Questions
Software vulnerabilities in cyberspace can range from the simple outdated security patches on national critical infrastructure...

Software vulnerabilities in cyberspace can range from the simple outdated security patches on national critical infrastructure systems to poorly designed defense missile control systems. When these industrial control systems, military weapon control systems, or air control transportation systems are designed without security built into the software, their security vulnerabilities are paramount to the national security, economy, and human health.

Do research on the latest prominent software vulnerabilities and share your literature review findings with the class.

In: Computer Science

1. What type of commands can you issue through the command line process? Start-> IBM DB2COPY1...

1. What type of commands can you issue through the command line process?

Start-> IBM DB2COPY1 (Default) -> DB2 Command Line Processor

In: Computer Science

how to read a csv file in php not using fgetscsv or fgets. Just using file("Stores.csv");...

how to read a csv file in php not using fgetscsv or fgets. Just using file("Stores.csv"); or fopen("Stores.csv", "r"); and making into a html table? It print but it keeps saying Notice: Undefined offset: , Notice: Undefined offset: 2, etc at the top.

Acme,Walmart,Ross,BJs,Target,Marshalls,Foot Locker,Giant,Charming Charlie

142,160,28,10,5,3,60,0.28,3167

175,180,18,8,4,1,12,0.43,4033

129,132,13,6,3,1,41,0.33,1471

138,140,17,7,3,1,22,0.46,3204

232,240,25,8,4,3,5,2.05,3613

135,140,18,7,4,3,9,0.57,3028

150,160,20,8,4,3,18,4.00,3131

207,225,22,8,4,2,16,2.22,5158

271,285,30,10,5,2,30,0.53,5702

89,90,10,5,3,1,43,0.30,2054

153,157,22,8,3,3,18,0.38,4127

87,90,16,7,3,1,50,0.65,1445

234,238,25,8,4,2,2,1.61,2087

106,116,20,8,4,1,13,0.22,2818

175,180,22,8,4,2,15,2.06,3917

165,170,17,8,4,2,33,0.46,2220

166,170,23,9,4,2,37,0.27,3498

136,140,19,7,3,1,22,0.63,3607

148,160,17,7,3,2,13,0.36,3648

151,153,19,8,4,2,24,0.34,3561

180,190,24,9,4,2,10,1.55,4681

293,305,26,8,4,3,6,0.46,7088

167,170,20,9,4,2,46,0.46,3482

190,193,22,9,5,2,37,0.48,3920

184,190,21,9,5,2,27,1.30,4162

157,165,20,8,4,2,7,0.30,3785

110,115,16,8,4,1,26,0.29,3103

135,145,18,7,4,1,35,0.43,3363

567,625,64,11,4,4,4,0.85,12192

180,185,20,8,4,2,11,1.00,3831

183,188,17,7,3,2,16,3.00,3564

185,193,20,9,3,2,56,6.49,3765

152,155,17,8,4,1,33,0.70,3361

148,153,13,6,3,2,22,0.39,3950

152,159,15,7,3,1,25,0.59,3055

146,150,16,7,3,1,31,0.36,2950

170,190,24,10,3,2,33,0.57,3346

127,130,20,8,4,1,65,0.40,3334

265,270,36,10,6,3,33,1.20,5853

157,163,18,8,4,2,12,1.13,3982

128,135,17,9,4,1,25,0.52,3374

110,120,15,8,4,2,11,0.59,3119

123,130,18,8,4,2,43,0.39,3268

212,230,39,12,5,3,202,4.29,3648

145,145,18,8,4,2,44,0.22,2783

129,135,10,6,3,1,15,1.00,2438

143,145,21,7,4,2,10,1.20,3529

247,252,29,9,4,2,4,1.25,4626

111,120,15,8,3,1,97,1.11,3205

133,145,26,7,3,1,42,0.36,3059

<!DOCTYPE html>

<html>

<head>

<meta charset="utf-8">

<!-- title for web page -->

<title>Stores</title>

<link rel="stylesheet" href="style.css">

</head>

<body>

<h1>Stores</h1>

<table>

<?php

$Stores = file("homes.csv");

foreach($Stores as $key => $data) {

$Stores[$key] = explode(",", $data);

}

foreach($Stores as $key => $data)

print "".$Homes[$key][0]. "";

print "".$Homes[$key][1]. "";

print "".$Homes[$key][2]. "";

print "".$Homes[$key][3]. "";

print "".$Homes[$key][4]. "";

print "".$Homes[$key][5]. "";

print "".$Homes[$key][6]. "";

print "".$Homes[$key][7]. "";

print "".$Homes[$key][8]. "";

print "";

}

print "";

?>

In: Computer Science

Discuss an IT-related system that could be adopted at AIT to eliminate impersonation during exams, indicating...

Discuss an IT-related system that could be adopted at AIT to eliminate impersonation during exams, indicating where it would be located/placed and how each component of the system functions. .

In: Computer Science

What are the most effective problem-solving techniques available to software engineers today, and how do they...

What are the most effective problem-solving techniques available to software engineers today, and how do they facilitate the software engineering process? Please provide examples and explain who the main stakeholders are and what their responsibilities in the software engineering process are.

In: Computer Science

Discuss the content (type of data and files) of a database which could be useful at...

Discuss the content (type of data and files) of a database which could be useful at Accra Institute Technology(AIT).

In: Computer Science

In the simplex algorithm can you have a degenerate pivot without cycling occuring? I know that...

