This week our topic shifts to working with data. In this week’s discussion post, please note a system that you work with frequently that has a major data component. Note the type of data, how the data is managed and maintained, and any other important factors regarding the data in the system.
Discussion 300 words
Describe some ways that an administrator can harden a system on a network.
Machine Learning algorithms implementation in Python
Implement classifiers KMeans, Random Forest and Decision Tree, SVM, XGBoost and Naive Bayes for the given dataset of audio samples to find top genre for an audio sample.
Software Architecture, Microservices Architecture, Cloud-based software
Part A (1000 words): Discuss the advantages and disadvantages of centralized and decentralized Software Architecture.
Part B (1000 words): Review the following url and provide an active discussion focused on the Software Architecture and Design. https://docs.microsoft.com/en-us/previous-versions/msp-n-p/ff921345(v=pandp.10)
Part C (1000 words): Discuss issues facing Cloud-based software discussing each component of “Everything as a Service”.
Part D (1000 words): Discuss each aspect of Microservices Architecture.
Part E (1000 words): Discusses each aspect of Computer Architecture Testing
CS 210 Project 3
I need help with this assignment. I am completely lost.
Competency
In this project, you will demonstrate your mastery of the following competency:
- Utilize various programming languages to develop secure, efficient code
Scenario
You are doing a fantastic job at Chada Tech in your new role as a junior developer, and you exceeded expectations in your last assignment for Airgead Banking. Since your team is impressed with your work, they have given you another, more complex assignment. Some of the code for this project has already been completed by a senior developer on your team. Because this work will require you to use both C++ and Python, the senior developer has given you the code to begin linking between C++ and Python. Your task is to build an item-tracking program for the Corner Grocer, which should incorporate all of their requested functionality.
The Corner Grocer needs a program that analyzes the text records they generate throughout the day. These records list items purchased in chronological order from the time the store opens to the time it closes. They are interested in rearranging their produce section and need to know how often items are purchased so they can create the most effective layout for their customers. The program that the Corner Grocer is asking you to create should address the following three requirements for a given text-based input file that contains a list of purchased items for a single day:
- Produce a list of all items purchased in a given day along with the number of times each item was purchased.
- Produce a number representing how many times a specific item was purchased in a given day.
- Produce a text-based histogram listing all items purchased in a given day, along with a representation of the number of times each item was purchased.
As you complete this work, your manager at Chada Tech is interested to see your thought process regarding how you use the different programming languages, C++ and Python. To help explain your rationale, you will also complete a written explanation of your code’s design and functionality.
Directions
One of Python’s strengths is its ability to search through text and process large amounts of data, so that programming language will be used to manage internal functions of the program you create. Alternatively, C++ will be used to interface with users who are interested in using the prototype tracking program.
Grocery Tracking Program
Begin with a Visual Studio project file that has been set up correctly to work with both C++ and Python, as you have done in a previous module. Remember to be sure you are working in Release mode, rather than Debug mode. Then add the CS210_Starter_CPP_Code and CS210_Starter_PY_Code files, linked in the Supporting Materials section, to their appropriate tabs within the project file so that C++ and Python will be able to effectively communicate with one another. After you have begun to code, you will also wish to access the CS210_Project_Three_Input_File, linked in the Supporting Materials section, to check the functionality and output of your work.
As you work, continue checking your code’s syntax to ensure your code will run. Note that when you compile your code, you will be able to tell if this is successful overall because it will produce an error message for any issues regarding syntax. Some common syntax errors are missing a semicolon, calling a function that does not exist, not closing an open bracket, or using double quotes and not closing them in a string, among others.
- Use C++ to develop a menu display that asks users what they would like to do. Include options for each of the three requirements outlined in the scenario and number them 1, 2, and 3. You should also include an option 4 to exit the program. All of your code needs to effectively validate user input.
- Create code to determine the number of times each individual item appears. Here you will be addressing the first requirement from the scenario to produce a list of all items purchased in a given day along with the number of times each item was purchased. Note that each grocery item is represented by a word in the input file. Reference the following to help guide how you can break down the coding work.
- Write C++ code for when a user selects option 1 from the menu. Select and apply a C++ function to call the appropriate Python function, which will display the number of times each item (or word) appears.
- Write Python code to calculate the frequency of every word that appears from the input file. It is recommended that you build off the code you have already been given for this work.
- Use Python to display the final result of items and their corresponding numeric value on the screen.
