For this week let’s discuss the concepts of primary keys and table indexes.
Give some examples of data types and fields that you might use for certain scenarios and also what types are not good to use.
In: Computer Science
13.10 Assessment
1. Which of the following groups should be included in an effort to develop an effective community of practice?
a. Senior management
b. Middle managers
c. Information security personnel
d. Users
e. All of the above
f. None of the above
2. Changing the developer’s mindset and culture requires leadership, but also policy.
a. True
b. False
3. NIST publication 800-30 promotes the integration of risk management practices into the Software Development Lifecycle (SDLC) using the ___.
a. Comprehensive Assessment Plan
b. 2009 Risk Management Methodology
c. Nine-step risk-assessment methodology
d. SSDLC Methodology Outline
4. HIPAA’s Title II deals with standards that relate to ___.
a. Data systems that process and transmit PHI
b. A child’s right to privacy
c. Encryption of PHI
d. Email use in the organization
e. All of the above
f. None of the above
5. The CIO is responsible for the oversight of all data and information that flows in and out of the organization.
a. True
b. False
6. The Family Educational Rights and Privacy Act (FERPA) applies to colleges and universities and any records that provide ___ of the student.
a. Personal identification
b. Document losses to the organization
c. Student library cards
d. Auditing software records
7. Security awareness and training is essential to developing an employee force that is aware of the threats that are imminent to an organization.
a. True
b. False
8. Policy enforcement can be done by using nontechnical controls only.
a. True
b. False
9. Tacit knowledge is easy to transfer to users throughout the organization.
a. True
b. False
10. An organization’s security policies should align with the following option or options:
a. Risk management
b. Federal regulations
c. Local laws
d. All of the above
In: Computer Science
Let A[1 · · · n] be an array of n elements and B[1 · · · m] an array of m elements. We assume that m ≤ n. Note that neither A nor B is sorted. The problem is to compute the number of elements of A that are smaller than B[i] for each element B[i] with 1 ≤ i ≤ m. For example, let A be {30, 20, 100, 60, 90, 10, 40, 50, 80, 70} of ten elements. Let B be {60, 35, 73} of three elements. Then, your answer should be the following: for 60, return 5 (because there are 5 numbers in A smaller than 60); for 35, return 3; for 73, return 7.
(a) Design an O(mn) time algorithm for the problem. (10 points)
(b) Improve your algorithm to O(n log m) time. (20 points) Hint: Use the divide and conquer technique. Since m ≤ n, you cannot sort the array A because that would take O(n log n) time, which is not O(n log m) as m may be much smaller than n.
Note: For this problem, you need to describe the main idea of your algorithms and briefly analyze their time complexities. You will receive the full 30 points if you give an O(n log m) time algorithm directly for (b) without giving any algorithm for (a).
In: Computer Science
Overview Your assignment is to complete a network diagram for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators, and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please review a description of ABC Corporation’s network resources and how they are allocated. ABC Corporation’s Network Description ABC Corporation is a small business in the heart of Central Pennsylvania. They provide services to their clients all over the region. The three-story main office building is where all of the employees report to work each day. There are no remote users. ABC Corporation is a very traditional business. While they have a computer network and are connected to the Internet, they aren’t very fancy and don’t yet have a need for telecommuting, wireless networks, or smart phones. All of their computers are desktop machines and are connected with wired Ethernet connections. All of the network wiring is CAT-6 twisted pair wiring that goes from the office location to a wiring closet. There is one wiring closet on each floor. Each closet is connected to the basement wiring closet via fiber. There are several departments of the company. The administrative office has ten employees including the CEO, executive Vice-President, a human resources manager, and several assistants and secretaries. The finance office has fifteen employees. Both of these divisions are on the third floor. The second floor has the Sales and R&D departments. There are a total of twenty employees in the Sales Department and includes sales executives and assistants. All of the sales department personnel have laptop computers, but they are still connected via the wired network. The R&D department has ten engineers who have two computers each – one in their office and one in their lab spaces. The first floor has the shipping/receiving department, manufacturing department, and the receptionist. The receptionist shares a computer with the night watchman, since they work opposite shifts. There are twenty people in manufacturing, but they only use three computers to enter their production details into the company’s ERP system. The shipping/receiving department has six people, each with a computer that connects to UPS, Fedex, and USPS systems, prints packaging labels and shipping documents. There is also a conference room/training room on the first floor with a multimedia system that includes a podium computer, projector, and all of the bells and whistles. The basement houses the maintenance department, information technology, and the mail room. The mail room clerk doesn’t use the computers at all. The two maintenance workers have computers at their desks that they use to enter reports of work performed. The IT Department has seven employees, each with a desktop computer. They also manage