Make sure to keep the answers divided base on the outline...
"Database Connectivity Methods" Please respond to the following:
1. Database solutions today must be able to adapt and integrate among various
computing applications. Determine at least three forms of database connectivity
methods that can be used as an interface between applications. For each method
you have chosen, create an example that demonstrates how each could facilitate
data exchange functionality in a cloud service environment.
2. Suggest at least two software solutions that offer the connectivity methods
you have determined in Part 1 of this discussion to interface with other
"Extensible Markup Language (XML)" Please respond to the following:
1. XML provides a method for data to be transferred between systems. Specify at
least three components of an XML document. Analyze how each component ensures
data reliability and validation.
2. Identify at least two e-Commerce systems that provide XML data integration.
For each system, describe how XML extensions could enable e-Commerce integration
among system stakeholders such as vendors, resellers, suppliers, and customers.
"Database Administrator’s Role" Please respond to the following:
1.Information professionals with adequate skills are required to maintain the
business continuity of database services in an organization. Identify and assess
at least three professional skills that would be required to be successful
2.Give your opinion on what the critical nature of a database administrator’s
role is to IT industry organizations. Support your answer with specific examples
of functions and responsibilities they perform.
"Database Security" Please respond to the following:
1. Confidentiality, integrity, and availability are the three common security
goals. Select at least three security vulnerabilities that could jeopardize and
compromise a database. Classify each vulnerability with being technical,
managerial, cultural, or procedural. Provide your rationale.
2.Suggest specific actions that could be performed to minimize the
vulnerabilities identified in Question 1 of this discussion. Describe how often
these measures should be performed and the order in which each should be