Describe how HTML5, CSS, JavaScript, and JQuery all work in web applications. Describe server- and client-side interactions.
- APA Format
- Write 4-5 pages
- Include at least three or more references.
Describe how HTML5, CSS, JavaScript, and JQuery all work in web applications. Describe server- and client-side interactions.
Assignment 1
This a research project and on this week, Choose any one topic and should stick to the same topic for coming weeks. Write a short paragraph (250 words) describing your project and how you intend to research it.
· Cloud Computing
· Computer Forensics
· Data Center Security
· Disaster Recovery
Assignment 2
Do a bit of research on penetration testing techniques. Investigate and document the following:
· Five network penetration testing techniques
· Advantages and disadvantages of each
· One notable social engineering test
· Possible negative implications of penetration testing
Note: Please write between 250 words with intext citations and 2 references needed.
User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security. The basic function of an information system security framework is to ensure the confidentiality and the integrity, as well as the availability of systems, applications, and data. Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators.
You are provided with the text sheet entitled Integrated Distributors Incorporated (access_project_ts_integrateddistributors.docx) to complete this project. You play the dual role of an IT architect and IT security specialist working for Integrated Distributors Incorporated (IDI), a multi-national organization with offices in several countries. Your instructor for this course plays the role of the chief information officer (CIO). Your peers play the role of selected technology staff. Each of the organization’s locations is operating with different information technologies and infrastructure—IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations.
Your goals as the IT architect and IT security specialist are to:
Let’s consider the following scenario:
Papa Georgeo (AKA PG) is opening a Pizzeria and he needs a database to capture and maintain the data for the entities Sales, Customers, Products, Purchase, Suppliers, and Employees.
Business Needs:
PG would like to capture all the sales data with the details of every order. An order could be consisted of multiple items. For example, a customer could order 3 large pizza, 1 bread sticks, and 2 beverages in one order with one order ID. The Sales schema should capt
ure and maintain order date, customer ID, Order Time, Sub Total, Tax Amount, Total Due, Order Item, Qty, Price Charged for each item, Discount Amount for each item etc. PG is going to offer a club card (AKA PG Card) for his customers which they will hand it to the cashier to get points (those points are known as, you guessed it correctly, PG points! ???? ) every time they buy anything from the pizzeria. A customer can get a free pizza when he/she has accumulated enough points. In addition, PG would like to track who is buying what so he can create different promotions for his customers with that information. The restaurant will accept cash, checks, and all major credit cards as payment method.
Note: Find the complete question in the attached document
Imagine you are an information security manager in a medium-sized organization. Your CIO has asked you to prepare a case analysis report and presentation on establishing internal controls in cloud computing. The CIO has seen several resources online that discuss the security risks related to cloud-based computing and storage. One that stood out was Cloud Computing Risk Assessment: A Case Study. You are asked to summarize the information you can find on the Internet and other available sources. The CIO wants to have a firm grasp on the benefits and risks associated with public, private, and hybrid cloud usage. There is also concern over how these systems should be monitored to ensure proper usage and data security.
Write a 3–4 page paper in which you:
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.The specific course learning outcome associated with this assignment is:
GO19_AC_CH02_GRADER_2G_HW – Student Scholarships 1.0
GO19ACCH02GRADER2GHWStudent Scholarships1.0
In this project, you will use a database to answer questions about scholarships awarded to students at a college. You will create a relationship between two tables, create a query from an existing query, and create queries using text, numeric, compound, and wildcard criteria based using the fields in one or both tables. You will create calculated fields, group data when calculating statistics, create a crosstab query, and create a parameter query.
Start Access. Open the file ‘Student_Access_2G_Student_Scholarships.accdb‘ downloaded with this project.
Using Student ID as the common field, create a one-to-many relationship between the 2G Students table and the 2G Scholarships Awarded table. Enforce referential integrity and enable both cascade options.
Create a relationship report with normal margins, and save it as 2G Relationships. Close all open objects.
