethical norms and the feelings of others, and further consequences. At the same time, he cannot foresee the...

The use of AI (Artificial Intelligence) has become a technology and business trend with many and varied applications where Ai is being applied. However, Ai is not without issues, particularly ethical issues. Discuss an example of bias in AI (e.g., gender, racial, agism…). You can include a specific context and example in this answer (e.g., Driverless Cars, HR recruitment…). What could be done to reduce these biases? What did the experts suggest should be done? Why?

Examples of bias in artificial intelligence relate to different social and moral-ethical aspects. One of the clear gaps in the use of advanced technologies is utilizing potentially racist algorithms for searching and processing information. For instance, some popular crime tracking software identifies black people more often than whites. Otherwise, special...

What can we learn from the example of the Wi-Fi Alliance with regard to the necessity of networking standards?

Wi-Fi Alliance is an excellent example of how large technology companies’ coordinated adherence and promotion of network standards ensures the continuous development of Internet technologies. Their vision for digital technologies and related products is manifested in their certification policies. Thanks to this, the current online space provides a wide variety...

Summarize the article “Are Airlines Sure We Can Flee Planes Fats? No Way.”

In their 2018 article entitled “Are Airlines Sure We Can Flee Planes Fats? No Way,” the Editorial Board of The New York Times argues its concerns regarding current evacuation plans in airliners and spaciousness-related safety. The authors note that an increased number of seats, high charges, and the person’s average...

Identify what you believe to be the area of most severe consequences for Deloitte—direct impact, business disruption, recovery, legal, or reputation.

It is important to note that cyber threats are becoming more prominent due to the factors of technological advancements and dependencies of modern organizations, such as Deloitte, on hackable and vulnerable instruments of communication. The most severe consequence for the company is its reputation since the majority of revenue comes...

Imagine the following situation: You are working the afternoon shift on a quiet Monday. A front office trainee, Georgina, is under your care for this shift. Making the most of this quiet time, you show Georgina a variety of manuals, reports and reference books kept in the back office. In the course of this, Georgina asks you the following: How do I a recognize a spam email and what should I do when I detect one? What is the difference between ADR and TRevPAR and how can front office contribute to either of them? What is Clean Data and how does it relate to front office?

Spam is emails that are unsolicited messages sent repeatedly and in bulk to an individual or organization. To differentiate spam emails from legitimate ones, it is recommended that one should check for typos and unusual phrasing of the messages contained in the email and whether they have links that they...

Identify one social media that you believe will not be viable in 2026. You must provide valid and research supported reasoning as to why you believe the platform will not be a viable platform in 2026.

The Clubhouse app came out in the spring of 2020, and in my opinion, this app will not last until the year 2026. Moreover, the marketing of Clubhouse is based on the idea of “you will miss something”, which cannot maintain a constant high interest in the promoted service. Strielkowski...

Provide an argument as to why Facebook platform will be viable in 2026.

Facebook will remain a viable platform in 2026 due to the fact that it has the reputation of a platform where people share their mindful, thought-out, or even controversial yet argumentative posts. A lot of influential speakers communicate with their audience from here, and thematic communities grow exponentially.

How can the Network Analysis Toolbox tool be useful to mitigate the challenges one might face as an area planner, city manager, politician, home owner or business owner?

Network Analysis Toolbox is software that was created to model the traffic of bicycles and pedestrian routes in the cities by modeling them. For different people, this software can be useful in different ways. For example, business owners can analyze the most popular pedestrian routes and to open their shops...

You work for a manufacturing company. The president of your company has heard about cloud computing and concealed conduits, but she does not understand what they are all about. Explain, in a memo, what these are and how they would help the company. Include any relevant potential risks. Remember to use language that she, as a non-technical but intelligent person, will be able to understand.

It goes without saying that the distribution of information and its sharing may be regarded as a highly critical stage of the process of information dissemination. In the present day, the majority of organizations have shifted from storing their information locally to information management on a network basis utilizing third-party...

Please explore the Web sites for the Law Enforcement National Data Exchange (N-DEx) and Law Enforcement Enterprise Portal (LEEP). What services does each provide that can assist police departments in obtaining information and intelligence?

United States law enforcement is one of the three main components of the U.S. criminal justice system. To facilitate and make their work more efficient, there are specialized Internet resources. Two of them are The National Law Enforcement Data Exchange and Law Enforcement Enterprise Portal. The first site under research...

Please explore the Web sites for the Law Enforcement National Data Exchange (N-DEx) and Law Enforcement Enterprise Portal (LEEP). Discuss commonalities and differences between these two Web sites.

The main common feature of these two sites is the provision of information about criminal cases, analytical resources, and a lot of information related to them. The second similarity is that the users of these web pages are law enforcement agencies for criminal justice. A distinctive feature is that Law...