the server farm, which includes two domain controllers, one print server, one mail server, one database server, one internal web server, one external web server (on the DMZ interface of the firewall), a file server, a special server for the ERP system, and a backup server. Layer 2/3 Network Devices Each floor needs to have an Ethernet switch in its network closet. Determine the number of ports that are needed on each floor. Don’t forget the basement. The server farm and DMZ each will need to have its own switch, separated from the users’ network. Each switch connects to a centralized router on a different interface, giving one subnetwork for each floor of the network, plus one for the server farm, one for the DMZ, and one for the Internet. Determine how many ports the router needs. IP Address Assignments The router will perform Network Address Translation between the local network and the Internet. Therefore, for each sub-network, assign a CIDR /24 sized network from the IANA private range of 172.28.0.0/16. One network should get 172.28.1.0/24, the next should get 172.28.2.0/24, the next should get 172.28.3.0/24 etc. While you could optimize the use of the IP range by using smaller subnets, this is not required in this assignment. Create a Network Diagram Your network diagram needs to include the following elements: • An Internet Service Provider Network (represented as a cloud) • Router with enough ports to meet the needs of the organization • A switch for each floor – you will need to identify how many ports each switch on each floor needs to have • You DO NOT need to show every single computer on your diagram. However, you need to show groups of computers, plus their use. So, if there are 5 people in the same department, you can show all 5 computers with one icon/glyph and label it appropriately. • Each grouping of computers needs to have the IP Address range documented on the diagram. Assign the x.x.x.1 address of each network to the appropriate port on the router. Network Documentation Your network design document needs to explain each element of the network. Each Layer two (switch) and Layer three (Router) device needs to be described in terms of number of ports. The number of computers for each department and floor also needs to be documented. The IP address ranges need to be explained – including the IP Address range that you assigned, the number of IP Addresses that the subnetwork will use, and the number of IP addresses that remain unused in that subnet. What to Turn In For assignments that require you to submit Visio work, please export your file and submit as a PDF. Also, please submit your original Visio file. You also need to turn in a Word document (.doc or .docx) file that explains your network diagram elements. Include snapshots from your network diagram in your Word document – and annotate your diagram snapshots to better help your explanation of your network.
In: Computer Science
Q3: Exhibit the research methodology associated formulating the research problem, extensive literature survey, development of working hypotheses and preparing the research design?
Mention the references at the end.
Solution to be typed up to 500 words.
In: Computer Science
programming language is in excel VB8
Program 2: Software Sales A software company sells three packages, Package A, Package B, and Package C, which retail for $99, $199, and $299, respectively. Quantity discounts are given according to the following table: Quantity Discount 10 through 19 20% 20 through 49 30% 50 through 99 40% 100 or more 50% Create an application that allows the user to enter the number of units sold for each software package. The application should calculate and display the order amounts and the grand total. ENGR 1100 Asignación #2 - DECISIONS Deadline: Lunes 19 de octubre 2020, 11:50pm Input validation: Make sure the number of units for each package is not negative. Use the following test data to determine if the application is calculating properly: Units Sold Amount of Order Package A: 15 units Package A: $1,188.00 Package B: 75 units Package B: $8,955.00 Package C: 120 units Package C: $17,940.00 Grand Total: $28,083.00
programming language is in excel VB8
In: Computer Science
Discuss how Bitcoin blockchain addresses the five security objectives.
In: Computer Science
Q#4: Describe the important concepts relating to research design based on the understandings of dependent and independent variables, extraneous variable, control, confounded relationship and research hypothesis?
Mention the references at the end.
Solution to be typed up to 500 words.
In: Computer Science
Mobile App security – Explore app permissions, how are they being used, where data being transmitted.
Hi, thesis my topic for the project.Iam in need of help in figuring out how to start my research and also have some questions regarding the topic
1. name 10 apps for which I can use to explore its app permissions and data gathering?.
2.Are there any software or app that can be installed to collect the information regarding the app permissions?
3.I need an introduction for about a 5 lines.
Please I need help with this, give brief explanation for all these questions .
In: Computer Science
1- Given following data structure of Single linked list :
class ListNode
{ int item ;
ListNode next ;
….
}
Choose the correct answer :
1- reference++ ;
2- reference = next ;
3- reference+= next ;
1- (p == null)
2- (p.next == null)
4- (p.item == 0)
5- None of the above.
1- n == m
2- n.item == m.item
4- None of the above
In: Computer Science
In: Computer Science
Following is the activity of javascript. i have tried to do it but got stuck from question 3, I have also attached my javascript code right after the HTML file. can you please help me. Inside the java script code, it contains all the necessary token. if you run the html file, it will display longitude as a AQI so need to fix that.
