CBSC 630 Book Review 2

 After reading, chapters 3 and 4, write a 3-4 page review (not including the Title page or Reference page) of the chapters.  

Text:   

Alfred Basta, Nadine Basta, Mary Brown (2014) Computer Security and Penetration Testing, 2nd Edition 1st Cengage

Information Technology

 

Think of and describe a “unique” e-business that you might want to start on the Internet that NO ONE HAS EVER TRIED. Do not create a game. Also, please use good taste! It must be legal in ALL 50 states.

WARNING: It should be a business that is not currently on the web. If I do find an online business that is identical or SIMILAR to your business idea, you will NOT receive any credit for it. 

PowerPoint_3G_Remodels

PowerPoint_3G_Remodels

#PowerPoint3GRemodels

  

Project Description:

In the following project, you will format a presentation that describes backyard remodels.

     

Open   the file named Student_PowerPoint_3G_Remodels.pptx. downloaded with this project.

 

Change the Colors for the   presentation to Paper.

 

On Slide 1, format the   background with the Stationery texture, and then change the Transparency to   30%.

 

Select Slides 2 through 4, and   then apply a Solid fill to the background of the selected slides-in the fifth   column, the third color.

 

On Slide 2, hide the background   graphics.

 

On Slide 2, insert a Table with   2 columns and 4 rows. Apply table style Medium Style 3-Accent 1, and then   type the information below in the inserted table.
 

  Row 1, Col 1: Improvement Type; Col 2: Components
  Row 2, Col 1: Outdoor Kitchen; Col2: Barbecue, sink, bar, covered patio
  Row 3, Col 1: Swimming Pool; Col 2: Jacuzzi, pool, waterfall
  Row 4, Col 1: Fire Pit; Col 2: Fire pit, seating area, gas lines

 

Change the Font Size of all of   the table text to 28. Resize the table height to 5.8″, and then   distribute the table rows. Align   the table text so that it is centered horizontally and vertically within the   cells.

 

In the table, change the Font   Size of the first row of text to 32. Apply a Round style Cell Bevel to the   first row. Note, depending on your version of PowerPoint, this may be called   Circle.

 

On Slide 3, animate the picture   using the Wipe entrance animation starting After Previous. Change the   Duration to 01.00. Apply the Split entrance animation to the bulleted list   placeholder, and then change the Effect Options to Vertical Out.

 

On Slide 4, insert a Clustered   Column chart. In the worksheet, beginning in cell B1, type the following   data.
 

  In row 1, beginning in cell B1: Owner Installed, Contractor, Owner as Contractor
  In row 2, beginning in cell A2: Patio, 8000, 12000, 9500
  In row 3, beginning in cell A3: Bar, 3500, 5200, 4600
  In row 4, beginning in cell A4: Infrastructure, 5000, 9750, 8100
  In row 5, beginning in cell A5: Appliances, 3000, 4200, 3850

 

Apply Chart Style 8 to the   chart, and then remove the Chart Title element. Apply the Wipe entrance   animation to the chart and change the Effect Options to By Series.

 

On Slide 5, format the   background using solid fill color Dark Green, Background 2 and hide the   background graphics. (depending upon your version of Office, the color may be   named Dark Green, Text 2). From your downloaded project files, insert the   video p03G_Video1.mp4.

 

Change the Video Height to 5 and use the Align Center and   Align Middle options to position the video. Apply the Simple Frame, Black   video style.

 

On the Playback tab, change the   Video Options to Start the video Automatically. Trim the video so that the   End Time is 00:07 and then compress the media to Low Quality. (Mac users, the   Compress Media feature is not available on a Mac).

 

On Slide 6, hide the background   graphics, and then format the slide background by inserting a picture from   your downloaded grader files-p03G_Backyard.jpg.   Set the Transparency to 0%

 

Insert a Header & Footer on   the Notes and Handouts. Include the Date and time updated automatically, the   Page number, and a Footer with the text 3G_Remodels
  Display the document properties. As the Tags, type backyard   remodels 

Network Services

 

All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.

Routing protocols use metrics to decide on the best path on the network. Name two different metrics and explain how routing protocols use these metrics to decide on the best path.