In the last record of the 2G Students table, change the Student ID from 9999999 to 2839403, and then close the table. (The related records in the Scholarships Awarded table will automatically update.)
Create a query in Query Design view based on the 2G Scholarships Awarded table to answer the question: What is the scholarship name, amount, and major for scholarships greater than or equal to $500, sorted in ascending order by the Scholarship Name field? Display the fields in the order listed in the question. Run the query. Eight records match the criteria. Save the query as 2G Amount $500 or More Query. Close the query.
Copy the 2G Amount $500 or More Query to create a new query with the name 2G Awards 4th Qtr Query and then redesign the query to answer the question: Which scholarships (Scholarship Name) were awarded between 10/1/22 and 12/31/22, for what amount, and for which student (Student ID), sorted in ascending order by the Award Date field? Display only the fields necessary to answer the question and in the order listed in the question. Run the query (five records display). Save the query, and then close the query.
Create a query in Query Design view based on the 2G Scholarships Awarded table to answer the question: Which scholarships (Scholarship Name) were awarded for either Math or Business majors for amounts of more than $200, sorted in descending order by the Amount field? Display the fields in the order listed in the question. Run the query. Four records match the criteria. (Hint: If six records display, switch to Design view and combine the majors on one criteria line using OR.) Save the query as 2G Math OR Business Over $200 Query, and then close the query.
Create a query in Query Design view based on the 2G Students table to answer the question: What is the city, student ID, first name, and last name of students from cities that begin with the letter L, sorted in ascending order by the City field and by the Last Name field? Run the query (five records display). Save the query as 2G L Cities Query, and then close the query.
Create a query in Query Design view based on the 2G Students table and all of the fields to answer the question: For which students is the Postal Code missing? Three records match the criteria. Run the query (three records display). Save the query as 2G Missing Postal Code Query, and then close the query.
Create a query in Query Design view based on both tables to answer the question: In ascending order by the Scholarship Name field, and including the first name and last name of the scholarship recipient, what will be the total value of each scholarship if the Board of Trustees donates an additional 50 percent of each award paid to students? (Hint: First calculate the amount of the donation, naming the new field Board Donation, and then run the query to be sure the correct results display (the first record—Scholarship Name that begins with Amanda—has a Board Donation of 125).
Display the query in Design view. In the sixth column of the design grid, create a new field named Total Donation that will calculate and display the total donation when the amount is added to the Board’s donation amount. Run the query.
Display the query in Design view. Use the Property Sheet to format the Board Donation field as Currency with 0 decimal places and the Total Donation field with 0 decimal places, and then close the Property Sheet. Run the query (the first record—Scholarship Name that begins with Amanda—has a Total Donation of $375.00), apply Best Fit to the fields, save the query as 2G Board Donation Query, and then close the query.
Create a query in Query Design view based on the 2G Scholarships Awarded table and the Sum aggregate function to answer the question: For each major, what is the total scholarship amount, sorted in descending order by the Amount field? Use the Property Sheet to format the Amount field with 0 decimal places, and then close the Property Sheet. Run the query (for the Major of History, the total scholarship amount is $1,850). Apply Best Fit to the fields, save the query as 2G Amount by Major Query, and then close the query.
Use the Query Wizard to create a crosstab query based on the 2G Scholarships Awarded table with the Student ID field as row headings and the Major field as column headings. Sum the Amount field, and name the query 2G Student ID and Major Crosstab Query. Display the query in Design view. Use the Property Sheet to format the last two columns with 0 decimal places, and then close the Property Sheet. Run the query, apply Best Fit to the fields, save the query, and then close the query.
Create a query in Query Design view based on the 2G Scholarships Awarded table that prompts you to Enter the Major of the student, and then answers the question: What is the scholarship name and amount for a major, sorted in ascending order by the Scholarship Name field? Run the query, and when prompted, enter history as the criteria (four records display). Display the query in Design view and hide the Major field from the results. Run the query again, entering history when prompted. Save the query as 2G Major Parameter Query, and then close the query.
