Homework #1 1. The search term I used is “database security” because I am interested in it when I read through it. Moreover, I want to know more about the term “database”, and it found it means a controlled collection of data, and metadata, stored on computer. I also want to learn about ways to protect against threats that specifically target databases. Besides, I searched about “Relational Databases” because most databases are relational database, and they store their data in relation. 2. I…
A data warehouse is a big store of data which basically serves as an entity for collecting and storing integrated sets of data from different sources and eras of time period. As per Bill Inmon, father of data warehousing, a data warehouse is a subject-oriented, integrated, time-variant and non-volatile collection of data in support of management 's decision making process. Basically, data warehousing is focused in query and analysis of data. It acts as storage of different kinds of historical…
Health Information exchange (HIE) allow providers which includes doctors, nurses, pharmacist and patients to have access to patient healthcare information. The health information exchange is a secure and safe electronic data, as well as helps facilitate coordinated patient care, reduce duplicative treatments and avoid costly mistakes. Working in the healthcare industry, I do see the benefit of government mandate that all electronic based healthcare system exchange information. It allows…
Since the terrorist attacks on September 11, 2001, national security has been a top priority, physically and electronically. The United States Government has created programs and institutions to handle and prevent threats and attacks within, or towards, our nation. The United States Government does not deny domestic surveillance programs and justifies monitoring the lives of civilians by stating that the programs are for the overall national security of the nation, rather than defending the…
Body Cameras are the most recent and seem to be the most challenging form of police equipment to date. All the way from its decision to make its way into police departments in America to the way it should be handled and used. They are the newest extension to police departments that allow police task force to become tech-savvy in the 21st century or what sociologist and communications theorist Manuel Castells would say the “digital information age”. The police executive research Forum (PERF)…
In a world where communication and sharing of thoughts across the globe is constant and near instantaneous, there is much insight towards human culture that can be extracted from what people say and write (Michel et al, 2010). Through analysis of the frequency of words contained in over five million books spanning hundreds of years, a culturomics study carried out by researchers from Harvard allowed the inspection of cultural trends in human history and gave us the ability to use those trends as…
Having drawn many of its founding values from John Locke’s social contract theory, the American government holds the responsibility of protecting its citizens at all costs – but to what extent? From the beginnings of the War on Terror in 2001, the American government has enacted multiple policies that have overstepped its legislative and executive boundaries, supposedly under the guise of protecting the American public from the grasps of terrorism. This was seen in the creation of the PATRIOT…
I can say for myself that curating did assets for this month in making me create better results in my assignments and projects. It helped in grow in so many ways that I didn't think it was possible. Yes, they were worth keeping, cause it gave me knowledge and growth in so many. I accredit that the process in curating and also developing amazing habits, like being more clam being patient and trying to learn new things helped me a lot in this class.Thanks to Pete who told me that I will be just…
Digital technology has opened many holes in which the government can peak into peoples’ lives. It has blurred the line between what is considered public and private information. These technologies come in many forms such as, facial recognition technology, GPS tracking devices, drones, surveillance cameras, and devices used by the NSA to collect information. These technologies are abused everyday by authorities and government officials, and it is time to set limitations on how they use them.…
and consistency with the response time requiring efficient memory of the system. The issues are vital to compute on a network, which requires rapid productivity for database administration. Therefore, the database requires the substance of prior metadata to robotize the infrastructure, which is an essential solution for a fruitful project…