Paper Help | Week 9 and Week 10 Discussions

Week 9 and Week 10 Discussions

Week 9 and Week 10 Discussions Week 9 Disc 1 •Database solutions today must be able to adapt and integrate among various computing applications. Determine at least three forms of database connectivity methods that can be used as an interface between applications. For each method you have chosen, create an example that demonstrates how each could facilitate data exchange functionality in a cloud service environment. •Suggest at least two software solutions that offer the connectivity methods you have determined in Part 1 of this discussion to interface with other systems. Disc 2 •XML provides a method for data to be transferred between systems. Specify at least three components of an XML document. Analyze how each component ensures data reliability and validation. Also include in your response an example of an XML document and use it to explain the three components of the document. •Identify at least two e-Commerce systems that provide XML data integration. For each system, describe how XML extensions could enable e-Commerce integration among system stakeholders such as vendors, resellers, suppliers, and customers.Week 10 Disc 1 •Information professionals with adequate skills are required to maintain the business continuity of database services in an organization. Identify and assess at least three professional skills that would be required to be successful database administrators. •Give your opinion on what the critical nature of a database administrator’s role is to IT industry organizations. Support your answer with specific examples of functions and responsibilities they perform.Disc 2 •Confidentiality, integrity, and availability are the three common security goals. Select at least three security vulnerabilities that could jeopardize and compromise a database. Classify each vulnerability with being technical, managerial, cultural, or procedural. Provide your rationale. •Suggest specific actions that could be performed to minimize the vulnerabilities identified in Question 1 of this discussion. Describe how often these measures should be performed and the order in which each should be performed.