Questions
For this week let’s discuss the concepts of primary keys and table indexes. What types of...

For this week let’s discuss the concepts of primary keys and table indexes.

  • What types of data might serve as a valuable index for a table?
  • What types of data would be unsuitable as a primary key?

Give some examples of data types and fields that you might use for certain scenarios and also what types are not good to use.

In: Computer Science

13.10 Assessment 1.   Which of the following groups should be included in an effort to develop an...

13.10 Assessment

1.   Which of the following groups should be included in an effort to develop an effective community of practice?

a.   Senior management

b.   Middle managers

c.   Information security personnel

d.   Users

e.   All of the above

f.   None of the above

2.   Changing the developer’s mindset and culture requires leadership, but also policy.

a.   True

b.   False

3.   NIST publication 800-30 promotes the integration of risk management practices into the Software Development Lifecycle (SDLC) using the ___.

a.   Comprehensive Assessment Plan

b.   2009 Risk Management Methodology

c.   Nine-step risk-assessment methodology

d.   SSDLC Methodology Outline

4.   HIPAA’s Title II deals with standards that relate to ___.

a.   Data systems that process and transmit PHI

b.   A child’s right to privacy

c.   Encryption of PHI

d.   Email use in the organization

e.   All of the above

f.   None of the above

5.   The CIO is responsible for the oversight of all data and information that flows in and out of the organization.

a.   True

b.   False

6.   The Family Educational Rights and Privacy Act (FERPA) applies to colleges and universities and any records that provide ___ of the student.

a.   Personal identification

b.   Document losses to the organization

c.   Student library cards

d.   Auditing software records

7.   Security awareness and training is essential to developing an employee force that is aware of the threats that are imminent to an organization.

a.   True

b.   False

8.   Policy enforcement can be done by using nontechnical controls only.

a.   True

b.   False

9.   Tacit knowledge is easy to transfer to users throughout the organization.

a.   True

b.   False

10.   An organization’s security policies should align with the following option or options:

a.   Risk management

b.   Federal regulations

c.   Local laws

d.   All of the above

In: Computer Science

Let A[1 · · · n] be an array of n elements and B[1 · ·...

Let A[1 · · · n] be an array of n elements and B[1 · · · m] an array of m elements. We assume that m ≤ n. Note that neither A nor B is sorted. The problem is to compute the number of elements of A that are smaller than B[i] for each element B[i] with 1 ≤ i ≤ m. For example, let A be {30, 20, 100, 60, 90, 10, 40, 50, 80, 70} of ten elements. Let B be {60, 35, 73} of three elements. Then, your answer should be the following: for 60, return 5 (because there are 5 numbers in A smaller than 60); for 35, return 3; for 73, return 7.

(a) Design an O(mn) time algorithm for the problem. (10 points)

(b) Improve your algorithm to O(n log m) time. (20 points) Hint: Use the divide and conquer technique. Since m ≤ n, you cannot sort the array A because that would take O(n log n) time, which is not O(n log m) as m may be much smaller than n.

Note: For this problem, you need to describe the main idea of your algorithms and briefly analyze their time complexities. You will receive the full 30 points if you give an O(n log m) time algorithm directly for (b) without giving any algorithm for (a).

In: Computer Science

Overview Your assignment is to complete a network diagram for a small company. You will place...

