week 2 paper
.docx
keyboard_arrow_up
School
University of Phoenix *
*We aren’t endorsed by this school
Course
20
Subject
Computer Science
Date
May 24, 2024
Type
docx
Pages
6
Uploaded by DoctorTitaniumGerbil3
COMPARING ACADEMIC SOURCES 1
WILLIAM DELANEY
UNIVERSITY OF PHOENIX
LDR/711A
ANDREW LAWLOR
MAY 20, 2024
Source Comparison Matrix
2
Source Comparison Matrix
3
Introduction In this essay, I will discuss reliable sources and how to determine their reliability. I will also discuss the publications by Porr and Zimmerman, as well as which authors' works, I believed to have undergone peer review, and which did not.
Credible Sources
[CITATION Eli23 \l 1033] explains the importance of using reliable sources in research and the risks associated with jeopardizing our job and reputation as professionals. We have significantly greater access to research information now than we did even a few decades ago because of technology. This amount of information can be debilitating. It might be challenging to
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Explain the different types of views in ABAP
arrow_forward
Data redundancy issue is a source of database content inconsistency
(a) True
(b)False
arrow_forward
Please provide a full list and explanation of all terms associated with data quantification. Urgent
arrow_forward
Assignment
Due: Fri, Jun 18 2021 at 11:59 PM
1. What are the basic steps in processing
research data?
2. What are the uses of dummy tables?
arrow_forward
Explain the concept of database normalization anomalies. Provide examples of insertion, update, and deletion anomalies, and how these can be mitigated.
arrow_forward
From the lists below, for each list, select three terms, concepts or analysis from each list (that’s 15 total), and write 1 paragraph for each (that’s 15 paragraphs).
List 1:
Database
Database management system (DBMS)
Structured query language (SQL)
Relational database
Table of data consisting of rows (tuples) and columns (attributes)
Primary and Foreign Keys
Database access control
List 2:
Malicious software (malware)
Terminology for malicious software
Viruses –mechanism, trigger, payload
dormant, propagation, triggering, and
execution phases
Boot sector infector
Polymorphic, and metamorphic viruses
worms
Scanning/fingerprinting
Spam e-mail/trojans – social engineering
System corruption
Bots
Remote control (command and control)
Phishing
Backdoor/trapdoor
Rootkit
Countermeasures
List 3:
Denial-of-service (DoS) attacks
Distributed DDoS attacks
Reflection attacks
Amplification attacks
DNS amplification attacks
Application-based bandwidth attacks
SIP flood
HTTP-based attacks…
arrow_forward
Mini-Case Organization Description:You work for a national healthcare society. Your society regularly collects information from hospitals and clinics nationwide regarding both inpatient and outpatient procedures. This data is stored in a large database, which is accessible by members of hospitals or clinics who contribute any information. Additionally, your society performs other member services, such as organizing a national conference and publishing a journal of information articles relevant to the society.Assume the society headquarters is in St. Louis, Missouri and leases floors in a high-rise multitenant office building located center city. The servers holding the national database of procedures occupy most of one of the leased floors. Other floors hold offices for the elected officers and hired staff, a library, and meeting rooms. Each floor has either a receptionist or guard (on the server floor). Except for the server floor, society members and the officers may access the…
arrow_forward
Mini-Case Organization Description:You work for a national healthcare society. Your society regularly collects information from hospitals and clinics nationwide regarding both inpatient and outpatient procedures. This data is stored in a large database, which is accessible by members of hospitals or clinics who contribute any information. Additionally, your society performs other member services, such as organizing a national conference and publishing a journal of information articles relevant to the society.Assume the society headquarters is in St. Louis, Missouri and leases floors in a high-rise multitenant office building located center city. The servers holding the national database of procedures occupy most of one of the leased floors. Other floors hold offices for the elected officers and hired staff, a library, and meeting rooms. Each floor has either a receptionist or guard (on the server floor). Except for the server floor, society members and the officers may access the…