Comparing Desktop Environments and Window Managers. In addition to desktop environments such as KDE and GNOME, there are window managers. For example, open SUSE includes Ice WM and TWM. Conduct Internet research to learn more about desktop environments and window managers, and explain the major differences between the two.

Window Managers Window Manager refers to the GUI that controls the appearance of the windows, as their size and placement. Furthermore, Window Managers are in charge of the different buttons often seen on the windows, such as close, minimize, maximize, etc., and scroll bars and menus. According to Wallen, some...

Using Disk Quotas You’re the system administrator for a small department in your company that’s responsible for an important database. You prefer having servers with more disk space, but your company can’t afford to increase the budget for IT equipment. You have noticed that some users are storing old files on the server that are most likely obsolete. You don’t want to delete any user files, so you decide to set up disk quotas for users. You have 20 users, and department servers are capable of holding 200 GB of data. What commands should you use to create disk quotas? Do you plan to use hard limits, soft limits, or both? Will all users have the same limits? Prepare a plan to submit to your manager for approval. Your plan should justify the need for disk quotas and the hard and soft limits you plan to set. If some users’ quotas will be higher, explain why.

The plan to set disk quotas comes from the concerns of privacy and efficiency. Efficiency, because it would be more beneficial for the company to have servers with more disk space since no one user would overfill the server with just their data. Privacy, because it would be unethical for...

List the command you should use to find the following information. Your company has decided to upgrade all Linux servers to ext4. You aren’t sure which file system is used on one Linux server. Which command should you use to determine its file system? Every time your Linux machine boots, the file system you added isn’t mounted automatically. What can you do to make sure it’s mounted automatically each time your computer starts? A customer calls to complain that she can’t view the contents of a directory she mounted. What command should you use to view all mounted file systems on her computer?

Determining File System on Linux Server A file system is how the OS organizes files on a disk. Users can employ several commands to determine which file system is being used on the Linux server. The best choice would be using the mount command allows the user to mount a...

Why is outlier mining important?

Outlier analysis is a critical element of statistical data processing. Outliers refer to any data that deviate from average trends, which is especially relevant in regression studies. Finding such outliers allows assessing whether the overall data are accurate or provides insights into particular cases that do not distort the overall...

What are the differences between visual data mining and data visualization?

The described processes are cause and effect of each other. For example, data visualization is used as a tool for effective presentation: instead of text and complex calculations, the reader receives conveniently designed, easy-to-understand data. These can be graphs, tables, charts, dendrograms, and other elements of visual statistics. In turn,...

There are three main application architectures in use today: server-based architectures, client-based architectures, and client-server architectures. Compare between them by highlighting advantages and disadvantages. Which one is considered the most common architecture?

Application architecture determines which hardware performs each of the four basic functions of an application: data storage, data access logic, application logic, and presentation logic. There are three main types of application architecture that are used today: server-based, client-based, and client-server architecture. Client-server architecture is considered to be the most...

Identify a challenge you want to solve. Then, record your thoughts about the compressed conflict inherent in this challenge; generate a number of different forms of compressed conflicts (i.e., which two words capture the essence of the challenge inherent in your situation). Choose the compressed conflict that does the best job of capturing the essence of the challenge you face. Finally, in considering this compressed conflict, ask yourself which other situations share the same compressed conflict. What new ideas for your challenge do you get from thinking about these analogous situations?

Challenge to Be Solved With the increasing world population, the number of visitors who usually come to people’s homes has increased. They may be friends, relatives, or even strangers who seek direction. Although there are numerous technological advancements that have been made to ensure that the lives of modern people...

Normalize the following unnormalized table using the three normalization rules and describe each step.

Normalization means organizing data in a full database by creating separate tables and establishing relationships among them. When normalizing a table, three rules, or steps, need to be followed. Student-ID Student-Name Student-City Student-Code_Area Instructor-ID Instructor-Name Instructor-Office Course-ID Course-Name Grade S1445 Ahmad Dammam 03 F12 Abdullah 315 CS140 Programming 1 A...

Why are IT systems important for accountants to understand? What impact does technology have on the field of accounting?

It is important for accountants to understand IT systems because they are used to accomplish accounting functions such as report generation, balancing books, and modifying different accounting reports. This means that different roles in the accounting profession depend on the IT systems. For instance, an accounting information system (AIS) is...

What does your energy cost your state? Include examples of financial costs, environmental costs, and personal health costs. Describe 3 ways that you can save energy at home or work as related to your ecological footprint.

The energy costs for Ohio are in the range of billions of dollars. The annual amount that is spent in this sector totals over $10 billion. Apart from financial costs, environmental costs that are incurred by the state of Ohio in its quest for energy production are also high. The...

