CYBERLAWS & ETHICAL HACKING

Task : Analyze secure web application design principles against specific attacks.

You are attempting to strengthen the security of your company’s e-commerce web application. You send a memo to the staff developers requiring the next version to use proper design principles that will prevent buffer overflows.
  1. 1. Will a more secure design of your web application also minimize the effects of a denial of service (DoS) or distributed denial of service (DDoS) attack on your web server? Why or why not?

Fully address the question(s) in this topic; provide valid rationale for your choices, where applicable.

computer science

 Modify DepartmentSalesS project posted on Blackboard as “Observer Pattern Example – Chart Using Swing” Add an Observer to display monthly sales in a pie chart. You modify YDTChart.java so it will display a pie chart. Modify SupervisorView.java to add a PieChart observer and change Layout so it has three columns. Follow the link to see how to draw pie chart as multiple pies. http://cs111.wellesley.edu/~cs111/archive/cs111_fall06/public_html/labs/lab12/arc.html You may use a Color array like Color[] colors= {Color.blue,Color.yellow, Color.gray, Color.green, Color.cyan, Color.red,Color.magenta, Color.orange, Color.pink, Color.darkGray, Color.black, Color.lightGray}; Before you draw the pie piece for a month i, you set color like g.setColor(colors[i]); 2. Modify ChartS posted on Blackboard as “Observer Pattern Example – Chart Using Swing” Add a PieChart to display monthly sales You may follow the following website: http://tutorials.jenkov.com/javafx/piechart.html Create array of PieChart.Data using a loop. Add one a time to PieChart using a loop. To display the tip of %, you may follow the following website https://riptutorial.com/javafx/example/8733/pie-chart 

Discussion 3- Exe Proj

 Chapter 3. Project Selection and Portfolio Management Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. What are the keys to successful project portfolio management? What are some of the key difficulties in successfully implementing portfolio management practices?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!] [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review] 

 Text

Title: Project Management

ISBN: 9780134730332

Authors: Pinto

Publisher: Pearson

Edition: 5TH 19

Homework

Sub: intro to data mining

 

Week 5 Homework

After reviewing the case study this week by Krizanic (2020), answer the following questions in essay format.

  1. What is the definition of data mining that the author mentions?  How is this different from our current understanding of data mining?
  2. What is the premise of the use case and findings?
  3. What type of tools are used in the data mining aspect of the use case and how are they used?
  4. Were the tools used appropriately for the use case?  Why or why not?

In an APA7 formatted essay answer all questions above.  There should be headings to each of the questions above as well.  Ensure there are at least two-peer reviewed sources to support your work. The paper should be at least two pages of content (this does not include the cover page or reference page). 

SE494 week 8

400 words and provide references 

Review the research paper on Methods for Evaluating Mobile Health Apps in this website,

https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5748471/

And, answer the following questions

Question 1: What are methods for evaluating health mobile apps?

Question 2 : Download and compare the following two Mobile Health Apps  based on Content .

Spok  Mobile App  vs PatientTouch System Mobile App. Both apps are available for free download

Robotics, AI and Building Apps

1. Assignment 1

Chapter 10

Discussion Question 1: Based on the current state of art of robotics applications, which industries are most likely to embrace robotics? Why?

Discussion Question 2: Watch the following video: https://www.youtube.com/watch?v=ggN8wCWSIx4 for a different view on the impact of AI on future jobs. What are your takeaways from the video? What is the more likely scenario in your view? How can you prepare for the day when humans indeed may not need to apply for many jobs? Write a report.

Exercise 1: Identify applications other than those discussed in this chapter where Pepper is being used for commercial and personal purposes.

Exercise 7: Conduct research to identify the most recent developments in self-driving cars. Write a report.

Chapter 11

Discussion Question 1: Explain why it is useful to describe group work in terms of the time/space framework.

Discussion Question 2: Describe the kinds of support that groupware can provide to decision makers.

Discussion Question 3: Explain why most groupware is deployed today over the web.

Discussion Question 4: Explain in what ways physical meetings can be inefficient. Explain how technology can make meetings more effective.

Exercise 4: Compare Simon’s four-phase decision-making model to the steps in using GDSS. Write a report.

Textbook: Business Intelligence and Analytics 

ISBN: 9780135192016

Your response should be 5-6 pages. There must be APA formatted references (and APA in-text citation) to support the thoughts in the post.

2. Portfolio Assignment

Discuss a current business process in a specific industry (The current business process itself and the industry in which the business process is utilized).

After explaining the current situation, take the current learning from the course and:

1. Explain a new technology that the business should deploy.  Be specific, don’t only note the type of technology but the specific instance of technology.  (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).

2. Note the pros and cons of the technology selected.

3. Note various factors the business should consider prior to deploying the new technology

The above submission should be 3 pages in length.  Remember the total length does not include the APA-approved cover page or the references.  There should be at least three APA-approved references to support your work. Please refer to Textbook: Business Intelligence and Analytics 

ISBN: 9780135192016

3. Assignment: Building APPS

Using the industry where you currently work or have worked before, write a 3-page proposal recommending your choice between Android or iOS. From a user and developer’s perspective, which would you recommend to your company and why?

Your assignment must follow these formatting requirements:

  • Please provide 3 – 5 peer-review references to substantiate your viewpoint. Note: Wikipedia and similar Websites do not qualify as quality resources.

Service Models

Compare and contrast the following service models:  Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). Technical product descriptions may be used as references for this submission however they may account for no more than half of the total references.

The requirements for your paper are:

• Describe the service models SaaS, IaaS, Paas, including:

o An example of each

o The pros and cons associated with each model

• Explain the similarities and differences between the three models

• APA formatted including title page, reference page, and in-text citations.

Modify the Week Three Java

  

Modify the Week Three Java™ application using Java™ NetBeans™ IDE to meet these additional and changed business requirements:

The application will now compare the total annual compensation of at least two salespersons.

It will calculate the additional amount of sales that each salesperson must achieve to match or exceed the higher of the two earners.

The application should ask for the name of each salesperson being compared.

The Java™ application should also meet these technical requirements:

The application should have at least one class, in addition to the application’s controlling class.

The source code must demonstrate the use of Array or ArrayList.

There should be proper documentation in the source code.

Define the concept of a shared responsibility model in cloud security.

   

Write 2- to 3-page security design and approach brief in which you:

• Define the concept of a shared responsibility model in cloud security.

• Expound on why the shared responsibility model is unique to the cloud environment.

• List common security threats in the cloud environment that GTR would want to consider.

• List three security services.

• Explain how the security services would help mitigate threats.