Program Development

Program Development

Program Development

Implications of Using ZIP Codes on the 1NF, 2NF, and 3NF Rules

The use of different data types and databases is commonplace in program development. Relational databases are data sets with predefined relationships, and a change in one data element can affect other data. The first nominal field (1NF) in relational databases implies that the area can only contain one predefined data type or an atomic value. On the other hand, the second nominal form (2NF) is when the data field follows 1NF rules but has other variables entirely dependent on the primary key. 3NF, the third little form in relational databases, arranges data in a series following the 2NF principle without dependency (Link & Prade, 2019). The relational database containing addresses for each data field implies that the database will use a string for the atomic value, which can be used in the first nominal form for the lesson. The address string can be the primary key to link the other data variables in the second little form (Link & Prade, 2019).

The Software Implementation Stages Where Detailed Design Specifications Are Likely to Be Implemented

The software development process has several stages, followed systematically to complete and launch the software. The design and development of the relational database happen at the design development stage (Lemke, 2018). The reason is that during the design and development stage of software development, the software developers create the software’s structures and design all elements that the software will use. Preparing the relational database during software development’s design and development stage is also advisable. For this reason, the software structures can be tested with the database to get accurate results during the coding process.

Source Code Control, Development Environment, and Refactoring Tools

Source code control is where any code change can be tracked and managed (Murphy-Hill, 2015). For example, when looking at an IDE, a programmer can view both the original code and the changes made to the original code. A programmer can manually manage code changes or use a source control system (Murphy-Hill, 2015). When choosing an IDE, a programmer should consider how it works the source code.

The development environment is the tool used to create a program. Various IDEs have different capabilities (Kavitha & Sindhu, 2015). Some of the IDE capabilities include code debugging and quick code completion. Types of IDEs include NetBeans, Geany, Aptana, and Eclipse (Kavitha & Sindhu, 2015). A programmer would choose an IDE based on the programming language he will be using and IDE capabilities. For example, NetBeans and Eclipse can handle Java programming languages (Kavitha & Sindhu, 2015). However, NetBeans would not be ideal when creating or editing large projects. For large Java projects, a programmer should use Eclipse.

Refactoring improves internal code quality and maintains the code’s external code while minimizing the possibility of new bugs (Murphy-Hill, 2015). This ensures that code quality is maintained. Refactoring tools can be manual or automatic (Murphy-Hill, 2015). Manual refactoring tools have a high chance of creating bugs. A programmer should, therefore, consider this when choosing a refactoring tool. Some of the refactoring tools include Rider, Visual Studio Intellicode, sonarqube, and Spring Tool Suite 4.

Pros and Cons of Using Development Tools

IDEs are easier to use and less time-consuming (Kavitha & Sindhu, 2015). They provide documentation tools that complement project management. Also, they offer a standard working environment. This includes guidance when more than one programmer is creating a program.

Using IDEs requires skills. Therefore, a programmer must learn to use one before creating a program (Kavitha & Sindhu, 2015). A programmer also requires knowledge of the programming language to create a schedule because he cannot rely on an IDE to fix destructive code. It is challenging for a programmer beginner to use a sophisticated IDE. Most beginners start with simple IDEs that have fewer capabilities.

References

Kavitha, S., & Sindhu, S. (2015). COMPARISON OF INTEGRATED DEVELOPMENT ENVIRONMENT (IDE) DEBUGGING TOOLS: ECLIPSE VS NETBEANS. International Research Journal of Engineering and Technology (IRJET)2(4), 432-437. https://www.irjet.net/archives/V2/i4/Irjet-v2i475.pdf

Lemke, G. (2018). The software development life cycle and its application.

Link, S., & Prade, H. (2019). Relational database schema design for uncertain data. Information Systems84, 88-110.

Murphy-Hill, E. (2015). Programmer-Friendly Refactoring Tools [Doctoral dissertation]. https://people.engr.ncsu.edu/ermurph3/papers/ThesisProposal.pdf

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Your company is developing software for the company’s client, a Fortune 500 company. You and your project team are actively involved in the program development.

Program Development

Program Development

You are finalizing the relational database that is about to be designed. Your client insists that you develop a relational database that stores related data in tables, including primary keys, foreign keys, and other design aspects. They also want to keep ZIP codes in the address data.

Create?a 1- to 2-page document using Microsoft® Word for your client. Detail the following:

With your client planning to use ZIP codes with every address in the table, discuss its implications on the 1NF, 2NF, and 3NF rules.
Describe during which stage of the software implementation these detailed design specifications will likely be implemented. Explain your reasons.

Your client also wants you to use at least three programming tools in program development. After carefully evaluating several programming tools, you and your team suggest source code control, development environment, and refactoring tools for programming.

Create a 1- to 2-page document using Microsoft® Word for your client. Detail the following:

Provide a rationale for suggesting source code control, development environment, and refactoring tools used in programming.
Describe three basic pros and cons of using development tools in programming.

Order Solution Now

Discussion – Excel Uses

Discussion – Excel Uses

Discussion – Excel Uses

Knowledge of Excel worksheets can, in various ways, benefit individuals in their careers. An individual undertaking a career in finance and accounting can extensively use Excel worksheets for financial analysis, budgeting, data analysis, financial modeling, forecasting, and report generation (Mayes, 2020). An individual in a data analysis and research career can use Excel worksheets to organize data, transform it, perform calculations, create charts and graphs, and perform statistical analyses. Thus, knowledge of Excel is important and will benefit my future career in different ways. I will use Excel worksheets for scheduling activities, allocating resources and monitoring progress, analyzing data acquired from daily activities, including market data, and creating reports that are presentable to my seniors using charts and graphs provided by the Excel worksheets.