- Create code to determine the frequency of a specific item. Here you will be addressing the second requirement from the scenario to produce a number representing how many times a specific item was purchased in a given day. Remember an item is represented by a word and its frequency is the number of times that word appears in the input file. Reference the following to help guide how you can break down the coding work.
- Use C++ to validate user input for option 2 in the menu. Prompt a user to input the item, or word, they wish to look for. Write a C++ function to take the user’s input and pass it to Python.
- Write Python code to return the frequency of a specific word. It will be useful to build off the code you just wrote to address the first requirement. You can use the logic you wrote but modify it to return just one value; this should be a fairly simple change (about one line). Next, instead of displaying the result on the screen from Python, return a numeric value for the frequency of the specific word to C++.
- Write a C++ function to display the value returned from Python. Remember, this should be displayed on the screen in C++. We recommend reviewing the C++ functions that have already been provided to you for this work.
- Create code to graphically display a data file as a text-based histogram. Here you will be addressing the third requirement from the scenario: to produce a text-based histogram listing all items purchased in a given day, along with a representation of the number of times each item was purchased. Reference the following to help guide how you can break down the coding work:
- Use C++ to validate user input for option 3 in the menu. Then have C++ prompt Python to execute its relevant function.
- Write a Python function that reads an input file (CS210_Project_Three_Input_File, which is linked in the Supporting Materials section) and then creates a file, which contains the words and their frequencies. The file that you create should be named frequency.dat, which needs to be specified in your C++ code and in your Python code. Note that you may wish to refer to work you completed in a previous assignment where you practiced reading and writing to a file. Some of your code from that work may be useful to reuse or manipulate here. The frequency.dat file should include every item (represented by a word) paired with the number of times that item appears in the input file. For example, the file might read as follows:
- Potatoes 4
- Pumpkins 5
- Onions 3
- Write C++ code to read the frequency.dat file and display a histogram. Loop through the newly created file and read the name and frequency on each row. Then print the name, followed by asterisks or another special character to represent the numeric amount. The number of asterisks should equal the frequency read from the file. For example, if the file includes 4 potatoes, 5 pumpkins, and 3 onions then your text-based histogram may appear as represented below. However, you can alter the appearance or color of the histogram in any way you choose.
- Potatoes ****
- Pumpkins *****
- Onions ***
- Apply industry standard best practices such as in-line comments and appropriate naming conventions to enhance readability and maintainability. Remember that you must demonstrate industry standard best practices in all your code to ensure clarity, consistency, and efficiency. This includes the following:
- Using input validation and error handling to anticipate, detect, and respond to run-time and user errors (for example, make sure you have option 4 on your menu so users can exit the program)
- Inserting in-line comments to denote your changes and briefly describe the functionality of the code
- Using appropriate variable, parameter, and other naming conventions throughout your code
Discussion Operations Security
Enforcement of security policies is most effective when it comes from leadership. Employees look to executive management for direction. The executive is more likely to enforce policies to support his or her personal credibility. Once executives put their own credibility behind policies, they are less likely to allow violations to occur.
Finding the right level of leadership to take action can be a challenge. It’s generally more effective to have leadership governance and management committees responsible for IT security policy enforcement, where governance sets the direction for management to follow.
Answer the following question(s):
Why, or in what ways, would a governance committee be more effective than an executive in enforcing security policies?
Cyber Law Inquiries and Incidents
It is essential that a security professional is able to resolve and respond to cyber law inquiries and incidents while avoiding unnecessary litigation.
In 500-750 words, explain why a legal cyber inquiry into an organization would need to be made and the process that would then be followed (consider the Napster ruling). Within your explanation, make sure to address the following:
- Procedures for testing, enforcing, and investigating breaches of policy
- Data breach notification laws
- The process for an incident response to a ransomware event
- The laws and regulations will often define sensitive or protected data and the reporting requirements in the case of a data breach. Failure to follow the prescribed process can often result in fines or other penalties. From the Christian worldview, which one should be considered first: protecting privacy or complying with the laws and regulations?
Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are required to submit this assignment to LopesWrite.
compare the instance scan results with a results from ping scan
compare the instance scan results with a results from ping scan
20210330
Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).
You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.
Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.
Research project
Research Project on
Mobile Users and Data Security
. It must consist of:
1. 5 source annotated bibliography
2. slide presentation with 12 or more slides
3. Summary or Abstract containing at least 750 words.The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use academically appropriate resources. Use the Research Databases available from the Danforth Library, not Google.