The university has decided to buy an e-assessment (e-exam) system. This system will be used by students to do their exam. During the requirement gathering the university decided that the system needs to have high standard of performance requirement. Please describes some of the performance requirements should the university apply and which architecture design should be selected and why?

An electronic assessment system allows students to take their exams online. High-standard requirements are important because the students’ marks depend on the system. The main requirements include reliability, flexibility, manageability, accessibility, affordability, and user-friendly design. Reliability means that the system should be failure-proof and well-protected against cyber threats. Flexibility refers...

Identify a challenge you want to solve. Next, look to nature for an analogous situation. Examine how nature solved the problem, and make connections to your own challenge. See what new ideas this helps you to generate.

A Challenge to Be Solved Teachers are crucial stakeholders in the educational system. They provide their students with knowledge; nevertheless, in most cases, the preparation for the lessons may take long hours that may even last into days to arrange their lesson plans on their personal processors. Although computers are...

Describe the causes of the Challenger disaster.

On January 28, 1986, the Challenger disaster happened after the space shuttle Challenger had risen into the sky. It had seven crew members who were strapped in their seats. The launch was going on well until seventy seconds after liftoff. The shuttle was already 50,000 feet above when some aggressive...

Describe NASA’s culture before the Challenger disaster.

NASA was a geographically dispersed team with its HQ in Washington DC and its mission control at the Johnson Space Center in Houston, Texas. All the propulsion aspects, such as the fuel tanks, main engines, and rocket boosters, were the Marshall Space Center’s obligation in Huntsville, Alabama. In contrast, the...

Describe changes made after the Challenger disaster.

After the Challenger disaster, the Presidential Commission suggested that NASA rearrange its management to strengthen its control. The management’s rearrangement was to set up a group devoted to identifying problems concerning the shuttle’s safety and reviewing its critical items. As per NASA’s new release on January 22, 1988, all of...

Backup is incredibly important to any software. Discuss the backup features (if any) of the software: graphical Interface, command line, incremental backups, automatic backups.

The MYOB accounting software stores significant business information, which needs protection as described below. Graphical Interface The graphical interface, the icon for desktop users, opens the inventory`s file window to enable selecting the option labelled data backup. On selecting the option labelled data backup, a window named company file backup...

Requirements are often difficult to derive, especially when the environment in which the system will function, and the specific task it will perform, are unknown. Explain the problems that this causes during development of information or computer security assurance.

The uncertainty of the environment and functions to be performed by a computer system may lead to various problems when developing information and computer security assurance, as outlined below. First, customers’ ignorance of their project demands may lead to incorrect information or insecure computer systems. Analysts are always left with...

Why is the waterfall model of software engineering the most commonly used method for development of trusted systems?

The waterfall model refers to a design process that is used in the development of software processes. Progress flows downwards through eight phases: conception, initiation, analysis, design, construction, testing, production, and maintenance hence the name ‘waterfall model.’ The waterfall model is commonly used because it saves on time and effort....

Why does the Boyer-Moore theorem prover perform induction only when the other five steps fail to simplify the formula? Why does it not try induction first?

Developed by Robert Boyer and Strother Moore, the Boyer-Moore theorem prover is an automatic and logic-based system. It is a heuristic theorem prover that is used to prove properties of pure Lisp programs in a logic that is quantifier-free. It also exploits the duality between proofs by induction and definitions...

Consider the following steps of the Systems Development Life Cycle. Planning, needs analysis (this is where those process flows come in), design and acquisition, build, testing, implementation, maintenance. What two steps in the process do you feel is the most critical? Can any steps be left out of the cycle?

The most important steps in the process are testing and implementation. Specifically, the results of the testing stage will determine the usability of the system in a practical organization environment. The testing stage determines the level of system acceptance or usability before the actual implementation. This means that the testing...

Online technology is widely used to purchase both personal items and materials for organizational use. One risk with the use of technology for purchasing is power outages or system failures. Describe a strategy an organization can use to help reduce the impact of such technology failure risks.

Online technology plays a significant role in the modern world, denoting that its failure can lead to actual harm. That is why companies should develop and use specific strategies to minimize the possible negative impact, and such a plan will be offered further. Firstly, it is necessary to perform regular...

Why are databases the core of an information system? Briefly describe what a database is and how as accountants they are critical to an AIS (Accounting Information system).

Databases make available an effective way of data storage, retrieval, and analysis. Databases are the core of an information system because they are faster and more efficient. This means that information systems or files can be stored and retrieved in databases with have unlimited storage capacity. A database is basically...

The trusted computing base comprises the reference validation mechanism while the TOE contributes to the protection of the trusted computing base.

The reference validation mechanism came about as an implementation of the reference monitor concept. The reference validation mechanism has three principles, i.e., it must be tamper-proof, it must be small in size to allow for analysis and tests to assure its correctness, and it must always be invoked. The mechanism...

Can the UNIX Bourne Shell variable HOME, which identifies the home directory of a user to programs that read start-up files from the user’s home directory, be used to compromise a system? If so, how?

The UNIX Bourne Shell variable HOME can be used to compromise a system. Using Unix, the user’s setuid program is given an environment that runs according to the authority given. A program can be made insecure when codes from specified locations in terms of environmental variables are loaded by another...

The NRL classification scheme for the “time of introduction” axis, must the development phase precede the maintenance and operation phase, and must the maintenance phase precede the operation phase?

In the NRL classification scheme, for the ‘time of introduction’ axis, the development phase must precede the maintenance phase and operation phase because the main intention here is to determine how and when the flaw entered the system. The analysis, therefore, has to first consider the development phase to determine...

Give examples of ways to validate the information from SQL queries or reports, to assure a level of accuracy in the results. When, if at all, is it better to extract raw data instead of summary information and what the the best ways to present any retrieved information (e.g. tables, diagrams, narrative)?

SQL queries usually require a range of documents in support of their validity. To be proved valid, SQL queries should, most importantly, be qualified. It means that it is needed to assemble a test script so as to document and verify the outcomes of the queries. Datasets can also prove...

What is the primary reason and the need to aggregate data in health care?

The primary reason and the need to aggregate data in health care is the normalization of the data and unification of it; subsequently, the queries, alerts, and reports are made possible. The main condition of this possibility is that the data is unified in a single format. For instance, the...

Find an article on RFID technology and how it has impacted a business in a positive manner. How do you think RFID technology improves the way accountants will work in the future?

The article, How RFID Technology Is Changing Business, by Matt Smith outlines the significance of Radio Frequency Identification (RFID) technology in the business environment. Although launched more than 4 decades ago, the practical usage of the RFID in the business environment only began less than a decade ago because of...

What is the Gantt chart? Why is it used?

The Gantt Chart also referred to as a harmonogram, is a unique project management tool that provides a visual illustration of activities (tasks) scheduled over a given period. It facilitates the planning, organization, and designing process of projects. This technique typically consists of time intervals denoted on the horizontal axis...

Describe the difference between functional and non-functional requirements. List two functional and two nonfunctional business requirements for a secure online shopping system.

In information technology (IT) and software engineering, functional requirements delineate the system as a whole or its particular components. They are product functions or features that must be implemented by developers to facilitate the user’s ability to execute their tasks. Functional requirements delineate a system’s behavior under a given condition....

What can be called as a success in IT.

Success is a fundamental concept, which encompasses all areas of human activity. In fact, it is considered the ultimate objective of such activities, but its exact definition for various industries has been the subject of active discussions. In its general understanding, success refers to the actual outcome of an endeavor,...

Select a modern supply chain technology and give an example of how an aircraft manufacturer might use that technology to improve customer relationships and increase productivity within the value chain.

Modern supply chains heavily rely on various technologies to achieve higher efficiency. There are many available options, and 3D printing is a noticeable variant. This technology allows for creating numerous parts that influence aircraft performance and customer experience. 3D printing can increase the value chain’s productivity because this approach helps...

Is the Internet a bigger invention than Electricity or the Telephone?

Yes, the Internet is a bigger invention because it spans the world and offers many advantages as compared to the Telephone. The telephone is solely used for communication and it is expensive. The Internet incorporates many functions including communication, electronic commerce, learning, and advertisement. All these capabilities enable people to...

Why is DNS considered one of the “pillar” application layer protocols?

The Domain Name System (DNS) is one of the pillar application layer protocols because it performs names resolutions by converting symbols into numeric addresses based on a Standard Name Resolution technique. The technique enables the translation of DNS names which are taken as input and resolved into the corresponding Internet...

A stateful firewall can tell if the HTTP connection is starting from inside the network by looking at the transport layer TCP SYN (synchronize) as well as IP address source. What should it do if someone from the outside is pretending to be an “interior” IP address?

Firewalls provide protection by inspecting packet headers and application layer data and comparing what it finds with existing rules, which are either predefined or built-in defaults. When an IP address seems to be from the inside of a network and yet it is not, the firewall examines the port numbers...

If Intrusion Detection Systems worked better, we would not have the cyber security problems we have. What makes this (creating great IDS) hard to do?

Schiffman argues that intrusion detection systems have limitations that make it difficult to detect some attacks. Beardsley views the limitations to include the inability to detect unknown attacks based on the “misuse detection” concept. In that case, the IDS functions on pre-defined rules based on human knowledge. In addition to...

Why isn’t IPSec used everywhere?

IPSEC is not used everywhere because it is only suitable for parties that know each other and are only able to make initial configurations that are required for secure communication to occur between the communicating parties. IPsec does not provide secure communication services based on the secure socket layer (SSL)...