Overview Your assignment is to complete a network diagram for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators, and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please review a description of ABC Corporation’s network resources and how they are allocated. ABC Corporation’s Network Description ABC Corporation is a small business in the heart of Central Pennsylvania. They provide services to their clients all over the region. The three-story main office building is where all of the employees report to work each day. There are no remote users. ABC Corporation is a very traditional business. While they have a computer network and are connected to the Internet, they aren’t very fancy and don’t yet have a need for telecommuting, wireless networks, or smart phones. All of their computers are desktop machines and are connected with wired Ethernet connections. All of the network wiring is CAT-6 twisted pair wiring that goes from the office location to a wiring closet. There is one wiring closet on each floor. Each closet is connected to the basement wiring closet via fiber. There are several departments of the company. The administrative office has ten employees including the CEO, executive Vice-President, a human resources manager, and several assistants and secretaries. The finance office has fifteen employees. Both of these divisions are on the third floor. The second floor has the Sales and R&D departments. There are a total of twenty employees in the Sales Department and includes sales executives and assistants. All of the sales department personnel have laptop computers, but they are still connected via the wired network. The R&D department has ten engineers who have two computers each – one in their office and one in their lab spaces. The first floor has the shipping/receiving department, manufacturing department, and the receptionist. The receptionist shares a computer with the night watchman, since they work opposite shifts. There are twenty people in manufacturing, but they only use three computers to enter their production details into the company’s ERP system. The shipping/receiving department has six people, each with a computer that connects to UPS, Fedex, and USPS systems, prints packaging labels and shipping documents. There is also a conference room/training room on the first floor with a multimedia system that includes a podium computer, projector, and all of the bells and whistles. The basement houses the maintenance department, information technology, and the mail room. The mail room clerk doesn’t use the computers at all. The two maintenance workers have computers at their desks that they use to enter reports of work performed. The IT Department has seven employees, each with a desktop computer. They also manage the server farm, which includes two domain controllers, one print server, one mail server, one database server, one internal web server, one external web server (on the DMZ interface of the firewall), a file server, a special server for the ERP system, and a backup server. Layer 2/3 Network Devices Each floor needs to have an Ethernet switch in its network closet. Determine the number of ports that are needed on each floor. Don’t forget the basement. The server farm and DMZ each will need to have its own switch, separated from the users’ network. Each switch connects to a centralized router on a different interface, giving one subnetwork for each floor of the network, plus one for the server farm, one for the DMZ, and one for the Internet. Determine how many ports the router needs. IP Address Assignments The router will perform Network Address Translation between the local network and the Internet. Therefore, for each sub-network, assign a CIDR /24 sized network from the IANA private range of 172.28.0.0/16. One network should get 172.28.1.0/24, the next should get 172.28.2.0/24, the next should get 172.28.3.0/24 etc. While you could optimize the use of the IP range by using smaller subnets, this is not required in this assignment. Create a Network Diagram Your network diagram needs to include the following elements: • An Internet Service Provider Network (represented as a cloud) • Router with enough ports to meet the needs of the organization • A switch for each floor – you will need to identify how many ports each switch on each floor needs to have • You DO NOT need to show every single computer on your diagram. However, you need to show groups of computers, plus their use. So, if there are 5 people in the same department, you can show all 5 computers with one icon/glyph and label it appropriately. • Each grouping of computers needs to have the IP Address range documented on the diagram. Assign the x.x.x.1 address of each network to the appropriate port on the router. Network Documentation Your network design document needs to explain each element of the network. Each Layer two (switch) and Layer three (Router) device needs to be described in terms of number of ports. The number of computers for each department and floor also needs to be documented. The IP address ranges need to be explained – including the IP Address range that you assigned, the number of IP Addresses that the subnetwork will use, and the number of IP addresses that remain unused in that subnet. What to Turn In For assignments that require you to submit Visio work, please export your file and submit as a PDF. Also, please submit your original Visio file. You also need to turn in a Word document (.doc or .docx) file that explains your network diagram elements. Include snapshots from your network diagram in your Word document – and annotate your diagram snapshots to better help your explanation of your network.

In: Computer Science

Q3: Exhibit the research methodology associated formulating the research problem, extensive literature survey, development of working...

Q3: Exhibit the research methodology associated formulating the research problem, extensive literature survey, development of working hypotheses and preparing the research design?

Mention the references at the end.

Solution to be typed up to 500 words.

In: Computer Science

programming language is in excel VB8 Program 2: Software Sales A software company sells three packages,...

programming language is in excel VB8

Program 2: Software Sales A software company sells three packages, Package A, Package B, and Package C, which retail for $99, $199, and $299, respectively. Quantity discounts are given according to the following table: Quantity Discount 10 through 19 20% 20 through 49 30% 50 through 99 40% 100 or more 50% Create an application that allows the user to enter the number of units sold for each software package. The application should calculate and display the order amounts and the grand total. ENGR 1100 Asignación #2 - DECISIONS Deadline: Lunes 19 de octubre 2020, 11:50pm Input validation: Make sure the number of units for each package is not negative. Use the following test data to determine if the application is calculating properly: Units Sold Amount of Order Package A: 15 units Package A: $1,188.00 Package B: 75 units Package B: $8,955.00 Package C: 120 units Package C: $17,940.00 Grand Total: $28,083.00

programming language is in excel VB8

In: Computer Science

Discuss how Bitcoin blockchain addresses the five security objectives.

Discuss how Bitcoin blockchain addresses the five security objectives.

In: Computer Science

Q#4:    Describe the important concepts relating to research design based on the understandings of dependent...

Q#4:    Describe the important concepts relating to research design based on the understandings of dependent and independent variables, extraneous variable, control, confounded relationship and research hypothesis?

Mention the references at the end.

Solution to be typed up to 500 words.

In: Computer Science

Mobile App security – Explore app permissions, how are they being used, where data being transmitted....

Mobile App security – Explore app permissions, how are they being used, where data being transmitted.