1. Based upon the current state of the art of robotics applications, which industries are most likely to embrace robotics? Why?
2. Watch the following two videos: https://www. youtube.com/watch?v=GHc63Xgc0-8 and https:// www.youtube.com/watch?v=ggN8wCWSIx4 for a different view on impact of AI on future jobs. What are your takeaways from these videos? What is the more likely scenario in your view? How can you prepare for the day when humans indeed may not need to apply for many jobs?
3. Identify applications other than those discussed in this chapter where Pepper is being used for commercial and personal purposes.
4.Conduct research to identify the most recent developments in self-driving cars
Write a PHP script to implement a function which will display the current date. Also, have the script print out a message stating how many days until your birthday. You can “hardcode” your birth date into the script and have the script calculate the number of days until your birthday any way that you wish.
Programming Fundamentals (48023) – Assignment 2
Due date: Monday, 4th June 2012, 9:00 am.
Value: 20%
Topics: Control flow, Arrays.
Objectives: This assignment supports objectives 1-5.
Introduction
Assignment 2 extends the game of Assignment 1 to support any number of enemies, which are
to be stored as an array.
Skeleton code
Download the skeleton code from UTSOnline/Assignments/Assignment 2/Skeleton Code. Your
solution must be based on this skeleton code.
Minimum requirements
To receive any marks, your solution must meet the following minimum requirements:
1. IMPORTANT: In your project, you will find a white document icon with a folded
corner. This is the README file for your project.
In this README file, you must keep a journal of every change that you submit to
plate. Each journal entry should begin on a new line, starting with the date of the
journal entry. In each journal entry, you should give an explanation of the code you
changed. For example:
14th of May – My first attempt at Task 2w. I added a method inside EnemyShip
to update the xyz field, and then I modified foo() to loop over all of the
enemy ships and call that method.
15th of May – Fixed the ArrayIndexOutOfBoundsException in method foo() by
making sure the for loop goes only up to position array.length-1.
15th of May – Fixed a few small indentation mistakes.
You should always submit your progress to PLATE in small increments, and include a
journal entry along with each small increment that you make. For example, after
making your first attempt at task 1a below, add your journal entry immediately to the
README file and then submit your project to PLATE.
If you do not update your journal in this manner for any part of the assignment, then
you will not receive marks for that part of the assignment.
Programming Fundamentals (48023) Autumn 2012 Assignment 2
Page 1
You must regularly submit to PLATE while developing your solution. You should
definitely NOT suddenly submit a completely working solution close to or on the due
date without submitting your progress (journal), because there will be no evidence that
you developed your solution. Any student who submits a substantial solution without
an equally substantial record of previous submissions (journal) during development will
receive ZERO.
2. Your solution must be based on the given skeleton code.
3. Your solution output must exactly match the benchmark output that is shown when
submitting to PLATE.
4. Any existing public methods, fields or classes in the skeleton code must not be
renamed, have their parameters added/removed or return types changed, although you
are free to add additional methods, fields and classes.
5. Tasks will not be marked unless they are completed in the order specified below.
6. To receive marks for the HD Task, you must be present to demonstrate your solution in
your final lab (week 14).
Specification and Tasks
Before beginning, download and open the skeleton code from UTSOnline. This project
contains a solution to Assignment 1 which must be used as a starting point for Assignment2.
The skeleton code project may be started by right-clicking on the UI class and selecting the
main() method.
An alternative graphical user interface has also been provided for students who are curious to
see how graphics could be added to the program. To run this, right-click on the GUI class and
select its main() method. You are not required to make modifications to this class, and you are
free to remove it from your project at any time.
Task 1: Rewrite the program to use arrays (40 marks)
It is important to complete the following tasks exactly as specified, and exactly in the same
order. If you do not, PLATE will not be able to mark you. Be sure to submit your progress to
PLATE regularly.