Web Services Activity (1%)
You need to sign up to the API to obtain a key/token at WAQI API [link]
You should save the files as w9-webservices.js and w9-webservices.html
We would like to display the AQI information around the current user's geoposition on a map.
Instructions:
|
AQI range |
Colour |
|
0 -- 50 |
Green |
|
51 -- 100 |
Yellow |
|
101 -- 150 |
Orange |
|
151 -- 200 |
Red |
|
201 -- 300 |
Purple |
|
301 -- 500 |
Maroon |
map.on('zoomend',function(){
// run some code if the zoom changes
});
When the user changes the zoom (and thus the map boundaries
change), you should update the map information by running (3) ->
(5) again.Notes:
Here's some code to get you started with the HTML page:
<html>
<head>
<meta charset="utf-8">
<title>Week 9 Web Services Activity</title>
<meta name="viewport" content="initial-scale=1,maximum-scale=1,user-scalable=no" />
<!-- Import MDL libraries -->
<link rel="stylesheet" href="https://fonts.googleapis.com/icon?family=Material+Icons">
<link rel="stylesheet" href="https://code.getmdl.io/1.3.0/material.indigo-pink.min.css">
<script defer src="https://code.getmdl.io/1.3.0/material.min.js"></script>
<!-- Import Mapbox libraries -->
<script src="https://api.mapbox.com/mapbox-gl-js/v1.7.0/mapbox-gl.js"></script>
<link href="https://api.mapbox.com/mapbox-gl-js/v1.7.0/mapbox-gl.css" rel="stylesheet" />
<style>
/* Define any CSS here */
#map { width: 80vw; height: 80vh }
</style>
</head>
<body>
<div class="mdl-layout mdl-js-layout mdl-layout--fixed-header">
<header class="mdl-layout__header">
<div class="mdl-layout__header-row"> <span class="mdl-layout__title">Check the air quality on the map</span> </div>
</header>
<main class="mdl-layout__content">
<div class="mdl-grid">
<div class="mdl-cell mdl-cell--8-col">
<!-- Map div -->
<div id='map'>
</div>
</div>
</div>
</main>
</div>
<script src="w9-webservices.js"></script>
</body>
</html>
w9-webservices.js
"use strict";
// mapbox token
const MAPBOX_TOKEN = "pk.eyJ1IjoidGVlZSIsImEiOiJja2c2ODQ0cHQxMXUwMnJsZDJyOTY5YXRvIn0.0yh14c1R35E-dxvvAC1nxw";
// WAQI token
const WAQI_TOKEN = "4e4ff5b84906529e3768ed72754304c9057587c1";
navigator.geolocation.getCurrentPosition((position) => {
doSomething(position.coords.latitude, position.coords.longitude);
});
function doSomething(lat,lng){
console.log(lat,lng);
mapboxgl.accessToken = MAPBOX_TOKEN;
let map = new mapboxgl.Map({
container: 'map',
style: 'mapbox://styles/mapbox/streets-v9', // stylesheet location
center: [lng,lat], // starting position [lng, lat]
zoom: 13 // starting zoom
}) ;
map.setCenter([lng,lat]);
let marker = new mapboxgl.Marker({ "color": "#FF8C00" });
marker.setLngLat([lng,lat]);
let popup = new mapboxgl.Popup({ offset: 45});
let desc = `AQI: ${lng}`; // at the moment i have just used AQI value as a lngitude.
popup.setHTML(desc);
marker.setPopup(popup)
marker.addTo(map);
popup.addTo(map);
}
In: Computer Science
For this assignment you will create a set of simple classes that model a cookbook. The cookbook will consist of set or recipes. Each recipe will consist of a set of ingredients and instructions. Your submission will consist of the below three classes and a test driver (the only class with a main()) that exercises the functionality of your system.
You will need to implement the following classes based on the description of their attributes and operations:
In: Computer Science
Write a program for multiplication quiz.
It displays to the student a question such as “What is 5 × 19?”. After the student enters the answer, the program displays a message indicating whether it is correct.
Note: you can use Math.random() to obtain a random integer value between 0 and 100.
JAVA
In: Computer Science
Assuming signed two’s complement representation using m=8 bits, add the following numbers using binary addition AND determine the values of the N, Z, V and C flags in response to each calculation.
(-128) + (+100)
(+5) + (+7)
(+5) + (-7)
(-5) + (+7)
(-5) + (-7)
(+120) + (+100)
(-120) + (-100)
(6A)16+ (E2)16
(A7)16+ (35)16
(80)16+ (80)16
In: Computer Science