ISO 27001

The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.For your week 6 research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Qualitative Research Study on DATA ANALYTICS

ASSIGNMENT INFORMATION Due Date:  Saturday, January 29, 2022  12:00 AM

Points Possible:  250

  • You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the area of interest as your expected dissertation topic so that you can start learning what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines and write in APA style.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.) 

Use APA formatting and include the following information:

  • Introduction/Background of the research topic:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • What characteristics of this study make it a qualitative study?
  • Methodology:  Describe how the data were gathered and analyzed.  What research questions or hypotheses were the researchers trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead to further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References   

700 words – Interactive Design

Interactive design is a combination of many business, technical, psychological, educational, artistic, and engineering disciplines. Which of the disciplines presented (see in Jenny Preece text for full scope) do you feel is most important to HCI? 

Requirements:

1.Intext citation

2.Google scholar references 

3.APA Citation

References:

Blog Article: Adobe Inc. (2019, October 16). What is Interaction Design & How Does it Compare to UX? Retrieved from https://xd.adobe.com/ideas/ principles/human-computer interaction/what-is-interaction design 

Video: Don Norman’s The three ways that good design makes you happy @ https://youtu.be/RlQEoJaLQR A 

Video: Cognition, Design, and Usability: An Primer for Technical Communicators @ https://youtu.be/p1vrgC04ab4 

c program, encrypts a binary file and then save it.

Write a program, myfilehide2, that encrypts a file — ASCII or binary — and saves the encrypted file. myfilehide2 reads from stdin a string that specifies the file to be encrypted followed by an integer. For example,

% myfilehide2
a.out 7

myfilehide2 saves the encrypted content in a new file whose name has “.E2” added as a suffix. After doing so, the app deletes the original file by calling remove(). In the above example, a.out.E2. We restrict input file names to be less than 15 characters and output file names to be less than 18 characters to account for the 3 character suffix. Spaces are not allowed in a file name. The filename and number must be separated by one or more space (‘ ‘) or tab (‘t’) characters. The number must be a single digit — either 0, 1, …, 7 — and end with ‘n’ which is generated on stdin when the ENTER/RETURN key is pressed on our lab machines. All other input of different format are disallowed and should result in a suitable error message on stdout followed by app termination by calling exit(1).

use the library function getchar() to read the input byte-by-byte. When a space character or tab character is encountered, assume the filename has ended and store it as a string in a 1-D char array of size 16. Of course, that is assuming that the filename has not exceeded 15 characters. Instead of the constants 15 and 16, use the C preprocessor directive #define to specify your own macro to reduce the potential for run-time bugs. Read the single digit (0, 1, …, 7) into variable, char numpos, and convert numpos into a decimal number, unsigned int decpos, when interpreted as a decimal number. For example, the ASCII character ‘3’ stored in numpos is convered to the decimal number 3, not the decimal encoding of the ASCII character ‘3’ which is 51.

Do not use any string processing library function to perform the input parsing task. The parsing chore can be implemented with a few lines of code. Delegate the input parsing task to

void inputcheck(void);

which stores a valid filename input a global 1-D char array. Make the variable numpos also global. 

After inputcheck() returns (it may not return if the input is ill-formatted), main() opens the input file to read and creates an output file with suffix “.E2” to write the encrypted bytes. If either of the two operations is unsuccessful, main() prints a suitable error message to stdout and terminates by calling exit(1). Otherwise, like in Problem 2, lab3, myfilehide2 reads the content of the input file byte by byte using fgetc(). Unlike myfilehide, myfilehide2 flips the bit value at the bit position specified by decpos and writes the resultant byte into the output file. For example, if an input byte has bits 00001111 and decpos equals 2, the encrypted byte is 00001011. Note that the rightmost bit at position 0 is considered the least significant bit. As with myfilehide, myfilehide2 has the property that running the app again on the encrypted file with the same digit as second arguments decrypts the file. Perform a similar cleanup as myfilehide so that the encrypted file with suffix “.E2” is deleted. Use Makefile to compile your app. Test and verify that it works correctly on mac terminal.