1a) Replace the enemy1, enemy2 and enemy3 fields by a single array called enemies.
Throughout your Game, each time you refer to one of the fields enemy1, enemy2 or
enemy3, replace that reference to the field by a reference to a particular position in the
enemies array. For example, whenever you refer to enemy1, you should refer to
enemies[0] instead. In order to avoid a NullPointerException, you must also create the
enemies array in the constructor before you attempt to store enemies into it.
1b) Notice that the Game constructor now reads the number of enemies from the user
and stores this into a local variable numEnemies. Modify your constructor so that it no
Programming Fundamentals (48023) Autumn 2012 Assignment 2
Page 2
longer creates 3 enemies, but instead creates however enemies the user requested,
according to the number that is stored in the local variable numEnemies.
Modify each of the following methods to take into account the true length of the enemies array,
rather than assuming 3 enemies:
1c) toString()
1d) print()
1e) moveEnemies()
1f) movePlayer()
1g) over()
Task 2: Add new features (50 marks)
The following tasks are of varying levels of difficulty. In some cases, you may decide to skip a
task and move on to the next one, unless that task is marked as REQUIRED. Any task marked
as required cannot be skipped, and PLATE will not continue marking the later tasks until that
task is correctly implemented. Be sure to submit your progress to PLATE regularly.
2a) If the user types ‘1’ after the “move:” prompt, this will cause all of the enemy ships
to reverse direction.
2b) If a gun fires when multiple enemies are lined up in front of the gun, only the
enemy closest to the gun will be hit. Hint: The modify the fire() method in PlayerShip
and Gun to take the entire array of enemies, rather than a single enemy.
2c) If the user types ‘2’ after the “move:” prompt, all of the enemies in the array will be
sorted so that the enemy with the smallest x position will be placed into enemies[0], the
next smallest will be placed into enemies[1], and so on. You must implement one of the
sorting algorithms presented in the lectures.
2d) (REQUIRED) If an enemy is destroyed, it is resurrected 3*numEnemies moves
later with its initial life intact.
2e) If a user inputs a velocity for an enemy greater than 1, or less than -1, the velocity
will indicate how many positions the enemy will move in one step. Care is required
when an enemy hits a boundary and turns in the opposite direction. For example, if an
enemy is at position 2 and it moves at velocity 4, it will end up at position 6. But if the
enemy is at position 3 and it moves at velocity 4, it will end up at position 5, because it
would have hit the boundary and turned around before being able to move a total
distance of 4 positions. After it has turned around, it’s velocity would change to -4 to
indicate that it was moving left. For further clarification, submit your project to PLATE
to see the expected output.
2e) If the user types ‘3’ after the “move:” prompt, whichever enemy is directly in front
of the player will be moved back to the farthest row of enemies, and every enemy that
was behind it will be moved forward one row. For example, if there are 5 enemies
e1,e2,e3,e4,e5 and enemy e3 is directly in front of the player when ‘2’ is pressed, the
result will be e1,e2,e4,e5,e3.
Programming Fundamentals (48023) Autumn 2012 Assignment 2
Page 3
2e) If the user types ‘4’, all dead enemies (i.e. marked with an ‘X’ symbol) are removed
from the array completely. Note that since it is not possible to change the length of an
existing array, you will have to create a new shorter array, and copy all of the remaining
“living” enemies from the old array into the new array.
Task 3: High Distinction (HD) task (10 marks)
This task is intended for HD students. If you complete this task, you must demonstrate it at the
week 14 lab session, and it will be marked manually by your tutor.
Make a copy of your project for Task 3. Your solution to Task 3 will be submitted separately
from your earlier tasks, and a separate submission page has been set up on PLATE for this
purpose under the name “Assignment 2 (HD Task)”. Although this task will not be
automatically marked by PLATE, you must still submit your solution to PLATE by the due
date for it to be marked.