In my personal life, I would use Excel for personal finance and budgeting, whereby I can track expenses, draft budgets, and analyze personal finances. Using Excel in my personal life can help in event planning as a volunteer activity, including listing guests, budgeting, seating arrangements, and event schedules. Further, Excel can also help clubs store membership data and track attendance and contributions (da Silva et al., 2019). Another personal activity that is worth considering in light of Excel usage is personal projects. The spreadsheets can be used to plan various activities such as travel planning, home improvement, and personal business inventory management. Various types of spreadsheets will be applied for the activities that are described above. However, the type of spreadsheet to be applied will vary based on requirements and specific needs. For instance, as an example of spreadsheets, budgeting templates will be used for all the events described to prepare budgets for various activities. Overall, the spreadsheets apply to different personal endeavors and career paths.

References

da Silva, R. J. B., Lourenço, F. R., Pennecchi, F. R., Hibbert, D. B., & Kuselman, I. (2019). Spreadsheet for evaluation of global risks in conformity assessment of a multicomponent material or object. Chemometrics and Intelligent Laboratory Systems188, 1-5.

Mayes, T. R. (2020). Financial analysis with microsoft excel. Cengage Learning.

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Discussion - Excel Uses

Discussion – Excel Uses

In what career paths would knowledge of excel worksheet benefit an individual? I would knowledge of excel be beneficial for you in your current or future career? How could you use excel in your personal life? (please consider any volunteer activities, clubs,

Order Solution Now

Encryption Methods

Encryption Methods

Encryption Methods

These encryption methods are used to protect WLANs from unauthorized access (Srikanth & Reddy, 2019). The Wi-Fi Protected Access (WPA) was first implemented in 2002 by Wi-Fi Alliance to eliminate network security issues experienced in WEP. Therefore, WPA came with MIC calculation for improved security (Srikanth & Reddy, 2019). Wi-Fi Protected Access 2 (WPA2), introduced in 2004, is an improvement of WPA. WPA2 protects information using CCMP protocol and for encryption. It is available in two versions: WPA2 – enterprise and WPA2 – personal. Wi-Fi Protected Access 3 (WPA3) was introduced in 2018, and it is an improvement of WAP2 (Srikanth & Reddy, 2019). It protects public networks efficiently because it eliminates brute force attacks, unlike in WPA2.

Compare And Contrast Their Strengths and Weaknesses.

WPA, WPA2, and WPA3 encryption methods were developed in different years, and a predecessor encryption method was succeeded by an improved encryption method (Srikanth & Reddy, 2019). Consequently, a successor encryption method offers better security features. WAP performs better than WEP, an earlier version of encryption because it is compatible with most vendor devices. Also, WAP encrypts data better than WEP because of the MIC calculation feature. The 802.11 standards are well implemented in the WAP2 compared to WEP and WAP. WAP2 also uses CCMP to protect data from unauthorized persons.

CCMP encrypts and decrypts to ensure that man cannot access data in the middle when being transmitted. Only the receiver can have it decrypted at the destination. This is done using a pre-shared key and AES encryption. WAP3 has better encryption than WAP2 Enterprise and WAP Personal. It protects data using Simultaneous Authentication of Equals as compared to WAP2’s Advanced Encryption Standard (Srikanth & Reddy, 2019). This improvement protects against the KRACK attack that was present in WAP2.

Consequently, it is difficult to successfully perform a KRACK attack or brute force attack on a public network protected by WAP3. This is because an attacker cannot access old traffic from a network and decode it (Srikanth & Reddy, 2019). Devices that are not WAP3 enabled cannot access a WAP3-protected network connection. This is efficient in ensuring that the network is secure.

WAP3 Preference

Using the WAP3 encryption method would be prudent because it offers the strongest protection against network attacks (Srikanth & Reddy, 2019). According to Bartoli (2020), it is evident that using an encryption method lower than WAP3 would expose the network to attackers. The experiments illustrated remote connections to a server using WAP, WAP2, and WAP3 and the vulnerabilities that would be experienced in the three encryption methods. In WAP and WAP2 encryptions, unauthorized persons could access data. However, in WAP3, no data could be obtained illegally. The only notable challenge in WAP3 was that connection authorization failed for some devices that were not WAP3 compatible (Bartoli, 2020). The Simultaneous Authentication of Equals is efficient in implementing WAP3 encryption. This would be used together with other standards based on the security needs of a network. For example, 802.1x could be used with 196-bit security to protect a network fully. 802.11 standard could also be employed as it checks on mesh network security. The Simultaneous Authentication of Equals ensures that all legal peer devices on a network are identified to prevent attackers from gaining access (Srikanth & Reddy, 2019). Therefore, the 802.11s would work well with SAE.

References

Bartoli, A. (2020). Understanding Server Authentication in WPA3 Enterprise. Applied Sciences10(7879), 2-12. https://www.mdpi.com/2076-3417/10/21/7879/pdf

Srikanth, V., & Reddy, I. (2019). Wireless Security Protocols (WEP, WPA, WPA2 & WPA3). Journal of Emerging Technologies and Innovative Research (JETIR)6(5), 1-6. https://www.jetir.org/papers/JETIRDA06001.pdf

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Encryption Methods

Encryption Methods

In a minimum 2-page paper, review encryption methods WPA, WPA2, and WPA3. Compare and contrast their strengths and weaknesses. Then, explain which version you would use and why. Would you include any authentication mechanisms, such as 802.1x or similar?

Order Solution Now