arrow_forward
Mini-Case Organization Description:You work for a national healthcare society. Your society regularly collects information from hospitals and clinics nationwide regarding both inpatient and outpatient procedures. This data is stored in a large database, which is accessible by members of hospitals or clinics who contribute any information. Additionally, your society performs other member services, such as organizing a national conference and publishing a journal of information articles relevant to the society.Assume the society headquarters is in St. Louis, Missouri and leases floors in a high-rise multitenant office building located center city. The servers holding the national database of procedures occupy most of one of the leased floors. Other floors hold offices for the elected officers and hired staff, a library, and meeting rooms. Each floor has either a receptionist or guard (on the server floor). Except for the server floor, society members and the officers may access the…
arrow_forward
Mini-Case Organization Description:You work for a national healthcare society. Your society regularly collects information from hospitals and clinics nationwide regarding both inpatient and outpatient procedures. This data is stored in a large database, which is accessible by members of hospitals or clinics who contribute any information. Additionally, your society performs other member services, such as organizing a national conference and publishing a journal of information articles relevant to the society.Assume the society headquarters is in St. Louis, Missouri and leases floors in a high-rise multitenant office building located center city. The servers holding the national database of procedures occupy most of one of the leased floors. Other floors hold offices for the elected officers and hired staff, a library, and meeting rooms. Each floor has either a receptionist or guard (on the server floor). Except for the server floor, society members and the officers may access the…
arrow_forward
CASE :
You work for a national healthcare society. Your society regularly collects information from hospitals and clinics nationwide regarding both inpatient and outpatient procedures. This data is stored in a large database, which is accessible by members of hospitals or clinics who contribute any information. Additionally, your society performs other member services, such as organizing a national conference and publishing a journal of information articles relevant to the society.
Assume the society headquarters is in St. Louis, Missouri and leases floors in a high-rise multitenant office building located center city. The servers holding the national database of procedures occupy most of one of the leased floors. Other floors hold offices for the elected officers and hired staff, a library, and meeting rooms. Each floor has either a receptionist or guard (on the server floor). Except for the server floor, society members and the officers may access the building and society floors.
The…
arrow_forward
External research is expected (please place citations in your submission with a bibliography at the end!)
List 1:
Database
Database management system (DBMS)
Structured query language (SQL)
Relational database
Table of data consisting of rows (tuples) and columns (attributes)
Primary and Foreign Keys
Database access control
List 2:
Malicious software (malware)
Terminology for malicious software
Viruses –mechanism, trigger, payload
dormant, propagation, triggering, and
execution phases
Boot sector infector
Polymorphic, and metamorphic viruses
worms
Scanning/fingerprinting
Spam e-mail/trojans – social engineering
System corruption
Bots
Remote control (command and control)
Phishing
Backdoor/trapdoor
Rootkit
Countermeasures
List 3:
Denial-of-service (DoS) attacks
Distributed DDoS attacks
Reflection attacks
Amplification attacks
DNS amplification attacks
Application-based bandwidth attacks
SIP flood
HTTP-based attacks
Defenses against DoS attacks
List 4:
Intruders
Masquerader…
arrow_forward
Explain the concept of data redundancy in database design and how normalization helps reduce redundancy. Provide real-world examples.
arrow_forward
Data dictionary role in DBLC process?