In your new Task 3 project, modify the game so that each enemy has both an x and y position.
Now, the height of each enemy is not determined by its position in the array but rather by the
value of the y coordinate of that enemy. At the beginning of the game, the enemies should be
placed into different rows (at different y positions), and the enemy on the bottom row should be
at least 5 spaces above the player. You have some degree of freedom as to the exact positions of
your enemies, as this task will be marked manually rather than by PLATE.
Enemies not only move left and right, but also move down one step whenever they hit a left or
right boundary. If an enemy makes it to the bottom row where the player is, the player dies and
a “You Lose” message is displayed.
Marking scheme
Your solution will be marked according to the following scheme:
Task 1: Rewrite program to use arrays (40%)
Task 2: Add new features
(50%)
Task 3: HD task
(10%)
Indentation consistency
1 mark will be subtracted from your task 1 and
task 2 marks for each indentation mistake found.
To indent properly, code should be shifted right
by one tab between { and } and within nested
control structures such as if statements, switch
statements and loop statements. In a switch
statement, the code within each case should also
be indented.
Tasks 1, 2 and indentation consistency are marked by PLATE. However, if your journal does
not show your progress for any sub-task marked by PLATE (e.g. 1a, 1b, 1c, …) you will not
receive any marks for that sub-task. Hence, the mark awarded by PLATE is not the final mark.
Programming Fundamentals (48023) Autumn 2012 Assignment 2
Page 4
Task 3 will be marked by a tutor at the week 14 lab session while you demonstrate your
program. It will be marked based on the quality of your code, and on the quality of the program
from the user’s perspective. Your program should be easy to use and should gracefully handle
bad inputs by the user. You must also keep a journal for this task, and you must be prepared to
explain your code in person at the demonstration.
Assignment submission, demonstration and return
Your assignment must be submitted to PLATE (http://plate.it.uts.edu.au/) after completing each
task, and before the due date.
There are two parts to your submission:
1. Your assignment is to be submitted as a JAR file through the PLATE system, online, at
http://plate.it.uts.edu.au/. Tasks 1and 2 should be submitted under the assessment
“Assignment 2”, while Task 3 should be submitted under the assessment “Assignment 2
HD”. You may submit and resubmit as many times as you wish, before the due date.
Please note every time you submit your tasks on plate, the marks you receive are
indicative only. Your final marks for Assignment 2 will be available through PLATE
within 2 weeks after the due date.
2. If you attempted the HD task (Task 3), you must demonstrate your program in
your final lab session in week 14. Failure to demonstrate your HD task will result
in a zero mark for the HD task irrespective of the assignment being submitted to
PLATE.
If for some reason you are unable to attend on this day, you must arrange with the
subject coordinator via email, before the due date, an alternate demonstration time. You
must bring your student ID card to the demonstration as proof of your identity.
Late submission
The assignment is due at 9:00 am on Monday, 4th June 2012. Each 24 hour period after this
time is considered to be an extra day late. For example, a submission at 9:01 am on Monday,
4th June is considered 1 day late, while a submission at 9:01 am on Tuesday, 5th June is
considered 2 days late.
Your assignment will lose 20% of its original mark per day late, unless permission has been
given by the subject co-ordinator before the due date.
If your performance in an assessment item or items has been affected by extenuating or special
circumstances beyond your control you may apply for Special Consideration. Information on
how to apply can be found at http://www.sau.uts.edu.au/assessment/consideration.html
Individual assessment
This assignment must be done by yourself and not with anyone else. Group work is not
allowed and will be considered as academic misconduct.
Programming Fundamentals (48023) Autumn 2012 Assignment 2
Page 5
Academic misconduct
Working with another person on this assignment is not allowed and is considered as academic
misconduct. Do not show other people your code, or look at other people’s code, or discuss
assignment code with other people; it is an offence to have a copy of someone else’s
assignment (before the submission date). Do not post your assignment on the web. Posting
your assignment on the web and getting help through blogs or other websites is considered to
be an academic misconduct.