Hi, thesis my topic for the project.Iam in need of help in figuring out how to start my research and also have some questions regarding the topic

1. name 10 apps for which I can use to explore its app permissions and data gathering?.

2.Are there any software or app that can be installed to collect the information regarding the app permissions?

3.I need an introduction for about a 5 lines.

Please I need help with this, give brief explanation for all these questions .

In: Computer Science

1- Given following data structure of Single linked list :           class ListNode                     &n

1- Given following data structure of Single linked list :

          class ListNode                        

           { int item ;                             

             ListNode next ;                        

             ….

           }

Choose the correct answer :                                                           

  1. Suppose reference refers to a node in a List (using the ListNode ) . What statement changes reference so that it refers to the next node?

                       1-      reference++ ;

2-    reference = next ;

3-    reference+= next ;

  1. reference = reference.next ;
  1. Suppose p refers to a node in a List (using the ListNode ) . What boolean expression will be true when p refers to the last node of the List?

1-   (p == null)

2- (p.next == null)

  1. (p.item == null)

4- (p.item == 0)

      5- None of the above.

  1. Which boolean expression indicates whether the items in two nodes (n and m) are the same. Assume that neither n nor m is null.

1-   n == m

2-   n.item == m.item

  1. n.next == m.next

4- None of the above

In: Computer Science

Please answer using MSP design and program for C. Write CCS code. outline the program for...

Please answer using MSP design and program for C.
Write CCS code.
outline the program for MSP design, and program for C.

Make a project that uses one timer on the board to control the blinking of the LED. Basically setup a timer interupt. Whenever the timer interrupt happens, the LED blinks. The frequency of the
blinking is chosen by the user.

Next modify the program above and make a project that uses one of the pushbuttons on the board to control the frequency of the LED blinking. Essentially, choose one frequency in the timer interrupt, and then setup a button for a interrupt routine. Whenever the pushbutton interrupt occurs, the frequency of the LED blinking slows down by half until it reaches the minimum frequency. The minimum frequency
of the blinking is chosen in the previous problem so keep the same.

Again please use MSP design and have it able to program in C.
I will up vote if done correctly, thanks!

In: Computer Science

Following is the activity of javascript. i have tried to do it but got stuck from...

Following is the activity of javascript. i have tried to do it but got stuck from question 3, I have also attached my javascript code right after the HTML file. can you please help me. Inside the java script code, it contains all the necessary token. if you run the html file, it will display longitude as a AQI so need to fix that.

Web Services Activity (1%)

You need to sign up to the API to obtain a key/token at WAQI API [link]

You should save the files as w9-webservices.js and w9-webservices.html

We would like to display the AQI information around the current user's geoposition on a map.

Instructions:

  1. When the page loads, get the user's current location using the Geolocation API's getCurrentPosition method. You should use a callback function.
    Display an appropriate error message as required if geolocation fails to get a position.
  2. In the callback function from (1), you should display a map centered at the current coordinates, with an appropriate zoom level.
  3. Obtain the map coordinate boundaries using MapBox's map.getBounds() method.
  4. Using the map boundary data, make a call to the AQI Map Query API [link: https://aqicn.org/json-api/doc/#api-Map_Queries-GetMapStations ] . You should use a callback function for this API call. The URL (with query string and :placeholders) looks like this: https://api.waqi.info/map/bounds/?token=:token&latlng=:latlng&callback=:callback
  5. In the callback function from (4), display a Marker and associated Popup for each location within the boundary coordinate data from (3). If no data is returned, display an appropriate error message.

    You should ensure that the Marker used is of an appropriate color depending on the AQI value (see table below).

    The Popup should display the AQI value and the station name in plain black text.

    AQI range

    Colour

    0 -- 50

    Green

    51 -- 100

    Yellow

    101 -- 150

    Orange

    151 -- 200

    Red

    201 -- 300

    Purple

    301 -- 500

    Maroon

  6. We can detect when the user changes the zoom level using:
    map.on('zoomend',function(){
        // run some code if the zoom changes
    });
    
    When the user changes the zoom (and thus the map boundaries change), you should update the map information by running (3) -> (5) again.