arrow_forward
This organization provides following functionalities
Emergency Care 24x7
Support Groups
Support and Help Through calls
Any new Patient is first registered in their database before meeting the doctor. Each Doctor have ID, specialization, age, name, gender and phone no. every doctor have unique ID. The Doctor can update the data related to the patient upon diagnosis (Including the disease diagnosed and prescription).doctor examined number of patients on daily bases. Patient has unique id, name, age, gender, disease status (admitted, discharged, expired), date and address. Patients with critical condition are examined by many doctors. This organization also provides rooms facility for admitting the patient who is critical. One room can be booked by one patient only and each room has room#, location attributes. Rooms are distributed among two categories general and VIP. Apart from doctors, this organization has nurses and ward boy. Each nurse and ward boy is assigned to no of doctor.…
arrow_forward
This organization provides following functionalities
Emergency Care 24x7
Support Groups
Support and Help Through calls
Any new Patient is first registered in their database before meeting the doctor. Each Doctor have ID, specialization, age, name, gender and phone no. every doctor have unique ID. The Doctor can update the data related to the patient upon diagnosis (Including the disease diagnosed and prescription).doctor examined number of patients on daily bases. Patient has unique id, name, age, gender, disease status (admitted, discharged, expired), date and address. Patients with critical condition are examined by many doctors. This organization also provides rooms facility for admitting the patient who is critical. One room can be booked by one patient only and each room has room#, location attributes. Rooms are distributed among two categories general and VIP. Apart from doctors, this organization has nurses and ward boy. Each nurse and ward boy is assigned to no of doctor.…
arrow_forward
This organization provides following functionalities
Emergency Care 24x7
Support Groups
Support and Help Through calls
Any new Patient is first registered in their database before meeting the doctor. Each Doctor have ID, specialization, age, name, gender and phone no. every doctor have unique ID. The Doctor can update the data related to the patient upon diagnosis (Including the disease diagnosed and prescription).doctor examined number of patients on daily bases. Patient has unique id, name, age, gender, disease status (admitted, discharged, expired), date and address. Patients with critical condition are examined by many doctors. This organization also provides rooms facility for admitting the patient who is critical. One room can be booked by one patient only and each room has room#, location attributes. Rooms are distributed among two categories general and VIP. Apart from doctors, this organization has nurses and ward boy. Each nurse and ward boy is assigned to no of doctor.…
arrow_forward
This organization provides following functionalities
Emergency Care 24x7
Support Groups
Support and Help Through calls
Any new Patient is first registered in their database before meeting the doctor. Each Doctor have ID, specialization, age, name, gender and phone no. every doctor have unique ID. The Doctor can update the data related to the patient upon diagnosis (Including the disease diagnosed and prescription).doctor examined number of patients on daily bases. Patient has unique id, name, age, gender, disease status (admitted, discharged, expired), date and address. Patients with critical condition are examined by many doctors. This organization also provides rooms facility for admitting the patient who is critical. One room can be booked by one patient only and each room has room#, location attributes. Rooms are distributed among two categories general and VIP. Apart from doctors, this organization has nurses and ward boy. Each nurse and ward boy is assigned to no of doctor.…
arrow_forward
explain what problems can occur because of a data discrepancy
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Related Questions
- Assignment Due: Fri, Jun 18 2021 at 11:59 PM 1. What are the basic steps in processing research data? 2. What are the uses of dummy tables?arrow_forwardExplain the concept of database normalization anomalies. Provide examples of insertion, update, and deletion anomalies, and how these can be mitigated.arrow_forwardFrom the lists below, for each list, select three terms, concepts or analysis from each list (that’s 15 total), and write 1 paragraph for each (that’s 15 paragraphs). List 1: Database Database management system (DBMS) Structured query language (SQL) Relational database Table of data consisting of rows (tuples) and columns (attributes) Primary and Foreign Keys Database access control List 2: Malicious software (malware) Terminology for malicious software Viruses –mechanism, trigger, payload dormant, propagation, triggering, and execution phases Boot sector infector Polymorphic, and metamorphic viruses worms Scanning/fingerprinting Spam e-mail/trojans – social engineering System corruption Bots Remote control (command and control) Phishing Backdoor/trapdoor Rootkit Countermeasures List 3: Denial-of-service (DoS) attacks Distributed DDoS attacks Reflection attacks Amplification attacks DNS amplification attacks Application-based bandwidth attacks SIP flood HTTP-based attacks…arrow_forward