To detect plagiarism, the subject uses an online system called PLATE available at
http://plate.it.uts.edu.au
Students may find it useful to consult The UTS Coursework Assessment Policy & Procedure
Manual, at http://www.gsu.uts.edu.au/policies/assessment-coursework.html
Expected work load
It is expected that this assignment will take about 12 to 18 hours of work. A well-designed
solution to task 1 and 2 is expected to use approximately 110 lines of code. Depending on your
design, Task 3 may use anywhere from 50 to 150 lines of code. Some people may complete the
task in 3 hours, and some may need 30 hours or more; there is a huge variation in students’
experience and abilities.
Frequently asked questions
A FAQ (Frequently Asked Questions) will be maintained at
UTSOnline/Assignments/Assignment 2/FAQ. FAQs and their answers will be posted there as
they arrive. You should read the FAQ at least once before you hand in your solution, but to be
safe check it every couple of days. Anything posted on the FAQ will be considered as part of
the assignment specification. The FAQ will be frozen (no new entries) two days before the due
date.
Discussion board
A discussion board has been set up on UTSOnline to discuss the assignment. You may discuss
any task of the assignment; however you must not share actual code from the assignment on
the board. The FAQ should always be checked before asking questions on the discussion board.
Rules for use of the discussion board are published on the discussion board itself. Please read
these rules carefully.
Programming Fundamentals (48023) Autumn 2012 Assignment 2
Page 6
Framework Purpose, Scope, Principles, and kind of structure use
Exp19_Excel_Ch10_Cap_Auto_Sales| Exp19 Excel Ch10 Cap Auto Sales
#Start Excel. Download and open the file named Exp19_Excel_Ch10_Cap-AutoSales.xlsx. Grader has automatically added your last name to the beginning of the filename.
#Use Get & Transform (Power Query) to import the file e10c1Agents.csv.
Hint: Get Data is located on the Data tab in the Get & Transform Data group.
Rename the worksheet Agents.
Hint: Double click the worksheet tab to edit the sheet name.
#Use Get & Transform (Power Query) to import the Vehicles table from the file e10c1Vehicles.accdb.
Hint: Get Data is located on the Data tab in the Get & Transform Data group.
Rename the worksheet Sales.
Hint: Double click the worksheet tab to edit the sheet name.
#Load the file e10c1Customer_Leads.txt in the Power Query Editor. Use the Power Query Editor to ensure the first row is used as Headers. Close and load the table.
Hint: To open the data in the Power Query Editor click Edit on the Import window.
Rename the worksheet Customer_Leads.
Hint: Double click the worksheet tab to edit the sheet name.
Add the Vehicles, e10c1Agents, and e10c1Customer_Leads tables to the data model.
Hint: Manage Data Model is located on the Data tab in the Data Tools group.
#Define the following relationship:
Table:
e10c1Agents
Field:
AgentID
Table:
Vehicles
Field:
AgentID
Hint: Relationships is located on the Data tab in the Data Tools group.
#Use Power Pivot to create a PivotTable on Sheet1 starting in cell B3. Add the Last field from the e10c1Agents table to the Rows area and Price from the Vehicles table to the Values area.
Hint: Power Pivot is an Excel add-in that must be loaded. Power Pivot can be loaded by accessing COM add-ins in Excel options. Once loaded, the Power Pivot tab is located on the Office ribbon.
Format the range C4:C20 with Accounting Number Format.
Hint: Accounting Number Format is located on the Home tab in the Number group.
Insert a Clustered Column Pivot Chart. Position the chart so the upper left corner is in the center of cell D3.
Hint: #PivotChart is located on the Analyze tab in the Tools group.
Add the Chart Title Sales.
Hint: Chart elements can be added or edited on the Design tab in the Chart Layouts group.
Rename the worksheet SalesAnalysis.
Hint: Double-click the worksheet tab to edit the sheet name.