Notes:

  • You can add CSS inline or to the header section

Here's some code to get you started with the HTML page:

<html>
<head>
  <meta charset="utf-8">
  <title>Week 9 Web Services Activity</title>
  <meta name="viewport" content="initial-scale=1,maximum-scale=1,user-scalable=no" />
  <!-- Import MDL libraries -->
  <link rel="stylesheet" href="https://fonts.googleapis.com/icon?family=Material+Icons">
  <link rel="stylesheet" href="https://code.getmdl.io/1.3.0/material.indigo-pink.min.css">
  <script defer src="https://code.getmdl.io/1.3.0/material.min.js"></script>
  <!-- Import Mapbox libraries -->
  <script src="https://api.mapbox.com/mapbox-gl-js/v1.7.0/mapbox-gl.js"></script>
  <link href="https://api.mapbox.com/mapbox-gl-js/v1.7.0/mapbox-gl.css" rel="stylesheet" />
  <style>
    /* Define any CSS here */
    #map { width: 80vw; height: 80vh }
  </style>
</head>
<body>
  <div class="mdl-layout mdl-js-layout mdl-layout--fixed-header">
    <header class="mdl-layout__header">
      <div class="mdl-layout__header-row"> <span class="mdl-layout__title">Check the air quality on the map</span> </div>
    </header>
    <main class="mdl-layout__content">
      <div class="mdl-grid">
        <div class="mdl-cell mdl-cell--8-col"> 
          <!-- Map div -->
          <div id='map'>
                    </div>
        </div>
      </div>
    </main>
  </div>
  <script src="w9-webservices.js"></script>
</body>
</html>

w9-webservices.js

"use strict";

// mapbox token

const MAPBOX_TOKEN = "pk.eyJ1IjoidGVlZSIsImEiOiJja2c2ODQ0cHQxMXUwMnJsZDJyOTY5YXRvIn0.0yh14c1R35E-dxvvAC1nxw";

// WAQI token

const WAQI_TOKEN = "4e4ff5b84906529e3768ed72754304c9057587c1";

navigator.geolocation.getCurrentPosition((position) => {

doSomething(position.coords.latitude, position.coords.longitude);

});

function doSomething(lat,lng){

console.log(lat,lng);

mapboxgl.accessToken = MAPBOX_TOKEN;

let map = new mapboxgl.Map({

container: 'map',

style: 'mapbox://styles/mapbox/streets-v9', // stylesheet location

center: [lng,lat], // starting position [lng, lat]

zoom: 13 // starting zoom

}) ;

map.setCenter([lng,lat]);

let marker = new mapboxgl.Marker({ "color": "#FF8C00" });

marker.setLngLat([lng,lat]);

let popup = new mapboxgl.Popup({ offset: 45});

let desc = `AQI: ${lng}`; // at the moment i have just used AQI value as a lngitude.

popup.setHTML(desc);

marker.setPopup(popup)

marker.addTo(map);

popup.addTo(map);

}

In: Computer Science

For this assignment you will create a set of simple classes that model a cookbook. The...

For this assignment you will create a set of simple classes that model a cookbook. The cookbook will consist of set or recipes. Each recipe will consist of a set of ingredients and instructions. Your submission will consist of the below three classes and a test driver (the only class with a main()) that exercises the functionality of your system.

You will need to implement the following classes based on the description of their attributes and operations:

  • Ingredient
    • name - the name of the ingredient
    • quantity - the amount of the ingredient
    • units - the unit of the quantity (e.g, tablespoon, or T, or Tbl)
    • require the creator to supply the name of the ingredient in order to create one
    • enable the user to retrieve and update each of the attributes appropriately
  • Recipe
    • name - the name of the recipe
    • category - the category of the recipe
    • ingredients - a list of ingredients (you may assume no more than 20)
    • instructions - this would be a paragraph of text, no need to worry about steps
    • require the creator to supply the name of the recipe in order to create one
    • enable the user to retrieve and update each of the attributes appropriately
  • Cookbook
    • name - the name of the cookbook
    • recipes - a list of recipes (you may assume no more than 20)
    • require the creator to supply the name of the cookbook in order to create one
    • enable the user to find recipes by name, returning only those recipes
    • Extra Credit (+1/3 letter grade): enable the user to find recipes by ingredient and return only those recipes

In: Computer Science

Write a program for multiplication quiz. It displays to the student a question such as “What...

Write a program for multiplication quiz.

It displays to the student a question such as “What is 5 × 19?”. After the student enters the answer, the program displays a message indicating whether it is correct.

Note: you can use Math.random() to obtain a random integer value between 0 and 100.

JAVA

In: Computer Science

Assuming signed two’s complement representation using m=8 bits, add the following numbers using binary addition AND...

Assuming signed two’s complement representation using m=8 bits, add the following numbers using binary addition AND determine the values of the N, Z, V and C flags in response to each calculation.

  1. (-128) + (+100)

  2. (+5) + (+7)

  3. (+5) + (-7)

  4. (-5) + (+7)

  5. (-5) + (-7)

  6. (+120) + (+100)

  7. (-120) + (-100)

  8. (6A)16+ (E2)16

  9. (A7)16+ (35)16

  10. (80)16+ (80)16

In: Computer Science