In the simplex algorithm can you have a degenerate pivot without cycling occuring? I know that Bland's rule prevents cycling but what about degenrate pivots? Or are degenerate pivots the same as cycling?

Also, when a variables leaves the tableau im assuming it cant come back the tableau for bland's?

In: Computer Science

What are the pattern elements for the Facade Design Pattern?

What are the pattern elements for the Facade Design Pattern?

In: Computer Science

Articles which explain the importance of information security in achieving organisational goals and objectives

Articles which explain the importance of information security in achieving organisational goals and objectives

In: Computer Science

Recall from Homework 2 that you are the chief robot designer for U.S. Robots and Mechanical...

Recall from Homework 2 that you are the chief robot designer for U.S. Robots and Mechanical Men, Inc., and you are working on designs for the following robots:

(a) A delivery robot that will carry supplies to different departments in a hospital.

(b) A supply robot that will carry heavy loads across loose soil and sand.

(c) A security robot that has to secure a wooded, hilly, area.

(d) A butler robot that will greet guests in a home and bring them drinks.

For each robot, describe what sensors you will equip it with, justifying your choices. Remember that, despite its monopoly, U.S. Robots and Mechanical Men, Inc. is a business, so you need to think carefully about the cost/benefit ratio of the sensors

In: Computer Science

Use 2012SERVERA VM. Depending on whether you want to change the security of a single system...

  1. Use 2012SERVERA VM.
  2. Depending on whether you want to change the security of a single system or multiple systems, use the Start screen and type either Local Security Policy or Group Policy to launch the appropriate tool. If you are on a server, you can also use the Tools menu in Server Manager to launch the appropriate tool:

• Local Security Policies Use Local Security Policy to administer security settings of a single Windows machine (either client or server).

    1. Group Policy Management Console Use the Group Policy Management Console to administer policies on the network that apply to multiple systems.
  1. In the Start screen, type Local and then launch the Local Security Policy.
  2. Under Security Settings (on the left), expand Local Policies and then select User Rights Assignment.
  3. To allow the Authors group to back up files, double-click the “Back up files and directories” policy at right. List who currently has the right to do backups: _____________________________________________________________________ _____________________________________________________________________
  4. Click the “Add User or Group” button and add Authors to the list of those who can do backups.
  5. Choose OK and then close the policies window.

Please provide step by step screen shots so I can see how it is done, and i will try it on my side.

Thank you

In: Computer Science

Normalization This is a Database Development problem.  Go through all the steps and process of normalization. Do...

Normalization

This is a Database Development problem.  Go through all the steps and process of normalization. Do normalization/dependency diagram FIRST. Then create a dependency diagram normalizing the following business rules to 3NF. Once normalized, create an accurate Entity Relationship Diagram. (ERD)

Business Scenario: You have been hired by a law firm to create a database that keeps track of the specific areas of law that each of their attorneys currently practice and their current caseload.

Business Rules:

1. An attorney can practice any area of law once he/she is admitted to their state’s Bar Association. However, most attorneys specialize in specific areas of law.

2. Our law firm is organized into departments based on the types of cases we receive in the areas of labor law, family law, and personal injury law.

3. Within these main departments, attorneys have specializations. For example, we have some attorneys who only handle worker’s compensation cases in our labor law area.

4. An attorney can only accept cases in their currently assigned department.

5. A client can have many open cases with our law firm at any one time.

6. Each client’s case is assigned to an attorney who specializes in that case’s form of law

In: Computer Science

NOTE: The first three are rules and do not have to be solved. Just there for...

NOTE: The first three are rules and do not have to be solved. Just there for the master theorem.

Master Theorem. Let T(n) = aT(n/b) + f(n) for some constants a ≥ 1, b > 1.

(Rule 1). If f(n) = O(n logb a− ) for some constant > 0, then T(n) = Θ(n logb a ).

(Rule 2). If f(n) = Θ(n logb a ), then T(n) = Θ(n logb a log n).

(Rule 3). If f(n) = Ω(n logb a+ ) for some constant > 0, and af(n/b) ≤ cf(n) for some constant c < 1, for all large n, then T(n) = Θ(f(n)).

1. Consider the recurrences: T(n) = 2T(n/2) + n log n. Either solve it using the Master method as given above, or explain why it can’t be solved using the Master method. If it can not be solved using Master method, use Recurrence tree method to solve it. Show your steps. If you use extended version of Master theorem to solve the same problem, does the solution thus obtained agree with the solution obtained by recurrence method?

In: Computer Science

Use C++ language Create a program which will ask the user to input three songs for...

Use C++ language Create a program which will ask the user to input three songs for a playlist (you may use TV shows or movies, if you prefer). Declare three strings to store each of the songs. Use getline to receive the input. Display output which lists each of the songs (or movies or tv shows), on separate lines, with a title on the first line: My Playlist. Insert three lines of comments at the beginning of the program for your name, today's date, and my playlist on the third line.

In: Computer Science

Create an application using PyQt. The user must be prompted for the name of a country...

Create an application using PyQt. The user must be prompted for the name of a country
(e.g. Spain) and a single character (e.g ‘a’). The application must read the name of the
country and count the number of occurrences of the character in the country name. The
count should be case-insensitive. Thus, if ‘c’ is entered as the character then both capital
letter ‘C’ and small letter ‘c’ in the string should be counted. The count must be displayed.
The application interface must include at least a label, an edit and a button. You are
welcome to enhance your application with comments and messages.

In: Computer Science