- Mini-Case Organization Description:You work for a national healthcare society. Your society regularly collects information from hospitals and clinics nationwide regarding both inpatient and outpatient procedures. This data is stored in a large database, which is accessible by members of hospitals or clinics who contribute any information. Additionally, your society performs other member services, such as organizing a national conference and publishing a journal of information articles relevant to the society.Assume the society headquarters is in St. Louis, Missouri and leases floors in a high-rise multitenant office building located center city. The servers holding the national database of procedures occupy most of one of the leased floors. Other floors hold offices for the elected officers and hired staff, a library, and meeting rooms. Each floor has either a receptionist or guard (on the server floor). Except for the server floor, society members and the officers may access the…arrow_forwardMini-Case Organization Description:You work for a national healthcare society. Your society regularly collects information from hospitals and clinics nationwide regarding both inpatient and outpatient procedures. This data is stored in a large database, which is accessible by members of hospitals or clinics who contribute any information. Additionally, your society performs other member services, such as organizing a national conference and publishing a journal of information articles relevant to the society.Assume the society headquarters is in St. Louis, Missouri and leases floors in a high-rise multitenant office building located center city. The servers holding the national database of procedures occupy most of one of the leased floors. Other floors hold offices for the elected officers and hired staff, a library, and meeting rooms. Each floor has either a receptionist or guard (on the server floor). Except for the server floor, society members and the officers may access the…arrow_forwardMini-Case Organization Description:You work for a national healthcare society. Your society regularly collects information from hospitals and clinics nationwide regarding both inpatient and outpatient procedures. This data is stored in a large database, which is accessible by members of hospitals or clinics who contribute any information. Additionally, your society performs other member services, such as organizing a national conference and publishing a journal of information articles relevant to the society.Assume the society headquarters is in St. Louis, Missouri and leases floors in a high-rise multitenant office building located center city. The servers holding the national database of procedures occupy most of one of the leased floors. Other floors hold offices for the elected officers and hired staff, a library, and meeting rooms. Each floor has either a receptionist or guard (on the server floor). Except for the server floor, society members and the officers may access the…arrow_forward
- Mini-Case Organization Description:You work for a national healthcare society. Your society regularly collects information from hospitals and clinics nationwide regarding both inpatient and outpatient procedures. This data is stored in a large database, which is accessible by members of hospitals or clinics who contribute any information. Additionally, your society performs other member services, such as organizing a national conference and publishing a journal of information articles relevant to the society.Assume the society headquarters is in St. Louis, Missouri and leases floors in a high-rise multitenant office building located center city. The servers holding the national database of procedures occupy most of one of the leased floors. Other floors hold offices for the elected officers and hired staff, a library, and meeting rooms. Each floor has either a receptionist or guard (on the server floor). Except for the server floor, society members and the officers may access the…arrow_forwardCASE : You work for a national healthcare society. Your society regularly collects information from hospitals and clinics nationwide regarding both inpatient and outpatient procedures. This data is stored in a large database, which is accessible by members of hospitals or clinics who contribute any information. Additionally, your society performs other member services, such as organizing a national conference and publishing a journal of information articles relevant to the society. Assume the society headquarters is in St. Louis, Missouri and leases floors in a high-rise multitenant office building located center city. The servers holding the national database of procedures occupy most of one of the leased floors. Other floors hold offices for the elected officers and hired staff, a library, and meeting rooms. Each floor has either a receptionist or guard (on the server floor). Except for the server floor, society members and the officers may access the building and society floors. The…arrow_forwardExternal research is expected (please place citations in your submission with a bibliography at the end!) List 1: Database Database management system (DBMS) Structured query language (SQL) Relational database Table of data consisting of rows (tuples) and columns (attributes) Primary and Foreign Keys Database access control List 2: Malicious software (malware) Terminology for malicious software Viruses –mechanism, trigger, payload dormant, propagation, triggering, and execution phases Boot sector infector Polymorphic, and metamorphic viruses worms Scanning/fingerprinting Spam e-mail/trojans – social engineering System corruption Bots Remote control (command and control) Phishing Backdoor/trapdoor Rootkit Countermeasures List 3: Denial-of-service (DoS) attacks Distributed DDoS attacks Reflection attacks Amplification attacks DNS amplification attacks Application-based bandwidth attacks SIP flood HTTP-based attacks Defenses against DoS attacks List 4: Intruders Masquerader…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
- Database Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781305627482Author:Carlos Coronel, Steven MorrisPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning