Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
Describe an example of a very poorly implemented database that you've encountered (or read about) that illustrates the potential for really messing things up.
What is it about, which topic it covers; Why interesting; Which vulnerability is involved; What is its CVSS value? motivate the CVSS values.
For concurrent control, describe the required reason of use concurrent control and how to implement concurrent control?
Are there any relations between different systems? How to integrate multi-different systems?
What do you think are the weaknesses of user stories when used to identify system features and how they work?
List each step of the decision making process. Include a brief description of each step of the decision-making process.
If you had your own business, what would it be? What would your twitter handle be? (The @ part of the name). What would your #hashtag be?
Explain something cool about the historical character you chose, and share your sources.
Describe File Structures and Relational Database. What is Normalization and Denormalization? Define Master File Design.
Define virtualization and the various types of virtualization. List the pros and cons of virtualization. List reasons why companies should virtualize.
What are the strategic and technical security measures for good database security?
What are the ramifications of stringent testing criteria vs. lax testing criteria? What might happen if insufficient time were left near the end of a project.
Discussion Post: Cryptography- Analyze the history of Caesar Cypher and its impact on cryptography.
Description of SSL certificates versus TLS certificates. Include at least one cited source. Cryptographers' Recommendation on TLS Certificate.
What are some ways that firewalls can filter network traffic? Research your answer before you respond and be sure to cite your sources.
How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.
Given this definition, discuss how you would analyze an algorithm for correctness and efficiency. Conduct some research to assist you with your answer.
What does it mean to preempt a process? What is the difference between a mode switch and a process switch?
Describe in 500 words the shared security responsibility model that a DBA must be aware of when moving to the cloud.
Discuss the event, and then discuss which of CIA (confidentiality, integrity and availability) principles were violated and specifically how they were violated.
Describe the importance of security in protecting data on computer systems. Describe the threats posed on the inside by employees of a company.
What are some other security models besides CIA triad? What are four components of security documentation? What are responsibilities of a security architect?
What is K-means from a basic standpoint? What are the various types of clusters and why is the distinction important?
What is the premise of the use case and findings? What type of tools are used in the data mining aspect of the use case and how are they used?